Security strategy for virtual machine allocation in cloud computing H Jia, X Liu, X Di, H Qi, L Cong, J Li, H Yang Procedia computer science 147, 140-144, 2019 | 42 | 2019 |
Formal definition and analysis of access control model based on role and attribute H Qi, X Di, J Li Journal of information security and applications 43, 53-60, 2018 | 35 | 2018 |
A novel network intrusion detection algorithm based on Fast Fourier Transformation W Liu, X Liu, X Di, H Qi 2019 1st international conference on Industrial Artificial Intelligence (IAI …, 2019 | 27 | 2019 |
SDN-based dynamic multi-path routing strategy for satellite networks H Qi, Y Guo, D Hou, Z Xing, W Ren, L Cong, X Di Future Generation Computer Systems 133, 254-265, 2022 | 25 | 2022 |
A semi-symmetric image encryption scheme based on the function projective synchronization of two hyperchaotic systems X Di, J Li, H Qi, L Cong, H Yang PloS one 12 (9), e0184586, 2017 | 25 | 2017 |
NADS-RA: network anomaly detection scheme based on feature representation and data augmentation X Liu, X Di, Q Ding, W Liu, H Qi, J Li, H Yang IEEE Access 8, 214781-214800, 2020 | 23 | 2020 |
Map-matching algorithm based on the junction decision domain and the hidden Markov model H Qi, X Di, J Li PloS one 14 (5), e0216476, 2019 | 23 | 2019 |
A hybrid caching strategy for information-centric satellite networks based on node classification and popular content awareness R Xu, X Di, J Chen, H Wang, H Luo, H Qi, X He, W Lei, S Zhang Computer Communications 197, 186-198, 2023 | 18 | 2023 |
Access control model based on role and attribute and its applications on space-ground integration networks H Qi, H Ma, J Li, X Di 2015 4th International Conference on Computer Science and Network Technology …, 2015 | 16 | 2015 |
A remote sensing data transmission strategy based on the combination of satellite-ground link and GEO relay under dynamic topology J Chen, X Di, R Xu, H Qi, L Cong, K Zhang, Z Xing, X He, W Lei, S Zhang Future Generation Computer Systems 145, 337-353, 2023 | 13 | 2023 |
Anomaly detection for application layer user browsing behavior based on attributes and features X Luo, X Di, X Liu, H Qi, J Li, L Cong, H Yang Journal of Physics: Conference Series 1069 (1), 012072, 2018 | 13 | 2018 |
Access control model based on role and attribute and its implementation H Qi, X Luo, X Di, J Li, H Yang, Z Jiang 2016 International Conference on Cyber-Enabled Distributed Computing and …, 2016 | 10 | 2016 |
Smart contract-based integrity audit method for IoT C Wang, X Liu, H Li, X Di, L Cong, S Zhang, H Qi Information Sciences 647, 119413, 2023 | 9 | 2023 |
Dynamic optimization of intersatellite link assignment based on reinforcement learning W Ren, J Zhu, H Qi, L Cong, X Di International Journal of Distributed Sensor Networks 18 (2), 15501477211070202, 2022 | 9 | 2022 |
Attention-based hybrid model for automatic short answer scoring H Qi, Y Wang, J Dai, J Li, X Di Simulation Tools and Techniques: 11th International Conference, SIMUtools …, 2019 | 8 | 2019 |
Improved K-means clustering algorithm and its applications H Qi, J Li, X Di, W Ren, F Zhang Recent Patents on Engineering 13 (4), 403-409, 2019 | 7 | 2019 |
A multipath routing algorithm for satellite networks based on service demand and traffic awareness Z Xing, H Qi, X Di, J Liu, R Xu, J Chen, L Cong Frontiers of Information Technology & Electronic Engineering 24 (6), 844-858, 2023 | 6 | 2023 |
Evaluation method of node importance in temporal satellite networks based on time slot correlation R Xu, X Di, X He, H Qi EURASIP Journal on Wireless Communications and Networking 2021 (1), 188, 2021 | 6 | 2021 |
Secure data deduplication scheme based on distributed random key in integrated networks H Qi, Y Han, X Di, F Sun 2017 3rd IEEE International Conference on Computer and Communications (ICCC …, 2017 | 5 | 2017 |
An efficient scheme for in-orbit remote sensing image data retrieval J Chen, X Di, R Xu, H Luo, H Qi, P Zhan, Y Jiang Future Generation Computer Systems 150, 103-114, 2024 | 4 | 2024 |