关注
Yanzhen Qu
标题
引用次数
引用次数
年份
RFH: A resilient, fault-tolerant and high-efficient replication algorithm for distributed cloud storage
Y Qu, N Xiong
2012 41st International Conference on Parallel Processing, 520-529, 2012
1182012
Anomaly secure detection methods by analyzing dynamic characteristics of the network traffic in cloud communications
W Xiong, H Hu, N Xiong, LT Yang, WC Peng, X Wang, Y Qu
Information Sciences 258, 403-415, 2014
1072014
Apparatus and methods for transmitting programming, receiving and displaying programming, communicating with exercise equipment, and accessing and passing data to and from …
Y Qu
US Patent App. 11/377,600, 2006
712006
Assessing vulnerabilities in Bluetooth low energy (BLE) wireless network based IoT systems
Y Qu, P Chan
2016 IEEE 2nd International Conference on Big Data Security on Cloud …, 2016
442016
A holistic model for making cloud migration decision: A consideration of security, architecture and business economics
B Johnson, Y Qu
2012 IEEE 10th International Symposium on Parallel and Distributed …, 2012
402012
A novel framework for math word problem solving
K Morton, Y Qu
International Journal of Information and Education Technology 3 (1), 88, 2013
322013
Detecting metamorphic malware by using behavior-based aggregated signature
Y Qu, K Hughes
World Congress on Internet Security (WorldCIS-2013), 13-18, 2013
142013
Enhancing the robustness of recommender systems against spammers
C Zhang, J Liu, Y Qu, T Han, X Ge, A Zeng
PloS one 13 (11), e0206458, 2018
132018
A Comparative Study on Machine Learning Algorithms for Predicting Breast Cancer Prognosis in Improving Clinical Trials
N Sangari, Y Qu
2020 International Conference on Computational Science and Computational …, 2020
122020
A theoretical model: Using logistic regression for malware signature based detection
K Hughes, Y Qu
The 10th International Conference on Dependable, Autonomic, and Secure …, 2012
122012
Automatic identification of coronary arteries in coronary computed tomographic angiography
CJ Zhang, D Xia, C Zheng, J Wei, Y Cui, Y Qu, F Liao
IEEE Access 8, 65566-65572, 2020
112020
Performance measures of behavior-based signatures: an anti-malware solution for platforms with limited computing resource
K Hughes, Y Qu
2014 Ninth International Conference on Availability, Reliability and …, 2014
92014
A Comparison Research on DSCP Marking’s Impact to the QoS of VoIP-based and SS7-based Phone Calls
S Daoud, Y Qu
2019 7th International Conference on Information, Communication and Networks …, 2019
72019
Research and Practice of Applying Adaptive Learning in Computer Science and IT Degree Programs
Y Qu, R Cai, M Haj-Hussein
2019 IEEE Frontiers in Education Conference (FIE), 1-8, 2019
62019
Effectively mining network traffic intelligence to detect malicious stealthy port scanning to cloud servers
YZ Qu, QK Lu
網際網路技術學刊 15 (5), 841-852, 2014
62014
Fault-tolerant and ubiquitous computing in sensor networks
NN Xiong, H Cheng, S Hussain, Y Qu
International Journal of Distributed Sensor Networks 9 (10), 524547, 2013
62013
Improving the security of the distributed enterprise data warehouse system
Y Qu, W Yang
Proceedings of 2011 IEEE International Conference on Intelligence and …, 2011
52011
Detecting Software Security Vulnerability during an Agile Development by Testing the Changes to the Security Posture of Software Systems
B Arnold, Y Qu
2020 International Conference on Computational Science and Computational …, 2020
42020
A quantitative approach for determining pilot affective patterns during soaring flight simulation
SM Moon, Y Qu
2017 3rd ieee international conference on computer and communications (iccc …, 2017
42017
Let's trade futures! a novel approach for cloud computing resource planning and management
AE Shebanow, B Sandén, Y Qu
2013 IEEE Seventh International Symposium on Service-Oriented System …, 2013
42013
系统目前无法执行此操作,请稍后再试。
文章 1–20