default search action
Jieren Cheng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j37]Jun Li, Xinman Luo, Hong Lei, Jieren Cheng:
TEEm: Supporting Large Memory for Trusted Applications in ARM TrustZone. IEEE Access 12: 108584-108596 (2024) - [j36]Xin Peng, Jieren Cheng, Xiangyan Tang, Bin Zhang, Wenxuan Tu:
Multi-view graph imputation network. Inf. Fusion 102: 102024 (2024) - [j35]Cheng Zeng, Jing Liu, Jingbing Li, Jieren Cheng, Jingjun Zhou, Saqib Ali Nawaz, Xiliang Xiao, Uzair Aslam Bhatti:
Multi-watermarking algorithm for medical image based on KAZE-DCT. J. Ambient Intell. Humaniz. Comput. 15(2): 1735-1743 (2024) - [j34]Dengbo Li, Hanning Zhang, Jieren Cheng, Bernie Liu:
Improving efficiency of DNN-based relocalization module for autonomous driving with server-side computing. J. Cloud Comput. 13(1): 25 (2024) - [j33]Yue Yang, Jieren Cheng, Zhaowu Liu, Huimin Li, Ganglou Xu:
A multi-classification detection model for imbalanced data in NIDS based on reconstruction and feature matching. J. Cloud Comput. 13(1): 31 (2024) - [j32]Xin Peng, Jieren Cheng, Xiangyan Tang, Jingxin Liu, Jiahua Wu:
Dual Contrastive Learning Network for Graph Clustering. IEEE Trans. Neural Networks Learn. Syst. 35(8): 10846-10856 (2024) - [j31]Ping Luo, Jieren Cheng, Neal Xiong, Zhenhao Liu, Jie Wu:
FedVeca: Federated Vectorized Averaging on Non-IID Data With Adaptive Bi-Directional Global Objective. IEEE Trans. Parallel Distributed Syst. 35(11): 2102-2113 (2024) - [j30]Xin Peng, Jieren Cheng, Xiangyan Tang, Ziqi Deng, Wenxuan Tu, Neal Xiong:
HSNet: An Intelligent Hierarchical Semantic-Aware Network System for Real-Time Semantic Segmentation. IEEE Trans. Syst. Man Cybern. Syst. 54(7): 4318-4330 (2024) - [c49]Wenxuan Tu, Renxiang Guan, Sihang Zhou, Chuan Ma, Xin Peng, Zhiping Cai, Zhe Liu, Jieren Cheng, Xinwang Liu:
Attribute-Missing Graph Clustering Network. AAAI 2024: 15392-15401 - [i14]Zilin Huang, Xiangyan Tang, Hongyu Li, Xinyi Cao, Jieren Cheng:
TabSec: A Collaborative Framework for Novel Insider Threat Detection. CoRR abs/2411.01779 (2024) - 2023
- [j29]Jieren Cheng, Xiulai Li, Xinbing Xu, Xiangyan Tang, Victor S. Sheng:
A Modified PointNet-Based DDoS Attack Classification and Segmentation in Blockchain. Comput. Syst. Sci. Eng. 47(1): 975-992 (2023) - [j28]Kai Lu, Jieren Cheng, Hua Li, Tianyu OuYang:
MFAFNet: A Lightweight and Efficient Network with Multi-Level Feature Adaptive Fusion for Real-Time Semantic Segmentation. Sensors 23(14): 6382 (2023) - [c48]Qi Lyu, Hui Li, Xinnan Lin, Han Wang, Hanxu Hou, Yuguo Yin, Qianbin Chen, Ping Fan, Gang Wan, Xiang Zhu, Selwyn Deng, Weixiang Huang, Jianping Wu, Jieren Cheng, Wenyuan Yang:
