Privacy preserving machine learning with homomorphic encryption and federated learning H Fang, Q Qian Future Internet 13 (4), 94, 2021 | 385 | 2021 |
Malware identification using visualization images and deep learning S Ni, Q Qian, R Zhang Computers & Security 77, 871-885, 2018 | 319 | 2018 |
Materials informatics S Ramakrishna, TY Zhang, WC Lu, Q Qian, JSC Low, JHR Yune, DZL Tan, ... Journal of Intelligent Manufacturing 30, 2307-2326, 2019 | 153 | 2019 |
Deep learning and visualization for identifying malware families G Sun, Q Qian IEEE Transactions on Dependable and Secure Computing 18 (1), 283-295, 2018 | 141 | 2018 |
Multi-objective optimization for materials design with improved NSGA-II P Zhang, Y Qian, Q Qian Materials Today Communications 28, 102709, 2021 | 56 | 2021 |
Dynamic API call sequence visualisation for malware classification M Tang, Q Qian IET Information Security 13 (4), 367-377, 2019 | 56 | 2019 |
Different implementations of AES cryptographic algorithm G Guo, Q Qian, R Zhang 2015 IEEE 17th International Conference on High Performance Computing and …, 2015 | 52 | 2015 |
Clustering Based K-anonymity Algorithm for Privacy Preservation. S Ni, M Xie, Q Qian Int. J. Netw. Secur. 19 (6), 1062-1071, 2017 | 49 | 2017 |
A Lightweight RFID Security Protocol Based on Elliptic Curve Crytography. Q Qian, YL Jia, R Zhang Int. J. Netw. Secur. 18 (2), 354-361, 2016 | 49 | 2016 |
A virtual sample generation algorithm supporting machine learning with a small-sample dataset: A case study for rubber materials L Shen, Q Qian Computational Materials Science 211, 111475, 2022 | 48 | 2022 |
Ontology based heterogeneous materials database integration and semantic query S Zhao, Q Qian AIP Advances 7 (10), 2017 | 39 | 2017 |
Malicious code classification based on opcode sequences and textCNN network Q Wang, Q Qian Journal of Information Security and Applications 67, 103151, 2022 | 26 | 2022 |
Android malware identification through visual exploration of disassembly files Y Zhao, Q Qian International Journal of Network Security 20 (6), 1061-1073, 2018 | 26 | 2018 |
Grid-based Data Stream Clustering for Intrusion Detection. Q Qian, CJ Xiao, R Zhang Int. J. Netw. Secur. 15 (1), 1-8, 2013 | 26 | 2013 |
Research on hidden markov model for system call anomaly detection Q Qian, M Xin Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2007 …, 2007 | 26 | 2007 |
Federated Active Learning for Multicenter Collaborative Disease Diagnosis X Wu, J Pei, C Chen, Y Zhu, J Wang, Q Qian, J Zhang, Q Sun, Y Guo IEEE Transactions on Medical Imaging 42 (7), 2068-2080, 2022 | 24 | 2022 |
Malicious behavior analysis for android applications Q Qian, J Cai, M Xie, R Zhang International Journal of Network Security 18 (1), 182-192, 2016 | 24 | 2016 |
Spatio-temporal graph convolutional networks via view fusion for trajectory data analytics W Hu, W Li, X Zhou, A Kawai, K Fueda, Q Qian, J Wang IEEE Transactions on Intelligent Transportation Systems 24 (4), 4608-4620, 2022 | 23 | 2022 |
Entropy based method for network anomaly detection Q Quan, C Hong-Yi, Z Rui 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing …, 2009 | 23 | 2009 |
A density-based random forest for imbalanced data classification J Dong, Q Qian Future Internet 14 (3), 90, 2022 | 22 | 2022 |