A survey of game theory as applied to network security S Roy, C Ellis, S Shiva, D Dasgupta, V Shandilya, Q Wu 2010 43rd Hawaii international conference on system sciences, 1-10, 2010 | 708 | 2010 |
On computing mobile agent routes for data fusion in distributed sensor networks Q Wu, NSV Rao, J Barhen, SS Iyenger, VK Vaishnavi, H Qi, ... IEEE Transactions on Knowledge and Data Engineering 16 (6), 740-753, 2004 | 402 | 2004 |
An effective convolutional neural network based on SMOTE and Gaussian mixture model for intrusion detection in imbalanced dataset H Zhang, L Huang, CQ Wu, Z Li Computer Networks 177, 107315, 2020 | 275 | 2020 |
AVOIDIT: A cyber attack taxonomy C Simmons, C Ellis, S Shiva, D Dasgupta, Q Wu University of Memphis, Technical Report CS-09-003, 2009 | 270 | 2009 |
Ultrascience net: Network testbed for large-scale science applications NSV Rao, WR Wing, SM Carter, Q Wu IEEE communications magazine 43 (11), S12-S17, 2005 | 159 | 2005 |
Performance modeling and workflow scheduling of microservice-based applications in clouds L Bao, C Wu, X Bu, N Ren, M Shen IEEE Transactions on Parallel and Distributed Systems 30 (9), 2114-2129, 2019 | 143 | 2019 |
End-to-end delay minimization for scientific workflows in clouds under budget constraint CQ Wu, X Lin, D Yu, W Xu, L Li IEEE Transactions on Cloud Computing 3 (2), 169-181, 2014 | 136 | 2014 |
CHEETAH: Circuit-switched high-speed end-to-end transport architecture testbed X Zheng, M Veeraraghavan, NSV Rao, Q Wu, M Zhu IEEE Communications Magazine 43 (8), S11-S17, 2005 | 126 | 2005 |
On efficient deployment of sensors on planar grid Q Wu, NSV Rao, X Du, SS Iyengar, VK Vaishnavi Computer Communications 30 (14-15), 2721-2734, 2007 | 117 | 2007 |
An effective deep learning based scheme for network intrusion detection H Zhang, CQ Wu, S Gao, Z Wang, Y Xu, Y Liu 2018 24th International Conference on Pattern Recognition (ICPR), 682-687, 2018 | 100 | 2018 |
On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks Q Wu, S Shiva, S Roy, C Ellis, V Datla Proceedings of the 2010 spring simulation multiconference, 1-8, 2010 | 81 | 2010 |
Fusion of threshold rules for target detection in wireless sensor networks M Zhu, S Ding, Q Wu, RR Brooks, NSV Rao, SS Iyengar ACM Transactions on Sensor Networks (TOSN) 6 (2), 1-7, 2010 | 80 | 2010 |
Secure cell relay routing protocol for sensor networks X Du, Y Xiao, HH Chen, Q Wu Wireless Communications and Mobile Computing 6 (3), 375-391, 2006 | 79 | 2006 |
On trust models for communication security in vehicular ad-hoc networks N Fan, CQ Wu Ad Hoc Networks 90, 101740, 2019 | 74 | 2019 |
On scientific workflow scheduling in clouds under budget constraint X Lin, CQ Wu 2013 42nd International Conference on Parallel Processing, 90-99, 2013 | 73 | 2013 |
Transferring compressive-sensing-based device-free localization across target diversity J Wang, X Chen, D Fang, CQ Wu, Z Yang, T Xing IEEE Transactions on Industrial Electronics 62 (4), 2397-2409, 2014 | 70 | 2014 |
Supporting distributed application workflows in heterogeneous computing environments Q Wu, Y Gu 2008 14th IEEE International Conference on Parallel and Distributed Systems …, 2008 | 70 | 2008 |
Control plane for advance bandwidth scheduling in ultra high-speed networks NSV Rao, Q Wu, S Ding, SM Carter, WR Wing, A Banerjee, D Ghosal, ... Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on …, 2006 | 69 | 2006 |
Complexity analysis and algorithm design for advance bandwidth scheduling in dedicated networks Y Lin, Q Wu IEEE/ACM Transactions on Networking 21 (1), 14-27, 2012 | 63 | 2012 |
A cost-effective scheduling algorithm for scientific workflows in clouds M Zhu, Q Wu, Y Zhao 2012 ieee 31st international performance computing and communications …, 2012 | 53 | 2012 |