| A survey of fog computing: concepts, applications and issues S Yi, C Li, Q Li Proceedings of the 2015 workshop on mobile big data, 37-42, 2015 | 1173 | 2015 |
| Online power-aware routing in wireless ad-hoc networks Q Li, J Aslam, D Rus Proceedings of the 7th annual international conference on Mobile computing …, 2001 | 1047* | 2001 |
| Global clock synchronization in sensor networks Q Li, D Rus IEEE Transactions on computers 55 (2), 214-226, 2006 | 782 | 2006 |
| Fog computing: Platform and applications S Yi, Z Hao, Z Qin, Q Li 2015 Third IEEE workshop on hot topics in web systems and technologies …, 2015 | 642 | 2015 |
| Security and privacy issues of fog computing: A survey S Yi, Z Qin, Q Li International conference on wireless algorithms, systems, and applications …, 2015 | 425 | 2015 |
| Sending messages to mobile users in disconnected ad-hoc wireless networks Q Li, D Rus Proceedings of the 6th annual international conference on Mobile computing …, 2000 | 419 | 2000 |
| Distributed algorithms for guiding navigation across a sensor network Q Li, M De Rosa, D Rus Proceedings of the 9th annual international conference on Mobile computing …, 2003 | 388 | 2003 |
| IMDGuard: Securing implantable medical devices with the external wearable guardian F Xu, Z Qin, CC Tan, B Wang, Q Li 2011 Proceedings IEEE INFOCOM, 1862-1870, 2011 | 251 | 2011 |
| Outlier detection in sensor networks B Sheng, Q Li, W Mao, W Jin Proceedings of the 8th ACM international symposium on Mobile ad hoc …, 2007 | 234 | 2007 |
| Elliptic curve cryptography-based access control in sensor networks H Wang, B Sheng, Q Li International Journal of Security and Networks 1 (3-4), 127-137, 2006 | 234 | 2006 |
| Secure and serverless RFID authentication and search protocols CC Tan, B Sheng, Q Li IEEE Transactions on Wireless Communications 7 (4), 1400-1407, 2008 | 210 | 2008 |
| Efficient implementation of public key cryptosystems on mote sensors (short paper) H Wang, Q Li ICICS, 519-528, 2006 | 187 | 2006 |
| Counting RFID tags efficiently and anonymously H Han, B Sheng, CC Tan, Q Li, W Mao, S Lu 2010 Proceedings IEEE INFOCOM, 1-9, 2010 | 182 | 2010 |
| Body sensor network security: an identity-based cryptography approach CC Tan, H Wang, S Zhong, Q Li Proceedings of the first ACM conference on Wireless network security, 148-153, 2008 | 181 | 2008 |
| Sybildefender: Defend against sybil attacks in large social networks W Wei, F Xu, CC Tan, Q Li 2012 proceedings ieee infocom, 1951-1959, 2012 | 168 | 2012 |
| How to monitor for missing RFID tags CC Tan, B Sheng, Q Li 2008 The 28th International Conference on Distributed Computing Systems, 295-302, 2008 | 168 | 2008 |
| Verifiable privacy-preserving range query in two-tiered sensor networks B Sheng, Q Li IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 46-50, 2008 | 161 | 2008 |
| Communication in disconnected ad hoc networks using message relay Q Li, D Rus Journal of Parallel and Distributed Computing 63 (1), 75-86, 2003 | 157 | 2003 |
| Lavea: Latency-aware video analytics on edge computing platform S Yi, Z Hao, Q Zhang, Q Zhang, W Shi, Q Li Proceedings of the Second ACM/IEEE Symposium on Edge Computing, 1-13, 2017 | 153 | 2017 |
| A timing-based scheme for rogue AP detection H Han, B Sheng, CC Tan, Q Li, S Lu Parallel and Distributed Systems, IEEE Transactions on 22 (11), 1912-1925, 2011 | 150 | 2011 |