On a mathematical model for low-rate shrew DDoS J Luo, X Yang, J Wang, J Xu, J Sun, K Long IEEE Transactions on Information Forensics and Security 9 (7), 1069-1083, 2014 | 134 | 2014 |
A network coding and DES based dynamic encryption scheme for moving target defense H Tang, QT Sun, X Yang, K Long IEEE Access 6, 26059-26068, 2018 | 63 | 2018 |
Quantifying photosynthetic performance of phytoplankton based on photosynthesis–irradiance response models X Yang, L Liu, Z Yin, X Wang, S Wang, Z Ye Environmental Sciences Europe 32, 1-13, 2020 | 53 | 2020 |
Web DDoS detection schemes based on measuring user's access behavior with large deviation J Wang, X Yang, K Long 2011 IEEE Global Telecommunications Conference-GLOBECOM 2011, 1-5, 2011 | 53 | 2011 |
Intelligent regulation on demand response for electric vehicle charging: a dynamic game method Y Zheng, J Luo, X Yang, Y Yang IEEE Access 8, 66105-66115, 2020 | 46 | 2020 |
A new relative entropy based app-DDoS detection method J Wang, X Yang, K Long The IEEE symposium on Computers and Communications, 966-968, 2010 | 46 | 2010 |
A simple and efficient frequency offset estimation algorithm for high-speed coherent optical OFDM systems X Zhou, K Long, R Li, X Yang, Z Zhang Optics express 20 (7), 7350-7361, 2012 | 45 | 2012 |
A genetic algorithm‐based task scheduling for cloud resource crowd‐funding model Z Nan, Y Xiaolong, Z Min, S Yan, L Keping International Journal of Communication Systems 31 (1), 2018 | 44 | 2018 |
On Vector Linear Solvability of Multicast Networks QT Sun, X Yang, K Long, Z Li IEEE Transactions on Communications 64 (12), 5096 - 5107, 2016 | 41 | 2016 |
A combination of two swords thermo-bluelight-synergistic-catalytic CO2 cycloaddition on ZnIn2S4 exposed abundant of Zinc cation sites Y Wu, XF Yu, Y Du, L Xia, Q Guo, K Zhang, W Zhang, S Liu, Y Peng, Z Li, ... Applied Catalysis B: Environmental 331, 122732, 2023 | 39 | 2023 |
Efficient joint carrier frequency offset and phase noise compensation scheme for high-speed coherent optical OFDM systems X Zhou, X Yang, R Li, K Long Journal of lightwave technology 31 (11), 1755-1761, 2013 | 34 | 2013 |
Circular-shift linear network coding H Tang, QT Sun, Z Li, X Yang, K Long IEEE Transactions on Information Theory 65 (1), 65-80, 2018 | 32 | 2018 |
Accurate and privacy-preserving task allocation for edge computing assisted mobile crowdsensing Z Wang, C Guo, J Liu, J Zhang, Y Wang, J Luo, X Yang IEEE Transactions on Computational Social Systems 9 (1), 120-133, 2021 | 30 | 2021 |
基于大偏差统计模型的 Http-Flood DDoS 检测机制及性能分析 王进, 阳小龙, 隆克平 软件学报 23 (5), 1272-1280, 2012 | 27 | 2012 |
Metal crack detection sensor based on microstrip antenna Q Pang, G Dong, X Yang IEEE Sensors Journal 23 (8), 8375-8384, 2023 | 25 | 2023 |
HTTP-sCAN: Detecting HTTP-flooding attack by modeling multi-features of web browsing behavior from noisy web-logs J Wang, M Zhang, X Yang, K Long, J Xu China Communications 12 (2), 118-128, 2015 | 25 | 2015 |
The NewShrew attack: A new type of low-rate TCP-Targeted DoS attack L Jingtang, Y Xiaolong Communications (ICC), 2014 IEEE International Conference on, 713-718, 2014 | 20* | 2014 |
Double-auction-based optimal user assignment for multisource–multirelay cellular networks W Yong, Y Li, L Chao, C Wang, X Yang IEEE Transactions on Vehicular Technology 64 (6), 2627-2636, 2013 | 20 | 2013 |
Spray and forward: Efficient routing based on the Markov location prediction model for DTNs F Dang, XL Yang, KP Long Science China Information Sciences 55, 433-440, 2012 | 19 | 2012 |
A reliable physical layer key generation scheme based on RSS and LSTM network in VANET Z Wang, Y Liu, J Wang, Z Li, Z Li, X Yang, F Qi, H Jia IEEE Internet of Things Journal 11 (1), 692-707, 2023 | 18 | 2023 |