Следене
Qiang Li
Qiang Li
Jilin University, Computer Science
Потвърден имейл адрес: jlu.edu.cn - Начална страница
Заглавие
Позовавания
Позовавания
Година
A hand gesture recognition framework and wearable gesture-based interaction prototype for mobile devices
Z Lu, X Chen, Q Li, X Zhang, P Zhou
IEEE transactions on human-machine systems 44 (2), 293-299, 2014
3252014
A secure mechanism for big data collection in large scale internet of vehicle
L Guo, M Dong, K Ota, Q Li, T Ye, J Wu, J Li
IEEE Internet of Things Journal 4 (2), 601-610, 2017
1542017
Detection of forwarding-based malicious URLs in online social networks
J Cao, Q Li, Y Ji, Y He, D Guo
International Journal of Parallel Programming 44, 163-180, 2016
772016
Combating the evasion mechanisms of social bots
Y Ji, Y He, X Jiang, J Cao, Q Li
computers & security 58, 230-249, 2016
602016
STMTO: A smart and trust multi-UAV task offloading system
J Guo, G Huang, Q Li, NN Xiong, S Zhang, T Wang
Information Sciences 573, 519-540, 2021
532021
Combating the evolving spammers in online social networks
Q Fu, B Feng, D Guo, Q Li
Computers & Security 72, 60-73, 2018
532018
Multistage and elastic spam detection in mobile social networks through deep learning
B Feng, Q Fu, M Dong, D Guo, Q Li
IEEE Network 32 (4), 15-21, 2018
452018
Discovering hidden suspicious accounts in online social networks
J Cao, Q Fu, Q Li, D Guo
Information Sciences 394, 123-140, 2017
322017
Discovering suspicious APT behaviors by analyzing DNS activities
G Yan, Q Li, D Guo, X Meng
Sensors 20 (3), 731, 2020
302020
Revealing privacy vulnerabilities of anonymous trajectories
S Chang, C Li, H Zhu, T Lu, Q Li
IEEE Transactions on Vehicular Technology 67 (12), 12061-12071, 2018
292018
SIoTFog: Byzantine-resilient IoT fog networking
J Xu, K Ota, M Dong, A Liu, Q Li
Frontiers of information technology & electronic engineering 19 (12), 1546-1557, 2018
282018
BTS: A blockchain-based trust system to deter malicious data reporting in intelligent Internet of Things
T Li, W Liu, A Liu, M Dong, K Ota, NN Xiong, Q Li
IEEE Internet of Things Journal 9 (22), 22327-22342, 2021
272021
Stopping the cyberattack in the early stage: assessing the security risks of social network users
B Feng, Q Li, Y Ji, D Guo, X Meng
Security and Communication Networks 2019, 2019
272019
A mulitiprocess mechanism of evading behavior-based bot detection approaches
Y Ji, Y He, D Zhu, Q Li, D Guo
Information Security Practice and Experience: 10th International Conference …, 2014
262014
Towards fast and lightweight spam account detection in mobile social networks through fog computing
J Zhang, Q Li, X Wang, B Feng, D Guo
Peer-to-Peer Networking and Applications 11, 778-792, 2018
252018
Discovering suspicious APT families through a large-scale domain graph in information-centric IoT
Z Ma, Q Li, X Meng
IEEE Access 7, 13917-13926, 2019
222019
Discovering unknown advanced persistent threat using shared features mined by neural networks
L Shang, D Guo, Y Ji, Q Li
Computer Networks 189, 107937, 2021
212021
Detecting mobile advanced persistent threats based on large-scale DNS logs
Z Xiang, D Guo, Q Li
Computers & Security 96, 101933, 2020
212020
Privacy-preserving two-parties logistic regression on vertically partitioned data using asynchronous gradient sharing
Q Wei, Q Li, Z Zhou, ZQ Ge, Y Zhang
Peer-to-Peer Networking and Applications 14, 1379-1387, 2021
172021
Groupfound: An effective approach to detect suspicious accounts in online social networks
B Feng, Q Li, X Pan, J Zhang, D Guo
International Journal of Distributed Sensor Networks 13 (7), 1550147717722499, 2017
162017
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–20