An abnormal network flow feature sequence prediction approach for DDoS attacks detection in big data environment J Cheng, R Xu, X Tang, VS Sheng, C Cai Comput. Mater. Continua 55 (1), 95-119, 2018 | 128 | 2018 |
Deep fusion clustering network W Tu, S Zhou, X Liu, X Guo, Z Cai, E Zhu, J Cheng Proceedings of the AAAI Conference on Artificial Intelligence 35 (11), 9978-9987, 2021 | 51 | 2021 |
DDoS attack detection using IP address feature interaction J Cheng, J Yin, Y Liu, Z Cai, C Wu 2009 International Conference on Intelligent Networking and Collaborative …, 2009 | 38 | 2009 |
DDoS attack detection algorithm using IP address features J Cheng, J Yin, Y Liu, Z Cai, M Li Frontiers in Algorithmics: Third International Workshop, FAW 2009, Hefei …, 2009 | 37 | 2009 |
蜜罐及蜜网技术研究进展 程杰仁, 殷建平, 刘运, 钟经伟 计算机研究与发展, 375-378, 2008 | 36 | 2008 |
Contourlet-DCT based multiple robust watermarkings for medical images X Wu, J Li, R Tu, J Cheng, UA Bhatti, J Ma Multimedia Tools and Applications 78, 8463-8480, 2019 | 35 | 2019 |
Singular point probability improve LSTM network performance for long-term traffic flow prediction B Liu, J Cheng, K Cai, P Shi, X Tang Theoretical Computer Science: 35th National Conference, NCTCS 2017, Wuhan …, 2017 | 34 | 2017 |
Experiments of federated learning for COVID-19 chest X-ray images B Yan, J Wang, J Cheng, Y Zhou, Y Zhang, Y Yang, L Liu, H Zhao, ... Advances in Artificial Intelligence and Security: 7th International …, 2021 | 31 | 2021 |
A novel robust watermarking algorithm for encrypted medical image based on DTCWT-DCT and chaotic map J Liu, J Li, J Cheng, J Ma, N Sadiq, B Han, Q Geng, Y Ai Computers, Materials & Continua 61 (2), 889-910, 2019 | 31 | 2019 |
Traffic flow combination forecasting method based on improved LSTM and ARIMA B Liu, X Tang, J Cheng, P Shi International Journal of Embedded Systems 12 (1), 22-30, 2020 | 29 | 2020 |
Design and implementation of teaching system for mobile cross-platform Z Zheng, J Cheng, J Peng International Journal of Multimedia and Ubiquitous Engineering 10 (2), 287-296, 2015 | 28 | 2015 |
Trend prediction of internet public opinion based on collaborative filtering X Chen, M Xia, J Cheng, X Tang, J Zhang 2016 12th international conference on natural computation, fuzzy systems and …, 2016 | 27 | 2016 |
Adaptive DDoS attack detection method based on multiple-kernel learning J Cheng, C Zhang, X Tang, VS Sheng, Z Dong, J Li Security and Communication Networks 2018, 2018 | 26 | 2018 |
DDoS attack detection method based on linear prediction model J Cheng, J Yin, C Wu, B Zhang, Y Liu Emerging Intelligent Computing Technology and Applications: 5th …, 2009 | 26 | 2009 |
Generative Adversarial Networks: A Literature Review. J Cheng, Y Yang, X Tang, N Xiong, Y Zhang, F Lei KSII Transactions on Internet & Information Systems 14 (12), 2020 | 25 | 2020 |
Flow correlation degree optimization driven random forest for detecting DDoS attacks in cloud computing J Cheng, M Li, X Tang, VS Sheng, Y Liu, W Guo Security and Communication Networks 2018, 1-14, 2018 | 25 | 2018 |
A DDoS detection method for socially aware networking based on forecasting fusion feature sequence J Cheng, J Zhou, Q Liu, X Tang, Y Guo The computer journal 61 (7), 959-970, 2018 | 24 | 2018 |
A robust zero-watermarking based on SIFT-DCT for medical images in the encrypted domain J Liu, J Li, Y Chen, X Zou, J Cheng, Y Liu, UA Bhatti Comput. Mater. Continua 61 (1), 363-378, 2019 | 22 | 2019 |
Detecting DDoS attacks using conditional entropy Y Liu, J Yin, J Cheng, B Zhang 2010 International Conference on Computer Application and System Modeling …, 2010 | 21 | 2010 |
A survey of security threats and defense on Blockchain J Cheng, L Xie, X Tang, N Xiong, B Liu Multimedia Tools and Applications 80, 30623-30652, 2021 | 20 | 2021 |