default search action
Qiuwei Yang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Dan Tang, Zhiqing Zheng, Chao Yin, Bing Xiong, Zheng Qin, Qiuwei Yang:
FTODefender: An efficient flow table overflow attacks defending system in SDN. Expert Syst. Appl. 237(Part B): 121460 (2024) - [j17]Boru Liu, Dan Tang, Jingwen Chen, Wei Liang, Yufeng Liu, Qiuwei Yang:
ERT-EDR: Online defense framework for TCP-targeted LDoS attacks in SDN. Expert Syst. Appl. 254: 124356 (2024) - 2023
- [j16]Qiuwei Yang, Xi Peng:
A Fast Calculation Method for Sensitivity Analysis Using Matrix Decomposition Technique. Axioms 12(2): 179 (2023) - [j15]Shanshan Cao, Qiuwei Yang, Xi Peng:
Structural Damage Identification Using the First-Order Vibration-Mode-Based Frequency-Shift Flexibility Sensitivity Algorithm. Axioms 12(6): 551 (2023) - [j14]Dan Tang, Dongshuo Zhang, Zheng Qin, Qiuwei Yang, Sheng Xiao:
SFTO-Guard: Real-time detection and mitigation system for slow-rate flow table overflow attacks. J. Netw. Comput. Appl. 213: 103597 (2023) - [j13]Dan Tang, Chenjun Gao, Xinmeng Li, Wei Liang, Sheng Xiao, Qiuwei Yang:
A Detection and Mitigation Scheme of LDoS Attacks via SDN Based on the FSS-RSR Algorithm. IEEE Trans. Netw. Sci. Eng. 10(4): 1952-1963 (2023) - [j12]Dan Tang, Zhiqing Zheng, Xiaocai Wang, Sheng Xiao, Qiuwei Yang:
PeakSAX: Real-Time Monitoring and Mitigation System for LDoS Attack in SDN. IEEE Trans. Netw. Serv. Manag. 20(3): 3686-3698 (2023) - 2022
- [j11]Jianfang Li, Degui Xiao, Qiuwei Yang:
Efficient multi-model integration neural network framework for nighttime vehicle detection. Multim. Tools Appl. 81(22): 32675-32699 (2022) - [j10]Qiuwei Yang, Zhikun Ba, Zhuo Zhao, Xi Peng, Yun Sun:
Stability Evaluation Method of Hole Wall for Bored Pile under Blasting Impact. Symmetry 14(1): 79 (2022) - 2021
- [j9]Dan Tang, Liu Tang, Wei Shi, Sijia Zhan, Qiuwei Yang:
MF-CNN: a New Approach for LDoS Attack Detection Based on Multi-feature Fusion and CNN. Mob. Networks Appl. 26(4): 1705-1722 (2021) - [j8]Gaopeng Xie, Yuling Liu, Guojiang Xin, Qiuwei Yang:
Blockchain-Based Cloud Data Integrity Verification Scheme with High Efficiency. Secur. Commun. Networks 2021: 9921209:1-9921209:15 (2021) - 2020
- [j7]Dan Tang, Jianping Man, Liu Tang, Ye Feng, Qiuwei Yang:
WEDMS: An advanced mean shift clustering algorithm for LDoS attacks detection. Ad Hoc Networks 102: 102145 (2020) - [c4]Xiaocai Wang, Qiuwei Yang, Zichao Xie, Zhiqing Zheng, Yudong Yan, Dan Tang:
Low-rate DoS Attack Detection Based on WPD-EE Algorithm. ISPA/BDCloud/SocialCom/SustainCom 2020: 384-391
2010 – 2019
- 2018
- [j6]Zheng Xiao, Xiong Li, Le Wang, Qiuwei Yang, Jiayi Du, Arun Kumar Sangaiah:
Using convolution control block for Chinese sentiment analysis. J. Parallel Distributed Comput. 116: 18-26 (2018) - 2017
- [j5]Degui Xiao, Qiuwei Yang, Bing Yang, Wei Wei:
Monocular scene flow estimation via variational method. Multim. Tools Appl. 76(8): 10575-10597 (2017) - 2016
- [j4]Qiuwei Yang, Fei Peng, Jiao-Ting Li, Min Long:
Image tamper detection based on noise estimation and lacunarity texture. Multim. Tools Appl. 75(17): 10201-10211 (2016) - [c3]Qiuwei Yang, Hongjuan Fu, Ting Zhu:
An Optimization Method for Parameters of SVM in Network Intrusion Detection System. DCOSS 2016: 136-142 - [c2]Qiuwei Yang, Pan Kong:
RuleCache: A Mobility Pattern Based Multi-Level Cache Approach for Location Privacy Protection. ICPADS 2016: 448-455 - 2015
- [j3]Qiuwei Yang, Xiaogang Zhu, Hongjuan Fu, Xiqiang Che:
Survey of Security Technologies on Wireless Sensor Networks. J. Sensors 2015: 842392:1-842392:9 (2015) - 2014
- [c1]Qiuwei Yang, Changquan Cheng, Xiqiang Che:
A Cost-Aware Method of Privacy Protection for Multiple Cloud Service Requests. CSE 2014: 583-590 - 2011
- [j2]Zuo Chen, Qiuwei Yang, Xin Wan, Yuanyan Tu, Fei Yu, Chen Xu:
Automated Trust Negotiation with Time Behavior. J. Networks 6(8): 1091-1098 (2011) - [j1]Zuo Chen, Qiuwei Yang, Xin Wan, Yuanyan Tu, Fei Yu, Chen Xu:
Privacy Preservation in Role-based Access Control Model. J. Networks 6(8): 1106-1113 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint