Jieren Cheng

According to our database1, Jieren Cheng authored at least 47 papers between 2006 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Traffic flow combination forecasting method based on improved LSTM and ARIMA.
Int. J. Embed. Syst., 2020

DDoS attack detection method based on network abnormal behaviour in big data environment.
Int. J. Comput. Sci. Eng., 2020

Encryption Algorithm for TCP Session Hijacking.
CoRR, 2020

Microcluster-Based Incremental Ensemble Learning for Noisy, Nonstationary Data Streams.
Complex., 2020

ProbInfer: Probability-based AS path inference from multigraph perspective.
Comput. Networks, 2020

Encryption Algorithm for TCP Session Hijacking.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

2019
A DRDoS Detection and Defense Method Based on Deep Forest in the Big Data Environment.
Symmetry, 2019

Corrigendum to "Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing".
Secur. Commun. Networks, 2019

Contourlet-DCT based multiple robust watermarkings for medical images.
Multim. Tools Appl., 2019

A Novel DDoS Attack Detection Method Using Optimized Generalized Multiple Kernel Learning.
CoRR, 2019

Adaptive DDoS attack detection method based on multiple-kernel learning.
CoRR, 2019

Forecasting model based on information-granulated GA-SVR and ARIMA for producer price index.
CoRR, 2019

DDoS Attack Detection Method Based on Network Abnormal Behavior in Big Data Environment.
CoRR, 2019

Robust Encrypted Watermarking for Medical Images Based on DWT-DCT and Tent Mapping in Encrypted Domain.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

DDoS Attack Situation Information Fusion Method Based on Dempster-Shafer Evidence Theory.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

An Automatic Identification Algorithm for Encrypted Anti-counterfeiting Tag Based on DWT-DCT and Chen's Chaos.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

DDOS Multivariate Information Fusion Model Based on Hierarchical Representation Learning.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

A Security Situation Assessment Method Based on Neural Network.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

DDoS Attack Detection Method Based on V-Support Vector Machine.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

Multi-view DDoS Network Flow Feature Extraction Method via Convolutional Neural Network.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2018
Adaptive DDoS Attack Detection Method Based on Multiple-Kernel Learning.
Secur. Commun. Networks, 2018

Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing.
Secur. Commun. Networks, 2018

基于多生长时期模板匹配的玉米螟识别方法 (Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods).
计算机科学, 2018

An automatic traffic-congestion detection method for bad weather based on traffic video.
Int. J. High Perform. Comput. Netw., 2018

Traffic flow detection method based on vertical virtual road induction line.
Int. J. Embed. Syst., 2018

A DDoS Detection Method for Socially Aware Networking Based on Forecasting Fusion Feature Sequence.
Comput. J., 2018

Research on Indirect Location Technology of Ground Target Based on Scene Matching.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

DDoS Attack Security Situation Assessment Model Using Fusion Feature Based on Fuzzy C-Means Clustering Algorithm.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Multi-source Enterprise Innovation Data Fusion Method Based on Hierarchy.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

A Robust Algorithm of Encrypted Face Recognition Based on DWT-DCT and Tent Map.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

DoS Attacks Intrusion Detection Algorithm Based on Support Vector Machine.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Design and Verification of a Security Policy to Defense DDoS Attack for Cloud Robot.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Medical Image Watermarking Based on SIFT-DCT Perceptual Hashing.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
A change-point DDoS attack detection method based on half interaction anomaly degree.
Int. J. Auton. Adapt. Commun. Syst., 2017

Singular Point Probability Improve LSTM Network Performance for Long-term Traffic Flow Prediction.
Proceedings of the Theoretical Computer Science - 35th National Conference, 2017

Design and Test of the Intelligent Rubber Tapping Technology Evaluation Equipment Based on Cloud Model.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
Trend prediction of internet public opinion based on collaborative filtering.
Proceedings of the 12th International Conference on Natural Computation, 2016

Characterization of bipolar information aggregation and decomposition.
Proceedings of the 12th International Conference on Natural Computation, 2016

2015
A Traffic-Congestion Detection Method for Bad Weather Based on Traffic Video.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

2009
DDoS Attack Detection Using IP Address Feature Interaction.
Proceedings of the 1st International Conference on Intelligent Networking and Collaborative Systems, 2009

DDoS Attack Detection Method Based on Linear Prediction Model.
Proceedings of the Emerging Intelligent Computing Technology and Applications, 2009

An Efficient Pre-filtering Mechanism for Parallel Intrusion Detection Based on Many-Core GPU.
Proceedings of the Security Technology, 2009

DDoS Attack Detection Using Three-State Partition Based on Flow Interaction.
Proceedings of the Security Technology, 2009

Detecting Distributed Denial of Service Attack Based on Multi-feature Fusion.
Proceedings of the Security Technology, 2009

DDoS Attack Detection Algorithm Using IP Address Features.
Proceedings of the Frontiers in Algorithmics, Third International Workshop, 2009

A Hybrid Parallel Signature Matching Model for Network Security Applications Using SIMD GPU.
Proceedings of the Advanced Parallel Processing Technologies, 8th International Symposium, 2009

2006
A Novel Fairness Property of Electronic Commerce Protocols and Its Game-based Formalization.
Proceedings of the Eighteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2006), 2006


  Loading...