Qiuwei Yang

Orcid: 0000-0003-1756-5959

According to our database1, Qiuwei Yang authored at least 22 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
FTODefender: An efficient flow table overflow attacks defending system in SDN.
Expert Syst. Appl., March, 2024

ERT-EDR: Online defense framework for TCP-targeted LDoS attacks in SDN.
Expert Syst. Appl., 2024

2023
PeakSAX: Real-Time Monitoring and Mitigation System for LDoS Attack in SDN.
IEEE Trans. Netw. Serv. Manag., September, 2023

Structural Damage Identification Using the First-Order Vibration-Mode-Based Frequency-Shift Flexibility Sensitivity Algorithm.
Axioms, June, 2023

SFTO-Guard: Real-time detection and mitigation system for slow-rate flow table overflow attacks.
J. Netw. Comput. Appl., April, 2023

A Fast Calculation Method for Sensitivity Analysis Using Matrix Decomposition Technique.
Axioms, February, 2023

A Detection and Mitigation Scheme of LDoS Attacks via SDN Based on the FSS-RSR Algorithm.
IEEE Trans. Netw. Sci. Eng., 2023

2022
Stability Evaluation Method of Hole Wall for Bored Pile under Blasting Impact.
Symmetry, 2022

Efficient multi-model integration neural network framework for nighttime vehicle detection.
Multim. Tools Appl., 2022

2021
Blockchain-Based Cloud Data Integrity Verification Scheme with High Efficiency.
Secur. Commun. Networks, 2021

MF-CNN: a New Approach for LDoS Attack Detection Based on Multi-feature Fusion and CNN.
Mob. Networks Appl., 2021

2020
WEDMS: An advanced mean shift clustering algorithm for LDoS attacks detection.
Ad Hoc Networks, 2020

Low-rate DoS Attack Detection Based on WPD-EE Algorithm.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

2018
Using convolution control block for Chinese sentiment analysis.
J. Parallel Distributed Comput., 2018

2017
Monocular scene flow estimation via variational method.
Multim. Tools Appl., 2017

2016
Image tamper detection based on noise estimation and lacunarity texture.
Multim. Tools Appl., 2016

RuleCache: A Mobility Pattern Based Multi-Level Cache Approach for Location Privacy Protection.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

An Optimization Method for Parameters of SVM in Network Intrusion Detection System.
Proceedings of the International Conference on Distributed Computing in Sensor Systems, 2016

2015
Survey of Security Technologies on Wireless Sensor Networks.
J. Sensors, 2015

2014
A Cost-Aware Method of Privacy Protection for Multiple Cloud Service Requests.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

2011
Privacy Preservation in Role-based Access Control Model.
J. Networks, 2011

Automated Trust Negotiation with Time Behavior.
J. Networks, 2011


  Loading...