H-MIS: A Hierarchical Multi-Identifier System Based on Blockchain. IEEE Big Data 2023: 2326-2333 - [c47]Feng Zhao, Hui Li, Shaoliang Peng, Xiyu Wang, Ping Lu, Qianbin Chen, Weixiang Huang, Jianping Wu, Xiang Zhu, Selwyn Deng, Hanxu Hou, Jieren Cheng, Han Wang:
EMIS: A Uniform Management and Resolution System of Multiple Identifiers on Ethereum. Blockchain 2023: 145-150 - [c46]Wenhai Lu, Jieren Cheng, Xiulai Li, Ji He:
A Review of Solving Non-IID Data in Federated Learning: Current Status and Future Directions. IAIC (1) 2023: 58-72 - [c45]Boya Liu, Haitao Ye, Jizhou Chen, Yong Xia, Jieren Cheng:
A Zero Trust Model for Networked Self-Service Terminals. NCTCS 2023: 237-247 - [i13]Wenxuan Tu, Bin Xiao, Xinwang Liu, Sihang Zhou, Zhiping Cai, Jieren Cheng:
Revisiting Initializing Then Refining: An Incomplete and Missing Graph Imputation Network. CoRR abs/2302.07524 (2023) - [i12]Dengbo Li, Jieren Cheng, Boyi Liu:
Improving Efficiency of DNN-based Relocalization Module for Autonomous Driving with Server-side Computing. CoRR abs/2312.00316 (2023) - 2022
- [j27]Jieren Cheng, Xinzhi Yao, Hui Li, Hao Lu, Naixue Xiong, Ping Luo, Le Liu, Hao Guo, Wen Feng:
Cooperative Detection Method for DDoS Attacks Based on Blockchain. Comput. Syst. Sci. Eng. 43(1): 103-117 (2022) - [j26]Jieren Cheng, Xin Peng, Xiangyan Tang, Wenxuan Tu, Wenhang Xu:
MIFNet: A lightweight multiscale information fusion network. Int. J. Intell. Syst. 37(9): 5617-5642 (2022) - [j25]Jieren Cheng, Le Liu, Boyi Liu, Ke Zhou, Qiaobo Da, Yue Yang:
Foreground object structure transfer for unsupervised domain adaptation. Int. J. Intell. Syst. 37(11): 8968-8987 (2022) - [j24]Jieren Cheng, Jiachen Zheng, Xiaomei Yu:
An ensemble framework for interpretable malicious code detection. Int. J. Intell. Syst. 37(12): 10100-10117 (2022) - [j23]Jingxin Liu, Jieren Cheng, Xin Peng, Zeli Zhao, Xiangyan Tang, Victor S. Sheng:
MSFM: Multi-view Semantic Feature Fusion Model for Chinese Named Entity Recognition. KSII Trans. Internet Inf. Syst. 16(6): 1833-1848 (2022) - [j22]Jieren Cheng, Ping Luo, Naixue Xiong, Jie Wu:
AAFL: Asynchronous-Adaptive Federated Learning in Edge-Based Wireless Communication Systems for Countering Communicable Infectious Diseasess. IEEE J. Sel. Areas Commun. 40(11): 3172-3190 (2022) - [j21]Yangxiu Fang, Jing Liu, Jingbing Li, Jieren Cheng, Jiabin Hu, Dan Yi, Xiliang Xiao, Uzair Aslam Bhatti:
Robust zero-watermarking algorithm for medical images based on SIFT and Bandelet-DCT. Multim. Tools Appl. 81(12): 16863-16879 (2022) - [c44]Yuanshen Li, Jieren Cheng, Hui Li, Yuming Yuan, Victor S. Sheng:
A Survey of Consensus Mechanism Based on Reputation Model. ICAIS (3) 2022: 208-221 - [c43]Xiaolong Chen, Jieren Cheng, Jingxin Liu, Wenghang Xu, Shuai Hua, Zhu Tang, Victor S. Sheng:
A Survey of Multi-label Text Classification Based on Deep Learning. ICAIS (1) 2022: 443-456 - [c42]Hao Guo, Jieren Cheng, Janghao Wang, Tao Chen, Yuming Yuan, Hui Li, Victor S. Sheng:
IoT Data Blockchain-Based Transaction Model Using Zero-Knowledge Proofs and Proxy Re-encryption. ICAIS (2) 2022: 573-586 - [c41]Jingxin Liu, Jieren Cheng, Ziyan Wang, Congqiang Lou, Chenli Shen, Victor S. Sheng:
A Survey of Deep Learning for Named Entity Recognition in Chinese Social Media. ICAIS (1) 2022: 573-582 - [c40]Wenxuan Tu, Sihang Zhou, Xinwang Liu, Yue Liu, Zhiping Cai, En Zhu, Changwang Zhang, Jieren Cheng:
Initializing Then Refining: A Simple Graph Attribute Imputation Network. IJCAI 2022: 3494-3500 - [i11]Hui Wang, Jieren Cheng, Yichen Xu, Sirui Ni, Zaijia Yang, Jiangpeng Li:
A Secure and Efficient Multi-Object Grasping Detection Approach for Robotic Arms. CoRR abs/2209.03511 (2022) - [i10]Ping Luo, Jieren Cheng, Zhenhao Liu, Naixue Xiong, Jie Wu:
FedVeca: Federated Vectorized Averaging on Non-IID Data with Adaptive Bi-directional Global Objective. CoRR abs/2209.13803 (2022) - 2021
- [j20]Jingjun Zhou, Jing Liu, Jingbing Li, Mengxing Huang, Jieren Cheng, Yen-Wei Chen, Yingying Xu, Saqib Ali Nawaz:
Mixed Attention Densely Residual Network for Single Image Super-Resolution. Comput. Syst. Sci. Eng. 39(1): 133-146 (2021) - [j19]Khaled Riad, Jieren Cheng:
Adaptive XACML access policies for heterogeneous distributed IoT environments. Inf. Sci. 548: 135-152 (2021) - [j18]Xiangyan Tang, Wenxuan Tu, Keqiu Li, Jieren Cheng:
DFFNet: An IoT-perceptive dual feature fusion network for general real-time semantic segmentation. Inf. Sci. 565: 326-343 (2021) - [j17]Jieren Cheng, Jingxin Liu, Xinbin Xu, Dongwan Xia, Le Liu, Victor S. Sheng:
A review of Chinese named entity recognition. KSII Trans. Internet Inf. Syst. 15(6): 2012-2030 (2021) - [j16]Jieren Cheng, Luyi Xie, Xiangyan Tang, Naixue Xiong, Boyi Liu:
A survey of security threats and defense on Blockchain. Multim. Tools Appl. 80(20): 30623-30652 (2021) - [c39]Wenxuan Tu, Sihang Zhou, Xinwang Liu, Xifeng Guo, Zhiping Cai, En Zhu, Jieren Cheng:
Deep Fusion Clustering Network. AAAI 2021: 9978-9987 - [c38]Hao Yang, Yong Zhang, Jingxin Liu, Hui Li, Jinyang Song, Jieren Cheng, Xiulai Li:
Intrusion Detection Method Based on Small Sample Learning. DMBD (2) 2021: 122-134 - [c37]Ke Zhou, Jieren Cheng, Hui Li, Yuming Yuan, Le Liu, Xiulai Li:
SC-VDM: A Lightweight Smart Contract Vulnerability Detection Model. DMBD (1) 2021: 138-149 - [c36]Wen Feng, Jieren Cheng, Yuming Yuan, Xinbin Xu, Yuqing Kou, Yuanshen Li, Xiulai Li:
Trust Evaluation Mechanism of Service Nodes Based on Blockchain. DMBD (1) 2021: 230-239 - [c35]Le Liu, Jieren Cheng, Luyi Xie, Jinyang Song, Ke Zhou, Jingxin Liu:
A Transfer Learning Method Based on ResNet Model. DMBD (1) 2021: 250-260 - [c34]Jingxin Liu, Jieren Cheng, Bo Wu, Dongwan Xia, Dengfang Feng, Xiulai Li:
