Seuraa
Qixu Wang
Qixu Wang
Chengdu University of Information Technology
Vahvistettu sähköpostiosoite verkkotunnuksessa cuit.edu.cn
Nimike
Viittaukset
Viittaukset
Vuosi
Enhancing cloud-based IoT security through trustworthy cloud service: An integration of security and reputation approach
X Li, Q Wang, X Lan, X Chen, N Zhang, D Chen
IEEE access 7, 9368-9383, 2019
1462019
PCP: A privacy-preserving content-based publish–subscribe scheme with differential privacy in fog computing
Q Wang, D Chen, N Zhang, Z Ding, Z Qin
IEEE Access 5, 17962-17974, 2017
722017
LACS: A lightweight label-based access control scheme in IoT-based 5G caching context
Q Wang, D Chen, N Zhang, Z Qin, Z Qin
IEEE Access 5, 4018-4027, 2017
682017
Containerguard: A real-time attack detection system in container-based big data platform
Y Wang, Q Wang, X Chen, D Chen, X Fang, M Yin, N Zhang
IEEE Transactions on Industrial Informatics 18 (5), 3327-3336, 2020
402020
Flow context and host behavior based shadowsocks’s traffic identification
X Zeng, X Chen, G Shao, T He, Z Han, Y Wen, Q Wang
IEEE Access 7, 41017-41032, 2019
372019
Enhancing trustworthiness of Internet of Vehicles in space–air–ground-integrated networks: Attestation approach
Q Wang, X Chen, X Jin, X Li, D Chen, X Qin
IEEE Internet of Things Journal 9 (8), 5992-6002, 2021
272021
Cloud virtual machine lifecycle security framework based on trusted computing
X Jin, Q Wang, X Li, X Chen, W Wang
Tsinghua Science and Technology 24 (5), 520-534, 2019
202019
Dynamics on hybrid complex network: Botnet modeling and analysis of medical IoT
M Yin, X Chen, Q Wang, W Wang, Y Wang
Security and Communication Networks 2019 (1), 6803801, 2019
182019
SCCAF: A Secure and Compliant Continuous Assessment Framework in Cloud‐Based IoT Context
X Li, X Jin, Q Wang, M Cao, X Chen
Wireless Communications and Mobile Computing 2018 (1), 3078272, 2018
162018
Unsupervised anomaly detection for container cloud via bilstm-based variational auto-encoder
Y Wang, X Chen, Q Wang, R Yang, B Xin
ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and …, 2022
152022
vtpm-sm: An application scheme of SM2/SM3/SM4 algorithms based on trusted computing in cloud environment
M Zhou, S Ruan, J Liu, X Chen, M Yang, Q Wang
2022 IEEE 15th International Conference on Cloud Computing (CLOUD), 351-356, 2022
102022
DockerWatch: a two-phase hybrid detection of malware using various static features in container cloud
Y Wang, Q Wang, X Qin, X Chen, B Xin, R Yang
Soft Computing 27 (2), 1015-1031, 2023
92023
An attack vector evaluation method for smart city security protection
M Yin, Q Wang, M Cao
2019 International Conference on Wireless and Mobile Computing, Networking …, 2019
92019
Random group recommendation model based on fuzzy clustering
Z Ding, Z Qin, QX Wang, ZG Qin
Journal of Electronic Science and Technology 18 (2), 100054, 2020
82020
Privacy-preserving security inference towards cloud-edge collaborative using differential privacy
Y Wang, X Chen, Q Wang
arXiv preprint arXiv:2212.06428, 2022
42022
MESA: An efficient matching scheme in content-based publish/subscribe system with simplified Bayesian approach
Q Wang, D Chen, Z Ding, Z Qin, Z Qin
2017 3rd International Conference on Big Data Computing and Communications …, 2017
42017
UAVs-assisted QoS guarantee scheme of IoT applications for reliable mobile edge computing
X Li, P Xiao, D Tang, X Li, Q Wang, D Chen
Computer Communications 223, 55-67, 2024
32024
Enhancing TinyML-Based Container Escape Detectors With Systemcall Semantic Association in UAVs Networks
T Zheng, Y Qiu, Y Zheng, Q Wang, X Chen
IEEE Internet of Things Journal, 2024
22024
PIMS: An Efficient Process Integrity Monitoring System Based on Blockchain and Trusted Computing in Cloud-Native Context.
M Yang, G Huang, J Liu, Y Gui, Q Wang, X Chen
CMES-Computer Modeling in Engineering & Sciences 136 (2), 2023
22023
Apkclassify: Identification and classification of packed android malicious applications
X Guo, T Zheng, X Chen, Q Wang, J Shao, Z Hu
GLOBECOM 2022-2022 IEEE Global Communications Conference, 2092-2097, 2022
22022
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20