Enhancing cloud-based IoT security through trustworthy cloud service: An integration of security and reputation approach X Li, Q Wang, X Lan, X Chen, N Zhang, D Chen IEEE access 7, 9368-9383, 2019 | 146 | 2019 |
PCP: A privacy-preserving content-based publish–subscribe scheme with differential privacy in fog computing Q Wang, D Chen, N Zhang, Z Ding, Z Qin IEEE Access 5, 17962-17974, 2017 | 72 | 2017 |
LACS: A lightweight label-based access control scheme in IoT-based 5G caching context Q Wang, D Chen, N Zhang, Z Qin, Z Qin IEEE Access 5, 4018-4027, 2017 | 68 | 2017 |
Containerguard: A real-time attack detection system in container-based big data platform Y Wang, Q Wang, X Chen, D Chen, X Fang, M Yin, N Zhang IEEE Transactions on Industrial Informatics 18 (5), 3327-3336, 2020 | 40 | 2020 |
Flow context and host behavior based shadowsocks’s traffic identification X Zeng, X Chen, G Shao, T He, Z Han, Y Wen, Q Wang IEEE Access 7, 41017-41032, 2019 | 37 | 2019 |
Enhancing trustworthiness of Internet of Vehicles in space–air–ground-integrated networks: Attestation approach Q Wang, X Chen, X Jin, X Li, D Chen, X Qin IEEE Internet of Things Journal 9 (8), 5992-6002, 2021 | 27 | 2021 |
Cloud virtual machine lifecycle security framework based on trusted computing X Jin, Q Wang, X Li, X Chen, W Wang Tsinghua Science and Technology 24 (5), 520-534, 2019 | 20 | 2019 |
Dynamics on hybrid complex network: Botnet modeling and analysis of medical IoT M Yin, X Chen, Q Wang, W Wang, Y Wang Security and Communication Networks 2019 (1), 6803801, 2019 | 18 | 2019 |
SCCAF: A Secure and Compliant Continuous Assessment Framework in Cloud‐Based IoT Context X Li, X Jin, Q Wang, M Cao, X Chen Wireless Communications and Mobile Computing 2018 (1), 3078272, 2018 | 16 | 2018 |
Unsupervised anomaly detection for container cloud via bilstm-based variational auto-encoder Y Wang, X Chen, Q Wang, R Yang, B Xin ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and …, 2022 | 15 | 2022 |
vtpm-sm: An application scheme of SM2/SM3/SM4 algorithms based on trusted computing in cloud environment M Zhou, S Ruan, J Liu, X Chen, M Yang, Q Wang 2022 IEEE 15th International Conference on Cloud Computing (CLOUD), 351-356, 2022 | 10 | 2022 |
DockerWatch: a two-phase hybrid detection of malware using various static features in container cloud Y Wang, Q Wang, X Qin, X Chen, B Xin, R Yang Soft Computing 27 (2), 1015-1031, 2023 | 9 | 2023 |
An attack vector evaluation method for smart city security protection M Yin, Q Wang, M Cao 2019 International Conference on Wireless and Mobile Computing, Networking …, 2019 | 9 | 2019 |
Random group recommendation model based on fuzzy clustering Z Ding, Z Qin, QX Wang, ZG Qin Journal of Electronic Science and Technology 18 (2), 100054, 2020 | 8 | 2020 |
Privacy-preserving security inference towards cloud-edge collaborative using differential privacy Y Wang, X Chen, Q Wang arXiv preprint arXiv:2212.06428, 2022 | 4 | 2022 |
MESA: An efficient matching scheme in content-based publish/subscribe system with simplified Bayesian approach Q Wang, D Chen, Z Ding, Z Qin, Z Qin 2017 3rd International Conference on Big Data Computing and Communications …, 2017 | 4 | 2017 |
UAVs-assisted QoS guarantee scheme of IoT applications for reliable mobile edge computing X Li, P Xiao, D Tang, X Li, Q Wang, D Chen Computer Communications 223, 55-67, 2024 | 3 | 2024 |
Enhancing TinyML-Based Container Escape Detectors With Systemcall Semantic Association in UAVs Networks T Zheng, Y Qiu, Y Zheng, Q Wang, X Chen IEEE Internet of Things Journal, 2024 | 2 | 2024 |
PIMS: An Efficient Process Integrity Monitoring System Based on Blockchain and Trusted Computing in Cloud-Native Context. M Yang, G Huang, J Liu, Y Gui, Q Wang, X Chen CMES-Computer Modeling in Engineering & Sciences 136 (2), 2023 | 2 | 2023 |
Apkclassify: Identification and classification of packed android malicious applications X Guo, T Zheng, X Chen, Q Wang, J Shao, Z Hu GLOBECOM 2022-2022 IEEE Global Communications Conference, 2092-2097, 2022 | 2 | 2022 |