Chinese Named Entity Recognition Incorporating Multi-scale Features. DMBD (1) 2021: 336-347 - [c33]Zhenyu Wang, Haoming Wu, Tianming Yu, Mengqin Fu, Bernie Liu, Jieren Cheng, Quanfeng Ye, Ni Zhang, Shuo Huang, Xingyue Lu, Xiulai Li, Kai Lu, GengQuan Xie:
A Video Stitching System of Underwater Image. HPCC/DSS/SmartCity/DependSys 2021: 1006-1013 - [c32]Zhicheng Zhou, Hailong Chen, Kunhua Li, Fei Hu, Bingjie Yan, Jieren Cheng, Xuyan Wei, Bernie Liu, Xiulai Li, Fuwen Chen, Yongji Sui:
A Novel Optimized Asynchronous Federated Learning Framework. HPCC/DSS/SmartCity/DependSys 2021: 2363-2370 - [c31]Xiangyan Tang, Hao Guo, Hui Li, Yuming Yuan, Jianghao Wang, Jieren Cheng:
A DAPP Business Data Storage Model Based on Blockchain and IPFS. ICAIS (2) 2021: 219-230 - [e1]Jieren Cheng, Xiangyan Tang, Xiaozhang Liu:
Cyberspace Safety and Security - 12th International Symposium, CSS 2020, Haikou, China, December 1-3, 2020, Proceedings. Lecture Notes in Computer Science 12653, Springer 2021, ISBN 978-3-030-73670-5 [contents] - [i9]Le Liu, Jieren Cheng, Boyi Liu, Yue Yang, Ke Zhou, Qiaobo Da:
Multi-Level Features Contrastive Networks for Unsupervised Domain Adaptation. CoRR abs/2109.06543 (2021) - [i8]Zhicheng Zhou, Hailong Chen, Kunhua Li, Fei Hu, Bingjie Yan, Jieren Cheng, Xuyan Wei, Bernie Liu, Xiulai Li, Fuwen Chen, Yongji Sui:
A Novel Optimized Asynchronous Federated Learning Framework. CoRR abs/2111.09487 (2021) - 2020
- [j15]Xiong-lve Li, Zhiping Cai, Bingnan Hou, Ning Liu, Fang Liu, Jieren Cheng:
ProbInfer: Probability-based AS path inference from multigraph perspective. Comput. Networks 180: 107377 (2020) - [j14]Sanmin Liu, Shan Xue, Fanzhen Liu, Jieren Cheng, Xiulai Li, Chao Kong, Jia Wu:
Microcluster-Based Incremental Ensemble Learning for Noisy, Nonstationary Data Streams. Complex. 2020: 6147378:1-6147378:12 (2020) - [j13]Jing Chen, Xiangyan Tang, Jieren Cheng, Fengkai Wang, Ruomeng Xu:
DDoS attack detection method based on network abnormal behaviour in big data environment. Int. J. Comput. Sci. Eng. 23(1): 22-30 (2020) - [j12]Boyi Liu, Xiangyan Tang, Jieren Cheng, Pengchao Shi:
Traffic flow combination forecasting method based on improved LSTM and ARIMA. Int. J. Embed. Syst. 12(1): 22-30 (2020) - [j11]Jieren Cheng, Yue Yang, Xiangyan Tang, Naixue Xiong, Yuan Zhang, Feifei Lei:
Generative Adversarial Networks: A Literature Review. KSII Trans. Internet Inf. Syst. 14(12): 4625-4647 (2020) - [c30]Minghan Chen, Fangyan Dai, Bingjie Yan, Jieren Cheng:
Encryption Algorithm for TCP Session Hijacking. ICAIS (2) 2020: 191-202 - [i7]Minghan Chen, Fangyan Dai, Bingjie Yan, Jieren Cheng, Longjuan Wang:
