Seguir
QIAO YAN
QIAO YAN
Dirección de correo verificada de szu.edu.cn
Título
Citado por
Citado por
Año
Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges
Q Yan, FR Yu, Q Gong, J Li
IEEE communications surveys & tutorials 18 (1), 602-622, 2015
9982015
Industrial internet: A survey on the enabling technologies, applications, and challenges
JQ Li, FR Yu, G Deng, C Luo, Z Ming, Q Yan
IEEE Communications Surveys & Tutorials 19 (3), 1504-1526, 2017
4422017
When big data meets software-defined networking: SDN for big data and big data for SDN
L Cui, FR Yu, Q Yan
IEEE network 30 (1), 58-65, 2016
3822016
Distributed denial of service attacks in software-defined networking with cloud computing
Q Yan, FR Yu
IEEE Communications Magazine 53 (4), 52-59, 2015
3142015
Anomaly intrusion detection method based on HMM
Y Qiao, XW Xin, Y Bin, S Ge
Electronics letters 38 (13), 1, 2002
2592002
A hybrid path planning method in unmanned air/ground vehicle (UAV/UGV) cooperative systems
J Li, G Deng, C Luo, Q Lin, Q Yan, Z Ming
IEEE Transactions on Vehicular Technology 65 (12), 9585-9596, 2016
2532016
Interference alignment and its applications: A survey, research issues, and challenges
N Zhao, FR Yu, M Jin, Q Yan, VCM Leung
IEEE Communications Surveys & Tutorials 18 (3), 1779-1803, 2016
2052016
A multi-level DDoS mitigation framework for the industrial Internet of Things
Q Yan, W Huang, X Luo, Q Gong, FR Yu
IEEE Communications Magazine 56 (2), 30-36, 2018
1922018
Physical layer security issues in interference-alignment-based wireless networks
N Zhao, FR Yu, M Li, Q Yan, VCM Leung
IEEE Communications Magazine 54 (8), 162-168, 2016
1592016
DDSE: A novel evolutionary algorithm based on degree-descending search strategy for influence maximization in social networks
L Cui, H Hu, S Yu, Q Yan, Z Ming, Z Wen, N Lu
Journal of Network and Computer Applications 103, 119-130, 2018
1162018
Software-defined device-to-device (D2D) communications in virtual wireless networks with imperfect network state information (NSI)
MYK Chua, FR Yu, C Liang, B Sun, Q Yan
IEEE Transactions on Vehicular Technology 65 (9), 7349-7360, 2015
972015
Adaptive composite operator selection and parameter control for multiobjective evolutionary algorithm
Q Lin, Z Liu, Q Yan, Z Du, CAC Coello, Z Liang, W Wang, J Chen
Information Sciences 339, 332-352, 2016
792016
Automatically synthesizing DoS attack traces using generative adversarial networks
Q Yan, M Wang, W Huang, X Luo, FR Yu
International journal of machine learning and cybernetics 10 (12), 3387-3396, 2019
732019
Effective software‐defined networking controller scheduling method to mitigate DDoS attacks
Q Yan, Q Gong, FR Yu
Electronics Letters 53 (7), 469-471, 2017
672017
A novel context-aware recommendation algorithm with two-level SVD in social networks
L Cui, W Huang, Q Yan, FR Yu, Z Wen, N Lu
Future Generation Computer Systems 86, 1459-1470, 2018
562018
QoS aware transcoding for live streaming in edge-clouds aided HetNets: An enhanced actor-critic approach
Z Zhang, R Wang, FR Yu, F Fu, Q Yan
IEEE Transactions on Vehicular Technology 68 (11), 11295-11308, 2019
542019
Detection of DDoS attacks against wireless SDN controllers based on the fuzzy synthetic evaluation decision-making model.
Q Yan, Q Gong, F Deng
Adhoc & Sensor Wireless Networks 33, 2016
512016
Joint offloading and resource allocation in mobile edge computing systems: An actor-critic approach
Z Zhang, FR Yu, F Fu, Q Yan, Z Wang
2018 IEEE global communications conference (GLOBECOM), 1-6, 2018
502018
Using MTD and SDN-based honeypots to defend DDoS attacks in IoT
X Luo, Q Yan, M Wang, W Huang
2019 Computing, Communications and IoT Applications (ComComAp), 392-395, 2019
372019
Proof-of-play: A novel consensus model for blockchain-based peer-to-peer gaming system
HY Yuen, F Wu, W Cai, HCB Chan, Q Yan, VCM Leung
Proceedings of the 2019 ACM international symposium on blockchain and secure …, 2019
372019
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20