default search action
Chuanyi Liu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j37]Junbin Fang, You Jiang, Canjian Jiang, Zoe Lin Jiang, Chuanyi Liu, Siu-Ming Yiu:
State-of-the-art optical-based physical adversarial attacks for deep learning computer vision systems. Expert Syst. Appl. 250: 123761 (2024) - [j36]Tianyu He, Peiyi Han, Shaoming Duan, Zirui Wang, Wentai Wu, Chuanyi Liu, Jianrun Han:
Generative data augmentation with differential privacy for non-IID problem in decentralized clinical machine learning. Future Gener. Comput. Syst. 160: 171-184 (2024) - [j35]Jiageng Yang, Chuanyi Liu, Binxing Fang:
Adaptive scheduling-based fine-grained greybox fuzzing for cloud-native applications. J. Cloud Comput. 13(1): 118 (2024) - [j34]Wenjian Luo, Licai Zhang, Yulin Wu, Chuanyi Liu, Peiyi Han, Rongfei Zhuang:
Capacity Abuse Attack of Deep Learning Models Without Need of Label Encodings. IEEE Trans. Artif. Intell. 5(2): 814-826 (2024) - [j33]Yatao Liang, Hui Lv, Yan Li, La Duo, Chuanyi Liu, Qingguo Zhou:
Tibetan-BERT-wwm: A Tibetan Pretrained Model With Whole Word Masking for Text Classification. IEEE Trans. Comput. Soc. Syst. 11(5): 6268-6277 (2024) - [j32]Yuanhang Yang, Wei He, Cuiyun Gao, Zenglin Xu, Xin Xia, Chuanyi Liu:
TopicAns: Topic-informed Architecture for Answer Recommendation on Technical Q&A Site. ACM Trans. Softw. Eng. Methodol. 33(1): 20:1-20:25 (2024) - [c47]Shuoran Jiang, Qingcai Chen, Youcheng Pan, Yang Xiang, Yukang Lin, Xiangping Wu, Chuanyi Liu, Xiaobao Song:
ZO-AdaMU Optimizer: Adapting Perturbation by the Momentum and Uncertainty in Zeroth-Order Optimization. AAAI 2024: 18363-18371 - [c46]Wenxin Mao, Ruiqi Wang, Jiyu Guo, Jichuan Zeng, Cuiyun Gao, Peiyi Han, Chuanyi Liu:
Enhancing Text-to-SQL Parsing through Question Rewriting and Execution-Guided Refinement. ACL (Findings) 2024: 2009-2024 - [c45]Yuhao Zhang, Shaoming Duan, Xinyu Zha, Jinhang Su, Peiyi Han, Chuanyi Liu:
FEDKA: Federated Knowledge Augmentation for Multi-Center Medical Image Segmentation on non-IID Data. ICASSP 2024: 2116-2120 - [c44]Tiancai Liang, Yun Zhao, Haolin Wang, Ziwen Cai, Zhaoguo Wang, Wenchao Wang, Chuanyi Liu:
FRBBM-Scheme: A Flexible Ratio Virtual Primary Key Generation Approach Based on Binary Matching. Intelligent Information Processing (1) 2024: 438-452 - [i12]Lehang Li, Haokuan Wu, Botao Yao, Tianyu He, Shuohan Huang, Chuanyi Liu:
First-principles Based 3D Virtual Simulation Testing for Discovering SOTIF Corner Cases of Autonomous Driving. CoRR abs/2401.11876 (2024) - [i11]Yinggang Sun, Ziming Guo, Haining Yu, Chuanyi Liu, Xiang Li, Bingxuan Wang, Xiangzhan Yu, Tiancheng Zhao:
QDA-SQL: Questions Enhanced Dialogue Augmentation for Multi-Turn Text-to-SQL. CoRR abs/2406.10593 (2024) - [i10]Wenbo Xu, Liang Yan, Peiyi Han, Haifeng Zhu, Chuanyi Liu, Shaoming Duan, Cuiyun Gao, Yingwei Liang:
TCSR-SQL: Towards Table Content-aware Text-to-SQL with Self-retrieval. CoRR abs/2407.01183 (2024) - [i9]Qingming Zeng, Mo Li, Ximing Fu, Chuanyi Liu, Hui Jiang:
IM: Optimizing Byzantine Consensus for High-Performance Distributed Networks. CoRR abs/2409.19286 (2024) - [i8]Ximing Fu, Mo Li, Qingming Zeng, Tianyang Li, Shenghao Yang, Yonghui Guan, Chuanyi Liu:
Hamster: A Fast Synchronous Byzantine Fault Tolerance Protocol. CoRR abs/2409.19564 (2024) - [i7]Ximing Fu, Mo Li, Shihan Lyu, Chuanyi Liu:
Bit-fixing Correlation Attacks on Goldreich's Pseudorandom Generators. IACR Cryptol. ePrint Arch. 2024: 1594 (2024) - 2023
- [j31]Chunkai Zhang, Xinyu Wang, Hongye Zhang, Jiahua Zhang, Hanyu Zhang, Chuanyi Liu, Peiyi Han:
LayerLog: Log sequence anomaly detection based on hierarchical semantics. Appl. Soft Comput. 132: 109860 (2023) - [j30]Shaoming Duan, Chuanyi Liu, Peiyi Han, Xiaopeng Jin, Xinyi Zhang, Tianyu He, Hezhong Pan, Xiayu Xiang:
HT-Fed-GAN: Federated Generative Model for Decentralized Tabular Data Synthesis. Entropy 25(1): 88 (2023) - [j29]Chunkai Zhang, Xinyu Wang, Jiahua Zhang, Shaocong Li, Hanyu Zhang, Chuanyi Liu, Peiyi Han:
VESC: a new variational autoencoder based model for anomaly detection. Int. J. Mach. Learn. Cybern. 14(3): 683-696 (2023) - [j28]Shiyi Qi, Yaoxian Li, Cuiyun Gao, Xiaohong Su, Shuzheng Gao, Zibin Zheng, Chuanyi Liu:
Dynamically Relative Position Encoding-Based Transformer for Automatic Code Edit. IEEE Trans. Reliab. 72(3): 1147-1160 (2023) - [j27]Wenbo Xu, Peiyi Han, Shaoming Duan, Chuanyi Liu:
FIGAT: Accurately Classify Individual Crime Risks With Multi-Information Fusion. IEEE Trans. Serv. Comput. 16(3): 1890-1903 (2023) - [c43]Yuanhang Yang, Shiyi Qi, Chuanyi Liu, Qifan Wang, Cuiyun Gao, Zenglin Xu:
Once is Enough: A Light-Weight Cross-Attention for Fast Sentence Pair Modeling. EMNLP 2023: 2800-2806 - [c42]Junbin Fang, Zewei Yang, Siyuan Dai, You Jiang, Canjian Jiang, Zoe Lin Jiang, Chuanyi Liu, Siu-Ming Yiu:
Cross-Task Physical Adversarial Attack Against Lane Detection System Based on LED Illumination Modulation. PRCV (3) 2023: 478-491 - [i6]Junbin Fang, You Jiang, Canjian Jiang, Zoe Lin Jiang, Siu-Ming Yiu, Chuanyi Liu:
State-of-the-art optical-based physical adversarial attacks for deep learning computer vision systems. CoRR abs/2303.12249 (2023) - [i5]Shuoran Jiang, Qingcai Chen, Youcheng Pan, Yang Xiang, Yukang Lin, Xiangping Wu, Chuanyi Liu, Xiaobao Song:
ZO-AdaMU Optimizer: Adapting Perturbation by the Momentum and Uncertainty in Zeroth-order Optimization. CoRR abs/2312.15184 (2023) - 2022
- [j26]Shaoming Duan, Chuanyi Liu, Zhengsheng Cao, Xiaopeng Jin, Peiyi Han:
Fed-DR-Filter: Using global data representation to reduce the impact of noisy labels on the performance of federated learning. Future Gener. Comput. Syst. 137: 336-348 (2022) - [j25]Chuanyi Liu, Xiaoyong Li, Mingliang Sun, Yali Gao, Jie Yuan, Shaoming Duan:
Bi-TCCS: Trustworthy Cloud Collaboration Service Scheme Based on Bilateral Social Feedback. IEEE Trans. Cloud Comput. 10(2): 1021-1037 (2022) - [j24]Wenjian Luo, Licai Zhang, Peiyi Han, Chuanyi Liu, Rongfei Zhuang:
Taking Away Both Model and Data: Remember Training Data by Parameter Combinations. IEEE Trans. Emerg. Top. Comput. Intell. 6(6): 1427-1437 (2022) - [c41]Wenchao Wang, Chuanyi Liu, Zhaoguo Wang, Tiancai Liang:
FBIPT: A New Robust Reversible Database Watermarking Technique Based on Position Tuples. ICDIS 2022: 67-74 - [c40]Peiyi Han, Yunzhe Guo, Shaoming Duan, Chuanyi Liu, Yuxing Zhou:
Towards Privacy-Preserving Computation on Gene: Construct Covid-19 Phylogenetic Tree using Homomorphic Encryption. ICDIS 2022: 148-154 - [c39]Zirui Wang, Shaoming Duan, Chengyue Wu, Wenhao Lin, Xinyu Zha, Peiyi Han, Chuanyi Liu:
Generative Data Augmentation for Non-IID Problem in Decentralized Clinical Machine Learning. ICDIS 2022: 336-343 - [i4]Shiyi Qi, Yaoxian Li, Cuiyun Gao, Xiaohong Su, Shuzheng Gao, Zibin Zheng, Chuanyi Liu:
Dynamically Relative Position Encoding-Based Transformer for Automatic Code Edit. CoRR abs/2205.13522 (2022) - [i3]Yuanhang Yang, Shiyi Qi, Cuiyun Gao, Zenglin Xu, Yulan He, Qifan Wang, Chuanyi Liu:
Once is Enough: A Light-Weight Cross-Attention for Fast Sentence Pair Modeling. CoRR abs/2210.05261 (2022) - [i2]Shaoming Duan, Chuanyi Liu, Peiyi Han, Tianyu He, Yifeng Xu, Qiyuan Deng:
Fed-TDA: Federated Tabular Data Augmentation on Non-IID Data. CoRR abs/2211.13116 (2022) - [i1]Zirui Wang, Shaoming Duan, Chengyue Wu, Wenhao Lin, Xinyu Zha, Peiyi Han, Chuanyi Liu:
Generative Data Augmentation for Non-IID Problem in Decentralized Clinical Machine Learning. CoRR abs/2212.01109 (2022) - 2021
- [j23]Chunkai Zhang, Xin Guo, Yepeng Deng, Xuan Wang, Peiyi Han, Chuanyi Liu, Hanyu Zhang:
An efficient general black-box adversarial attack approach based on multi-objective optimization for high dimensional images. Comput. Electr. Eng. 95: 107402 (2021) - [j22]Rahul Yadav, Weizhe Zhang, Keqin Li, Chuanyi Liu, Asif Ali Laghari:
Managing overloaded hosts for energy-efficiency in cloud data centers. Clust. Comput. 24(3): 2001-2015 (2021) - [j21]Desheng Wang, Weizhe Zhang, Hui He, Chuanyi Liu:
Node-Fusion: Topology-aware virtual network embedding algorithm for repeatable virtual network mapping over substrate nodes. Concurr. Comput. Pract. Exp. 33(7): 1 (2021) - [j20]Chunkai Zhang, Wei Zuo, Ao Yin, Xuan Wang, Chuanyi Liu:
ADET: anomaly detection in time series with linear time. Int. J. Mach. Learn. Cybern. 12(1): 271-280 (2021) - [c38]Yexing Zhang, Zihou Wang, Zhaoguo Wang, Chuanyi Liu:
A Robust and Adaptive Watermarking Technique for Relational Database. CNCERT 2021: 3-26 - [c37]Xiayu Xiang, Shaoming Duan, Hezhong Pan, Peiyi Han, Chuanyi Liu:
Sampled Data Debugging via Fuzzy C-Means. DSC 2021: 32-39 - [c36]Xianzhe Yu, Peiyi Han, Chuanyi Liu, Shaoming Duan, Hezhong Pan, Xiayu Xiang:
FIGAT: Accurately Predict Individual Crime Risks with Multi-information Fusion. DSC 2021: 248-255 - [c35]Xunan Gao, Peiyi Han, Chuanyi Liu, Shaoming Duan, Hezhong Pan, Xiayu Xiang:
PRFP: Privacy-respecting and Accurate Device Fingerprint Identification. DSC 2021: 264-271 - [c34]Chunkai Zhang, Wei Zuo, Shaocong Li, Xuan Wang, Peiyi Han, Chuanyi Liu:
Reconstruct Anomaly to Normal: Adversarially Learned and Latent Vector-Constrained Autoencoder for Time-Series Anomaly Detection. PRICAI (2) 2021: 515-529 - 2020
- [j19]Peiyi Han, Chuanyi Liu, Jiahao Cao, Shaoming Duan, Hezhong Pan, Zekun Cao, Binxing Fang:
CloudDLP: Transparent and Scalable Data Sanitization for Browser-Based Cloud Storage. IEEE Access 8: 68449-68459 (2020) - [j18]Junqian Wang, Hanyu Zhang, Peiyi Han, Chuanyi Liu, Yong Xu:
Pixel re-representations for better classification of images. Pattern Recognit. Lett. 140: 310-317 (2020) - [j17]Chuanyi Liu, Xiaoyong Li:
Fast, Resource-Saving, and Anti-Collaborative Attack Trust Computing Scheme Based on Cross-Validation for Clustered Wireless Sensor Networks. Sensors 20(6): 1592 (2020) - [j16]Hui He, Weizhe Zhang, Chuanyi Liu, Honglei Sun:
Trustworthy Enhancement for Cloud Proxy based on Autonomic Computing. IEEE Trans. Cloud Comput. 8(4): 1108-1121 (2020) - [j15]Wen Xia, Xiangyu Zou, Hong Jiang, Yukun Zhou, Chuanyi Liu, Dan Feng, Yu Hua, Yuchong Hu, Yucheng Zhang:
The Design of Fast Content-Defined Chunking for Data Deduplication Based Storage Systems. IEEE Trans. Parallel Distributed Syst. 31(9): 2017-2031 (2020) - [j14]Rahul Yadav, Weizhe Zhang, Keqin Li, Chuanyi Liu, Muhammad Shafiq, Nabin Kumar Karn:
An adaptive heuristic for managing energy consumption and overloaded hosts in a cloud data center. Wirel. Networks 26(3): 1905-1919 (2020) - [j13]Hezhong Pan, Chuanyi Liu, Shaoming Duan, Peiyi Han, Binxing Fang:
Scene text reading based cloud compliance access. World Wide Web 23(4): 2633-2647 (2020) - [c33]Xiayu Xiang, Shaoming Duan, Hezhong Pan, Peiyi Han, Jiahao Cao, Chuanyi Liu:
From One-hot Encoding to Privacy-preserving Synthetic Electronic Health Records Embedding. CIAT 2020: 407-413 - [c32]Peiyi Han, Chaozheng Wang, Chuanyi Liu, Shaoming Duan, Hezhong Pan, Pengshuai Luo:
SecureMLDebugger: A Privacy-Preserving Machine Learning Debugging Tool. DSC 2020: 127-134
2010 – 2019
- 2019
- [j12]Chuanyi Liu, Junqian Wang, Shaoming Duan, Yong Xu:
Combining dissimilarity measures for image classification. Pattern Recognit. Lett. 128: 536-543 (2019) - [c31]Peiyi Han, Chuanyi Liu, Yingfei Dong, Hezhong Pan, QiYang Song, Binxing Fang:
FileCrypt: Transparent and Scalable Protection of Sensitive Data in Browser-based Cloud Storage. CNS 2019: 46-54 - [c30]Jie Lin, Chuanyi Liu, Xinyi Zhang, Rongfei Zhuang, Binxing Fang:
VMRe: A Reverse Framework of Virtual Machine Protection Packed Binaries. DSC 2019: 528-535 - [c29]Hezhong Pan, Chuanyi Liu, Shaoming Duan, Peiyi Han, Xinyi Zhang, Binxing Fang:
Deep Learning Based Scene Text Reading for Cloud Audit Information Extraction. DSC 2019: 686-693 - [c28]Chuanyi Liu, Peiyi Han, Yingfei Dong, Hezhong Pan, Shaoming Duan, Binxing Fang:
CloudDLP: Transparent and Automatic Data Sanitization for Browser-Based Cloud Storage. ICCCN 2019: 1-8 - [c27]Chuanyi Liu, Chang Liu, Hao Mao, Wei Su:
Tilt-Scrolling: A Comparative Study of Scrolling Techniques for Mobile Devices. ICIC (3) 2019: 189-200 - [c26]Chuanyi Liu, Ningning Wu, Hao Mao, Wei Su:
Smart-Scrolling: Improving Information Access Performance in Linear Layout Views for Small-Screen Devices. ICIC (1) 2019: 412-423 - [c25]Chunkai Zhang, Yepeng Deng, Xin Guo, Xuan Wang, Chuanyi Liu:
An Adversarial Attack Based on Multi-objective Optimization in the Black-Box Scenario: MOEA-APGA II. ICICS 2019: 603-612 - [c24]Jie Lin, Chuanyi Liu, Binxing Fang:
Out-of-Domain Characteristic Based Hierarchical Emulator Detection for Mobile. ICITEE 2019: 144:1-144:5 - [c23]Chuanyi Liu, Ningning Wu, Jiali Zhang, Wei Su:
Tilt Space: A Systematic Exploration of Mobile Tilt for Design Purpose. INTERACT (3) 2019: 497-517 - 2018
- [j11]Guofeng Wang, Chuanyi Liu, Yingfei Dong, Peiyi Han, Hezhong Pan, Binxing Fang:
IDCrypt: A Multi-User Searchable Symmetric Encryption Scheme for Cloud Applications. IEEE Access 6: 2908-2921 (2018) - [j10]Guofeng Wang, Chuanyi Liu, Yingfei Dong, Kim-Kwang Raymond Choo, Peiyi Han, Hezhong Pan, Binxing Fang:
Leakage Models and Inference Attacks on Searchable Encryption for Cyber-Physical Social Systems. IEEE Access 6: 21828-21839 (2018) - [c22]Yan Li, Peiyi Han, Chuanyi Liu, Binxing Fang:
Automatically Crawling Dynamic Web Applications via Proxy-Based JavaScript Injection and Runtime Analysis. DSC 2018: 242-249 - [c21]Chuanyi Liu, Rui Zhao:
Find the 'Lost' Cursor: A Comparative Experiment of Visually Enhanced Cursor Techniques. ICIC (2) 2018: 85-92 - [c20]Chuanyi Liu, Jiali Zhang, Kang Ma:
Natural and Fluid 3D Operations with Multiple Input Channels of a Digital Pen. ICIC (3) 2018: 585-598 - [c19]Xiaoyu Liu, LiGuo Huang, Chuanyi Liu, Vincent Ng:
Linking Source Code to Untangled Change Intents. ICSME 2018: 393-403 - 2017
- [c18]Chuanyi Liu, Guofeng Wang, Peiyi Han, Hezhong Pan, Binxing Fang:
A Cloud Access Security Broker based approach for encrypted data search and sharing. ICNC 2017: 422-426 - [c17]Guofeng Wang, Chuanyi Liu, Yingfei Dong, Hezhong Pan, Peiyi Han, Binxing Fang:
Query Recovery Attacks on Searchable Encryption Based on Partial Knowledge. SecureComm 2017: 530-549 - [c16]Guofeng Wang, Chuanyi Liu, Yingfei Dong, Hezhong Pan, Peiyi Han, Binxing Fang:
SafeBox: A scheme for searching and sharing encrypted data in cloud applications. SPAC 2017: 648-653 - 2016
- [j9]Zhanye Wang, Chuanyi Liu, Dongsheng Wang:
Reusing the Results of Queries in MapReduce Systems by Adopting Shared Storage. IEICE Trans. Commun. 99-B(2): 315-325 (2016) - [j8]Peiyi Han, Chuanyi Liu, Binxing Fang, Guofeng Wang, Xiaobao Song, Lei Wan:
Revisiting the Practicality of Search on Encrypted Data: From the Security Broker's Perspective. Sci. Program. 2016: 8057208:1-8057208:9 (2016) - [c15]Hao Xu, Xingquan Zuo, Chuanyi Liu, Xinchao Zhao:
Predicting Virtual Machine's Power via a RBF Neural Network. ICSI (2) 2016: 370-381 - 2015
- [j7]Da Xiao, Lvyin Yang, Chuanyi Liu, Bin Sun, Shihui Zheng:
Efficient Data Possession Auditing for Real-World Cloud Storage Environments. IEICE Trans. Inf. Syst. 98-D(4): 796-806 (2015) - 2014
- [j6]Yu Gu, Chuanyi Liu, Dongsheng Wang:
Fast Recovery and Low Cost Coexist: When Continuous Data Protection Meets the Cloud. IEICE Trans. Inf. Syst. 97-D(7): 1700-1708 (2014) - [j5]Chunlu Wang, Chenye Qiu, Xingquan Zuo, Chuanyi Liu:
An Accident Severity Classification Model Based on Multi-Objective Particle Swarm Optimization. IEICE Trans. Inf. Syst. 97-D(11): 2863-2871 (2014) - [c14]Jie Lin, Chuanyi Liu, Zhichun Ning, Binxing Fang:
Detecting the run time attacks in the cloud with an evidence collection based approach. CCIS 2014: 514-518 - [c13]Jie Lin, Chuanyi Liu, Binxing Fang:
POSTER: TraceVirt: A Framework for Detecting the Non-tampering Attacks in the Virtual Machine. CCS 2014: 1466-1468 - [c12]Dong Cui, Chuanyi Liu, Meiqi Yang, Jincui Yang:
Sentinel: In Case of the Untrustworthy Behaviors Inside the Clouds. ISCTCS 2014: 99-106 - 2013
- [j4]Chuanyi Liu, Jie Lin, Binxing Fang:
T-YUN: Trustworthiness Verification and Audit on the Cloud Providers. IEICE Trans. Inf. Syst. 96-D(11): 2344-2353 (2013) - [j3]Xi Zhang, Chuanyi Liu, Zhenyu Liu, Dongsheng Wang:
Improving Cache Partitioning Algorithms for Pseudo-LRU Policies. IEICE Trans. Inf. Syst. 96-D(12): 2514-2523 (2013) - [c11]Chunlu Wang, Chuanyi Liu, Xiaoliang Wang, Yingfei Dong:
Effectively auditing IaaS cloud servers. GLOBECOM 2013: 682-688 - [c10]Guofeng Wang, Chuanyi Liu, Jie Lin:
Transparency and Semantics Coexist: When Malware Analysis Meets the Hardware Assisted Virtualization. ISCTCS 2013: 29-37 - 2012
- [j2]Yuyu Yuan, Chuanyi Liu, Jie Cheng, Xiaoliang Wang:
DISWOP: A Novel Scheduling Algorithm for Data-Intensive Workflow Optimizations. IEICE Trans. Inf. Syst. 95-D(7): 1839-1846 (2012) - [j1]Tian Song, Cheng Gong, Chuanyi Liu:
A practical coverage algorithm for wireless sensor networks in real terrain surface. Int. J. Wirel. Mob. Comput. 5(4): 358-364 (2012) - [c9]Chunwen Li, Xu Wu, Chuanyi Liu, Xiaqing Xie:
An Implementation of Trusted Remote Attestation Oriented the IaaSCloud. ISCTCS 2012: 194-202 - [c8]Xu Wu, Xiaqing Xie, Chuanyi Liu, Chunwen Li:
An Improved Design of the Trustworthiness Authentication Mechanism of IaaS. ISCTCS 2012: 219-226 - [c7]Chuanyi Liu, Xiaojian Liu, Lei Wan:
Policy-Based De-duplication in Secure Cloud Storage. ISCTCS 2012: 250-262
2000 – 2009
- 2009
- [c6]Chuanyi Liu, Yibo Xue, Dapeng Ju, Dongsheng Wang:
A Novel Optimization Method to Improve De-duplication Storage System Performance. ICPADS 2009: 228-235 - [c5]Chuanyi Liu, Yu Gu, Linchun Sun, Bin Yan, Dongsheng Wang:
R-ADMAD: high reliability provision for large-scale de-duplication archival storage systems. ICS 2009: 370-379 - [c4]Chuanyi Liu, Xiangshi Ren:
Making Pen-Based Operation More Seamless and Continuous. INTERACT (1) 2009: 261-273 - 2008
- [c3]Chuanyi Liu, Dapeng Ju, Yu Gu, Youhui Zhang, Dongsheng Wang, David H. C. Du:
Semantic Data De-duplication for archival storage systems. ACSAC 2008: 1-9 - [c2]Yingping Lu, David Hung-Chang Du, Chuanyi Liu, Xianbo Zhang:
QoS Scheduling for Networked Storage System. ICDCS 2008: 605-612 - [c1]Chuanyi Liu, Xiangshi Ren, Dawei Li:
A Comparative Evaluation of Mode Switching Techniques. ISPA 2008: 975-981
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint