Back-propagation neural network on Markov chains from system call sequences: a new approach for detecting Android malware with system call sequences X Xiao, Z Wang, Q Li, S Xia, Y Jiang IET Information Security 11 (1), 8-15, 2016 | 85 | 2016 |
When machine learning meets congestion control: A survey and comparison H Jiang, Q Li, Y Jiang, GB Shen, R Sinnott, C Tian, M Xu Computer Networks 192, 108033, 2021 | 69 | 2021 |
Self-attentive deep learning method for online traffic classification and its interpretability G Xie, Q Li, Y Jiang Elsevier Computer Networks, 2021 | 54 | 2021 |
Phishing websites detection via CNN and multi-head self-attention on imbalanced datasets X Xiao, W Xiao, D Zhang, B Zhang, G Hu, Q Li, S Xia Computers & Security 108, 102372, 2021 | 53 | 2021 |
Video Super-Resolution and Caching—An Edge-Assisted Adaptive Video Streaming Solution A Zhang, Q Li, Y Chen, X Ma, L Zou, Y Jiang, Z Xu, GM Muntean IEEE Transactions on Broadcasting 67 (4), 799-812, 2021 | 52 | 2021 |
Woodpecker: Detecting and Mitigating Link-flooding Attacks via SDN L Wang, Q Li, Y Jiang, X Jia, J Wu Elsevier Computer Networks 147, 1-13, 2018 | 51 | 2018 |
Design and analysis of SEIQR worm propagation model in mobile internet X Xiao, P Fu, C Dou, Q Li, G Hu, S Xia Communications in nonlinear science and numerical simulation 43, 341-350, 2017 | 51 | 2017 |
Towards mitigating link flooding attack via incremental SDN deployment L Wang, Q Li, Y Jiang, J Wu 2016 IEEE Symposium on Computers and Communication (ISCC), 397-402, 2016 | 48 | 2016 |
On the scalability of router forwarding tables: Nexthop-selectable FIB aggregation Q Li, D Wang, M Xu, J Yang 2011 Proceedings IEEE INFOCOM, 321-325, 2011 | 43 | 2011 |
Mousika: Enable General In-Network Intelligence in Programmable Switches by Knowledge Distillation G Xie, Q Li, Y Dong, G Duan, Y Jiang, J Duan IEEE INFOCOM, 1-10, 2022 | 40 | 2022 |
SAM: Self-Attention based Deep Learning Method for Online Traffic Classification G Xie, Q Li, Y Jiang, T Dai, G Shen, R Li, R Sinnott, S Xia NetAI '20: ACM SIGCOMM 2020 Workshop on Network Meets AI & ML, 2020 | 31 | 2020 |
QAVA: QoE-aware adaptive video bitrate aggregation for HTTP live streaming based on smart edge computing X Ma, Q Li, L Zou, J Peng, J Zhou, J Chai, Y Jiang, GM Muntean IEEE Transactions on Broadcasting 68 (3), 661-676, 2022 | 30 | 2022 |
ADRIoT: An Edge-assisted Anomaly Detection Framework against IoT-based Network Attacks R Li, Q Li, J Zhou, Y Jiang IEEE Internet of Things Journal, 2021 | 30 | 2021 |
BOND: Flexible failure recovery in software defined networks Q Li, Y Liu, Z Zhu, H Li, Y Jiang Computer Networks 149, 1-12, 2019 | 30 | 2019 |
HQTimer: A Hybrid -Learning-Based Timeout Mechanism in Software-Defined Networks Q Li, N Huang, D Wang, X Li, Y Jiang, Z Song IEEE Transactions on Network and Service Management 16 (1), 153-166, 2019 | 29 | 2019 |
Session-based access control in information-centric networks: Design and analyses Y Wang, M Xu, Z Feng, Q Li, Q Li 2014 IEEE 33rd International Performance Computing and Communications …, 2014 | 27 | 2014 |
VaBUS: Edge-Cloud Real-time Video Analytics via Background Understanding and Subtraction H Wang, Q Li, H Sun, Z Chen, Y Hao, J Peng, Z Yuan, J Fu, Y Jiang IEEE Journal on Selected Areas in Communications, 2022 | 26 | 2022 |
Detection and prevention of code injection attacks on HTML5-based apps X Xiao, R Yan, R Ye, Q Li, S Peng, Y Jiang 2015 Third International Conference on Advanced Cloud and Big Data, 254-261, 2015 | 24 | 2015 |
Toward latency-aware dynamic middlebox scheduling P Duan, Q Li, Y Jiang, ST Xia 2015 24th International Conference on Computer Communication and Networks …, 2015 | 21 | 2015 |
Quokka: Latency-Aware Middlebox Scheduling with dynamic resource allocation Q Li, Y Jiang, P Duan, M Xu, X Xiao Journal of Network and Computer Applications 78, 253-266, 2017 | 20 | 2017 |