Encryption Algorithm for TCP Session Hijacking. CoRR abs/2002.01391 (2020) - [i6]Wenxuan Tu, Sihang Zhou, Xinwang Liu, Xifeng Guo, Zhiping Cai, En Zhu, Jieren Cheng:
Deep Fusion Clustering Network. CoRR abs/2012.09600 (2020)
2010 – 2019
- 2019
- [j10]Xiaoqi Wu, Jingbing Li, Rong Tu, Jieren Cheng, Uzair Aslam Bhatti, Jixin Ma:
Contourlet-DCT based multiple robust watermarkings for medical images. Multim. Tools Appl. 78(7): 8463-8480 (2019) - [j9]Jieren Cheng, Mengyang Li, Xiangyan Tang, Victor S. Sheng, Yifu Liu, Wei Guo:
Corrigendum to "Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing". Secur. Commun. Networks 2019: 6809054:1 (2019) - [j8]Ruomeng Xu, Jieren Cheng, Fengkai Wang, Xiangyan Tang, Jinying Xu:
A DRDoS Detection and Defense Method Based on Deep Forest in the Big Data Environment. Symmetry 11(1): 78 (2019) - [c29]Yifu Liu, Jieren Cheng, Xiangyan Tang, Mengyang Li, Luyi Xie:
Multi-view DDoS Network Flow Feature Extraction Method via Convolutional Neural Network. CSS (2) 2019: 30-41 - [c28]Xiangyan Tang, Rui Cao, Jieren Cheng, Dong Fan, Wenxuan Tu:
DDoS Attack Detection Method Based on V-Support Vector Machine. CSS (2) 2019: 42-56 - [c27]Xiangyan Tang, Yiyang Zhang, Jieren Cheng, Jinying Xu, Hui Li:
DDOS Multivariate Information Fusion Model Based on Hierarchical Representation Learning. CSS (2) 2019: 57-66 - [c26]Xiangyan Tang, Meizhu Chen, Jieren Cheng, Jinying Xu, Hui Li:
A Security Situation Assessment Method Based on Neural Network. CSS (2) 2019: 579-587 - [c25]Wei Guo, Xiangyan Tang, Jieren Cheng, Jinying Xu, Canting Cai, Yulong Guo:
DDoS Attack Situation Information Fusion Method Based on Dempster-Shafer Evidence Theory. ICAIS (4) 2019: 396-407 - [c24]Yanlin Liu, Jingbing Li, Jing Liu, Jieren Cheng, Jialing Liu, Lingren Wang, Xiaobo Bai:
Robust Encrypted Watermarking for Medical Images Based on DWT-DCT and Tent Mapping in Encrypted Domain. ICAIS (2) 2019: 584-596 - [c23]Qianning Dai, Jingbing Li, Uzair Aslam Bhatti, Jieren Cheng, Xiaobo Bai:
An Automatic Identification Algorithm for Encrypted Anti-counterfeiting Tag Based on DWT-DCT and Chen's Chaos. ICAIS (3) 2019: 596-608 - [c22]Qiaobo Da, Jieren Cheng, Qian Li, Wentao Zhao:
Socially-Attentive Representation Learning for Cold-Start Fraud Review Detection. NCTCS 2019: 76-91 - [i5]Jing Chen, Xiangyan Tang, Jieren Cheng, Fengkai Wang, Ruomeng Xu:
DDoS Attack Detection Method Based on Network Abnormal Behavior in Big Data Environment. CoRR abs/1903.11844 (2019) - [i4]Xiangyan Tang, Liang Wang, Jieren Cheng, Jing Chen:
Forecasting model based on information-granulated GA-SVR and ARIMA for producer price index. CoRR abs/1903.12012 (2019) - [i3]Jieren Cheng, Chen Zhang, Xiangyan Tang, Victor S. Sheng, Zhe Dong, Junqi Li, Jing Chen:
Adaptive DDoS attack detection method based on multiple-kernel learning. CoRR abs/1905.07893 (2019) - [i2]Jieren Cheng, Junqi Li, Xiangyan Tang, Victor S. Sheng, Chen Zhang, Mengyang Li:
A Novel DDoS Attack Detection Method Using Optimized Generalized Multiple Kernel Learning. CoRR abs/1906.08204 (2019) - [i1]Boyi Liu, Xiangyan Tang, Jieren Cheng, Pengchao Shi:
Traffic Flow Combination Forecasting Method Based on Improved LSTM and ARIMA. CoRR abs/1906.10407 (2019) - 2018
- [j7]Jieren Cheng, Jinghe Zhou, Qiang Liu, Xiangyan Tang, Yanxiang Guo:
A DDoS Detection Method for Socially Aware Networking Based on Forecasting Fusion Feature Sequence. Comput. J. 61(7): 959-970 (2018) - [j6]Jieren Cheng, Boyi Liu, Xiangyan Tang, Zhuhua Hu, Jianping Yin:
Traffic flow detection method based on vertical virtual road induction line. Int. J. Embed. Syst. 10(6): 518-525 (2018) - [j5]Jieren Cheng, Boyi Liu, Xiangyan Tang:
An automatic traffic-congestion detection method for bad weather based on traffic video. Int. J. High Perform. Comput. Netw. 11(3): 251-259 (2018) - [j4]Boyi Liu, Xiangyan Tang, Jieren Cheng:
基于多生长时期模板匹配的玉米螟识别方法 (Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods). 计算机科学 45(4): 106-111 (2018) - [j3]Jieren Cheng, Chen Zhang, Xiangyan Tang, Victor S. Sheng, Zhe Dong, Junqi Li:
Adaptive DDoS Attack Detection Method Based on Multiple-Kernel Learning. Secur. Commun. Networks 2018: 5198685:1-5198685:19 (2018) - [j2]Jieren Cheng, Mengyang Li, Xiangyan Tang, Victor S. Sheng, Yifu Liu, Wei Guo:
Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing. Secur. Commun. Networks 2018: 6459326:1-6459326:14 (2018) - [c21]Ruomeng Xu, Jieren Cheng, Fengkai Wang, Xiangyan Tang, Jinying Xu:
A DRDoS Detection and Defense Method Based on Deep Forest in the Big Data Environment. ICA3PP (Workshops) 2018: 165-176 - [c20]Lin Zhang, Ruili Zhao, Mengxing Huang, Zhonghua Liu, Jieren Cheng, Yu Zhang:
Research on Indirect Location Technology of Ground Target Based on Scene Matching. ICCCS (2) 2018: 90-104 - [c19]Lingren Wang, Jingbing Li, Jieren Cheng, Uzair Aslam Bhatti, Qianning Dai:
DoS Attacks Intrusion Detection Algorithm Based on Support Vector Machine. ICCCS (5) 2018: 286-297 - [c18]Jialing Liu, Jingbing Li, Jing Chen, Xiangxi Zou, Jieren Cheng, Jing Liu:
Medical Image Watermarking Based on SIFT-DCT Perceptual Hashing. ICCCS (4) 2018: 334-345 - [c17]Tong Xiao, Jingbing Li, Jing Liu, Jieren Cheng, Uzair Aslam Bhatti:
A Robust Algorithm of Encrypted Face Recognition Based on DWT-DCT and Tent Map. ICCCS (2) 2018: 508-518 - [c16]Ruizhi Zhang, Jieren Cheng, Xiangyan Tang, Qiang Liu, Xiangfeng He:
DDoS Attack Security Situation Assessment Model Using Fusion Feature Based on Fuzzy C-Means Clustering Algorithm. ICCCS (2) 2018: 654-669 - [c15]Jinying Xu, Yuehua Lv, Jieren Cheng:
