关注
Jieren Cheng
Jieren Cheng
Professor, Hainan University
在 hainu.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
An abnormal network flow feature sequence prediction approach for DDoS attacks detection in big data environment
J Cheng, R Xu, X Tang, VS Sheng, C Cai
Comput. Mater. Continua 55 (1), 95-119, 2018
1282018
Deep fusion clustering network
W Tu, S Zhou, X Liu, X Guo, Z Cai, E Zhu, J Cheng
Proceedings of the AAAI Conference on Artificial Intelligence 35 (11), 9978-9987, 2021
512021
DDoS attack detection using IP address feature interaction
J Cheng, J Yin, Y Liu, Z Cai, C Wu
2009 International Conference on Intelligent Networking and Collaborative …, 2009
382009
DDoS attack detection algorithm using IP address features
J Cheng, J Yin, Y Liu, Z Cai, M Li
Frontiers in Algorithmics: Third International Workshop, FAW 2009, Hefei …, 2009
372009
蜜罐及蜜网技术研究进展
程杰仁, 殷建平, 刘运, 钟经伟
计算机研究与发展, 375-378, 2008
362008
Contourlet-DCT based multiple robust watermarkings for medical images
X Wu, J Li, R Tu, J Cheng, UA Bhatti, J Ma
Multimedia Tools and Applications 78, 8463-8480, 2019
352019
Singular point probability improve LSTM network performance for long-term traffic flow prediction
B Liu, J Cheng, K Cai, P Shi, X Tang
Theoretical Computer Science: 35th National Conference, NCTCS 2017, Wuhan …, 2017
342017
Experiments of federated learning for COVID-19 chest X-ray images
B Yan, J Wang, J Cheng, Y Zhou, Y Zhang, Y Yang, L Liu, H Zhao, ...
Advances in Artificial Intelligence and Security: 7th International …, 2021
312021
A novel robust watermarking algorithm for encrypted medical image based on DTCWT-DCT and chaotic map
J Liu, J Li, J Cheng, J Ma, N Sadiq, B Han, Q Geng, Y Ai
Computers, Materials & Continua 61 (2), 889-910, 2019
312019
Traffic flow combination forecasting method based on improved LSTM and ARIMA
B Liu, X Tang, J Cheng, P Shi
International Journal of Embedded Systems 12 (1), 22-30, 2020
292020
Design and implementation of teaching system for mobile cross-platform
Z Zheng, J Cheng, J Peng
International Journal of Multimedia and Ubiquitous Engineering 10 (2), 287-296, 2015
282015
Trend prediction of internet public opinion based on collaborative filtering
X Chen, M Xia, J Cheng, X Tang, J Zhang
2016 12th international conference on natural computation, fuzzy systems and …, 2016
272016
Adaptive DDoS attack detection method based on multiple-kernel learning
J Cheng, C Zhang, X Tang, VS Sheng, Z Dong, J Li
Security and Communication Networks 2018, 2018
262018
DDoS attack detection method based on linear prediction model
J Cheng, J Yin, C Wu, B Zhang, Y Liu
Emerging Intelligent Computing Technology and Applications: 5th …, 2009
262009
Generative Adversarial Networks: A Literature Review.
J Cheng, Y Yang, X Tang, N Xiong, Y Zhang, F Lei
KSII Transactions on Internet & Information Systems 14 (12), 2020
252020
Flow correlation degree optimization driven random forest for detecting DDoS attacks in cloud computing
J Cheng, M Li, X Tang, VS Sheng, Y Liu, W Guo
Security and Communication Networks 2018, 1-14, 2018
252018
A DDoS detection method for socially aware networking based on forecasting fusion feature sequence
J Cheng, J Zhou, Q Liu, X Tang, Y Guo
The computer journal 61 (7), 959-970, 2018
242018
A robust zero-watermarking based on SIFT-DCT for medical images in the encrypted domain
J Liu, J Li, Y Chen, X Zou, J Cheng, Y Liu, UA Bhatti
Comput. Mater. Continua 61 (1), 363-378, 2019
222019
Detecting DDoS attacks using conditional entropy
Y Liu, J Yin, J Cheng, B Zhang
2010 International Conference on Computer Application and System Modeling …, 2010
212010
A survey of security threats and defense on Blockchain
J Cheng, L Xie, X Tang, N Xiong, B Liu
Multimedia Tools and Applications 80, 30623-30652, 2021
202021
系统目前无法执行此操作,请稍后再试。
文章 1–20