A survey on access control in the age of internet of things J Qiu, Z Tian, C Du, Q Zuo, S Su, B Fang IEEE Internet of Things Journal 7 (6), 4682-4696, 2020 | 378 | 2020 |
A distributed deep learning system for web attack detection on edge devices Z Tian, C Luo, J Qiu, X Du, M Guizani IEEE Transactions on Industrial Informatics 16 (3), 1963-1971, 2019 | 327 | 2019 |
Evaluating reputation management schemes of internet of vehicles based on evolutionary game theory Z Tian, X Gao, S Su, J Qiu, X Du, M Guizani IEEE Transactions on Vehicular Technology 68 (6), 5971-5980, 2019 | 188 | 2019 |
Nei-TTE: Intelligent traffic time estimation based on fine-grained time derivation of road segments for smart city J Qiu, L Du, D Zhang, S Su, Z Tian IEEE Transactions on Industrial Informatics 16 (4), 2659-2666, 2019 | 170 | 2019 |
Vcash: a novel reputation framework for identifying denial of traffic service in internet of connected vehicles Z Tian, X Gao, S Su, J Qiu IEEE Internet of Things Journal 7 (5), 3901-3909, 2019 | 138 | 2019 |
Dynamic prototype network based on sample adaptation for few-shot malware detection Y Chai, L Du, J Qiu, L Yin, Z Tian IEEE Transactions on Knowledge and Data Engineering 35 (5), 4754-4766, 2022 | 67 | 2022 |
Location privacy challenges in mobile edge computing: Classification and exploration Z Tian, Y Wang, Y Sun, J Qiu IEEE Network 34 (2), 52-56, 2020 | 57 | 2020 |
Automatically traceback RDP‐based targeted ransomware attacks ZH Wang, CG Liu, J Qiu, ZH Tian, X Cui, S Su Wireless Communications and Mobile Computing 2018 (1), 7943586, 2018 | 57 | 2018 |
Automatic concept extraction based on semantic graphs from big data in smart city J Qiu, Y Chai, Z Tian, X Du, M Guizani IEEE Transactions on Computational Social Systems 7 (1), 225-233, 2019 | 56 | 2019 |
A data leakage prevention method based on the reduction of confidential and context terms for smart mobile devices X Yu, Z Tian, J Qiu, F Jiang Wireless Communications and Mobile Computing 2018 (1), 5823439, 2018 | 55 | 2018 |
A correlation-change based feature selection method for IoT equipment anomaly detection S Su, Y Sun, X Gao, J Qiu, Z Tian Applied sciences 9 (3), 437, 2019 | 51 | 2019 |
Automatic non-taxonomic relation extraction from big data in smart city J Qiu, Y Chai, Y Liu, Z Gu, S Li, Z Tian IEEE Access 6, 74854-74864, 2018 | 51 | 2018 |
Centralized fusion based on interacting multiple model and adaptive Kalman filter for target tracking in underwater acoustic sensor networks J Qiu, Z Xing, C Zhu, K Lu, J He, Y Sun, L Yin IEEE Access 7, 25948-25958, 2019 | 42 | 2019 |
Artificial intelligence security in 5g networks: Adversarial examples for estimating a travel time task J Qiu, L Du, Y Chen, Z Tian, X Du, M Guizani IEEE vehicular technology magazine 15 (3), 95-100, 2020 | 28 | 2020 |
Panner: Pos-aware nested named entity recognition through heterogeneous graph neural network L Zhou, J Li, Z Gu, J Qiu, BB Gupta, Z Tian IEEE Transactions on Computational Social Systems, 2022 | 21 | 2022 |
A hybrid-based method for Chinese domain lightweight ontology construction J Qiu, L Qi, J Wang, G Zhang International Journal of Machine Learning and Cybernetics 9, 1519-1531, 2018 | 21 | 2018 |
From data and model levels: Improve the performance of few-shot malware classification Y Chai, J Qiu, L Yin, L Zhang, BB Gupta, Z Tian IEEE Transactions on Network and Service Management 19 (4), 4248-4261, 2022 | 19 | 2022 |
Deep learning and dempster-shafer theory based insider threat detection Z Tian, W Shi, Z Tan, J Qiu, Y Sun, F Jiang, Y Liu Mobile Networks and Applications, 1-10, 2020 | 19 | 2020 |
Dependency-Based Local Attention Approach to Neural Machine Translation. J Qiu, Y Liu, Y Chai, Y Si, S Su, L Wang, Y Wu Computers, Materials & Continua 59 (2), 2019 | 18 | 2019 |
News recommender system based on topic detection and tracking J Qiu, L Liao, P Li Rough Sets and Knowledge Technology: 4th International Conference, RSKT 2009 …, 2009 | 18 | 2009 |