A residual learning-based network intrusion detection system J Man, G Sun Security and Communication Networks 2021, 1-9, 2021 | 42 | 2021 |
Data backup and recovery based on data de-duplication GZ Sun, Y Dong, DW Chen, J Wei 2010 International Conference on Artificial Intelligence and Computational …, 2010 | 36 | 2010 |
Network traffic anomaly detection based on wavelet analysis Z Du, L Ma, H Li, Q Li, G Sun, Z Liu 2018 IEEE 16th International Conference on Software Engineering Research …, 2018 | 35 | 2018 |
CP-ABE based data access control for cloud storage GZ Sun Journal of China Institute of Communications 32 (7), 146-152, 2011 | 35 | 2011 |
An optimized approach for massive web page classification using entity similarity based on semantic network H Li, Z Xu, T Li, G Sun, KKR Choo Future Generation Computer Systems 76, 510-518, 2017 | 32 | 2017 |
Dump and analysis of android volatile memory on wechat F Zhou, Y Yang, Z Ding, G Sun 2015 IEEE International Conference on Communications (ICC), 7151-7156, 2015 | 31 | 2015 |
DDoS attacks and flash event detection based on flow characteristics in SDN SUN Guozi, W Jiang, GU Yu, REN Danni, LI Huakang 2018 15th IEEE international conference on advanced video and signal based …, 2018 | 26 | 2018 |
Design and implementation of a malware detection system based on network behavior L Xue, G Sun Security and Communication Networks 8 (3), 459-470, 2015 | 26 | 2015 |
AppTrace: Dynamic trace on Android devices L Qiu, Z Zhang, Z Shen, G Sun 2015 IEEE International Conference on Communications (ICC), 7145-7150, 2015 | 25 | 2015 |
A policy-based deduplication mechanism for securing cloud storage Z Wang, Y Lu, G Sun International Journal of Electronics and Information Engineering 2 (2), 70-79, 2015 | 24 | 2015 |
A privacy protection policy combined with privacy homomorphism in the internet of things G Sun, S Huang, W Bao, Y Yang, Z Wang 2014 23rd International Conference on Computer Communication and Networks …, 2014 | 24 | 2014 |
A new definition of homomorphic signature for identity management in mobile cloud computing Z Wang, G Sun, D Chen Journal of Computer and System Sciences 80 (3), 546-553, 2014 | 23 | 2014 |
A security carving approach for AVI video based on frame size and index Y Yang, Z Xu, L Liu, G Sun Multimedia Tools and Applications 76, 3293-3312, 2017 | 22 | 2017 |
LIPPS: Logistics information privacy protection system based on encrypted QR code X Zhang, H Li, Y Yang, G Sun, G Chen 2016 IEEE Trustcom/BigDataSE/ISPA, 996-1000, 2016 | 20 | 2016 |
Topic detection from microblog based on text clustering and topic model analysis S Huang, Y Yang, H Li, G Sun 2014 Asia-Pacific Services Computing Conference, 88-92, 2014 | 19 | 2014 |
Recovery of deleted record for SQLite3 database X Liu, X Fu, G Sun 2016 8th International Conference on Intelligent Human-Machine Systems and …, 2016 | 16 | 2016 |
Defending against jamming attacks in wireless local area networks W Chen, D Chen, G Sun, Y Zhang International Conference on Autonomic and Trusted Computing, 519-528, 2007 | 15 | 2007 |
Overdue prediction of bank loans based on LSTM-SVM X Li, X Long, G Sun, G Yang, H Li 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2018 | 13 | 2018 |
ConGradetect: Blockchain-based detection of code and identity privacy vulnerabilities in crowdsourcing J Wang, G Sun, Y Gu, K Liu Journal of Systems Architecture 114, 101910, 2021 | 12 | 2021 |
An opinion leader perceptual model based on PageRank algorithm H Li, S Huang, G Sun 2015 International Conference on Behavioral, Economic and Socio-cultural …, 2015 | 12 | 2015 |