Qiuyun Wang

Orcid: 0000-0001-6101-9715

According to our database1, Qiuyun Wang authored at least 27 papers between 2012 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
GTCBS-YOLOv5s: A lightweight model for weed species identification in paddy fields.
Comput. Electron. Agric., December, 2023

M3F: A novel multi-session and multi-protocol based malware traffic fingerprinting.
Comput. Networks, May, 2023

Who Are Querying For Me? Egress Measurement For Open DNS Resolvers.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
Measurement for encrypted open resolvers: Applications and security.
Comput. Networks, 2022

Cryptocurrency malware detection in real-world environment: Based on multi-results stacking learning.
Appl. Soft Comput., 2022

Effectiveness Evaluation of Evasion Attack on Encrypted Malicious Traffic Detection.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

Malware Detected and Tell Me Why: An Verifiable Malware Detection Model with Graph Metric Learning.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022

2021
Joint Congestion Control and Resource Allocation for Delay-Aware Tasks in Mobile Edge Computing.
Wirel. Commun. Mob. Comput., 2021

Assessing the Security of Campus Networks: The Case of Seven Universities.
Sensors, 2021

Trojan Traffic Detection Based on Meta-learning.
Proceedings of the Computational Science - ICCS 2021, 2021

Producing More with Less: A GAN-based Network Attack Detection Approach for Imbalanced Data.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

HSRF: Community Detection Based on Heterogeneous Attributes and Semi-Supervised Random Forest.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

Spear Phishing Emails Detection Based on Machine Learning.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

2020
Threat Intelligence Relationship Extraction Based on Distant Supervision and Reinforcement Learning.
Proceedings of the 32nd International Conference on Software Engineering and Knowledge Engineering, 2020

Bi-LSTM: Finding Network Anomaly Based on Feature Grouping Clustering.
Proceedings of the MLMI 2020: The 3rd International Conference on Machine Learning and Machine Intelligence, 2020

Improved Secure Lightweight RFID Authentication Protocol.
Proceedings of the MLMI 2020: The 3rd International Conference on Machine Learning and Machine Intelligence, 2020

Towards Comprehensive Detection of DNS Tunnels.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

A Weak Coupling of Semi-Supervised Learning with Generative Adversarial Networks for Malware Classification.
Proceedings of the 25th International Conference on Pattern Recognition, 2020

Towards Network Anomaly Detection Using Graph Embedding.
Proceedings of the Computational Science - ICCS 2020, 2020

Research on Database Anomaly Access Detection Based on User Profile Construction.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

2019
Joint remote radio heads and baseband units pool resource scheduling for delay-aware traffic in cloud radio access networks.
Telecommun. Syst., 2019

Delay-Aware Task Congestion Control and Resource Allocation in Mobile Edge Computing.
Proceedings of the 30th IEEE Annual International Symposium on Personal, 2019

Dynamic Server Switching for Energy Efficient Mobile Edge Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
Dynamic Service Caching in Mobile Edge Networks.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

Collaborative Service Placement for Mobile Edge Computing Applications.
Proceedings of the IEEE Global Communications Conference, 2018

2015
Modeling Communication Costs in Blade Servers.
ACM SIGOPS Oper. Syst. Rev., 2015

2012
Map estimation of the input of an oversampled filter bank from noisy subbands by belief propagation.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012


  Loading...