Jinxia Wei

Orcid: 0000-0003-3108-2515

According to our database1, Jinxia Wei authored at least 19 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Quicksolver: A lightweight malicious domains detection system based on adaptive autoencoder.
Proceedings of the 48th IEEE Conference on Local Computer Networks, 2023

2022
Autoencoder ensembles for network intrusion detection.
Proceedings of the 24th International Conference on Advanced Communication Technology, 2022

2021
ELSV: An Effective Anomaly Detection System from Web Access Logs.
Proceedings of the IEEE International Performance, 2021

An Effective Intrusion Detection Model based on Random Forest Algorithm with I-SMOTE.
Proceedings of the 23rd International Conference on Enterprise Information Systems, 2021

2020
An intrusion detection algorithm based on bag representation with ensemble support vector machine in cloud computing.
Concurr. Comput. Pract. Exp., 2020

An Effective Parallel SVM Intrusion Detection Model for Imbalanced Training Datasets.
Proceedings of the 22nd International Conference on Enterprise Information Systems, 2020

2019
An Attack Behaviors Prediction Model Based on Bag Representation in Time Series.
Proceedings of the 44th IEEE Conference on Local Computer Networks, 2019

A Hybrid Intrusion Detection Algorithm Based on Gaussian Mixture Model and Nearest Neighbors.
Proceedings of the 44th IEEE Conference on Local Computer Networks, 2019

An Effective RF-based Intrusion Detection Algorithm with Feature Reduction and Transformation.
Proceedings of the 21st International Conference on Enterprise Information Systems, 2019

A Real-time Big Data Framework for Network Security Situation Monitoring.
Proceedings of the 21st International Conference on Enterprise Information Systems, 2019

2017
Efficient data possession-checking protocol with deduplication in cloud.
Int. J. Distributed Sens. Networks, 2017

Distributed data possession provable in cloud.
Distributed Parallel Databases, 2017

Dynamic data integrity auditing for secure outsourcing in the cloud.
Concurr. Comput. Pract. Exp., 2017

Efficient integrity verification of replicated data in cloud computing system.
Comput. Secur., 2017

2016
Efficient Dynamic Replicated Data Possession Checking in Distributed Cloud Storage Systems.
Int. J. Distributed Sens. Networks, 2016

Identity-based storage management and integrity verify protocol for secure outsourcing in multi-cloud.
Concurr. Comput. Pract. Exp., 2016

Efficiently secure multiparty computation based on homomorphic encryption.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

2015
Defense Strategy of Network Security based on Dynamic Classification.
KSII Trans. Internet Inf. Syst., 2015

2013
Block pulse operational matrix method for solving fractional partial differential equation.
Appl. Math. Comput., 2013


  Loading...