Jieren Cheng

Orcid: 0000-0002-0160-0126

According to our database1, Jieren Cheng authored at least 94 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A multi-classification detection model for imbalanced data in NIDS based on reconstruction and feature matching.
J. Cloud Comput., December, 2024

Improving efficiency of DNN-based relocalization module for autonomous driving with server-side computing.
J. Cloud Comput., December, 2024

FedVeca: Federated Vectorized Averaging on Non-IID Data With Adaptive Bi-Directional Global Objective.
IEEE Trans. Parallel Distributed Syst., November, 2024

Dual Contrastive Learning Network for Graph Clustering.
IEEE Trans. Neural Networks Learn. Syst., August, 2024

HSNet: An Intelligent Hierarchical Semantic-Aware Network System for Real-Time Semantic Segmentation.
IEEE Trans. Syst. Man Cybern. Syst., July, 2024

Multi-watermarking algorithm for medical image based on KAZE-DCT.
J. Ambient Intell. Humaniz. Comput., February, 2024

Multi-view graph imputation network.
Inf. Fusion, February, 2024

TEEm: Supporting Large Memory for Trusted Applications in ARM TrustZone.
IEEE Access, 2024

Attribute-Missing Graph Clustering Network.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
MFAFNet: A Lightweight and Efficient Network with Multi-Level Feature Adaptive Fusion for Real-Time Semantic Segmentation.
Sensors, July, 2023

A Modified PointNet-Based DDoS Attack Classification and Segmentation in Blockchain.
Comput. Syst. Sci. Eng., 2023

Improving Efficiency of DNN-based Relocalization Module for Autonomous Driving with Server-side Computing.
CoRR, 2023

Revisiting Initializing Then Refining: An Incomplete and Missing Graph Imputation Network.
CoRR, 2023

A Zero Trust Model for Networked Self-Service Terminals.
Proceedings of the Theoretical Computer Science - 41st National Conference, 2023

A Review of Solving Non-IID Data in Federated Learning: Current Status and Future Directions.
IAIC (1), 2023

EMIS: A Uniform Management and Resolution System of Multiple Identifiers on Ethereum.
Proceedings of the IEEE International Conference on Blockchain, 2023

H-MIS: A Hierarchical Multi-Identifier System Based on Blockchain.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
An ensemble framework for interpretable malicious code detection.
Int. J. Intell. Syst., December, 2022

Robust zero-watermarking algorithm for medical images based on SIFT and Bandelet-DCT.
Multim. Tools Appl., 2022

AAFL: Asynchronous-Adaptive Federated Learning in Edge-Based Wireless Communication Systems for Countering Communicable Infectious Diseasess.
IEEE J. Sel. Areas Commun., 2022

MSFM: Multi-view Semantic Feature Fusion Model for Chinese Named Entity Recognition.
KSII Trans. Internet Inf. Syst., 2022

MIFNet: A lightweight multiscale information fusion network.
Int. J. Intell. Syst., 2022

Foreground object structure transfer for unsupervised domain adaptation.
Int. J. Intell. Syst., 2022

Cooperative Detection Method for DDoS Attacks Based on Blockchain.
Comput. Syst. Sci. Eng., 2022

A Secure and Efficient Multi-Object Grasping Detection Approach for Robotic Arms.
CoRR, 2022

Initializing Then Refining: A Simple Graph Attribute Imputation Network.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

A Survey of Deep Learning for Named Entity Recognition in Chinese Social Media.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

A Survey of Consensus Mechanism Based on Reputation Model.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

IoT Data Blockchain-Based Transaction Model Using Zero-Knowledge Proofs and Proxy Re-encryption.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

A Survey of Multi-label Text Classification Based on Deep Learning.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

2021
A survey of security threats and defense on Blockchain.
Multim. Tools Appl., 2021

A review of Chinese named entity recognition.
KSII Trans. Internet Inf. Syst., 2021

DFFNet: An IoT-perceptive dual feature fusion network for general real-time semantic segmentation.
Inf. Sci., 2021

Adaptive XACML access policies for heterogeneous distributed IoT environments.
Inf. Sci., 2021

Mixed Attention Densely Residual Network for Single Image Super-Resolution.
Comput. Syst. Sci. Eng., 2021

Multi-Level Features Contrastive Networks for Unsupervised Domain Adaptation.
CoRR, 2021

A DAPP Business Data Storage Model Based on Blockchain and IPFS.
Proceedings of the Artificial Intelligence and Security - 7th International Conference, 2021

A Novel Optimized Asynchronous Federated Learning Framework.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

A Video Stitching System of Underwater Image.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

SC-VDM: A Lightweight Smart Contract Vulnerability Detection Model.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021

Intrusion Detection Method Based on Small Sample Learning.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021

A Transfer Learning Method Based on ResNet Model.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021

Chinese Named Entity Recognition Incorporating Multi-scale Features.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021

Trust Evaluation Mechanism of Service Nodes Based on Blockchain.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021

Deep Fusion Clustering Network.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Generative Adversarial Networks: A Literature Review.
KSII Trans. Internet Inf. Syst., 2020

Traffic flow combination forecasting method based on improved LSTM and ARIMA.
Int. J. Embed. Syst., 2020

DDoS attack detection method based on network abnormal behaviour in big data environment.
Int. J. Comput. Sci. Eng., 2020

Encryption Algorithm for TCP Session Hijacking.
CoRR, 2020

Microcluster-Based Incremental Ensemble Learning for Noisy, Nonstationary Data Streams.
Complex., 2020

ProbInfer: Probability-based AS path inference from multigraph perspective.
Comput. Networks, 2020

Encryption Algorithm for TCP Session Hijacking.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

2019
A DRDoS Detection and Defense Method Based on Deep Forest in the Big Data Environment.
Symmetry, 2019

Corrigendum to "Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing".
Secur. Commun. Networks, 2019

Contourlet-DCT based multiple robust watermarkings for medical images.
Multim. Tools Appl., 2019

A Novel DDoS Attack Detection Method Using Optimized Generalized Multiple Kernel Learning.
CoRR, 2019

Adaptive DDoS attack detection method based on multiple-kernel learning.
CoRR, 2019

Forecasting model based on information-granulated GA-SVR and ARIMA for producer price index.
CoRR, 2019

DDoS Attack Detection Method Based on Network Abnormal Behavior in Big Data Environment.
CoRR, 2019

Socially-Attentive Representation Learning for Cold-Start Fraud Review Detection.
Proceedings of the Theoretical Computer Science - 37th National Conference, 2019

Robust Encrypted Watermarking for Medical Images Based on DWT-DCT and Tent Mapping in Encrypted Domain.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

DDoS Attack Situation Information Fusion Method Based on Dempster-Shafer Evidence Theory.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

An Automatic Identification Algorithm for Encrypted Anti-counterfeiting Tag Based on DWT-DCT and Chen's Chaos.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

DDOS Multivariate Information Fusion Model Based on Hierarchical Representation Learning.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

A Security Situation Assessment Method Based on Neural Network.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

DDoS Attack Detection Method Based on V-Support Vector Machine.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

Multi-view DDoS Network Flow Feature Extraction Method via Convolutional Neural Network.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2018
Adaptive DDoS Attack Detection Method Based on Multiple-Kernel Learning.
Secur. Commun. Networks, 2018

Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing.
Secur. Commun. Networks, 2018

基于多生长时期模板匹配的玉米螟识别方法 (Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods).
计算机科学, 2018

An automatic traffic-congestion detection method for bad weather based on traffic video.
Int. J. High Perform. Comput. Netw., 2018

Traffic flow detection method based on vertical virtual road induction line.
Int. J. Embed. Syst., 2018

A DDoS Detection Method for Socially Aware Networking Based on Forecasting Fusion Feature Sequence.
Comput. J., 2018

Research on Indirect Location Technology of Ground Target Based on Scene Matching.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

DDoS Attack Security Situation Assessment Model Using Fusion Feature Based on Fuzzy C-Means Clustering Algorithm.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Multi-source Enterprise Innovation Data Fusion Method Based on Hierarchy.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

A Robust Algorithm of Encrypted Face Recognition Based on DWT-DCT and Tent Map.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

DoS Attacks Intrusion Detection Algorithm Based on Support Vector Machine.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Design and Verification of a Security Policy to Defense DDoS Attack for Cloud Robot.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Medical Image Watermarking Based on SIFT-DCT Perceptual Hashing.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
A change-point DDoS attack detection method based on half interaction anomaly degree.
Int. J. Auton. Adapt. Commun. Syst., 2017

Singular Point Probability Improve LSTM Network Performance for Long-term Traffic Flow Prediction.
Proceedings of the Theoretical Computer Science - 35th National Conference, 2017

Design and Test of the Intelligent Rubber Tapping Technology Evaluation Equipment Based on Cloud Model.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
Trend prediction of internet public opinion based on collaborative filtering.
Proceedings of the 12th International Conference on Natural Computation, 2016

Characterization of bipolar information aggregation and decomposition.
Proceedings of the 12th International Conference on Natural Computation, 2016

2015
A Traffic-Congestion Detection Method for Bad Weather Based on Traffic Video.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

2009
DDoS Attack Detection Using IP Address Feature Interaction.
Proceedings of the 1st International Conference on Intelligent Networking and Collaborative Systems, 2009

DDoS Attack Detection Method Based on Linear Prediction Model.
Proceedings of the Emerging Intelligent Computing Technology and Applications, 2009

An Efficient Pre-filtering Mechanism for Parallel Intrusion Detection Based on Many-Core GPU.
Proceedings of the Security Technology, 2009

DDoS Attack Detection Using Three-State Partition Based on Flow Interaction.
Proceedings of the Security Technology, 2009

Detecting Distributed Denial of Service Attack Based on Multi-feature Fusion.
Proceedings of the Security Technology, 2009

DDoS Attack Detection Algorithm Using IP Address Features.
Proceedings of the Frontiers in Algorithmics, Third International Workshop, 2009

A Hybrid Parallel Signature Matching Model for Network Security Applications Using SIMD GPU.
Proceedings of the Advanced Parallel Processing Technologies, 8th International Symposium, 2009

2006
A Novel Fairness Property of Electronic Commerce Protocols and Its Game-based Formalization.
Proceedings of the Eighteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2006), 2006


  Loading...