Multi-source Enterprise Innovation Data Fusion Method Based on Hierarchy. ICCCS (1) 2018: 699-708 - [c14]Boyi Liu, Xiangyan Tang, Jieren Cheng, Jiquan Chen:
Design and Verification of a Security Policy to Defense DDoS Attack for Cloud Robot. ICCCS (2) 2018: 718-730 - 2017
- [j1]Jieren Cheng, Xiangyan Tang, Jianping Yin:
A change-point DDoS attack detection method based on half interaction anomaly degree. Int. J. Auton. Adapt. Commun. Syst. 10(1): 38-54 (2017) - [c13]Jieren Cheng, Kuanqi Cai, Boyi Liu, Xiangyan Tang:
Design and Test of the Intelligent Rubber Tapping Technology Evaluation Equipment Based on Cloud Model. ICCCS (1) 2017: 275-287 - [c12]Boyi Liu, Jieren Cheng, Kuanqi Cai, Pengchao Shi, Xiangyan Tang:
Singular Point Probability Improve LSTM Network Performance for Long-term Traffic Flow Prediction. NCTCS 2017: 328-340 - 2016
- [c11]Xuegang Chen, Jieren Cheng, Jianping Yin, Xiangyan Tang, Jialu Zhang:
Characterization of bipolar information aggregation and decomposition. ICNC-FSKD 2016: 305-310 - [c10]Xuegang Chen, Mingna Xia, Jieren Cheng, Xiangyan Tang, Jialu Zhang:
Trend prediction of internet public opinion based on collaborative filtering. ICNC-FSKD 2016: 583-588 - 2015
- [c9]Jieren Cheng, Boyi Liu, Xiangyan Tang:
A Traffic-Congestion Detection Method for Bad Weather Based on Traffic Video. ISICA 2015: 506-518
2000 – 2009
- 2009
- [c8]Chengkun Wu, Jianping Yin, Zhiping Cai, En Zhu, Jieren Cheng:
A Hybrid Parallel Signature Matching Model for Network Security Applications Using SIMD GPU. APPT 2009: 191-204 - [c7]Jieren Cheng, Jianping Yin, Yun Liu, Zhiping Cai, Min Li:
DDoS Attack Detection Algorithm Using IP Address Features. FAW 2009: 207-215 - [c6]Jieren Cheng, Jianping Yin, Yun Liu, Zhiping Cai, Chengkun Wu:
Detecting Distributed Denial of Service Attack Based on Multi-feature Fusion. FGIT-SecTech 2009: 132-139 - [c5]Jieren Cheng, Boyun Zhang, Jianping Yin, Yun Liu, Zhiping Cai:
DDoS Attack Detection Using Three-State Partition Based on Flow Interaction. FGIT-SecTech 2009: 176-184 - [c4]Chengkun Wu, Jianping Yin, Zhiping Cai, En Zhu, Jieren Cheng:
An Efficient Pre-filtering Mechanism for Parallel Intrusion Detection Based on Many-Core GPU. FGIT-SecTech 2009: 298-305 - [c3]Jieren Cheng, Jianping Yin, Chengkun Wu, Boyun Zhang, Yun Liu:
DDoS Attack Detection Method Based on Linear Prediction Model. ICIC (1) 2009: 1004-1013 - [c2]Jieren Cheng, Jianping Yin, Yun Liu, Zhiping Cai, Chengkun Wu:
DDoS Attack Detection Using IP Address Feature Interaction. INCoS 2009: 113-118 - 2006
- [c1]Ling Zhang, Jianping Yin, Mengjun Li, Jieren Cheng:
A Novel Fairness Property of Electronic Commerce Protocols and Its Game-based Formalization. SEKE 2006: 410-415
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 21:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint