Time series anomaly detection for trustworthy services in cloud computing systems C Huang, G Min, Y Wu, Y Ying, K Pei, Z Xiang IEEE Transactions on Big Data 8 (1), 60-72, 2017 | 71 | 2017 |
An intelligent anomaly detection scheme for micro-services architectures with temporal and spatial data analysis Y Zuo, Y Wu, G Min, C Huang, K Pei IEEE Transactions on Cognitive Communications and Networking 6 (2), 548-561, 2020 | 58 | 2020 |
Towards experienced anomaly detector through reinforcement learning C Huang, Y Wu, Y Zuo, K Pei, G Min Proceedings of the AAAI Conference on Artificial Intelligence 32 (1), 2018 | 45 | 2018 |
Resilient range-based d-dimensional localization for mobile sensor networks H Huang, W Miao, G Min, C Huang, X Zhang, C Wang IEEE/ACM Transactions on Networking 28 (5), 2037-2050, 2020 | 10 | 2020 |
Statistical certification of acceptable robustness for neural networks C Huang, Z Hu, X Huang, K Pei Artificial Neural Networks and Machine Learning–ICANN 2021: 30th …, 2021 | 7 | 2021 |
Kernelized convex hull approximation and its applications in data description tasks C Huang, Y Wu, G Min, Y Ying 2018 International Joint Conference on Neural Networks (IJCNN), 1-8, 2018 | 7 | 2018 |
Terminator: An Efficient and Light-weight Fault Localization Framework Y Li, H Zheng, C Huang, K Pei, J Li, L Huang IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops …, 2020 | 2 | 2020 |
Featured Anomaly Detection Methods and Applications C Huang University of Exeter, 2018 | 2 | 2018 |
An Improved Construction for Reusable Anonymous Return Channels Based on Universal Re-encryption CQ Huang, LH Li, SF Fu 2012 International Conference on Cyber-Enabled Distributed Computing and …, 2012 | 2 | 2012 |
Adaptive Retraining for Neural Network Robustness in Classification R Yao, C Huang, Z Hu, K Pei 2021 International Joint Conference on Neural Networks (IJCNN), 1-8, 2021 | 1 | 2021 |
A CCA-secure Verifiable Mix-net LH Li, CQ Huang, SF Fu 2017 International Conference on Networking and Network Applications (NaNA …, 2017 | 1 | 2017 |
Distributed machine learning in big data era for smart city Y Zuo, Y Wu, G Min, C Huang, X Zhang From Internet of Things to Smart Cities, 151-177, 2017 | 1 | 2017 |
基于 Tor 的反向匿名信道建立技术研究 [D] 黄诚强 西安电子科技大学, 2014 | 1 | 2014 |
基于 DC-net 的会议室电子选举方案 李龙海, 付少锋, 黄诚强 通信学报 33 (Z1), 103-109, 2012 | 1 | 2012 |
Boardroom voting scheme with unconditionally secret ballots based on DC-Net LH Li, CQ Huang, SF Fu Network and System Security: 6th International Conference, NSS 2012 …, 2012 | 1 | 2012 |
Toward Practical Anomaly Detection in Network Big Data C Huang, Y Wu, Z Yuan, G Min Big Data and Computational Intelligence in Networking, 411-432, 2017 | | 2017 |
选择密文安全的可验证 Mix-Net 协议 李龙海, 黄诚强, 许尚妹, 付少锋 通信学报 36 (10), 17-27, 2015 | | 2015 |
高效的基于混合加密的乐观 Mix-net 协议 李龙海, 黄诚强, 许尚妹, 付少锋 通信学报 35 (Z2), 154-164, 2014 | | 2014 |
Pairing-Based Anonymous Boardroom Voting Scheme LH Li, CQ Huang, SF Fu 2014 International Conference on Cyber-Enabled Distributed Computing and …, 2014 | | 2014 |
对 Telex 互联网反监管系统的攻击 李龙海, 黄城强, 王万兴, 慕建君 通信学报 35 (9), 40-56, 2014 | | 2014 |