An abnormal network flow feature sequence prediction approach for DDoS attacks detection in big data environment J Cheng, R Xu, X Tang, VS Sheng, C Cai Comput. Mater. Continua 55 (1), 95-119, 2018 | 125 | 2018 |
Deep fusion clustering network W Tu, S Zhou, X Liu, X Guo, Z Cai, E Zhu, J Cheng Proceedings of the AAAI Conference on Artificial Intelligence 35 (11), 9978-9987, 2021 | 44 | 2021 |
DDoS attack detection using IP address feature interaction J Cheng, J Yin, Y Liu, Z Cai, C Wu 2009 International Conference on Intelligent Networking and Collaborative …, 2009 | 37 | 2009 |
DDoS attack detection algorithm using IP address features J Cheng, J Yin, Y Liu, Z Cai, M Li Frontiers in Algorithmics: Third International Workshop, FAW 2009, Hefei …, 2009 | 36 | 2009 |
蜜罐及蜜网技术研究进展 程杰仁, 殷建平, 刘运, 钟经伟 计算机研究与发展, 375-378, 2008 | 36 | 2008 |
Contourlet-DCT based multiple robust watermarkings for medical images X Wu, J Li, R Tu, J Cheng, UA Bhatti, J Ma Multimedia Tools and Applications 78, 8463-8480, 2019 | 33 | 2019 |
Singular point probability improve LSTM network performance for long-term traffic flow prediction B Liu, J Cheng, K Cai, P Shi, X Tang Theoretical Computer Science: 35th National Conference, NCTCS 2017, Wuhan …, 2017 | 32 | 2017 |
A novel robust watermarking algorithm for encrypted medical image based on DTCWT-DCT and chaotic map J Liu, J Li, J Cheng, J Ma, N Sadiq, B Han, Q Geng, Y Ai Computers, Materials & Continua 61 (2), 889-910, 2019 | 29 | 2019 |
Experiments of federated learning for COVID-19 chest X-ray images B Yan, J Wang, J Cheng, Y Zhou, Y Zhang, Y Yang, L Liu, H Zhao, ... Advances in Artificial Intelligence and Security: 7th International …, 2021 | 27 | 2021 |
Traffic flow combination forecasting method based on improved LSTM and ARIMA B Liu, X Tang, J Cheng, P Shi International Journal of Embedded Systems 12 (1), 22-30, 2020 | 27 | 2020 |
Design and implementation of teaching system for mobile cross-platform Z Zheng, J Cheng, J Peng International Journal of Multimedia and Ubiquitous Engineering 10 (2), 287-296, 2015 | 27 | 2015 |
Adaptive DDoS attack detection method based on multiple-kernel learning J Cheng, C Zhang, X Tang, VS Sheng, Z Dong, J Li Security and Communication Networks 2018, 2018 | 26 | 2018 |
Trend prediction of internet public opinion based on collaborative filtering X Chen, M Xia, J Cheng, X Tang, J Zhang 2016 12th international conference on natural computation, fuzzy systems and …, 2016 | 26 | 2016 |
DDoS attack detection method based on linear prediction model J Cheng, J Yin, C Wu, B Zhang, Y Liu Emerging Intelligent Computing Technology and Applications: 5th …, 2009 | 25 | 2009 |
Flow correlation degree optimization driven random forest for detecting DDoS attacks in cloud computing J Cheng, M Li, X Tang, VS Sheng, Y Liu, W Guo Security and Communication Networks 2018, 1-14, 2018 | 24 | 2018 |
Generative adversarial networks: a literature review J Cheng, Y Yang, X Tang, N Xiong, Y Zhang, F Lei KSII Transactions on Internet and Information Systems (TIIS) 14 (12), 4625-4647, 2020 | 23 | 2020 |
A DDoS detection method for socially aware networking based on forecasting fusion feature sequence J Cheng, J Zhou, Q Liu, X Tang, Y Guo The computer journal 61 (7), 959-970, 2018 | 23 | 2018 |
Detecting DDoS attacks using conditional entropy Y Liu, J Yin, J Cheng, B Zhang 2010 International Conference on Computer Application and System Modeling …, 2010 | 21 | 2010 |
A review of Chinese named entity recognition. J Cheng, J Liu, X Xu, D Xia, L Liu, VS Sheng KSII Transactions on Internet & Information Systems 15 (6), 2021 | 20 | 2021 |
A robust zero-watermarking based on SIFT-DCT for medical images in the encrypted domain J Liu, J Li, Y Chen, X Zou, J Cheng, Y Liu, UA Bhatti Comput. Mater. Continua 61 (1), 363-378, 2019 | 19 | 2019 |