When intrusion detection meets blockchain technology: a review W Meng, EW Tischhauser, Q Wang, Y Wang, J Han Ieee Access 6, 10179-10188, 2018 | 607 | 2018 |
Network traffic classification using correlation information J Zhang, Y Xiang, Y Wang, W Zhou, Y Xiang, Y Guan IEEE Transactions on Parallel and Distributed systems 24 (1), 104-117, 2012 | 431 | 2012 |
Statistical features-based real-time detection of drifted twitter spam C Chen, Y Wang, J Zhang, Y Xiang, W Zhou, G Min IEEE Transactions on Information Forensics and Security 12 (4), 914-925, 2016 | 200 | 2016 |
Addressing the class imbalance problem in twitter spam detection using ensemble learning S Liu, Y Wang, J Zhang, C Chen, Y Xiang Computers & Security 69, 35-49, 2017 | 154 | 2017 |
Internet traffic classification using constrained clustering Y Wang, Y Xiang, J Zhang, W Zhou, G Wei, LT Yang IEEE transactions on parallel and distributed systems 25 (11), 2932-2943, 2013 | 125 | 2013 |
Unsupervised traffic classification using flow statistical properties and IP packet payload J Zhang, Y Xiang, W Zhou, Y Wang Journal of Computer and System Sciences 79 (5), 573-585, 2013 | 112 | 2013 |
Generating regular expression signatures for network traffic classification in trusted network management Y Wang, Y Xiang, W Zhou, S Yu Journal of Network and Computer Applications 35 (3), 992-1000, 2012 | 97 | 2012 |
Adaptive machine learning‐based alarm reduction via edge computing for distributed intrusion detection systems Y Wang, W Meng, W Li, Z Liu, Y Liu, H Xue Concurrency and Computation: Practice and Experience 31 (19), e5101, 2019 | 89 | 2019 |
A fog-based privacy-preserving approach for distributed signature-based intrusion detection Y Wang, W Meng, W Li, J Li, WX Liu, Y Xiang Journal of Parallel and Distributed Computing 122, 26-35, 2018 | 85 | 2018 |
Detecting insider attacks in medical cyber–physical networks based on behavioral profiling W Meng, W Li, Y Wang, MH Au Future Generation Computer Systems 108, 1258-1266, 2020 | 81 | 2020 |
TouchWB: Touch behavioral user authentication based on web browsing on smartphones W Meng, Y Wang, DS Wong, S Wen, Y Xiang Journal of Network and Computer Applications 117, 1-9, 2018 | 74 | 2018 |
A novel semi-supervised approach for network traffic clustering Y Wang, Y Xiang, J Zhang, S Yu 2011 5th International Conference on Network and System Security, 169-175, 2011 | 64 | 2011 |
Centralized duplicate removal video storage system with privacy preservation in IoT H Yan, X Li, Y Wang, C Jia Sensors 18 (6), 1814, 2018 | 62 | 2018 |
IoT-FBAC: Function-based access control scheme using identity-based encryption in IoT H Yan, Y Wang, C Jia, J Li, Y Xiang, W Pedrycz Future Generation Computer Systems 95, 344-353, 2019 | 60 | 2019 |
An automatic application signature construction system for unknown traffic Y Wang, Y Xiang, SZ Yu Concurrency and Computation: Practice and Experience 22 (13), 1927-1944, 2010 | 58 | 2010 |
Enhancing network capacity by weakening community structure in scale-free network J Cai, Y Wang, Y Liu, JZ Luo, W Wei, X Xu Future Generation Computer Systems 87, 765-771, 2018 | 57 | 2018 |
Internet traffic clustering with side information Y Wang, Y Xiang, J Zhang, W Zhou, B Xie Journal of Computer and System Sciences 80 (5), 1021-1036, 2014 | 46 | 2014 |
Modeling oscillation behavior of network traffic by nested hidden Markov model with variable state-duration Y Xie, J Hu, Y Xiang, S Yu, S Tang, Y Wang IEEE Transactions on Parallel and Distributed Systems 24 (9), 1807-1817, 2012 | 39 | 2012 |
Supervised Learning Real-time Traffic Classifiers. Y Wang, SZ Yu J. Networks 4 (7), 622-629, 2009 | 36 | 2009 |
JFCGuard: detecting juice filming charging attack via processor usage analysis on smartphones W Meng, L Jiang, Y Wang, J Li, J Zhang, Y Xiang Computers & Security 76, 252-264, 2018 | 34 | 2018 |