Issue Date | Title | Author(s) |
2019-01-01 | A manifesto for future generation cloud computing: Research directions for the next decade | Buyya, R; Srirama, SN; Casale, G; Calheiros, R; Simmhan, Y; Varghese, B; Gelenbe, E; Javadi, B; Vaquero, LM; Netto, MAS; Toosi, AN; Rodriguez, MA; Llorente, IM; De Capitani Di Vimercati, S; Samarati, P; Milojicic, D; Varela, C; Bahsoon, R; Dias De Assuncao, M; Rana, O; Zhou, W; Jin, H; Gentzsch, W; Zomaya, AY; Shen, H |
2018-06-01 | A Practical Byzantine-Based Approach for Faulty Switch Tolerance in Software-Defined Networks | Yuan, B; Jin, H; Zou, D; Yang, LT; Yu, S |
2019-04-01 | Detection and segmentation of underwater CW-like signals in spectrum image under strong noise background | Xiao, Z; Zhang, M; Chen, L; Jin, H |
2020-10-01 | Minimizing Financial Cost of DDoS Attack Defense in Clouds with Fine-Grained Resource Management | Yuan, B; Zhao, H; Lin, C; Zou, D; Yang, LT; Jin, H; He, L; Yu, S |
2020-01-01 | Differential Privacy Preservation for Smart Meter Systems | Wu, J; Qiang, W; Zhu, T; Jin, H; Xu, P; Shen, S |
2021-10-01 | Dynamic online convex optimization with long-term constraints via virtual queue | Ding, X; Chen, L; Zhou, P; Xu, Z; Wen, S; Lui, JCS; Jin, H |
2022-05-24 | NaturalCC: An Open-Source Toolkit for Code Intelligence | Wan, Y; He, Y; Bi, Z; Zhang, J; Sui, Y; Zhang, H; Hashimoto, K; Jin, H; Xu, G; Xiong, C; Yu, PS |
2022-01-01 | Can Language Models Serve as Temporal Knowledge Bases? | Zhao, R; Zhao, F; Xu, G; Zhang, S; Jin, H |
2019-03-01 | Defending against flow table overloading attack in software-defined networks | Yuan, B; Zou, D; Yu, S; Jin, H; Qiang, W; Shen, J |
2022-01-01 | Cross-Language Binary-Source Code Matching with Intermediate Representations | Gui, Y; Wan, Y; Zhang, H; Huang, H; Sui, Y; Xu, G; Shao, Z; Jin, H |