Yaqin Zhou
Yaqin Zhou
Verified email at ict.ac.cn
Title
Cited by
Cited by
Year
Devign: Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks
Yaqin Zhou, Shangqing Liu, Jingkai Siow, Xiaoning Du, and Yang Liu
NeurIPS 2019 https://arxiv.org/abs/1909.03496, 0
81*
Automated identification of security issues from commit messages and bug reports
Y Zhou, A Sharma
ESEC/FSE 2017 Proceedings of the 2017 11th Joint Meeting on Foundations of …, 2017
692017
Optimal-Cost Scheduling of Electrical Vehicle Charging under Uncertainty
Y Zhou, DKY Yau, P You, P Cheng
IEEE Transactions on Smart Grid, 2017
342017
Leopard: Identifying vulnerable code for vulnerability assessment through program metrics
X Du, B Chen, Y Li, J Guo, Y Zhou, Y Liu, Y Jiang
2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019
322019
Throughput optimizing localized link scheduling for multihop wireless networks under physical interference model
Y Zhou, XY Li, M Liu, X Mao, S Tang, Z Li
IEEE Transactions on Parallel and Distributed Systems 25 (10), 2708-2720, 2013
302013
Distributed link scheduling for throughput maximization under physical interference model
Y Zhou, XY Li, M Liu, Z Li, S Tang, X Mao, Q Huang
2012 Proceedings IEEE INFOCOM, 2691-2695, 2012
272012
Incentive-based distributed scheduling of electric vehicle charging under uncertainty
Y Zhou, R Kumar, S Tang
IEEE Transactions on Power Systems 34 (1), 3-11, 2018
222018
A Truthful Incentive Mechanism for Online Recruitment in Mobile Crowd Sensing System
X Chen, M Liu, Y Zhou, Z Li, S Chen, X He
Sensors 17 (1), 2017
172017
Almost optimal channel access in multi-hop networks with unknown channel variables
Y Zhou, Q Huang, F Li, XY Li, M Liu, Z Li, Z Yin
2014 IEEE 34th International Conference on Distributed Computing Systems …, 2014
142014
Networked Stochastic Multi-Armed Bandits with Combinatorial Strategies
S Tang, Y Zhou, K Han, Z Zhang, J Yuan, W Wu
The 37th IEEE International Conference on Distributed Computing Systems …, 2017
62017
Partner-recruitment: Incentive mechanism for content offloading
X Chen, S Wang, M Liu, C Huang, Y Zhou, Z Li
ICC, 2538-2543, 2014
42014
Differentially private distributed learning
Y Zhou, S Tang
INFORMS Journal on Computing 32 (3), 779-789, 2020
32020
Link scheduling for throughput maximization in multihop wireless networks under physical interference
Y Zhou, XY Li, M Liu, Z Li, X Xu
arXiv preprint arXiv:1208.0902, 2012
2*2012
SPI: Automated Identification of Security Patches via Commits
Y Zhou, JK Siow, C Wang, SQ Liu, Y Liu
arXiv preprint arXiv:2105.14565, 2021
2021
Differential spread strategy: An incentive for advertisement dissemination
X Chen, M Liu, Y Zhou, Z Li, S Chen, X He
Computers and Communication (ISCC), 2015 IEEE Symposium on, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–15