A trusted feature aggregator federated learning for distributed malicious attack detection X Hei, X Yin, Y Wang, J Ren, L Zhu Computers & Security 99, 102033, 2020 | 80 | 2020 |
Cheating identifiable secret sharing scheme using symmetric bivariate polynomial Y Liu, C Yang, Y Wang, L Zhu, W Ji Information Sciences 453, 21-29, 2018 | 67 | 2018 |
A trusted recommendation scheme for privacy protection based on federated learning Y Wang, Y Tian, X Yin, X Hei CCF Transactions on Networking 3 (3), 218-228, 2020 | 38 | 2020 |
A novel energy-aware bio-inspired clustering scheme for IoT communication Y Zhang, Y Wang Journal of Ambient Intelligence and Humanized Computing 11 (10), 4239-4248, 2020 | 28 | 2020 |
Towards energy efficient cloud: an optimized ant colony model for virtual machine placement Z Liumei, W Yichuan, ZHU Lei, J Wenjiang Journal of communications and information networks 1 (4), 116-132, 2016 | 27 | 2016 |
An energy saving based on task migration for mobile edge computing Y Wang, H Zhu, X Hei, Y Kong, W Ji, L Zhu EURASIP Journal on Wireless Communications and Networking 2019, 1-10, 2019 | 26 | 2019 |
A limited-trust capacity model for mitigating threats of internal malicious services in cloud computing Y Wang, S Chandrasekhar, M Singhal, J Ma Cluster computing 19, 647-662, 2016 | 22 | 2016 |
Dynamic game model of botnet DDoS attack and defense Y Wang, J Ma, L Zhang, W Ji, D Lu, X Hei Security and Communication Networks 9 (16), 3127-3140, 2016 | 21 | 2016 |
An unknown protocol syntax analysis method based on convolutional neural network Y Wang, B Bai, X Hei, L Zhu, W Ji Transactions on Emerging Telecommunications Technologies 32 (5), e3922, 2021 | 17 | 2021 |
From high-availability to collapse: quantitative analysis of “cloud-droplet-freezing” attack threats to virtual machine migration in cloud computing Y Wang, J Ma, D Lu, X Lu, L Zhang Cluster computing 17, 1369-1381, 2014 | 15 | 2014 |
Efficient group authentication in RFID using secret sharing scheme Y Liu, Q Sun, Y Wang, L Zhu, W Ji Cluster Computing 22, 8605-8611, 2019 | 14 | 2019 |
PSO-BP neural network in reservoir parameter dynamic prediction L Zhang, J Ma, Y Wang, S Pan 2011 Seventh International Conference on Computational Intelligence and …, 2011 | 14 | 2011 |
A blockchain based distributed storage system for knowledge graph security Y Wang, X Yin, H Zhu, X Hei International Conference on Artificial Intelligence and Security, 318-327, 2020 | 12 | 2020 |
Game strategies for distributed denial of service defense in the cloud of things W Yichuan, Z Yefei, H Xinhong, J Wenjiang, MA Weigang Journal of communications and information networks 1 (4), 143-155, 2016 | 11 | 2016 |
A rational framework for secure communication Y Tian, J Ma, C Peng, Y Wang, L Zhang Information Sciences 250, 215-226, 2013 | 11 | 2013 |
Content based spam text classification: An empirical comparison between english and Chinese L Zhang, J Ma, Y Wang 2013 5th International Conference on Intelligent Networking and …, 2013 | 10 | 2013 |
Game optimization for internal DDoS attack detection in cloud computing W Yichuan, M Jianfeng, LU Di, Z Liumei, M Xianjia Journal of Computer Research and Development 52 (8), 1873, 2015 | 8 | 2015 |
A novel subgraph querying method based on paths and spectra L Zhu, Y Yao, Y Wang, X Hei, Q Zhao, W Ji, Q Yao Neural Computing and Applications 31, 5671-5678, 2019 | 6 | 2019 |
云计算下保障公平性的多资源分配算法 卢笛, 马建峰, 王一川, 习宁, 张留美, 孟宪佳 西安电子科技大学学报 41 (3), 162-168, 2014 | 6 | 2014 |
一种基于模糊推理的主观信任评价模型 [J] 张仕斌, 陈麟, 王一川 仪器与仪表学报, 2009 | 6 | 2009 |