A survey of networking applications applying the software defined networking concept based on machine learning Y Zhao, Y Li, X Zhang, G Geng, W Zhang, Y Sun IEEE access 7, 95397-95417, 2019 | 197 | 2019 |
Fast kNN Graph Construction with Locality Sensitive Hashing YM Zhang, K Huang, G Geng, CL Liu Machine Learning and Knowledge Discovery in Databases: European Conference …, 2013 | 131 | 2013 |
Anomaly detection for in-vehicle network using CNN-LSTM with attention mechanism H Sun, M Chen, J Weng, Z Liu, G Geng IEEE Transactions on Vehicular Technology 70 (10), 10880-10893, 2021 | 126 | 2021 |
Improving personalized services in mobile commerce by a novel multicriteria rating approach Q Li, C Wang, G Geng Proceedings of the 17th international conference on World Wide Web, 1235-1236, 2008 | 73 | 2008 |
Stochastic conjugate gradient algorithm with variance reduction XB Jin, XY Zhang, K Huang, GG Geng IEEE transactions on neural networks and learning systems 30 (5), 1360-1369, 2018 | 66 | 2018 |
Detection of dns ddos attacks with random forest algorithm on spark L Chen, Y Zhang, Q Zhao, G Geng, ZW Yan Procedia computer science 134, 310-315, 2018 | 66 | 2018 |
Method for detecting phishing website without depending on samples G Geng, B Hong US Patent 9,276,956, 2016 | 60 | 2016 |
Boosting the phishing detection performance by semantic analysis X Zhang, Y Zeng, XB Jin, ZW Yan, GG Geng 2017 ieee international conference on big data (big data), 1063-1070, 2017 | 58 | 2017 |
Boosting the performance of web spam detection with ensemble under-sampling classification GG Geng, CH Wang, QD Li, L Xu, XB Jin Fourth International Conference on Fuzzy Systems and Knowledge Discovery …, 2007 | 56 | 2007 |
Toward concurrent video multicast orchestration for caching-assisted mobile networks X Zhang, Y Wang, M Yang, G Geng IEEE transactions on vehicular technology 70 (12), 13205-13220, 2021 | 55 | 2021 |
Seeing traffic paths: Encrypted traffic classification with path signature features SJ Xu, GG Geng, XB Jin, DJ Liu, J Weng IEEE Transactions on Information Forensics and Security 17, 2166-2181, 2022 | 53 | 2022 |
Delay-optimized multicast tree packing in software-defined networks X Zhang, Y Wang, G Geng, J Yu IEEE Transactions on Services Computing 16 (1), 261-275, 2021 | 45 | 2021 |
Differential evolution-based convolutional neural networks: An automatic architecture design method for intrusion detection in industrial control systems JC Huang, GQ Zeng, GG Geng, J Weng, KD Lu, Y Zhang Computers & Security 132, 103310, 2023 | 40 | 2023 |
An efficient multistage phishing website detection model based on the CASE feature framework: Aiming at the real web environment DJ Liu, GG Geng, XB Jin, W Wang Computers & Security 110, 102421, 2021 | 39 | 2021 |
Initialization-Based k-Winners-Take-All Neural Network Model Using Modified Gradient Descent Y Zhang, S Li, G Geng IEEE transactions on neural networks and learning systems, 2021 | 37 | 2021 |
Favicon-a clue to phishing sites detection GG Geng, XD Lee, W Wang, SS Tseng 2013 APWG eCrime Researchers Summit, 1-10, 2013 | 35 | 2013 |
Link based small sample learning for web spam detection GG Geng, Q Li, X Zhang Proceedings of the 18th international conference on World wide web, 1185-1186, 2009 | 35 | 2009 |
Combating phishing attacks via brand identity and authorization features GG Geng, XD Lee, YM Zhang Security and communication networks 8 (6), 888-898, 2015 | 33 | 2015 |
MTC: A fast and robust graph-based transductive learning method YM Zhang, K Huang, GG Geng, CL Liu IEEE transactions on neural networks and learning systems 26 (9), 1979-1991, 2014 | 30 | 2014 |
A hybrid system to find & fight phishing attacks actively H Bo, W Wei, W Liming, G Guanggang, X Yali, L Xiaodong, M Wei 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and …, 2011 | 30 | 2011 |