On a mathematical model for low-rate shrew DDoS J Luo, X Yang, J Wang, J Xu, J Sun, K Long IEEE Transactions on Information Forensics and Security 9 (7), 1069-1083, 2014 | 127 | 2014 |
Multi-model ensemble with rich spatial information for object detection J Xu, W Wang, H Wang, J Guo Pattern Recognition 99, 107098, 2020 | 79 | 2020 |
Sql injection detection for web applications based on elastic-pooling cnn X Xie, C Ren, Y Fu, J Xu, J Guo IEEE Access 7, 151475-151481, 2019 | 62 | 2019 |
Nanomaterials in electrochemical cytosensors J Xu, Y Hu, S Wang, X Ma, J Guo Analyst 145 (6), 2058-2069, 2020 | 36 | 2020 |
A fast human action recognition network based on spatio-temporal features J Xu, R Song, H Wei, J Guo, Y Zhou, X Huang Neurocomputing 441, 350-358, 2021 | 29 | 2021 |
HTTP-sCAN: Detecting HTTP-flooding attack by modeling multi-features of web browsing behavior from noisy web-logs J Wang, M Zhang, X Yang, K Long, J Xu China Communications 12 (2), 118-128, 2015 | 23 | 2015 |
Family-based big medical-level data acquisition system J Xu, L Wang, Y Shen, K Yuan, Y Nie, Y Tian, X Jian, X Ma, J Guo IEEE Transactions on Industrial Informatics 15 (4), 2321-2329, 2018 | 22 | 2018 |
Webshell detection based on the word attention mechanism T Li, C Ren, Y Fu, J Xu, J Guo, X Chen IEEE Access 7, 185140-185147, 2019 | 16 | 2019 |
HTTP-SoLDiER: An HTTP-flooding attack detection scheme with the large deviation principle J Wang, XL Yang, M Zhang, KP Long, J Xu Science China Information Sciences 57, 1-15, 2014 | 15 | 2014 |
A novel video inter-frame forgery detection method based on histogram intersection J Xu, Y Liang, X Tian, A Xie 2016 IEEE/CIC international conference on communications in China (ICCC), 1-6, 2016 | 12 | 2016 |
Chaos generator for secure transmission using a sine map and an RLC series circuit J Xu, P Chargé, D Fournier-Prunaret, AK Taha, KP Long Science in China Series F: Information Sciences 53, 129-136, 2010 | 12 | 2010 |
Video description model based on temporal-spatial and channel multi-attention mechanisms J Xu, H Wei, L Li, Q Fu, J Guo Applied Sciences 10 (12), 4312, 2020 | 10 | 2020 |
HTTP-sCAN: Detecting HTTP-flooding attaCk by modeling multi-features of web browsing behavior from noisy dataset J Wang, M Zhang, X Yang, K Long, C Zhou 2013 19th Asia-Pacific Conference on Communications (APCC), 677-682, 2013 | 9 | 2013 |
Web application attack detection based on attention and gated convolution networks J Li, Y Fu, J Xu, C Ren, X Xiang, J Guo IEEE Access 8, 20717-20724, 2019 | 8 | 2019 |
Analysis of chaotic dynamics in a two-dimensional sine square map X Jie, L Ke-Ping, F Daniele, T Abdel-Kaddous Chinese Physics Letters 27 (2), 020504, 2010 | 8 | 2010 |
A novel multivariable time series prediction model for acute kidney injury in general hospitalization J Xu, Y Hu, H Liu, W Mi, G Li, J Guo, Y Feng International Journal of Medical Informatics 161, 104729, 2022 | 7 | 2022 |
AAIC: adaptive-sliding-connection-window solution to TCP incast from application layer J Luo, X Yang, J Xu, J Sun IEEE Communications Letters 20 (10), 1967-1970, 2016 | 7 | 2016 |
A novel batch-based LKH tree balanced algorithm for group key management J Xu, L Li, S Lu, H Yin Science China Information Sciences 10 (60), 1-3, 2017 | 6 | 2017 |
Hybrid intrusion detection model based on a designed autoencoder Y Hou, Y Fu, J Guo, J Xu, R Liu, X Xiang Journal of Ambient Intelligence and Humanized Computing 14 (8), 10799-10809, 2023 | 5 | 2023 |
Nonlinear Analysis and Optimal Control of an Improved SIR Rumor Spreading Model. J Xu, Y Yu, C Gao, J Sun J. Commun. 10 (8), 638-646, 2015 | 5 | 2015 |