Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing K Gai, M Qiu, H Zhao, L Tao, Z Zong Journal of network and computer applications 59, 46-54, 2016 | 602 | 2016 |
Shifting paradigms with the application service provider model L Tao Computer 34 (10), 32-39, 2001 | 282 | 2001 |
Intrusion detection techniques for mobile cloud computing in heterogeneous 5G K Gai, M Qiu, L Tao, Y Zhu Security and communication networks 9 (16), 3049-3058, 2016 | 229 | 2016 |
A static analysis framework for detecting SQL injection vulnerabilities X Fu, X Lu, B Peltsverger, S Chen, K Qian, L Tao 31st annual international computer software and applications conference …, 2007 | 219 | 2007 |
Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry M Qiu, K Gai, B Thuraisingham, L Tao, H Zhao Future generation computer systems 80, 421-429, 2018 | 191 | 2018 |
Word embeddings for Arabic sentiment analysis AA Altowayan, L Tao 2016 IEEE international conference on big data (big data), 3820-3825, 2016 | 143 | 2016 |
A reusable software component for integrated syntax and semantic validation for services computing L Tao, S Golikov, K Gai, M Qiu 2015 IEEE Symposium on Service-Oriented System Engineering, 127-132, 2015 | 116 | 2015 |
Proactive attribute-based secure data schema for mobile cloud in financial industry K Gai, M Qiu, B Thuraisingham, L Tao 2015 IEEE 17th International Conference on High Performance Computing and …, 2015 | 114 | 2015 |
Automated detection and analysis for android ransomware T Yang, Y Yang, K Qian, DCT Lo, Y Qian, L Tao 2015 IEEE 17th International Conference on High Performance Computing and …, 2015 | 111 | 2015 |
APOGEE: automated project grading and instant feedback system for web based computing X Fu, B Peltsverger, K Qian, L Tao, J Liu ACM SIGCSE Bulletin 40 (1), 77-81, 2008 | 68 | 2008 |
Improving data governance in large organizations through ontology and linked data RJ DeStefano, L Tao, K Gai 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing …, 2016 | 63 | 2016 |
Software architecture and design illuminated K Qian, X Fu, L Tao, C Xu Jones & Bartlett Publishers, 2009 | 60 | 2009 |
Ontology-based knowledge representation for secure self-diagnosis in patient-centered teleheath with cloud systems K Gai, M Qiu, S Jayaraman, L Tao 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015 | 48 | 2015 |
Embeddings among toruses and meshes E Ma, L Tao University of Pennsylvania, School of Engineering and Applied Science …, 1988 | 47 | 1988 |
MongoDB NoSQL injection analysis and detection B Hou, K Qian, L Li, Y Shi, L Tao, J Liu 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing …, 2016 | 35 | 2016 |
Effective heuristic algorithms for VLSI circuit partition L Tao, YC Zhao IEE Proceedings G (Circuits, Devices and Systems) 140 (2), 127-134, 1993 | 33 | 1993 |
Security enhancement of cloud servers with a redundancy-based fault-tolerant cache structure H Dai, S Zhao, J Zhang, M Qiu, L Tao Future Generation Computer Systems 52, 147-155, 2015 | 29 | 2015 |
Heuristics for mapping parallel computations to parallel architectures L Tao, B Narahari, YC Zhao Proceedings. Workshop on Heterogeneous Processing,, 36, 37, 38, 39, 40, 41 …, 1993 | 29 | 1993 |
Improve the prediction accuracy of Naïve Bayes classifier with association rule mining T Yang, K Qian, DCT Lo, Y Xie, Y Shi, L Tao 2016 IEEE 2nd International Conference on Big Data Security on Cloud …, 2016 | 28 | 2016 |
Teaching web security using portable virtual labs LC Chen, L Tao 2011 IEEE 11th International Conference on Advanced Learning Technologies …, 2011 | 28 | 2011 |