Obserwuj
Lv Qiujian
Lv Qiujian
Nieznane powiązanie
Zweryfikowany adres z iie.ac.cn
Tytuł
Cytowane przez
Cytowane przez
Rok
Big data driven hidden Markov model based individual mobility prediction at points of interest
Q Lv, Y Qiao, N Ansari, J Liu, J Yang
IEEE Transactions on Vehicular Technology 66 (6), 5204-5216, 2016
1542016
A novel deep framework for dynamic malware detection based on API sequence intrinsic features
C Li, Q Lv, N Li, Y Wang, D Sun, Y Qiao
Computers & Security 116, 102686, 2022
472022
DMalNet: Dynamic malware analysis based on API feature engineering and graph learning
C Li, Z Cheng, H Zhu, L Wang, Q Lv, Y Wang, N Li, D Sun
Computers & Security 122, 102872, 2022
252022
Risk prediction for imbalanced data in cyber security: a Siamese network-based deep learning classification framework
D Sun, Z Wu, Y Wang, Q Lv, B Hu
2019 international joint conference on neural networks (IJCNN), 1-8, 2019
212019
Hidden Markov Model based user mobility analysis in LTE network
Q Lv, Z Mei, Y Qiao, Y Zhong, Z Lei
2014 International Symposium on wireless personal multimedia communications …, 2014
202014
A few-shot class-incremental learning approach for intrusion detection
T Wang, Q Lv, B Hu, D Sun
2021 International Conference on Computer Communications and Networks (ICCCN …, 2021
192021
A hybrid model based on multi-dimensional features for insider threat detection
B Lv, D Wang, Y Wang, Q Lv, D Lu
Wireless Algorithms, Systems, and Applications: 13th International …, 2018
172018
Itdbert: Temporal-semantic representation for insider threat detection
W Huang, H Zhu, C Li, Q Lv, Y Wang, H Yang
2021 IEEE Symposium on Computers and Communications (ISCC), 1-7, 2021
152021
Towards a user and role-based behavior analysis method for insider threat detection
Q Lv, Y Wang, L Wang, D Wang
2018 international conference on network infrastructure and digital content …, 2018
122018
CVSS-based multi-factor dynamic risk assessment model for network system
T Wang, Q Lv, B Hu, D Sun
2020 IEEE 10th International Conference on Electronics Information and …, 2020
102020
Linking virtual identities across service domains: An online behavior modeling approach
Y Wu, Q Lv, Y Qiao, J Yang
2017 International Conference on Intelligent Environments (IE), 122-129, 2017
72017
Heat-supply of thermal power plant in wind-heat conflict
Q Lv, B Hu, H Wang, N Zhang, L Liu
Electric Power Automation Equipment 36 (7), 236-244, 2017
72017
Anomaly detection in unstructured logs using attention-based Bi-LSTM network
D Yu, X Hou, C Li, Q Lv, Y Wang, N Li
2021 7th IEEE International Conference on Network Intelligence and Digital …, 2021
62021
Measuring geospatial properties: Relating online content browsing behaviors to users’ points of interest
Q Lv, Y Qiao, Y Zhang, FB Abdesslem, W Lin, J Yang
Wireless Personal Communications 101, 1469-1498, 2018
62018
Density weighted diversity based query strategy for active learning
T Wang, X Zhao, Q Lv, B Hu, D Sun
2021 IEEE 24th International Conference on Computer Supported Cooperative …, 2021
52021
Improving mobility prediction performance with state based prediction method when the user departs from routine
A Li, Q Lv, Y Qiao, J Yang
2016 IEEE International Conference on Big Data Analysis (ICBDA), 1-7, 2016
52016
Spatial and temporal mobility analysis in LTE mobile network
Q Lv, Y Di, Y Qiao, Z Lei, C Dong
2015 IEEE Wireless Communications and Networking Conference (WCNC), 795-800, 2015
52015
Cyevent2vec: Attributed heterogeneous information network based event embedding framework for cyber security events analysis
X Ma, L Wang, Q Lv, Y Wang, Q Zhang, J Jiang
2022 International Joint Conference on Neural Networks (IJCNN), 01-08, 2022
42022
Kairos:: Practical Intrusion Detection and Investigation using Whole-system Provenance
Z Cheng, Q Lv, J Liang, Y Wang, D Sun, T Pasquier, X Han
arXiv preprint arXiv:2308.05034, 2023
22023
MMSP: A LSTM Based Framework for Multi-Step Attack Prediction in Mixed Scenarios
Z Cheng, D Sun, L Wang, Q Lv, Y Wang
2022 IEEE Symposium on Computers and Communications (ISCC), 1-6, 2022
22022
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20