2025
Mobility-Aware Partial Task Offloading and Resource Allocation Based on Deep Reinforcement Learning for Mobile Edge Computing.
IEEE Trans. Veh. Technol., April, 2025
2024
Estimating the composition ratios of network services carried in mixed traffic.
Comput. Commun., 2024
Identifying the Fraudulent Users for E-commerce Applications Based on the Access Behaviors.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024
2023
Network Traffic Content Identification Based on Time-Scale Signal Modeling.
IEEE Trans. Dependable Secur. Comput., 2023
Range-Free Localization Using Extreme Learning Machine and Ring-Shaped Salp Swarm Algorithm in Anisotropic Networks.
IEEE Internet Things J., 2023
Mobile-Aware Online Task Offloading Based on Deep Reinforcement Learning in Mobile Edge Computing Networks.
Proceedings of the 34th IEEE Annual International Symposium on Personal, 2023
2022
Threat-Event Detection for Distributed Networks Based on Spatiotemporal Markov Random Field.
IEEE Trans. Dependable Secur. Comput., 2022
PowerFDNet: Deep Learning-Based Stealthy False Data Injection Attack Detection for AC-Model Transmission Systems.
IEEE Open J. Comput. Soc., 2022
Stacked Autoencoders-Based Localization Without Ranging Over Internet of Things.
IEEE Internet Things J., 2022
FPGA-based DFT system design, optimisation and implementation using high-level synthesis.
Int. J. Comput. Appl. Technol., 2022
Application Identification under Multi-Service Integration Platform.
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022
2021
Identifying click-requests for the network-side through traffic behavior.
J. Netw. Comput. Appl., 2021
Performance analysis of a healthcare internet of things system subject to wireless cloud connection failure.
Int. J. Wirel. Mob. Comput., 2021
Range-free localization using Reliable Anchor Pair Selection and Quantum-behaved Salp Swarm Algorithm for anisotropic Wireless Sensor Networks.
Ad Hoc Networks, 2021
A Light-Weight Scheme for Detecting Component Structure of Network Traffic.
Proceedings of the Parallel and Distributed Computing, Applications and Technologies, 2021
A Review on the Research of Producer Services Supply Chain in China.
Proceedings of the Design, Operation and Evaluation of Mobile Communications, 2021
2020
A Novel Range-Free Localization Scheme Based on Anchor Pairs Condition Decision in Wireless Sensor Networks.
IEEE Trans. Commun., 2020
Serially concatenated scheme of polar codes and the improved belief propagation decoding algorithm.
IET Commun., 2020
An Attack-Resistant Weighted Least Squares Localization Algorithm Based on RSSI.
Proceedings of the Science and Technologies for Smart Cities, 2020
2019
Detecting Anomalous Behavior in Cloud Servers by Nested-Arc Hidden SEMI-Markov Model with State Summarization.
IEEE Trans. Big Data, 2019
Corrigendum to "Recognizing the content types of network traffic based on a hybrid DNN-HMM model" [J. Netw. Comput. Appl. 142 (2019) 51-62].
J. Netw. Comput. Appl., 2019
Recognizing the content types of network traffic based on a hybrid DNN-HMM model.
J. Netw. Comput. Appl., 2019
Content Recognition of Network Traffic Using Wavelet Transform and CNN.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019
2018
Hybrid Deep Neural Network - Hidden Markov Model Based Network Traffic Classification.
Proceedings of the Communications and Networking, 2018
Detecting Network Events by Analyzing Dynamic Behavior of Distributed Network.
Proceedings of the Communications and Networking, 2018
2017
Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling.
J. Netw. Comput. Appl., 2017
2016
A General Collaborative Framework for Modeling and Perceiving Distributed Network Behavior.
IEEE/ACM Trans. Netw., 2016
Comments and Corrections.
IEEE Trans. Comput. Soc. Syst., 2016
Impact of sensing errors on the performance of an unreliable opportunistic spectrum sharing system.
Int. J. Wirel. Mob. Comput., 2016
Windows Based Data Sets for Evaluation of Robustness of Host Based Intrusion Detection Systems (IDS) to Zero-Day and Stealth Attacks.
Future Internet, 2016
2015
A Performance Evaluation of Machine Learning-Based Streaming Spam Tweets Detection.
IEEE Trans. Comput. Soc. Syst., 2015
Integer Data Zero-Watermark Assisted System Calls Abstraction and Normalization for Host Based Anomaly Detection Systems.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
2013
Resisting Web Proxy-Based HTTP Attacks by Temporal and Spatial Locality Behavior.
IEEE Trans. Parallel Distributed Syst., 2013
Modeling Oscillation Behavior of Network Traffic by Nested Hidden Markov Model with Variable State-Duration.
IEEE Trans. Parallel Distributed Syst., 2013
Modeling Web Session for Detecting Pseudo HTTP Traffic.
J. Comput., 2013
Analysis of TDOA based radar target positioning in LOS and NLOS environments.
Int. J. Wirel. Mob. Comput., 2013
A Forward-Backward Algorithm for Nested Hidden semi-Markov Model and Application to Network Traffic.
Comput. J., 2013
2012
A structural approach for modelling the hierarchical dynamic process of Web workload in a large-scale campus network.
J. Netw. Comput. Appl., 2012
A Comparative Study of Power Line Communication Networks With and Without Buffer.
Int. J. Commun. Networks Inf. Secur., 2012
Online Anomaly Detection Based on Web Usage Mining.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012
A Periodic Structural Model for Characterizing Network Traffic.
Proceedings of the Intelligent Computing Theories and Applications, 2012
2011
Performance Analysis of Unreliable Sensing for an Opportunistic Spectrum Sharing System.
Int. J. Commun. Networks Inf. Secur., 2011
A Two-Layer Hidden Markov Model for the Arrival Process of Web Traffic.
Proceedings of the MASCOTS 2011, 2011
Modeling and Analysis of Network Security Situation Prediction Based on Covariance Likelihood Neural.
Proceedings of the Bio-Inspired Computing and Applications, 2011
Modeling and Analysis of a Power Line Communication Network Subject to Channel Failure.
Proceedings of the ICEIS 2011, 2011
A new model for generating burst traffic based on hierarchical HMM.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011
2009
A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors.
IEEE/ACM Trans. Netw., 2009
Monitoring the application-layer DDoS attacks for popular websites.
IEEE/ACM Trans. Netw., 2009
2008
Measuring the Normality of Web Proxies' Behavior Based on Locality Principles.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2008
2007
Detecting Shrew HTTP Flood Attacks for Flash Crowds.
Proceedings of the Computational Science, 2007
2006
A Novel Model for Detecting Application Layer DDoS Attacks.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006
A Dynamic Anomaly Detection Model for Web User Behavior Based on HsMM.
Proceedings of the 10th International Conference on CSCW in Design, 2006