RDMA Transports in Datacenter Networks: Survey.
IEEE Netw., November, 2024
Coordinated cyber-physical attacks based on different attack strategies for cascading failure analysis in smart grids.
Wirel. Networks, July, 2024
Tiny Defect-Oriented Single-View CT Reconstruction Based on a Hybrid Framework.
IEEE Trans. Instrum. Meas., 2024
A mutual authentication scheme in VANET providing vehicular anonymity and tracking.
Telecommun. Syst., 2022
Privacy-preserving data aggregation scheme for edge computing supported vehicular ad hoc networks.
Trans. Emerg. Telecommun. Technol., 2022
Memory-augmented meta-learning on meta-path for fast adaptation cold-start recommendation.
Connect. Sci., 2022
Social Relationship Mining Based on User Telephone Communication Data for Cooperative Relationship Recommendation.
Proceedings of the IEEE INFOCOM 2022, 2022
DroidDeep: using Deep Belief Network to characterize and detect android malware.
Soft Comput., 2020
An Informative and Comprehensive Behavioral Characteristics Analysis Methodology of Android Application for Data Security in Brain-Machine Interfacing.
Comput. Math. Methods Medicine, 2020
Integrated Defense Mechanism Based on Attack Goals against Three Attack Strategies in Smart Grid.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Multi-dimensional Security Risk Assessment Model Based on Three Elements in the IoT System.
Proceedings of the 9th IEEE/CIC International Conference on Communications in China, 2020
Real-time detecting one specific tampering operation in multiple operator chains.
J. Real Time Image Process., 2019
A network traffic-aware mobile application recommendation system based on network traffic cost consideration.
Int. J. Comput. Sci. Eng., 2019
VDetector: Detecting Vulnerability Based on Inter-Component Data Flows in Android Applications.
Proceedings of the 15th International Conference on Mobile Ad-Hoc and Sensor Networks, 2019
A New Power Load Forecasting Model (SIndRNN): Independently Recurrent Neural Network Based on Softmax Kernel Function.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019
Detectability of the Image Operation Order: Upsampling and Mean Filtering.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018
De-cloaking Malicious Activities in Smartphones Using HTTP Flow Mining.
KSII Trans. Internet Inf. Syst., 2017
An Android App Recommendation Approach by Merging Network Traffic Cost.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
Lossless Visible Three-Dimensional Watermark of Digital Elevation Model Data.
Trans. Edutainment, 2012