Follow
XU Jie
Title
Cited by
Cited by
Year
On a mathematical model for low-rate shrew DDoS
J Luo, X Yang, J Wang, J Xu, J Sun, K Long
IEEE Transactions on Information Forensics and Security 9 (7), 1069-1083, 2014
1272014
Multi-model ensemble with rich spatial information for object detection
J Xu, W Wang, H Wang, J Guo
Pattern Recognition 99, 107098, 2020
792020
Sql injection detection for web applications based on elastic-pooling cnn
X Xie, C Ren, Y Fu, J Xu, J Guo
IEEE Access 7, 151475-151481, 2019
622019
Nanomaterials in electrochemical cytosensors
J Xu, Y Hu, S Wang, X Ma, J Guo
Analyst 145 (6), 2058-2069, 2020
362020
A fast human action recognition network based on spatio-temporal features
J Xu, R Song, H Wei, J Guo, Y Zhou, X Huang
Neurocomputing 441, 350-358, 2021
292021
HTTP-sCAN: Detecting HTTP-flooding attack by modeling multi-features of web browsing behavior from noisy web-logs
J Wang, M Zhang, X Yang, K Long, J Xu
China Communications 12 (2), 118-128, 2015
232015
Family-based big medical-level data acquisition system
J Xu, L Wang, Y Shen, K Yuan, Y Nie, Y Tian, X Jian, X Ma, J Guo
IEEE Transactions on Industrial Informatics 15 (4), 2321-2329, 2018
222018
Webshell detection based on the word attention mechanism
T Li, C Ren, Y Fu, J Xu, J Guo, X Chen
IEEE Access 7, 185140-185147, 2019
162019
HTTP-SoLDiER: An HTTP-flooding attack detection scheme with the large deviation principle
J Wang, XL Yang, M Zhang, KP Long, J Xu
Science China Information Sciences 57, 1-15, 2014
152014
A novel video inter-frame forgery detection method based on histogram intersection
J Xu, Y Liang, X Tian, A Xie
2016 IEEE/CIC international conference on communications in China (ICCC), 1-6, 2016
122016
Chaos generator for secure transmission using a sine map and an RLC series circuit
J Xu, P Chargé, D Fournier-Prunaret, AK Taha, KP Long
Science in China Series F: Information Sciences 53, 129-136, 2010
122010
Video description model based on temporal-spatial and channel multi-attention mechanisms
J Xu, H Wei, L Li, Q Fu, J Guo
Applied Sciences 10 (12), 4312, 2020
102020
HTTP-sCAN: Detecting HTTP-flooding attaCk by modeling multi-features of web browsing behavior from noisy dataset
J Wang, M Zhang, X Yang, K Long, C Zhou
2013 19th Asia-Pacific Conference on Communications (APCC), 677-682, 2013
92013
Web application attack detection based on attention and gated convolution networks
J Li, Y Fu, J Xu, C Ren, X Xiang, J Guo
IEEE Access 8, 20717-20724, 2019
82019
Analysis of chaotic dynamics in a two-dimensional sine square map
X Jie, L Ke-Ping, F Daniele, T Abdel-Kaddous
Chinese Physics Letters 27 (2), 020504, 2010
82010
A novel multivariable time series prediction model for acute kidney injury in general hospitalization
J Xu, Y Hu, H Liu, W Mi, G Li, J Guo, Y Feng
International Journal of Medical Informatics 161, 104729, 2022
72022
AAIC: adaptive-sliding-connection-window solution to TCP incast from application layer
J Luo, X Yang, J Xu, J Sun
IEEE Communications Letters 20 (10), 1967-1970, 2016
72016
A novel batch-based LKH tree balanced algorithm for group key management
J Xu, L Li, S Lu, H Yin
Science China Information Sciences 10 (60), 1-3, 2017
62017
Hybrid intrusion detection model based on a designed autoencoder
Y Hou, Y Fu, J Guo, J Xu, R Liu, X Xiang
Journal of Ambient Intelligence and Humanized Computing 14 (8), 10799-10809, 2023
52023
Nonlinear Analysis and Optimal Control of an Improved SIR Rumor Spreading Model.
J Xu, Y Yu, C Gao, J Sun
J. Commun. 10 (8), 638-646, 2015
52015
The system can't perform the operation now. Try again later.
Articles 1–20