Seuraa
Qianmu Li
Nimike
Viittaukset
Viittaukset
Vuosi
A novel data-driven stock price trend prediction system
J Zhang, S Cui, Y Xu, Q Li, T Li
Expert Systems with Applications 97, 60-69, 2018
1892018
EACMS: Emergency access control management system for personal health record based on blockchain
AR Rajput, Q Li, MT Ahvanooey, I Masood
IEEE Access 7, 84304-84317, 2019
1752019
Dual sentiment analysis: Considering two sides of one review
R Xia, F Xu, C Zong, Q Li, Y Qi, T Li
IEEE transactions on knowledge and data engineering 27 (8), 2120-2133, 2015
1742015
Adversarial deep ensemble: Evasion attacks and defenses for malware detection
D Li, Q Li
IEEE Transactions on Information Forensics and Security 15, 3886-3900, 2020
1692020
A survey on smartphones security: software vulnerabilities, malware, and attacks
MT Ahvanooey, Q Li, M Rabbani, AR Rajput
arXiv preprint arXiv:2001.09406, 2020
1262020
Social network user influence sense-making and dynamics prediction
J Li, W Peng, T Li, T Sun, Q Li, J Xu
Expert Systems with Applications 41 (11), 5115-5124, 2014
1102014
A survey of genetic programming and its applications
MT Ahvanooey, Q Li, M Wu, S Wang
KSII Transactions on Internet and Information Systems (TIIS) 13 (4), 1765-1794, 2019
1062019
Reliable control design for composite‐driven scheme based on delay networked T‐S fuzzy system
MS Aslam, X Dai, J Hou, Q Li, R Ullah, Z Ni, Y Liu
International Journal of Robust and Nonlinear Control 30 (4), 1622-1642, 2020
1032020
Fault detection for asynchronous T–S fuzzy networked Markov jump systems with new event‐triggered scheme
MS Aslam, Q Li, J Hou
IET Control Theory & Applications 15 (11), 1461-1473, 2021
992021
A delay-based dynamic scheduling algorithm for bag-of-task workflows with stochastic task execution times in clouds
Z Cai, X Li, R Ruiz, Q Li
Future Generation Computer Systems 71, 57-72, 2017
972017
Modern text hiding, text steganalysis, and applications: a comparative analysis
M Taleby Ahvanooey, Q Li, J Hou, AR Rajput, Y Chen
Entropy 21 (4), 355, 2019
852019
A blockchain-based secret-data sharing framework for personal health records in emergency condition
AR Rajput, Q Li, MT Ahvanooey
Healthcare 9 (2), 206, 2021
832021
A framework for enhancing deep neural networks against adversarial malware
D Li, Q Li, Y Ye, S Xu
IEEE Transactions on Network Science and Engineering 8 (1), 736-750, 2021
78*2021
Arms race in adversarial malware detection: A survey
D Li, Q Li, Y Ye, S Xu
ACM Computing Surveys (CSUR) 55 (1), 1-35, 2021
772021
AITSteg: An innovative text steganography technique for hidden transmission of text message via social media
MT Ahvanooey, Q Li, J Hou, HD Mazraeh, J Zhang
IEEE Access 6, 65981-65995, 2018
752018
Blockchain and federated learning-based intrusion detection approaches for edge-enabled industrial IoT networks: A survey
S Ali, Q Li, A Yousafzai
Ad Hoc Networks 152, 103320, 2024
742024
ANiTW: A novel intelligent text watermarking technique for forensic identification of spurious information on social media
MT Ahvanooey, Q Li, X Zhu, M Alazab, J Zhang
Computers & Security 90, 101702, 2020
712020
A comparative analysis of information hiding techniques for copyright protection of text documents
M Taleby Ahvanooey, Q Li, HJ Shim, Y Huang
Security and Communication Networks 2018 (1), 5325040, 2018
712018
Differentially private classification with decision tree ensemble
X Liu, Q Li, T Li, D Chen
Applied Soft Computing 62, 807-816, 2018
712018
Long short-term memory neural network for network traffic prediction
Q Zhuo, Q Li, H Yan, Y Qi
2017 12th International Conference on Intelligent Systems and Knowledge …, 2017
692017
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20