On a mathematical model for low-rate shrew DDoS J Luo, X Yang, J Wang, J Xu, J Sun, K Long IEEE Transactions on Information Forensics and Security 9 (7), 1069-1083, 2014 | 128 | 2014 |
A network coding and DES based dynamic encryption scheme for moving target defense H Tang, QT Sun, X Yang, K Long IEEE Access 6, 26059-26068, 2018 | 53 | 2018 |
Web DDoS detection schemes based on measuring user's access behavior with large deviation J Wang, X Yang, K Long 2011 IEEE Global Telecommunications Conference-GLOBECOM 2011, 1-5, 2011 | 53 | 2011 |
A new relative entropy based app-DDoS detection method J Wang, X Yang, K Long The IEEE symposium on Computers and Communications, 966-968, 2010 | 47 | 2010 |
A genetic algorithm‐based task scheduling for cloud resource crowd‐funding model Z Nan, Y Xiaolong, Z Min, S Yan, L Keping International Journal of Communication Systems 31 (1), 2018 | 43 | 2018 |
A simple and efficient frequency offset estimation algorithm for high-speed coherent optical OFDM systems X Zhou, K Long, R Li, X Yang, Z Zhang Optics express 20 (7), 7350-7361, 2012 | 42 | 2012 |
Intelligent regulation on demand response for electric vehicle charging: a dynamic game method Y Zheng, J Luo, X Yang, Y Yang IEEE Access 8, 66105-66115, 2020 | 37 | 2020 |
Quantifying photosynthetic performance of phytoplankton based on photosynthesis–irradiance response models X Yang, L Liu, Z Yin, X Wang, S Wang, Z Ye Environmental Sciences Europe 32, 1-13, 2020 | 36 | 2020 |
On Vector Linear Solvability of Multicast Networks QT Sun, X Yang, K Long, Z Li IEEE Transactions on Communications 64 (12), 5096 - 5107, 2016 | 35 | 2016 |
Efficient joint carrier frequency offset and phase noise compensation scheme for high-speed coherent optical OFDM systems X Zhou, X Yang, R Li, K Long Journal of lightwave technology 31 (11), 1755-1761, 2013 | 30 | 2013 |
Circular-shift linear network coding H Tang, QT Sun, Z Li, X Yang, K Long IEEE Transactions on Information Theory 65 (1), 65-80, 2018 | 29 | 2018 |
基于大偏差统计模型的 Http-Flood DDoS 检测机制及性能分析 王进, 阳小龙, 隆克平 软件学报 23 (5), 1272-1280, 2012 | 27 | 2012 |
Accurate and privacy-preserving task allocation for edge computing assisted mobile crowdsensing Z Wang, C Guo, J Liu, J Zhang, Y Wang, J Luo, X Yang IEEE Transactions on Computational Social Systems 9 (1), 120-133, 2021 | 23 | 2021 |
HTTP-sCAN: Detecting HTTP-flooding attack by modeling multi-features of web browsing behavior from noisy web-logs J Wang, M Zhang, X Yang, K Long, J Xu China Communications 12 (2), 118-128, 2015 | 23 | 2015 |
The NewShrew attack: A new type of low-rate TCP-Targeted DoS attack L Jingtang, Y Xiaolong Communications (ICC), 2014 IEEE International Conference on, 713-718, 2014 | 21* | 2014 |
Spray and forward: Efficient routing based on the Markov location prediction model for DTNs F Dang, XL Yang, KP Long Science China Information Sciences 55, 433-440, 2012 | 21 | 2012 |
Double-auction-based optimal user assignment for multisource–multirelay cellular networks W Yong, Y Li, L Chao, C Wang, X Yang IEEE Transactions on Vehicular Technology 64 (6), 2627-2636, 2013 | 19 | 2013 |
HTTP-SoLDiER: An HTTP-flooding attack detection scheme with the large deviation principle J Wang, XL Yang, M Zhang, KP Long, J Xu Science China Information Sciences 57, 1-15, 2014 | 15 | 2014 |
Double window spectrogram difference method: A blind estimation of frequency-hopping signal for battlefield communication environment Y He, Y Su, Y Chen, Y Yu, X Yang 2018 24th Asia-Pacific Conference on Communications (APCC), 439-443, 2018 | 14 | 2018 |
A survey of system architectures, privacy preservation, and main research challenges on location-based services MK Tefera, X Yang, QT Sun KSII Transactions on Internet and Information Systems (TIIS) 13 (6), 3199-3218, 2019 | 13 | 2019 |