On a mathematical model for low-rate shrew DDoS J Luo, X Yang, J Wang, J Xu, J Sun, K Long IEEE Transactions on Information Forensics and Security 9 (7), 1069-1083, 2014 | 135 | 2014 |
Multi-model ensemble with rich spatial information for object detection J Xu, W Wang, H Wang, J Guo Pattern Recognition 99, 107098, 2020 | 91 | 2020 |
Sql injection detection for web applications based on elastic-pooling cnn X Xie, C Ren, Y Fu, J Xu, J Guo IEEE Access 7, 151475-151481, 2019 | 80 | 2019 |
A fast human action recognition network based on spatio-temporal features J Xu, R Song, H Wei, J Guo, Y Zhou, X Huang Neurocomputing 441, 350-358, 2021 | 45 | 2021 |
Nanomaterials in electrochemical cytosensors J Xu, Y Hu, S Wang, X Ma, J Guo Analyst 145 (6), 2058-2069, 2020 | 41 | 2020 |
STGAFormer: Spatial–temporal Gated Attention Transformer based Graph Neural Network for traffic flow forecasting Z Geng, J Xu, R Wu, C Zhao, J Wang, Y Li, C Zhang Information Fusion 105, 102228, 2024 | 26 | 2024 |
HTTP-sCAN: Detecting HTTP-flooding attack by modeling multi-features of web browsing behavior from noisy web-logs J Wang, M Zhang, X Yang, K Long, J Xu China Communications 12 (2), 118-128, 2015 | 24 | 2015 |
Family-based big medical-level data acquisition system J Xu, L Wang, Y Shen, K Yuan, Y Nie, Y Tian, X Jian, X Ma, J Guo IEEE Transactions on Industrial Informatics 15 (4), 2321-2329, 2018 | 22 | 2018 |
Webshell detection based on the word attention mechanism T Li, C Ren, Y Fu, J Xu, J Guo, X Chen IEEE Access 7, 185140-185147, 2019 | 20 | 2019 |
HTTP-SoLDiER: An HTTP-flooding attack detection scheme with the large deviation principle J Wang, XL Yang, M Zhang, KP Long, J Xu Science China Information Sciences 57, 1-15, 2014 | 17 | 2014 |
Hybrid intrusion detection model based on a designed autoencoder Y Hou, Y Fu, J Guo, J Xu, R Liu, X Xiang Journal of Ambient Intelligence and Humanized Computing 14 (8), 10799-10809, 2023 | 14 | 2023 |
A novel multivariable time series prediction model for acute kidney injury in general hospitalization J Xu, Y Hu, H Liu, W Mi, G Li, J Guo, Y Feng International Journal of Medical Informatics 161, 104729, 2022 | 12 | 2022 |
A novel video inter-frame forgery detection method based on histogram intersection J Xu, Y Liang, X Tian, A Xie 2016 IEEE/CIC international conference on communications in China (ICCC), 1-6, 2016 | 12 | 2016 |
Chaos generator for secure transmission using a sine map and an RLC series circuit J Xu, P Chargé, D Fournier-Prunaret, AK Taha, KP Long Science in China Series F: Information Sciences 53, 129-136, 2010 | 12 | 2010 |
Video description model based on temporal-spatial and channel multi-attention mechanisms J Xu, H Wei, L Li, Q Fu, J Guo Applied Sciences 10 (12), 4312, 2020 | 11 | 2020 |
Web application attack detection based on attention and gated convolution networks J Li, Y Fu, J Xu, C Ren, X Xiang, J Guo IEEE Access 8, 20717-20724, 2019 | 11 | 2019 |
Improving fine-grained image classification with multimodal information J Xu, X Zhang, C Zhao, Z Geng, Y Feng, K Miao, Y Li IEEE Transactions on Multimedia, 2023 | 9 | 2023 |
HTTP-sCAN: Detecting HTTP-flooding attaCk by modeling multi-features of web browsing behavior from noisy dataset J Wang, M Zhang, X Yang, K Long, C Zhou 2013 19th Asia-Pacific Conference on Communications (APCC), 677-682, 2013 | 9 | 2013 |
Analysis of chaotic dynamics in a two-dimensional sine square map X Jie, L Ke-Ping, F Daniele, T Abdel-Kaddous Chinese Physics Letters 27 (2), 020504, 2010 | 8 | 2010 |
AAIC: adaptive-sliding-connection-window solution to TCP incast from application layer J Luo, X Yang, J Xu, J Sun IEEE Communications Letters 20 (10), 1967-1970, 2016 | 7 | 2016 |