A comprehensive survey of AI-enabled phishing attacks detection techniques A Basit, M Zafar, X Liu, AR Javed, Z Jalil, K Kifayat Telecommunication Systems 76, 139-154, 2021 | 427 | 2021 |
Information-centric mobile ad hoc networks and content routing: a survey X Liu, Z Li, P Yang, Y Dong Ad Hoc Networks 58, 255-268, 2017 | 187 | 2017 |
DeepAMD: Detection and identification of Android malware using high-efficient Deep Artificial Neural Network WSA Syed Ibrahim Imtiaz, Saif ur Rehman, Abdul Rehman Javed, Zunera Jalil ... Future Generation Computer Systems 115 (February 2021), 844-856, 2020 | 153* | 2020 |
Blockchain for decentralized multi‐drone to combat COVID‐19 and future pandemics: Framework and proposed solutions SH Alsamhi, B Lee, M Guizani, N Kumar, Y Qiao, X Liu Transactions on Emerging Telecommunications Technologies, e4255, 2021 | 134 | 2021 |
A survey on recent optimal techniques for securing unmanned aerial vehicles applications F Syed, SK Gupta, S Hamood Alsamhi, M Rashid, X Liu Transactions on Emerging Telecommunications Technologies 32 (7), e4133, 2021 | 120 | 2021 |
Ensemble Adaboost classifier for accurate and fast detection of botnet attacks in connected vehicles A Rehman Javed, Z Jalil, S Atif Moqurrab, S Abbas, X Liu Transactions on Emerging Telecommunications Technologies, e4088, 2020 | 111 | 2020 |
An efficient privacy-preserving id centric authentication in iot based cloud servers for sustainable smart cities A Kumar, K Abhishek, X Liu, A Haldorai Wireless Personal Communications 117 (4), 3229-3253, 2021 | 26 | 2021 |
Recent advances in multimedia security and information hiding AK Singh, X Liu, H Wang, H Ko Transactions on Emerging Telecommunications Technologies, e4193, 2020 | 24 | 2020 |
Automatic performance-optimal offloading of network functions on programmable switches X Chen, H Liu, D Zhang, Z Meng, Q Huang, H Zhou, C Wu, X Liu, Q Yang IEEE Transactions on Cloud Computing 11 (2), 1591-1607, 2022 | 17 | 2022 |
Empowering network security with programmable switches: A comprehensive survey X Chen, C Wu, X Liu, Q Huang, D Zhang, H Zhou, Q Yang, MK Khan IEEE Communications Surveys & Tutorials 25 (3), 1653-1704, 2023 | 15 | 2023 |
Amalgamation of blockchain and sixth‐generation‐envisioned responsive edge orchestration in future cellular vehicle‐to‐anything ecosystems: Opportunities and challenges P Bhattacharya, U Bodkhe, M Zuhair, M Rashid, X Liu, A Verma, ... Transactions on Emerging Telecommunications Technologies 35 (4), e4410, 2024 | 14 | 2024 |
Combination attacks and defenses on sdn topology discovery D Kong, Y Shen, X Chen, Q Cheng, H Liu, D Zhang, X Liu, S Chen, C Wu IEEE/ACM Transactions on Networking 31 (2), 904-919, 2022 | 11 | 2022 |
Unsupervised Derivation of Keyword Summary for Short Texts B Cao, J Wu, S Wang, J Fan, H Gao, S Deng, J Yin, X Liu ACM Transactions on Internet Technology (TOIT), 2021 | 9 | 2021 |
MalDroid: Secure DL‐enabled intelligent malware detection framework IU Haq, TA Khan, A Akhunzada, X Liu IET Communications 16 (10), 1160-1171, 2022 | 8 | 2022 |
Toward low-overhead inter-switch coordination in network-wide data plane program deployment X Chen, H Liu, Q Xiao, K Guo, T Sun, X Ling, X Liu, Q Huang, D Zhang, ... 2022 IEEE 42nd International Conference on Distributed Computing Systems …, 2022 | 5 | 2022 |
GTF: An Adaptive Network Anomaly Detection Method at the Network Edge R Li, Z Zhou, X Liu, D Li, W Yang, S Li, Q Liu Security and Communication Networks 2021 (1), 3017797, 2021 | 4 | 2021 |
Toward Scalable and Low-Cost Traffic Testing for Evaluating DDoS Defense Solutions X Chen, H Liu, Q Huang, D Zhang, H Zhou, C Wu, X Liu IEEE/ACM Transactions on Networking 32 (1), 191-206, 2023 | 3 | 2023 |
Bpa: The optimal placement of interdependent vnfs in many-core system Y Zhong, Z Zhou, X Liu, D Li, M Guo, S Zhang, Q Liu, L Guo Collaborative Computing: Networking, Applications and Worksharing: 16th EAI …, 2021 | 3 | 2021 |
A comparative analysis of content delivery capability for collaborative dual-architecture network X Liu, P Yang, Y Dong, SH Ahmed International Conference on Collaborative Computing: Networking …, 2017 | 3 | 2017 |
RDefender: A lightweight and robust defense against flow table overflow attacks in SDN D Kong, X Chen, C Wu, Y Shen, Z Zhou, Q Cheng, X Liu, M Yang, Y Qiu, ... IEEE Transactions on Information Forensics and Security, 2024 | 2 | 2024 |