RFH: A resilient, fault-tolerant and high-efficient replication algorithm for distributed cloud storage Y Qu, N Xiong 2012 41st International Conference on Parallel Processing, 520-529, 2012 | 118 | 2012 |
Anomaly secure detection methods by analyzing dynamic characteristics of the network traffic in cloud communications W Xiong, H Hu, N Xiong, LT Yang, WC Peng, X Wang, Y Qu Information Sciences 258, 403-415, 2014 | 107 | 2014 |
Apparatus and methods for transmitting programming, receiving and displaying programming, communicating with exercise equipment, and accessing and passing data to and from … Y Qu US Patent App. 11/377,600, 2006 | 71 | 2006 |
Assessing vulnerabilities in Bluetooth low energy (BLE) wireless network based IoT systems Y Qu, P Chan 2016 IEEE 2nd International Conference on Big Data Security on Cloud …, 2016 | 44 | 2016 |
A holistic model for making cloud migration decision: A consideration of security, architecture and business economics B Johnson, Y Qu 2012 IEEE 10th International Symposium on Parallel and Distributed …, 2012 | 40 | 2012 |
A novel framework for math word problem solving K Morton, Y Qu International Journal of Information and Education Technology 3 (1), 88, 2013 | 32 | 2013 |
Detecting metamorphic malware by using behavior-based aggregated signature Y Qu, K Hughes World Congress on Internet Security (WorldCIS-2013), 13-18, 2013 | 14 | 2013 |
Enhancing the robustness of recommender systems against spammers C Zhang, J Liu, Y Qu, T Han, X Ge, A Zeng PloS one 13 (11), e0206458, 2018 | 13 | 2018 |
A Comparative Study on Machine Learning Algorithms for Predicting Breast Cancer Prognosis in Improving Clinical Trials N Sangari, Y Qu 2020 International Conference on Computational Science and Computational …, 2020 | 12 | 2020 |
A theoretical model: Using logistic regression for malware signature based detection K Hughes, Y Qu The 10th International Conference on Dependable, Autonomic, and Secure …, 2012 | 12 | 2012 |
Automatic identification of coronary arteries in coronary computed tomographic angiography CJ Zhang, D Xia, C Zheng, J Wei, Y Cui, Y Qu, F Liao IEEE Access 8, 65566-65572, 2020 | 11 | 2020 |
Performance measures of behavior-based signatures: an anti-malware solution for platforms with limited computing resource K Hughes, Y Qu 2014 Ninth International Conference on Availability, Reliability and …, 2014 | 9 | 2014 |
A Comparison Research on DSCP Marking’s Impact to the QoS of VoIP-based and SS7-based Phone Calls S Daoud, Y Qu 2019 7th International Conference on Information, Communication and Networks …, 2019 | 7 | 2019 |
Research and Practice of Applying Adaptive Learning in Computer Science and IT Degree Programs Y Qu, R Cai, M Haj-Hussein 2019 IEEE Frontiers in Education Conference (FIE), 1-8, 2019 | 6 | 2019 |
Effectively mining network traffic intelligence to detect malicious stealthy port scanning to cloud servers YZ Qu, QK Lu 網際網路技術學刊 15 (5), 841-852, 2014 | 6 | 2014 |
Fault-tolerant and ubiquitous computing in sensor networks NN Xiong, H Cheng, S Hussain, Y Qu International Journal of Distributed Sensor Networks 9 (10), 524547, 2013 | 6 | 2013 |
Improving the security of the distributed enterprise data warehouse system Y Qu, W Yang Proceedings of 2011 IEEE International Conference on Intelligence and …, 2011 | 5 | 2011 |
Detecting Software Security Vulnerability during an Agile Development by Testing the Changes to the Security Posture of Software Systems B Arnold, Y Qu 2020 International Conference on Computational Science and Computational …, 2020 | 4 | 2020 |
A quantitative approach for determining pilot affective patterns during soaring flight simulation SM Moon, Y Qu 2017 3rd ieee international conference on computer and communications (iccc …, 2017 | 4 | 2017 |
Let's trade futures! a novel approach for cloud computing resource planning and management AE Shebanow, B Sandén, Y Qu 2013 IEEE Seventh International Symposium on Service-Oriented System …, 2013 | 4 | 2013 |