关注
Qiang Li
Qiang Li
Jilin University, Computer Science
在 jlu.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A hand gesture recognition framework and wearable gesture-based interaction prototype for mobile devices
Z Lu, X Chen, Q Li, X Zhang, P Zhou
IEEE transactions on human-machine systems 44 (2), 293-299, 2014
3292014
A secure mechanism for big data collection in large scale internet of vehicle
L Guo, M Dong, K Ota, Q Li, T Ye, J Wu, J Li
IEEE Internet of Things Journal 4 (2), 601-610, 2017
1592017
Detection of forwarding-based malicious URLs in online social networks
J Cao, Q Li, Y Ji, Y He, D Guo
International Journal of Parallel Programming 44, 163-180, 2016
782016
Combating the evasion mechanisms of social bots
Y Ji, Y He, X Jiang, J Cao, Q Li
computers & security 58, 230-249, 2016
642016
STMTO: A smart and trust multi-UAV task offloading system
J Guo, G Huang, Q Li, NN Xiong, S Zhang, T Wang
Information Sciences 573, 519-540, 2021
562021
Combating the evolving spammers in online social networks
Q Fu, B Feng, D Guo, Q Li
Computers & Security 72, 60-73, 2018
562018
Multistage and elastic spam detection in mobile social networks through deep learning
B Feng, Q Fu, M Dong, D Guo, Q Li
IEEE Network 32 (4), 15-21, 2018
492018
Discovering suspicious APT behaviors by analyzing DNS activities
G Yan, Q Li, D Guo, X Meng
Sensors 20 (3), 731, 2020
332020
Discovering hidden suspicious accounts in online social networks
J Cao, Q Fu, Q Li, D Guo
Information Sciences 394, 123-140, 2017
312017
Stopping the cyberattack in the early stage: assessing the security risks of social network users
B Feng, Q Li, Y Ji, D Guo, X Meng
Security and Communication Networks 2019 (1), 3053418, 2019
292019
Revealing privacy vulnerabilities of anonymous trajectories
S Chang, C Li, H Zhu, T Lu, Q Li
IEEE Transactions on Vehicular Technology 67 (12), 12061-12071, 2018
292018
SIoTFog: Byzantine-resilient IoT fog networking
J Xu, K Ota, M Dong, A Liu, Q Li
Frontiers of information technology & electronic engineering 19 (12), 1546-1557, 2018
282018
BTS: A blockchain-based trust system to deter malicious data reporting in intelligent Internet of Things
T Li, W Liu, A Liu, M Dong, K Ota, NN Xiong, Q Li
IEEE Internet of Things Journal 9 (22), 22327-22342, 2021
272021
A mulitiprocess mechanism of evading behavior-based bot detection approaches
Y Ji, Y He, D Zhu, Q Li, D Guo
Information Security Practice and Experience: 10th International Conference …, 2014
272014
Towards fast and lightweight spam account detection in mobile social networks through fog computing
J Zhang, Q Li, X Wang, B Feng, D Guo
Peer-to-Peer Networking and Applications 11, 778-792, 2018
262018
Discovering suspicious APT families through a large-scale domain graph in information-centric IoT
Z Ma, Q Li, X Meng
IEEE Access 7, 13917-13926, 2019
232019
Detecting mobile advanced persistent threats based on large-scale DNS logs
Z Xiang, D Guo, Q Li
Computers & Security 96, 101933, 2020
222020
Discovering unknown advanced persistent threat using shared features mined by neural networks
L Shang, D Guo, Y Ji, Q Li
Computer Networks 189, 107937, 2021
202021
Privacy-preserving two-parties logistic regression on vertically partitioned data using asynchronous gradient sharing
Q Wei, Q Li, Z Zhou, ZQ Ge, Y Zhang
Peer-to-Peer Networking and Applications 14, 1379-1387, 2021
192021
A high-pressure artificial photosynthetic device: pumping carbon dioxide as well as achieving selectivity
K Deng, H Feng, D Liu, L Chen, Y Zhang, Q Li
Journal of Materials Chemistry A 9 (7), 3961-3967, 2021
182021
系统目前无法执行此操作,请稍后再试。
文章 1–20