Follow
Yaqin Zhou
Yaqin Zhou
Verified email at ict.ac.cn
Title
Cited by
Cited by
Year
Devign: Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks
Yaqin Zhou, Shangqing Liu, Jingkai Siow, Xiaoning Du, and Yang Liu
NeurIPS 2019 https://arxiv.org/abs/1909.03496, 0
699*
Automated identification of security issues from commit messages and bug reports
Y Zhou, A Sharma
ESEC/FSE 2017 Proceedings of the 2017 11th Joint Meeting on Foundations of …, 2017
1742017
Leopard: Identifying vulnerable code for vulnerability assessment through program metrics
X Du, B Chen, Y Li, J Guo, Y Zhou, Y Liu, Y Jiang
2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019
1092019
Incentive-based distributed scheduling of electric vehicle charging under uncertainty
Y Zhou, R Kumar, S Tang
IEEE Transactions on Power Systems 34 (1), 3-11, 2018
622018
Optimal-Cost Scheduling of Electrical Vehicle Charging under Uncertainty
Y Zhou, DKY Yau, P You, P Cheng
IEEE Transactions on Smart Grid, 2017
622017
Spi: Automated identification of security patches via commits
Y Zhou, JK Siow, C Wang, S Liu, Y Liu
ACM Transactions on Software Engineering and Methodology (TOSEM) 31 (1), 1-27, 2021
482021
Throughput optimizing localized link scheduling for multihop wireless networks under physical interference model
Y Zhou, XY Li, M Liu, X Mao, S Tang, Z Li
IEEE Transactions on Parallel and Distributed Systems 25 (10), 2708-2720, 2013
342013
Distributed link scheduling for throughput maximization under physical interference model
Y Zhou, XY Li, M Liu, Z Li, S Tang, X Mao, Q Huang
2012 Proceedings IEEE INFOCOM, 2691-2695, 2012
272012
A Truthful Incentive Mechanism for Online Recruitment in Mobile Crowd Sensing System
X Chen, M Liu, Y Zhou, Z Li, S Chen, X He
Sensors 17 (1), 2017
192017
Differentially private distributed learning
Y Zhou, S Tang
INFORMS Journal on Computing 32 (3), 779-789, 2020
152020
Almost optimal channel access in multi-hop networks with unknown channel variables
Y Zhou, Q Huang, F Li, XY Li, M Liu, Z Li, Z Yin
2014 IEEE 34th International Conference on Distributed Computing Systems …, 2014
132014
Networked Stochastic Multi-Armed Bandits with Combinatorial Strategies
S Tang, Y Zhou, K Han, Z Zhang, J Yuan, W Wu
The 37th IEEE International Conference on Distributed Computing Systems …, 2017
122017
Link scheduling for throughput maximization in multihop wireless networks under physical interference
Y Zhou, XY Li, M Liu, Z Li, X Xu
Wireless Networks 23, 2415-2430, 2017
42017
Partner-recruitment: Incentive mechanism for content offloading
X Chen, S Wang, M Liu, C Huang, Y Zhou, Z Li
ICC, 2538-2543, 2014
42014
Differential spread strategy: An incentive for advertisement dissemination
X Chen, M Liu, Y Zhou, Z Li, S Chen, X He
Computers and Communication (ISCC), 2015 IEEE Symposium on, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–15