default search action
Shanhe Yi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j5]Yutao Tang, Zhengrui Qin, Zhiqiang Lin, Yue Li, Shanhe Yi, Fengyuan Xu, Qun Li:
vTrust: Remotely Executing Mobile Apps Transparently With Local Untrusted OS. IEEE Trans. Computers 71(12): 3349-3360 (2022)
2010 – 2019
- 2019
- [j4]Zeyi Tao, Qi Xia, Zijiang Hao, Cheng Li, Lele Ma, Shanhe Yi, Qun Li:
A Survey of Virtual Machine Management in Edge Computing. Proc. IEEE 107(8): 1482-1499 (2019) - [j3]Lele Ma, Shanhe Yi, Nancy J. Carter, Qun Li:
Efficient Live Migration of Edge Services Leveraging Container Layered Storage. IEEE Trans. Mob. Comput. 18(9): 2020-2033 (2019) - [c18]Yutao Tang, Zhengrui Qin, Shanhe Yi, Qun Li:
Virtual machine migration for IoT applications. SEC 2019: 437-442 - [c17]Zijiang Hao, Shanhe Yi, Qun Li:
Nomad: An Efficient Consensus Approach for Latency-Sensitive Edge-Cloud Applications. INFOCOM 2019: 2539-2547 - 2018
- [j2]Yafeng Yin, Qun Li, Lei Xie, Shanhe Yi, Ed Novak, Sanglu Lu:
CamK: Camera-Based Keystroke Detection and Localization for Small Mobile Devices. IEEE Trans. Mob. Comput. 17(10): 2236-2251 (2018) - [c16]Yunlong Mao, Shanhe Yi, Qun Li, Jinghao Feng, Fengyuan Xu, Sheng Zhong:
Learning from Differentially Private Neural Activations with Edge Computing. SEC 2018: 90-102 - [c15]Zijiang Hao, Shanhe Yi, Qun Li:
EdgeCons: Achieving Efficient Consensus in Edge Computing Networks. HotEdge 2018 - 2017
- [j1]Zijiang Hao, Ed Novak, Shanhe Yi, Qun Li:
Challenges and Software Architecture for Fog Computing. IEEE Internet Comput. 21(2): 44-53 (2017) - [c14]Lele Ma, Shanhe Yi, Qun Li:
Efficient service handoff across edge servers via docker container migration. SEC 2017: 11:1-11:13 - [c13]Shanhe Yi, Zijiang Hao, Qingyang Zhang, Quan Zhang, Weisong Shi, Qun Li:
LAVEA: latency-aware video analytics on edge computing platform. SEC 2017: 15:1-15:13 - [c12]Shanhe Yi, Zhengrui Qin, Nancy J. Carter, Qun Li:
WearLock: Unlocking Your Phone via Acoustics Using Smartwatch. ICDCS 2017: 469-479 - [c11]Shanhe Yi, Zijiang Hao, Qingyang Zhang, Quan Zhang, Weisong Shi, Qun Li:
LAVEA: Latency-Aware Video Analytics on Edge Computing Platform. ICDCS 2017: 2573-2574 - 2016
- [c10]Hao Han, Shanhe Yi, Qun Li, Guobin Shen, Yunxin Liu, Edmund Novak:
AMIL: Localizing neighboring mobile devices through a simple gesture. INFOCOM 2016: 1-9 - [c9]Shanhe Yi, Zhengrui Qin, Edmund Novak, Yafeng Yin, Qun Li:
GlassGesture: Exploring head gesture interface of smart glasses. INFOCOM 2016: 1-9 - [c8]Yafeng Yin, Qun Li, Lei Xie, Shanhe Yi, Edmund Novak, Sanglu Lu:
CamK: A camera-based keyboard for small mobile devices. INFOCOM 2016: 1-9 - [c7]Shanhe Yi, Zhengrui Qin, Edmund Novak, Yafeng Yin, Qun Li:
GlassGesture: Exploring head gesture interface of smart glasses. INFOCOM Workshops 2016: 1017-1018 - [c6]Hao Han, Shanhe Yi, Qun Li, Guobin Shen, Yunxin Liu, Edmund Novak:
AMIL: Localizing neighboring mobile devices through a simple gesture. INFOCOM Workshops 2016: 1027-1028 - 2015
- [c5]Shanhe Yi, Zijiang Hao, Zhengrui Qin, Qun Li:
Fog Computing: Platform and Applications. HotWeb 2015: 73-78 - [c4]Shanhe Yi, Cheng Li, Qun Li:
A Survey of Fog Computing: Concepts, Applications and Issues. Mobidata@MobiHoc 2015: 37-42 - [c3]Shanhe Yi, Zhengrui Qin, Qun Li:
Security and Privacy Issues of Fog Computing: A Survey. WASA 2015: 685-695 - 2014
- [c2]Zhengrui Qin, Shanhe Yi, Qun Li, Dmitry Zamkov:
Preserving secondary users' privacy in cognitive radio networks. INFOCOM 2014: 772-780 - 2012
- [c1]Shanhe Yi, Kai Zeng, Jing Xu:
Secondary User Monitoring in Unslotted Cognitive Radio Networks with Unknown Models. WASA 2012: 648-659
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:58 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint