关注
Lv Qiujian
Lv Qiujian
未知所在单位机构
在 iie.ac.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Big data driven hidden Markov model based individual mobility prediction at points of interest
Q Lv, Y Qiao, N Ansari, J Liu, J Yang
IEEE Transactions on Vehicular Technology 66 (6), 5204-5216, 2016
1472016
Hidden Markov Model based user mobility analysis in LTE network
Q Lv, Z Mei, Y Qiao, Y Zhong, Z Lei
2014 International Symposium on Wireless Personal Multimedia Communications …, 2014
192014
Risk prediction for imbalanced data in cyber security: a Siamese network-based deep learning classification framework
D Sun, Z Wu, Y Wang, Q Lv, B Hu
2019 international joint conference on neural networks (IJCNN), 1-8, 2019
172019
A novel deep framework for dynamic malware detection based on API sequence intrinsic features
C Li, Q Lv, N Li, Y Wang, D Sun, Y Qiao
Computers & Security 116, 102686, 2022
152022
A hybrid model based on multi-dimensional features for insider threat detection
B Lv, D Wang, Y Wang, Q Lv, D Lu
Wireless Algorithms, Systems, and Applications: 13th International …, 2018
132018
Towards a user and role-based behavior analysis method for insider threat detection
Q Lv, Y Wang, L Wang, D Wang
2018 international conference on network infrastructure and digital content …, 2018
92018
A few-shot class-incremental learning approach for intrusion detection
T Wang, Q Lv, B Hu, D Sun
2021 International Conference on Computer Communications and Networks (ICCCN …, 2021
62021
Linking virtual identities across service domains: An online behavior modeling approach
Y Wu, Q Lv, Y Qiao, J Yang
2017 International Conference on Intelligent Environments (IE), 122-129, 2017
62017
Itdbert: Temporal-semantic representation for insider threat detection
W Huang, H Zhu, C Li, Q Lv, Y Wang, H Yang
2021 IEEE Symposium on Computers and Communications (ISCC), 1-7, 2021
52021
Measuring geospatial properties: Relating online content browsing behaviors to users’ points of interest
Q Lv, Y Qiao, Y Zhang, FB Abdesslem, W Lin, J Yang
Wireless Personal Communications 101, 1469-1498, 2018
52018
Heat-supply of thermal power plant in wind-heat conflict
Q Lv, B Hu, H Wang, N Zhang, L Liu
Electric Power Automation Equipment 36 (7), 236-244, 2017
52017
Improving mobility prediction performance with state based prediction method when the user departs from routine
A Li, Q Lv, Y Qiao, J Yang
2016 IEEE International Conference on Big Data Analysis (ICBDA), 1-7, 2016
52016
Spatial and temporal mobility analysis in LTE mobile network
Q Lv, Y Di, Y Qiao, Z Lei, C Dong
2015 IEEE Wireless Communications and Networking Conference (WCNC), 795-800, 2015
52015
DMalNet: Dynamic malware analysis based on API feature engineering and graph learning
C Li, Z Cheng, H Zhu, L Wang, Q Lv, Y Wang, N Li, D Sun
Computers & Security 122, 102872, 2022
42022
CVSS-based multi-factor dynamic risk assessment model for network system
T Wang, Q Lv, B Hu, D Sun
2020 IEEE 10th International Conference on Electronics Information and …, 2020
42020
Anomaly Detection in Unstructured Logs Using Attention-based Bi-LSTM Network
D Yu, X Hou, C Li, Q Lv, Y Wang, N Li
2021 7th IEEE International Conference on Network Intelligence and Digital …, 2021
32021
Density weighted diversity based query strategy for active learning
T Wang, X Zhao, Q Lv, B Hu, D Sun
2021 IEEE 24th International Conference on Computer Supported Cooperative …, 2021
22021
Probabilistic top-k query: Model and application on web traffic analysis
X Gui, J Liu, Q Lv, C Dong, Z Lei
China Communications 13 (6), 123-137, 2016
22016
AOPL: attention enhanced oversampling and parallel deep learning model for attack detection in imbalanced network traffic
L Wang, W Huang, Q Lv, Y Wang, HY Chen
Wireless Algorithms, Systems, and Applications: 16th International …, 2021
12021
Cyber profiles based risk prediction of application systems for effective access control
D Sun, Z Wu, Y Wang, Q Lv, B Hu
2019 IEEE Symposium on Computers and Communications (ISCC), 1-7, 2019
12019
系统目前无法执行此操作,请稍后再试。
文章 1–20