Quicksolver: A lightweight malicious domains detection system based on adaptive autoencoder.
Proceedings of the 48th IEEE Conference on Local Computer Networks, 2023
Autoencoder ensembles for network intrusion detection.
Proceedings of the 24th International Conference on Advanced Communication Technology, 2022
ELSV: An Effective Anomaly Detection System from Web Access Logs.
Proceedings of the IEEE International Performance, 2021
An Effective Intrusion Detection Model based on Random Forest Algorithm with I-SMOTE.
Proceedings of the 23rd International Conference on Enterprise Information Systems, 2021
An intrusion detection algorithm based on bag representation with ensemble support vector machine in cloud computing.
Concurr. Comput. Pract. Exp., 2020
An Effective Parallel SVM Intrusion Detection Model for Imbalanced Training Datasets.
Proceedings of the 22nd International Conference on Enterprise Information Systems, 2020
An Attack Behaviors Prediction Model Based on Bag Representation in Time Series.
Proceedings of the 44th IEEE Conference on Local Computer Networks, 2019
A Hybrid Intrusion Detection Algorithm Based on Gaussian Mixture Model and Nearest Neighbors.
Proceedings of the 44th IEEE Conference on Local Computer Networks, 2019
An Effective RF-based Intrusion Detection Algorithm with Feature Reduction and Transformation.
Proceedings of the 21st International Conference on Enterprise Information Systems, 2019
A Real-time Big Data Framework for Network Security Situation Monitoring.
Proceedings of the 21st International Conference on Enterprise Information Systems, 2019
Efficient data possession-checking protocol with deduplication in cloud.
Int. J. Distributed Sens. Networks, 2017
Distributed data possession provable in cloud.
Distributed Parallel Databases, 2017
Dynamic data integrity auditing for secure outsourcing in the cloud.
Concurr. Comput. Pract. Exp., 2017
Efficient integrity verification of replicated data in cloud computing system.
Comput. Secur., 2017
Efficient Dynamic Replicated Data Possession Checking in Distributed Cloud Storage Systems.
Int. J. Distributed Sens. Networks, 2016
Identity-based storage management and integrity verify protocol for secure outsourcing in multi-cloud.
Concurr. Comput. Pract. Exp., 2016
Efficiently secure multiparty computation based on homomorphic encryption.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016
Defense Strategy of Network Security based on Dynamic Classification.
KSII Trans. Internet Inf. Syst., 2015
Block pulse operational matrix method for solving fractional partial differential equation.
Appl. Math. Comput., 2013