Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges Q Yan, FR Yu, Q Gong, J Li IEEE communications surveys & tutorials 18 (1), 602-622, 2015 | 1014 | 2015 |
Industrial internet: A survey on the enabling technologies, applications, and challenges JQ Li, FR Yu, G Deng, C Luo, Z Ming, Q Yan IEEE Communications Surveys & Tutorials 19 (3), 1504-1526, 2017 | 445 | 2017 |
When big data meets software-defined networking: SDN for big data and big data for SDN L Cui, FR Yu, Q Yan IEEE network 30 (1), 58-65, 2016 | 387 | 2016 |
Distributed denial of service attacks in software-defined networking with cloud computing Q Yan, FR Yu IEEE Communications Magazine 53 (4), 52-59, 2015 | 318 | 2015 |
A hybrid path planning method in unmanned air/ground vehicle (UAV/UGV) cooperative systems J Li, G Deng, C Luo, Q Lin, Q Yan, Z Ming IEEE Transactions on Vehicular Technology 65 (12), 9585-9596, 2016 | 262 | 2016 |
Anomaly intrusion detection method based on HMM Y Qiao, XW Xin, Y Bin, S Ge Electronics letters 38 (13), 1, 2002 | 260 | 2002 |
Interference alignment and its applications: A survey, research issues, and challenges N Zhao, FR Yu, M Jin, Q Yan, VCM Leung IEEE Communications Surveys & Tutorials 18 (3), 1779-1803, 2016 | 206 | 2016 |
A multi-level DDoS mitigation framework for the industrial Internet of Things Q Yan, W Huang, X Luo, Q Gong, FR Yu IEEE Communications Magazine 56 (2), 30-36, 2018 | 195 | 2018 |
Physical layer security issues in interference-alignment-based wireless networks N Zhao, FR Yu, M Li, Q Yan, VCM Leung IEEE Communications Magazine 54 (8), 162-168, 2016 | 160 | 2016 |
DDSE: A novel evolutionary algorithm based on degree-descending search strategy for influence maximization in social networks L Cui, H Hu, S Yu, Q Yan, Z Ming, Z Wen, N Lu Journal of Network and Computer Applications 103, 119-130, 2018 | 121 | 2018 |
Software-defined device-to-device (D2D) communications in virtual wireless networks with imperfect network state information (NSI) MYK Chua, FR Yu, C Liang, B Sun, Q Yan IEEE Transactions on Vehicular Technology 65 (9), 7349-7360, 2015 | 98 | 2015 |
Adaptive composite operator selection and parameter control for multiobjective evolutionary algorithm Q Lin, Z Liu, Q Yan, Z Du, CAC Coello, Z Liang, W Wang, J Chen Information Sciences 339, 332-352, 2016 | 80 | 2016 |
Automatically synthesizing DoS attack traces using generative adversarial networks Q Yan, M Wang, W Huang, X Luo, FR Yu International journal of machine learning and cybernetics 10 (12), 3387-3396, 2019 | 77 | 2019 |
Effective software‐defined networking controller scheduling method to mitigate DDoS attacks Q Yan, Q Gong, FR Yu Electronics Letters 53 (7), 469-471, 2017 | 68 | 2017 |
A novel context-aware recommendation algorithm with two-level SVD in social networks L Cui, W Huang, Q Yan, FR Yu, Z Wen, N Lu Future Generation Computer Systems 86, 1459-1470, 2018 | 56 | 2018 |
QoS aware transcoding for live streaming in edge-clouds aided HetNets: An enhanced actor-critic approach Z Zhang, R Wang, FR Yu, F Fu, Q Yan IEEE Transactions on Vehicular Technology 68 (11), 11295-11308, 2019 | 54 | 2019 |
Detection of DDoS attacks against wireless SDN controllers based on the fuzzy synthetic evaluation decision-making model. Q Yan, Q Gong, F Deng Adhoc & Sensor Wireless Networks 33, 2016 | 54 | 2016 |
Joint offloading and resource allocation in mobile edge computing systems: An actor-critic approach Z Zhang, FR Yu, F Fu, Q Yan, Z Wang 2018 IEEE global communications conference (GLOBECOM), 1-6, 2018 | 51 | 2018 |
Proof-of-play: A novel consensus model for blockchain-based peer-to-peer gaming system HY Yuen, F Wu, W Cai, HCB Chan, Q Yan, VCM Leung Proceedings of the 2019 ACM international symposium on blockchain and secure …, 2019 | 38 | 2019 |
Using MTD and SDN-based honeypots to defend DDoS attacks in IoT X Luo, Q Yan, M Wang, W Huang 2019 Computing, Communications and IoT Applications (ComComAp), 392-395, 2019 | 37 | 2019 |