Name
Affiliation
Papers
MINGCHU LI
School of Software, Dalian University of Technology, Dalian, China 116620
192
Collaborators
Citations 
PageRank 
311
469
78.10
Referers 
Referees 
References 
1147
3246
1580
Search Limit
1001000
Title
Citations
PageRank
Year
Two completely independent spanning trees of claw-free graphs00.342022
Device-to-Device Task Offloading in a Stochastic Invalid-Device Scenario with Social Awareness00.342022
Resource Allocation Scheduling Algorithm Based On Incomplete Information Dynamic Game For Edge Computing00.342021
A Stochastic Bilevel Model For Facility Location-Protection Problem With The Most Likely Interdiction Strategy10.372021
Personalized and Quality-Aware Task Recommendation in Collaborative Crowdsourcing00.342021
Dynamic Multi-Phrase Ranked Search over Encrypted Data with Symmetric Searchable Encryption70.422020
Text Data Truth Discovery Using Self-confidence of Sources10.352020
Variational Channel Estimation with Tempering: An Artificial Intelligence Algorithm for Wireless Intelligent Networks.00.342020
Game theoretic resource allocation model for designing effective traffic safety solution against drunk driving00.342020
Cognitive radio assisted WSN with interference aware AODV routing protocol20.372019
A Novel Crowd-sourcing Inference Method00.342019
An Intelligent Information Hiding Scheme Based on Histogram Translation in Frequency Domain00.342019
RIMNet: Recommendation Incentive Mechanism based on evolutionary game dynamics in peer-to-peer service networks.10.342019
Hybrid Directional CR-MAC based on Q-Learning with Directional Power Control.10.352018
A Game-theoretic Approach for Channel Security Against Active Time-Varying attacks Based on Artificial Noise.00.342018
Spanning 3-ended trees in quasi-claw-free graphs.00.342018
Construction of compressed sensing matrices for signal processing.00.342018
Psychology-Inspired Trust Restoration Framework in Distributed Multiagent Systems.00.342018
Online task scheduling for edge computing based on repeated stackelberg game.50.392018
A novel proactive secret image sharing scheme based on LISS.10.352018
Optimally Protecting Elections with Uncertainty about Voter Preferences.00.342018
Dynamic Defense Strategy Against DoS Attacks Over Vehicular Ad Hoc Networks Based on Port Hopping.00.342018
Multi-Reciprocity Policies Co-Evolution Based Incentive Evaluating Framework for Mobile P2P Systems.00.342017
Attribute-Based Partner Updating Boosts Cooperation in Social P2P Systems.00.342017
GroupTrust: Dependable Trust Management00.342017
Optimal Patrol Strategies Against Attacker'S Persistent Attack With Multiple Resources00.342017
A hierarchical combinatorial testing method for smart phone software in wearable IoT systems.40.462017
Automated Software Testing Based on Hierarchical State Transition Matrix for Smart TV.10.362017
(t, n) Threshold secret image sharing scheme with adversary structure.30.392017
Modeling altruism agents: Incentive mechanism in autonomous networks with other-regarding preference.10.352017
Classification-Based Reputation Mechanism for Master-Worker Computing System.00.342017
A novel green software evaluation model for cloud robotics.20.382017
Improving the Efficiency of an Online Marketplace by Incorporating Forgiveness Mechanism.30.402017
Effective hybrid load scheduling of online and offline clusters for e-health service.10.362017
A dynamic reward-based incentive mechanism: Reducing the cost of P2P systems.50.432016
A region-adaptive semi-fragile dual watermarking scheme.50.432016
A Cyber-Physical System for Girder Hoisting Monitoring Based on Smartphones.40.492016
A dynamic bandwidth pricing mechanism based on trust management in P2P streaming systems00.342016
Fighting Pollution Attack in Peer-to-Peer Streaming Systems: A Dynamic Reputation Management Approach00.342016
A multi-threshold secret image sharing scheme based on the generalized Chinese reminder theorem90.482016
AD-ASGKA - authenticated dynamic protocols for asymmetric group key agreement00.342016
Energy Consumption Analysis Method of CPS Software Based on Architecture Modeling10.362015
Analysis and evaluation of incentive mechanisms in P2P networks: a spatial evolutionary game theory perspective60.432015
Reversible data hiding exploiting high-correlation regulation for high-quality images.10.352015
Identity-Based Broadcast Encryption Schemes for Open Networks00.342015
LPSSE: Lightweight Phrase Search with Symmetric Searchable Encryption in Cloud Storage10.362015
A Sensitive and Robust Grid Reputation System Based on Rating of Recommenders00.342014
Impact of Duty Cycle and Radio Range Irregularity on Localization Algorithms for Wireless Sensor Networks.10.362014
A Novel Reversible Chinese Text Information Hiding Scheme based on Lookalike Traditional and Simplified Chinese Characters.00.342014
ServiceTrust: Trust Management in Service Provision Networks50.412013
  • 1
  • 2