Qi, M., Induruwa, A. and Hussain, F. 2021. Security vulnerabilities of popular smart home appliances. in: Proceeding of The Twentieth International Conference on Networks April 18, 2021 to April 22, 2021 - Porto, Portugal
Qi, M. and Hussain, F. 2018. Integrated privacy preserving framework for smart home. in: Proceedings of The 14th International Conference on Fuzzy Systems and Knowledge Discovery, 28-30 July 2018 in Huangshan, China.
Induruwa, A., Qi, M. and Hussain, F. 2020. Hybrid intrusion detection system for smart home applications. in: Mahmood, Z. (ed.) Developing and Monitoring Smart Environments for Intelligent Cities IGI Global.
Wang, Q., Gong, D., Qi, M., Shen, Y. and Lei, Y. 2018. Temporal sparse feature auto-combination deep network for video action recognition. Concurrency and Computation: Practice and Experience. https://doi.org/10.1002/cpe.4487
Liu, W., Wang, L., Feng, X., Qi, M., Yan, C. and Li, M. 2017. Soundness analytics of composed logical workflow nets. International Journal of Parallel Programming. https://doi.org/10.1007/s10766-017-0536-8
Luo, C., Zhang, B., Xiang, Y. and Qi, M. 2017. Gaussian-Gamma collaborative filtering: a hierarchical Bayesian model for recommender systems. Journal of Computer and System Sciences. https://doi.org/10.1016/j.jcss.2017.03.007
Cheng, K., Zhan, Y. and Qi, M. 2017. AL-DDCNN : a distributed crossing semantic gap learning for person re-identification. Concurrency and Computation: Practice and Experience. 29 (3). https://doi.org/10.1002/cpe.3766
Obiri-Yeboah, J. and Qi, M. 2016. Data security of android applications. in: 2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery : ICNC-FSKD 2016 : 13-15 August, Changsha, China IEEE Xplore.
Liu, Y., Jing, W., Liu, Y., Lv, L., Qi, M. and Xiang, Y. 2016. A sliding window-based dynamic load balancing for heterogeneous Hadoop clusters. Concurrency and Computation: Practice and Experience. 29 (3). https://doi.org/10.1002/cpe.3763
Guo, W., Khalid, N., Liu, Y., Li, M., Qi, M., Guo, W., Khalid, N., Liu, Y., Li, M. and Qi, M. 2015. A resource aware MapReduce based parallel SVM for large scale image classification. Neural Processing Letters. 44 (1), pp. 161-184.
Alham, K., Li, M., Liu, Y. and Qi, M. 2013. A distributed SVM ensemble for large scale image classification and annotation. Computers and Mathematics with Applications. 66 (10), pp. 1920-1934. https://doi.org/10.1016/j.camwa.2013.07.015
Cherry, D., Li, M. and Qi, M. 2012. A distributed storage system for archiving broadcast media content. in: Grid and Cloud Computing: Concepts, Methodologies, Tools and Applications IGI Global. pp. 669-679
Alham, M., Li, M., Liu, Y., Ponraj, M. and Qi, M. 2012. A distributed SVM ensemble for image classification and annotation. in: 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD) IEEE. pp. 1581-1584
Caruana, G., Li, M. and Qi, M. 2011. A MapReduce based parallel SVM for large scale spam filtering. in: Caruana, G. (ed.) Eighth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), 2011 IEEE.
Li, M. and Qi, M. 2009. Facilitating resource discovery in grid environments with peer-to-peer structured tuple spaces. Peer-to-Peer Networking and Applications. 2 (4), pp. 283-297. https://doi.org/10.1007/s12083-009-0036-8
Wu, T., Li, M. and Qi, M. 2010. Optimizing peer selection in BitTorrent networks with genetic algorithms. Future Generation Computer Systems. 26 (8), pp. 1151-1156. https://doi.org/10.1016/j.future.2010.05.016
Qi, M., Wang, Y. and Xu, R. 2009. Fighting cybercrime: legislation in China. International Journal of Electronic Security and Digital Forensics. 2 (2), pp. 219-227. https://doi.org/10.1504/IJESDF.2009.024905
Edgar-Nevill, D. and Qi, M. 2009. Lessons learned from Beijing for the London 2012. in: Edgar-Nevill, D. (ed.) Proceedings of the 3rd International Conference on Cybercrime Forensics Euducation and Training CFET 2009 Canterbury, UK Canterbury Christ Church University.
Li, M., Yu, B., Qi, M. and Antonopoulos, N. 2008. Automatically wrapping legacy software into services: a grid case study. Peer-to-Peer Networking and Applications. 1 (2), pp. 139-147. https://doi.org/10.1007/s12083-008-0011-9
Mousoli, R., Qi, M. and Edgar-Nevill, D. 2008. The social effects of spam. in: Edgar-Nevill, D. (ed.) Proceedings of CFET 2008 – 2nd Annual International Conference on Cybercrime Forensics Education and Training Canterbury Canterbury Christ Church University. pp. 71-78
Qi, M., Edgar-Nevill, D., Wang, Y. and Xu, R. 2008. Tracking online trails. International Journal of Electronic Security and Digital Forensics. 1 (4), pp. 353-361. https://doi.org/10.1504/IJESDF.2008.021453
Li, M., Yu, B. and Qi, M. 2006. PGGA: a predictable and grouped genetic algorithm for job scheduling. Future Generation Computer Systems. 22 (5), pp. 588-599. https://doi.org/10.1016/j.future.2005.09.001
Li, M., Qi, M., Rozati, M. and Yu, B. 2005. A WSRF based shopping cart system. Lecture Notes in Computer Science [Advances in Grid Computing (EGC) 2005 European Grid Conference, Amsterdam, The Netherlands, February 14-16, 2005, Revised Selected Papers]. 3470, pp. 105-137. https://doi.org/10.1007/b137919
Li, M. and Qi, M. 2004. Leveraging legacy codes to distributed problem-solving environments: a web services approach. Software: Practice and Experience. 34 (13), pp. 1297-1309. https://doi.org/10.1002/spe.614