Monitoring the application-layer DDoS attacks for popular websites Y Xie, SZ Yu Networking, IEEE/ACM Transactions on 17 (1), 15-25, 2009 | 431 | 2009 |
A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors Y Xie, SZ Yu IEEE/ACM transactions on networking 17 (1), 54-65, 2008 | 326 | 2008 |
Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling W Haider, J Hu, J Slay, BP Turnbull, Y Xie Journal of Network and Computer Applications 87, 185-192, 2017 | 233 | 2017 |
A performance evaluation of machine learning-based streaming spam tweets detection C Chen, J Zhang, Y Xie, Y Xiang, W Zhou, MM Hassan, A AlElaiwi, ... IEEE Transactions on Computational social systems 2 (3), 65-76, 2015 | 165 | 2015 |
A novel model for detecting application layer DDoS attacks Y Xie, SZ Yu First international multi-symposiums on computer and computational sciences …, 2006 | 92 | 2006 |
Windows based data sets for evaluation of robustness of host based intrusion detection systems (IDS) to zero-day and stealth attacks W Haider, G Creech, Y Xie, J Hu Future Internet 8 (3), 29, 2016 | 74 | 2016 |
S100A proteins in the pathogenesis of experimental corneal neovascularization C Li, F Zhang, Y Wang Molecular vision 16, 2225, 2010 | 58* | 2010 |
Detecting anomalous behavior in cloud servers by nested-arc hidden semi-Markov model with state summarization W Haider, J Hu, Y Xie, X Yu, Q Wu IEEE Transactions on Big Data 5 (3), 305-316, 2017 | 44 | 2017 |
Modeling oscillation behavior of network traffic by nested hidden Markov model with variable state-duration Y Xie, J Hu, Y Xiang, S Yu, S Tang, Y Wang IEEE Transactions on Parallel and Distributed Systems 24 (9), 1807-1817, 2012 | 39 | 2012 |
A novel range-free localization scheme based on anchor pairs condition decision in wireless sensor networks X Liu, F Han, W Ji, Y Liu, Y Xie IEEE Transactions on Communications 68 (12), 7882-7895, 2020 | 38 | 2020 |
基于 Web 用户浏览行为的统计异常检测 谢逸, 余顺争 软件学报 18 (4), 967-977, 2007 | 38 | 2007 |
Resisting web proxy-based http attacks by temporal and spatial locality behavior Y Xie, S Tang, Y Xiang, J Hu IEEE transactions on parallel and distributed systems 24 (7), 1401-1410, 2012 | 36 | 2012 |
Anomaly detection based on web users' browsing behaviors Y Xie, SZ Yu Ruan Jian Xue Bao(Journal of Software) 18 (4), 967-977, 2007 | 36* | 2007 |
A survey on privacy inference attacks and defenses in cloud-based deep neural network X Zhang, C Chen, Y Xie, X Chen, J Zhang, Y Xiang Computer Standards & Interfaces 83, 103672, 2023 | 34 | 2023 |
Range-free localization using reliable anchor pair selection and quantum-behaved salp swarm algorithm for anisotropic wireless sensor networks Q Tu, Y Liu, F Han, X Liu, Y Xie Ad Hoc Networks 113, 102406, 2021 | 30 | 2021 |
Detecting latent attack behavior from aggregated Web traffic Y Xie, S Tang, X Huang, C Tang, X Liu Computer Communications 36 (8), 895-907, 2013 | 26 | 2013 |
Availability modeling and performance improving of a healthcare internet of things (IoT) system S Tang, Y Xie IoT 2 (2), 310-325, 2021 | 24 | 2021 |
Security situation prediction based on dynamic BP neural with covariance C Tang, Y Xie, B Qiang, X Wang, R Zhang Procedia Engineering 15, 3313-3317, 2011 | 24 | 2011 |
Integer data zero-watermark assisted system calls abstraction and normalization for host based anomaly detection systems W Haider, J Hu, X Yu, Y Xie 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015 | 23 | 2015 |
Online Anomaly Detection Based on Web Usage Mining Y Xie, T Shensheng IEEE 26th International Parallel and Distributed Processing Symposium …, 2012 | 23 | 2012 |