A hand gesture recognition framework and wearable gesture-based interaction prototype for mobile devices Z Lu, X Chen, Q Li, X Zhang, P Zhou IEEE transactions on human-machine systems 44 (2), 293-299, 2014 | 329 | 2014 |
A secure mechanism for big data collection in large scale internet of vehicle L Guo, M Dong, K Ota, Q Li, T Ye, J Wu, J Li IEEE Internet of Things Journal 4 (2), 601-610, 2017 | 159 | 2017 |
Detection of forwarding-based malicious URLs in online social networks J Cao, Q Li, Y Ji, Y He, D Guo International Journal of Parallel Programming 44, 163-180, 2016 | 78 | 2016 |
Combating the evasion mechanisms of social bots Y Ji, Y He, X Jiang, J Cao, Q Li computers & security 58, 230-249, 2016 | 64 | 2016 |
STMTO: A smart and trust multi-UAV task offloading system J Guo, G Huang, Q Li, NN Xiong, S Zhang, T Wang Information Sciences 573, 519-540, 2021 | 56 | 2021 |
Combating the evolving spammers in online social networks Q Fu, B Feng, D Guo, Q Li Computers & Security 72, 60-73, 2018 | 56 | 2018 |
Multistage and elastic spam detection in mobile social networks through deep learning B Feng, Q Fu, M Dong, D Guo, Q Li IEEE Network 32 (4), 15-21, 2018 | 49 | 2018 |
Discovering suspicious APT behaviors by analyzing DNS activities G Yan, Q Li, D Guo, X Meng Sensors 20 (3), 731, 2020 | 33 | 2020 |
Discovering hidden suspicious accounts in online social networks J Cao, Q Fu, Q Li, D Guo Information Sciences 394, 123-140, 2017 | 31 | 2017 |
Stopping the cyberattack in the early stage: assessing the security risks of social network users B Feng, Q Li, Y Ji, D Guo, X Meng Security and Communication Networks 2019 (1), 3053418, 2019 | 29 | 2019 |
Revealing privacy vulnerabilities of anonymous trajectories S Chang, C Li, H Zhu, T Lu, Q Li IEEE Transactions on Vehicular Technology 67 (12), 12061-12071, 2018 | 29 | 2018 |
SIoTFog: Byzantine-resilient IoT fog networking J Xu, K Ota, M Dong, A Liu, Q Li Frontiers of information technology & electronic engineering 19 (12), 1546-1557, 2018 | 28 | 2018 |
BTS: A blockchain-based trust system to deter malicious data reporting in intelligent Internet of Things T Li, W Liu, A Liu, M Dong, K Ota, NN Xiong, Q Li IEEE Internet of Things Journal 9 (22), 22327-22342, 2021 | 27 | 2021 |
A mulitiprocess mechanism of evading behavior-based bot detection approaches Y Ji, Y He, D Zhu, Q Li, D Guo Information Security Practice and Experience: 10th International Conference …, 2014 | 27 | 2014 |
Towards fast and lightweight spam account detection in mobile social networks through fog computing J Zhang, Q Li, X Wang, B Feng, D Guo Peer-to-Peer Networking and Applications 11, 778-792, 2018 | 26 | 2018 |
Discovering suspicious APT families through a large-scale domain graph in information-centric IoT Z Ma, Q Li, X Meng IEEE Access 7, 13917-13926, 2019 | 23 | 2019 |
Detecting mobile advanced persistent threats based on large-scale DNS logs Z Xiang, D Guo, Q Li Computers & Security 96, 101933, 2020 | 22 | 2020 |
Discovering unknown advanced persistent threat using shared features mined by neural networks L Shang, D Guo, Y Ji, Q Li Computer Networks 189, 107937, 2021 | 20 | 2021 |
Privacy-preserving two-parties logistic regression on vertically partitioned data using asynchronous gradient sharing Q Wei, Q Li, Z Zhou, ZQ Ge, Y Zhang Peer-to-Peer Networking and Applications 14, 1379-1387, 2021 | 19 | 2021 |
A high-pressure artificial photosynthetic device: pumping carbon dioxide as well as achieving selectivity K Deng, H Feng, D Liu, L Chen, Y Zhang, Q Li Journal of Materials Chemistry A 9 (7), 3961-3967, 2021 | 18 | 2021 |