A double-image encryption scheme based on amplitude-phase encoding and discrete complex random transformation Y Luo, S Tang, X Qin, L Cao, F Jiang, J Liu IEEE access 6, 77740-77753, 2018 | 35 | 2018 |
Hybrid cyber defense strategies using Honey-X: A survey X Qin, F Jiang, M Cen, R Doss Computer Networks, 109776, 2023 | 8 | 2023 |
Distributed ledger technologies in vehicular mobile edge computing: a survey M Jiang, X Qin Complex & Intelligent Systems 8 (5), 4403-4419, 2022 | 6 | 2022 |
Ransomware early detection: A survey M Cen, F Jiang, X Qin, Q Jiang, R Doss Computer Networks 239, 110138, 2024 | 5 | 2024 |
A hybrid cyber defense framework for reconnaissance attack in industrial control systems X Qin, F Jiang, C Dong, R Doss Computers & Security 136, 103506, 2024 | 3 | 2024 |
The Success of a Food Tourism Destination: A Systematic Review B Long, NS Yusof, MM Azmy, X Qin International Journal of Professional Business Review 8 (10), e03761-e03761, 2023 | | 2023 |
A quantum inspired differential evolution algorithm with multiple mutation strategies J Liu, XS Qin, F Jiang 2022 IEEE International Conference on Trust, Security and Privacy in …, 2022 | | 2022 |