| Pyraformer: Low-complexity pyramidal attention for long-range time series modeling and forecasting S Liu, H Yu, C Liao, J Li, W Lin, AX Liu, S Dustdar # PLACEHOLDER_PARENT_METADATA_VALUE#, 2022 | 1409 | 2022 |
| Understanding and modeling of wifi signal based human activity recognition W Wang, AX Liu, M Shahzad, K Ling, S Lu Proceedings of the 21st annual international conference on mobile computing …, 2015 | 1311 | 2015 |
| Deepseek llm: Scaling open-source language models with longtermism X Bi, D Chen, G Chen, S Chen, D Dai, C Deng, H Ding, K Dong, Q Du, ... arXiv preprint arXiv:2401.02954, 2024 | 728 | 2024 |
| Gait recognition using wifi signals W Wang, AX Liu, M Shahzad Proceedings of the 2016 ACM international joint conference on pervasive and …, 2016 | 688 | 2016 |
| Keystroke recognition using wifi signals K Ali, AX Liu, W Wang, M Shahzad Proceedings of the 21st annual international conference on mobile computing …, 2015 | 685 | 2015 |
| Device-free human activity recognition using commercial WiFi devices W Wang, AX Liu, M Shahzad, K Ling, S Lu IEEE Journal on Selected Areas in Communications 35 (5), 1118-1131, 2017 | 577 | 2017 |
| Device-free gesture tracking using acoustic signals W Wang, AX Liu, K Sun Proceedings of the 22nd Annual International Conference on Mobile Computing …, 2016 | 545 | 2016 |
| Automated online exam proctoring Y Atoum, L Chen, AX Liu, SDH Hsu, X Liu IEEE Transactions on Multimedia 19 (7), 1609-1624, 2017 | 374 | 2017 |
| A first look at cellular machine-to-machine traffic: large scale measurement and characterization MZ Shafiq, L Ji, AX Liu, J Pang, J Wang ACM SIGMETRICS performance evaluation review 40 (1), 65-76, 2012 | 362 | 2012 |
| TCAM Razor: A systematic approach towards minimizing packet classifiers in TCAMs AX Liu, CR Meiners, E Torng IEEE/ACM Transactions on Networking 18 (2), 490-500, 2009 | 359 | 2009 |
| Label inference attacks against vertical federated learning C Fu, X Zhang, S Ji, J Chen, J Wu, S Guo, J Zhou, AX Liu, T Wang 31st USENIX security symposium (USENIX Security 22), 1397-1414, 2022 | 343 | 2022 |
| Secure unlocking of mobile touch screen devices by simple gestures: You can see it but you can not do it M Shahzad, AX Liu, A Samuel Proceedings of the 19th annual international conference on Mobile computing …, 2013 | 326 | 2013 |
| Characterizing and modeling internet traffic dynamics of cellular devices MZ Shafiq, L Ji, AX Liu, J Wang ACM SIGMETRICS Performance Evaluation Review 39 (1), 265-276, 2011 | 310 | 2011 |
| Firewall design: Consistency, completeness, and compactness MG Gouda, XYA Liu 24th International Conference on Distributed Computing Systems, 2004 …, 2004 | 290 | 2004 |
| A large scale exploratory analysis of software vulnerability life cycles M Shahzad, MZ Shafiq, AX Liu 2012 34th International Conference on Software Engineering (ICSE), 771-781, 2012 | 288 | 2012 |
| Dynamic resource allocation for load balancing in fog environment X Xu, S Fu, Q Cai, W Tian, W Liu, W Dou, X Sun, AX Liu Wireless Communications and Mobile Computing 2018 (1), 6421607, 2018 | 257 | 2018 |
| Diverse Firewall Design AXLMG Gouda Proceedings of the IEEE International Conference on Dependable Systems and …, 2004 | 256* | 2004 |
| Bit Weaving: A Non-prefix Approach to Compressing Packet Classifiers in TCAMs ET Chad R.\ Meiners, Alex X. Liu Proceedings of the 17th IEEE International Conference on Network Protocols …, 2009 | 244* | 2009 |
| Structured firewall design MG Gouda, AX Liu Computer networks 51 (4), 1106-1120, 2007 | 243 | 2007 |
| Safe charging for wireless power transfer H Dai, Y Liu, G Chen, X Wu, T He, AX Liu, H Ma IEEE/ACM Transactions on Networking 25 (6), 3531-3544, 2017 | 232 | 2017 |