Jieren Cheng
Jieren Cheng
Professor, Hainan University
Verified email at - Homepage
Cited by
Cited by
An abnormal network flow feature sequence prediction approach for DDoS attacks detection in big data environment
J Cheng, R Xu, X Tang, VS Sheng, C Cai
Comput. Mater. Continua 55 (1), 95-119, 2018
Deep fusion clustering network
W Tu, S Zhou, X Liu, X Guo, Z Cai, E Zhu, J Cheng
Proceedings of the AAAI Conference on Artificial Intelligence 35 (11), 9978-9987, 2021
DDoS attack detection using IP address feature interaction
J Cheng, J Yin, Y Liu, Z Cai, C Wu
2009 International Conference on Intelligent Networking and Collaborative …, 2009
DDoS attack detection algorithm using IP address features
J Cheng, J Yin, Y Liu, Z Cai, M Li
Frontiers in Algorithmics: Third International Workshop, FAW 2009, Hefei …, 2009
程杰仁, 殷建平, 刘运, 钟经伟
计算机研究与发展, 375-378, 2008
Contourlet-DCT based multiple robust watermarkings for medical images
X Wu, J Li, R Tu, J Cheng, UA Bhatti, J Ma
Multimedia Tools and Applications 78, 8463-8480, 2019
Singular point probability improve LSTM network performance for long-term traffic flow prediction
B Liu, J Cheng, K Cai, P Shi, X Tang
Theoretical Computer Science: 35th National Conference, NCTCS 2017, Wuhan …, 2017
A novel robust watermarking algorithm for encrypted medical image based on DTCWT-DCT and chaotic map
J Liu, J Li, J Cheng, J Ma, N Sadiq, B Han, Q Geng, Y Ai
Computers, Materials & Continua 61 (2), 889-910, 2019
Experiments of federated learning for COVID-19 chest X-ray images
B Yan, J Wang, J Cheng, Y Zhou, Y Zhang, Y Yang, L Liu, H Zhao, ...
Advances in Artificial Intelligence and Security: 7th International …, 2021
Traffic flow combination forecasting method based on improved LSTM and ARIMA
B Liu, X Tang, J Cheng, P Shi
International Journal of Embedded Systems 12 (1), 22-30, 2020
Design and implementation of teaching system for mobile cross-platform
Z Zheng, J Cheng, J Peng
International Journal of Multimedia and Ubiquitous Engineering 10 (2), 287-296, 2015
Adaptive DDoS attack detection method based on multiple-kernel learning
J Cheng, C Zhang, X Tang, VS Sheng, Z Dong, J Li
Security and Communication Networks 2018, 2018
Trend prediction of internet public opinion based on collaborative filtering
X Chen, M Xia, J Cheng, X Tang, J Zhang
2016 12th international conference on natural computation, fuzzy systems and …, 2016
DDoS attack detection method based on linear prediction model
J Cheng, J Yin, C Wu, B Zhang, Y Liu
Emerging Intelligent Computing Technology and Applications: 5th …, 2009
Flow correlation degree optimization driven random forest for detecting DDoS attacks in cloud computing
J Cheng, M Li, X Tang, VS Sheng, Y Liu, W Guo
Security and Communication Networks 2018, 1-14, 2018
Generative adversarial networks: a literature review
J Cheng, Y Yang, X Tang, N Xiong, Y Zhang, F Lei
KSII Transactions on Internet and Information Systems (TIIS) 14 (12), 4625-4647, 2020
A DDoS detection method for socially aware networking based on forecasting fusion feature sequence
J Cheng, J Zhou, Q Liu, X Tang, Y Guo
The computer journal 61 (7), 959-970, 2018
Detecting DDoS attacks using conditional entropy
Y Liu, J Yin, J Cheng, B Zhang
2010 International Conference on Computer Application and System Modeling …, 2010
A review of Chinese named entity recognition.
J Cheng, J Liu, X Xu, D Xia, L Liu, VS Sheng
KSII Transactions on Internet & Information Systems 15 (6), 2021
A robust zero-watermarking based on SIFT-DCT for medical images in the encrypted domain
J Liu, J Li, Y Chen, X Zou, J Cheng, Y Liu, UA Bhatti
Comput. Mater. Continua 61 (1), 363-378, 2019
The system can't perform the operation now. Try again later.
Articles 1–20