关注
Qingjia Huang
Qingjia Huang
中国科学院信息工程研究所
在 iie.ac.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Clustering approach based on mini batch kmeans for intrusion detection system over big data
K Peng, VCM Leung, Q Huang
IEEE access 6, 11897-11906, 2018
2722018
Cost-efficient task scheduling for executing large programs in the cloud
S Su, J Li, Q Huang, X Huang, K Shuang, J Wang
Parallel Computing 39 (4-5), 177-188, 2013
2202013
Enhanced energy-efficient scheduling for parallel applications in cloud
Q Huang, S Su, J Li, P Xu, K Shuang, X Huang
2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2012
1542012
A survey on mobile edge computing: Focusing on service adoption and provision
K Peng, VCM Leung, X Xu, L Zheng, J Wang, Q Huang
Wireless Communications and Mobile Computing 2018 (1), 8267838, 2018
1202018
Cost-conscious scheduling for large graph processing in the cloud
J Li, S Su, X Cheng, Q Huang, Z Zhang
2011 IEEE international conference on high performance computing and …, 2011
1052011
Using multi-features and ensemble learning method for imbalanced malware classification
Y Zhang, Q Huang, X Ma, Z Yang, J Jiang
2016 IEEE Trustcom/BigDataSE/ISPA, 965-973, 2016
762016
Prediction-based dynamic resource scheduling for virtualized cloud systems
Q Huang, K Shuang, P Xu, J Li, X Liu, S Su
Journal of Networks 9 (2), 375, 2014
512014
Reducing operational costs through consolidation with resource prediction in the cloud
J Li, K Shuang, S Su, Q Huang, P Xu, X Cheng, J Wang
2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2012
412012
Migration-based elastic consolidation scheduling in cloud data center
Q Huang, S Su, S Xu, J Li, P Xu, K Shuang
2013 IEEE 33rd International Conference on Distributed Computing Systems …, 2013
302013
Based on multi-features and clustering ensemble method for automatic malware categorization
Y Zhang, C Rong, Q Huang, Y Wu, Z Yang, J Jiang
2017 IEEE Trustcom/BigDataSE/ICESS, 73-82, 2017
292017
A comprehensive study of co-residence threat in multi-tenant public paas clouds
W Zhang, X Jia, C Wang, S Zhang, Q Huang, M Wang, P Liu
Information and Communications Security: 18th International Conference …, 2016
232016
Enhanced energy-efficient scheduling for parallel tasks using partial optimal slacking
S Su, Q Huang, J Li, X Cheng, P Xu, K Shuang
The Computer Journal 58 (2), 246-257, 2015
222015
Energy‐and Resource‐Aware Computation Offloading for Complex Tasks in Edge Environment
K Peng, B Zhao, S Xue, Q Huang
Complexity 2020 (1), 9548262, 2020
152020
Security-Aware computation offloading for Mobile edge computing-Enabled smart city
K Peng, P Liu, P Tao, Q Huang
Journal of Cloud Computing 10 (1), 47, 2021
102021
A light-weight and accurate method of static integer-overflow-to-buffer-overflow vulnerability detection
M Xu, S Li, L Xu, F Li, W Huo, J Ma, X Li, Q Huang
Information Security and Cryptology: 14th International Conference, Inscrypt …, 2019
82019
Findevasion: an effective environment-sensitive malware detection system for the cloud
X Jia, G Zhou, Q Huang, W Zhang, D Tian
Digital Forensics and Cyber Crime: 9th International Conference, ICDF2C 2017 …, 2018
82018
Non-transferable blockchain-based identity authentication
Y Fu, J Shao, Q Huang, Q Zhou, H Feng, X Jia, R Wang, W Feng
Peer-to-Peer Networking and Applications 16 (3), 1354-1364, 2023
62023
ET-GAN: cross-language emotion transfer based on cycle-consistent generative adversarial networks
X Jia, J Tai, H Zhou, Y Li, W Zhang, H Du, Q Huang
ECAI 2020, 2038-2045, 2020
62020
Seef-aldr: A speaker embedding enhancement framework via adversarial learning based disentangled representation
J Tai, X Jia, Q Huang, W Zhang, H Du, S Zhang
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
42020
Using the Rgb Image of Machine Code to Classify the Malware
J Chen, X Jia, C Zhao, W Zhang, Q Huang
2020 IEEE 5th International Conference on Cloud Computing and Big Data …, 2020
22020
系统目前无法执行此操作,请稍后再试。
文章 1–20