ChengQiang Huang
ChengQiang Huang
Verified email at - Homepage
Cited by
Cited by
Time series anomaly detection for trustworthy services in cloud computing systems
C Huang, G Min, Y Wu, Y Ying, K Pei, Z Xiang
IEEE Transactions on Big Data 8 (1), 60-72, 2017
An intelligent anomaly detection scheme for micro-services architectures with temporal and spatial data analysis
Y Zuo, Y Wu, G Min, C Huang, K Pei
IEEE Transactions on Cognitive Communications and Networking 6 (2), 548-561, 2020
Towards experienced anomaly detector through reinforcement learning
C Huang, Y Wu, Y Zuo, K Pei, G Min
Proceedings of the AAAI Conference on Artificial Intelligence 32 (1), 2018
Resilient range-based d-dimensional localization for mobile sensor networks
H Huang, W Miao, G Min, C Huang, X Zhang, C Wang
IEEE/ACM Transactions on Networking 28 (5), 2037-2050, 2020
Statistical certification of acceptable robustness for neural networks
C Huang, Z Hu, X Huang, K Pei
Artificial Neural Networks and Machine Learning–ICANN 2021: 30th …, 2021
Kernelized convex hull approximation and its applications in data description tasks
C Huang, Y Wu, G Min, Y Ying
2018 International Joint Conference on Neural Networks (IJCNN), 1-8, 2018
Terminator: An Efficient and Light-weight Fault Localization Framework
Y Li, H Zheng, C Huang, K Pei, J Li, L Huang
IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops …, 2020
Featured Anomaly Detection Methods and Applications
C Huang
University of Exeter, 2018
An Improved Construction for Reusable Anonymous Return Channels Based on Universal Re-encryption
CQ Huang, LH Li, SF Fu
2012 International Conference on Cyber-Enabled Distributed Computing and …, 2012
Adaptive Retraining for Neural Network Robustness in Classification
R Yao, C Huang, Z Hu, K Pei
2021 International Joint Conference on Neural Networks (IJCNN), 1-8, 2021
A CCA-secure Verifiable Mix-net
LH Li, CQ Huang, SF Fu
2017 International Conference on Networking and Network Applications (NaNA …, 2017
Distributed machine learning in big data era for smart city
Y Zuo, Y Wu, G Min, C Huang, X Zhang
From Internet of Things to Smart Cities, 151-177, 2017
基于 Tor 的反向匿名信道建立技术研究 [D]
西安电子科技大学, 2014
基于 DC-net 的会议室电子选举方案
李龙海, 付少锋, 黄诚强
通信学报 33 (Z1), 103-109, 2012
Boardroom voting scheme with unconditionally secret ballots based on DC-Net
LH Li, CQ Huang, SF Fu
Network and System Security: 6th International Conference, NSS 2012 …, 2012
Toward Practical Anomaly Detection in Network Big Data
C Huang, Y Wu, Z Yuan, G Min
Big Data and Computational Intelligence in Networking, 411-432, 2017
选择密文安全的可验证 Mix-Net 协议
李龙海, 黄诚强, 许尚妹, 付少锋
通信学报 36 (10), 17-27, 2015
高效的基于混合加密的乐观 Mix-net 协议
李龙海, 黄诚强, 许尚妹, 付少锋
通信学报 35 (Z2), 154-164, 2014
Pairing-Based Anonymous Boardroom Voting Scheme
LH Li, CQ Huang, SF Fu
2014 International Conference on Cyber-Enabled Distributed Computing and …, 2014
对 Telex 互联网反监管系统的攻击
李龙海, 黄城强, 王万兴, 慕建君
通信学报 35 (9), 40-56, 2014
The system can't perform the operation now. Try again later.
Articles 1–20