Building auto-encoder intrusion detection system based on random forest feature selection XK Li, W Chen, Q Zhang, L Wu Computers & Security 95, 101851, 2020 | 344 | 2020 |
Defending against TCP SYN flooding attacks under different types of IP spoofing W Chen, DY Yeung International Conference on Networking, International Conference on Systems …, 2006 | 129 | 2006 |
物联网安全特征与关键技术 杨庚, 许建, 陈伟, 祁正华, 王海勇 南京邮电大学学报: 自然科学版 30 (004), 20-29, 2010 | 118 | 2010 |
Security characteristic and technology in the internet of things G Yang, J Xu, W Chen, ZH Qi, HY Wang Nanjing Youdian Daxue Xuebao(Ziran Kexue Ban)/ Journal of Nanjing University …, 2010 | 97 | 2010 |
An active detecting method against SYN flooding attack B Xiao, W Chen, Y He, EHM Sha 11th International Conference on Parallel and Distributed Systems (ICPADS'05 …, 2005 | 70 | 2005 |
PAM-DenseNet: A deep convolutional neural network for computer-aided COVID-19 diagnosis B Xiao, Z Yang, X Qiu, J Xiao, G Wang, W Zeng, W Li, Y Nian, W Chen IEEE Transactions on Cybernetics 52 (11), 12163-12174, 2021 | 61 | 2021 |
A novel approach to detecting DDoS attacks at an early stage B Xiao, W Chen, Y He The Journal of Supercomputing 36 (3), 235-248, 2006 | 50 | 2006 |
An autonomous defense against SYN flooding attacks: Detect and throttle attacks at the victim side independently B Xiao, W Chen, Y He Journal of Parallel and Distributed Computing 68 (4), 456-470, 2008 | 47 | 2008 |
Secure, efficient, and weighted access control for cloud-assisted industrial IoT Q Li, Q Zhang, H Huang, W Zhang, W Chen, H Wang IEEE Internet of Things Journal 9 (18), 16917-16927, 2022 | 40 | 2022 |
一种轻量级的拒绝服务攻击检测方法 陈伟, 何炎祥, 彭文灵 计算机学报 29 (8), 1392-1400, 2006 | 35* | 2006 |
Association of radiomic imaging features and gene expression profile as prognostic factors in pancreatic ductal adenocarcinoma K Li, J Xiao, J Yang, M Li, X Xiong, Y Nian, L Qiao, H Wang, A Eresen, ... American journal of translational research 11 (7), 4491, 2019 | 30 | 2019 |
Mediastinal follicular dendritic cell sarcoma: a rare, potentially under-recognized, and often misdiagnosed disease YL Wu, F Wu, CP Xu, GL Chen, Y Zhang, W Chen, XC Yan, GJ Duan Diagnostic Pathology 14, 1-11, 2019 | 28 | 2019 |
A novel clustering and KWNN-based strategy for Wi-Fi fingerprint indoor localization W Chen, Q Chang, H Hou, W Wang 2015 4th International Conference on Computer Science and Network Technology …, 2015 | 26 | 2015 |
A crowd-sourcing indoor localization algorithm via optical camera on a smartphone assisted by Wi-Fi fingerprint RSSI W Chen, W Wang, Q Li, Q Chang, H Hou Sensors 16 (3), 410, 2016 | 25 | 2016 |
Throttling spoofed SYN flooding traffic at the source W Chen, DY Yeung Telecommunication Systems 33 (1), 47-65, 2006 | 25 | 2006 |
An intrusion detection method based on stacked sparse autoencoder and improved gaussian mixture model T Zhang, W Chen, Y Liu, L Wu Computers & Security 128, 103144, 2023 | 19 | 2023 |
Ontology based cooperative intrusion detection system Y He, W Chen, M Yang, W Peng IFIP International Conference on Network and Parallel Computing, 419-426, 2004 | 16 | 2004 |
Defending against jamming attacks in wireless local area networks W Chen, D Chen, G Sun, Y Zhang International Conference on Autonomic and Trusted Computing, 519-528, 2007 | 15 | 2007 |
A Deep Convolutional Neural Network for Pneumonia Detection in X-ray Images with Attention Ensemble Q An, W Chen, W Shao Diagnostics 14 (4), 390, 2024 | 12 | 2024 |
Anomaly traffic detection in IoT security using graph neural networks M Gao, L Wu, Q Li, W Chen Journal of Information Security and Applications 76, 103532, 2023 | 11 | 2023 |