default search action
Yunhe Cui
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Siqin Wang, Xiao Huang, Pengyuan Liu, Mengxi Zhang, Filip Biljecki, Tao Hu, Xiaokang Fu, Lingbo Liu, Xintao Liu, Ruomei Wang, Yuanyuan Huang, Jingjing Yan, Jinghan Jiang, Michaelmary Chukwu, Seyed Reza Naghedi, Moein Hemmati, Yaxiong Shao, Nan Jia, Zhiyang Xiao, Tian Tian, Yaxin Hu, Lixiaona Yu, Winston Yap, Edgardo Macatulad, Zhuo Chen, Yunhe Cui, Koichi Ito, Mengbi Ye, Zicheng Fan, Binyu Lei, Shuming Bao:
Mapping the landscape and roadmap of geospatial artificial intelligence (GeoAI) in quantitative human geography: An extensive systematic review. Int. J. Appl. Earth Obs. Geoinformation 128: 103734 (2024) - [j19]Ben Pi, Chun Guo, Yunhe Cui, Guowei Shen, Jialong Yang, Yuan Ping:
Remote access trojan traffic early detection method based on Markov matrices and deep learning. Comput. Secur. 137: 103628 (2024) - [j18]Jiaxin Peng, Chun Guo, Yuan Ping, Yunhe Cui, Yi Chen, Guowei Shen:
SNDMI: Spyware network traffic detection method based on inducement operations. Comput. Secur. 140: 103806 (2024) - 2023
- [j17]Tongtong Jiang, Guowei Shen, Chun Guo, Yunhe Cui, Bo Xie:
BFLS: Blockchain and Federated Learning for sharing threat detection models as Cyber Threat Intelligence. Comput. Networks 224: 109604 (2023) - [j16]Huaxin Deng, Chun Guo, Guowei Shen, Yunhe Cui, Yuan Ping:
MCTVD: A malware classification method based on three-channel visualization and deep learning. Comput. Secur. 126: 103084 (2023) - [j15]Kaixi Wang, Yunhe Cui, Qing Qian, Yi Chen, Chun Guo, Guowei Shen:
USAGE : Uncertain flow graph and spatio-temporal graph convolutional network-based saturation attack detection method. J. Netw. Comput. Appl. 219: 103722 (2023) - [c9]Xuanyu Huan, Jianpeng Zhao, Guolin Chen, Xianchao Li, Yunhe Cui, Hongzhen Yang:
Towards Feature Selection for Detecting LDDoS in SD-IoT of Smart Grids: A Multi-correlation Information EA-based Method. ISCAI 2023: 60-66 - [c8]Yong Long, Qing Qian, Yunhe Cui:
VERY-RL: An Adaptive Image Steganography Algorithm Based on Reinforcement Learning. ISCAI 2023: 67-71 - 2022
- [j14]Mengxi Zhang, Siqin Wang, Tao Hu, Xiaokang Fu, Xiaoyue Wang, Yaxin Hu, Briana Halloran, Zhenlong Li, Yunhe Cui, Haokun Liu, Zhimin Liu, Shuming Bao:
Human mobility and COVID-19 transmission: a systematic review and future directions. Ann. GIS 28(4): 501-514 (2022) - [j13]Longyan Ran, Yunhe Cui, Chun Guo, Qing Qian, Guowei Shen, Huanlai Xing:
Defending saturation attacks on SDN controller: A confusable instance analysis-based algorithm. Comput. Networks 213: 109098 (2022) - [j12]Man Xiao, Yunhe Cui, Qing Qian, Guowei Shen:
KIND: A Novel Image-Mutual-Information-Based Decision Fusion Method for Saturation Attack Detection in SD-IoT. IEEE Internet Things J. 9(23): 23750-23771 (2022) - [c7]Qing Qian, Shuyun Zhou, Meixin Song, Yunhe Cui, Huan Wang:
VICTOR: An Adaptive Framing-based Speech Content Authentication and Recovery Algorithm. HPCC/DSS/SmartCity/DependSys 2022: 1649-1654 - 2021
- [j11]Hao Liu, Chun Guo, Yunhe Cui, Guowei Shen, Yuan Ping:
2-SPIFF: a 2-stage packer identification method based on function call graph and file attributes. Appl. Intell. 51(12): 9038-9053 (2021) - [j10]Mao Xiao, Chun Guo, Guowei Shen, Yunhe Cui, Chaohui Jiang:
Image-based malware classification using section distribution information. Comput. Secur. 110: 102420 (2021) - [j9]Tao Hu, Siqin Wang, Bing She, Mengxi Zhang, Xiao Huang, Yunhe Cui, Jacob Khuri, Yaxin Hu, Xiaokang Fu, Xiaoyue Wang, Peixiao Wang, Xinyan Zhu, Shuming Bao, Wendy Guan, Zhenlong Li:
Human mobility data in the COVID-19 pandemic: characteristics, applications, and challenges. Int. J. Digit. Earth 14(9): 1126-1147 (2021) - [j8]Jin-cheng Peng, Yunhe Cui, Qing Qian, Chun Guo, Chaohui Jiang, Saifei Li:
ADVICE: Towards adaptive scheduling for data collection and DDoS detection in SDN. J. Inf. Secur. Appl. 63: 103017 (2021) - [j7]Yunhe Cui, Qing Qian, Chun Guo, Guowei Shen, Youliang Tian, Huanlai Xing, Lianshan Yan:
Towards DDoS detection mechanisms in Software-Defined Networking. J. Netw. Comput. Appl. 190: 103156 (2021) - [j6]Huixia Zhang, Guowei Shen, Chun Guo, Yunhe Cui, Chaohui Jiang:
EX-Action: Automatically Extracting Threat Actions from Cyber Threat Intelligence Report Based on Multimodal Learning. Secur. Commun. Networks 2021: 5586335:1-5586335:12 (2021) - [j5]Bo Xie, Guowei Shen, Chun Guo, Yunhe Cui:
The Named Entity Recognition of Chinese Cybersecurity Using an Active Learning Strategy. Wirel. Commun. Mob. Comput. 2021: 6629591:1-6629591:11 (2021) - [c6]Cong Wang, Yunhe Cui, Qing Qian, Guowei Shen, Hongfeng Gao, Saifei Li:
METER: An Ensemble DWT-based Method for Identifying Low-rate DDoS Attack in SDN. EUC 2021: 79-86 - 2020
- [j4]Qing Qian, Yunhe Cui, Hongxia Wang, Mingsen Deng:
REPAIR: fragile watermarking for encrypted speech authentication with recovery ability. Telecommun. Syst. 75(3): 273-289 (2020) - [c5]Yunhe Cui, Qing Qian:
MIND: Message Classification Based Controller Scheduling Method for Resisting DDoS Attack in Software-Defined Networking. ICCCS 2020: 486-490 - [c4]Qing Qian, Yunhe Cui:
A Fragile Watermarking Algorithm for Speech Authentication by Modifying Least Significant Digits. ICCCS 2020: 680-684 - [c3]Yunhe Cui, Qing Qian, Huanlai Xing, Saifei Li:
LNAD: Towards Lightweight Network Anomaly Detection in Software-Defined Networking. HPCC/DSS/SmartCity 2020: 855-860
2010 – 2019
- 2018
- [j3]Qing Qian, Hongxia Wang, Xingming Sun, Yunhe Cui, Huan Wang, Canghong Shi:
Speech authentication and content recovery scheme for security communication and storage. Telecommun. Syst. 67(4): 635-649 (2018) - 2017
- [j2]Huanlai Xing, Saifei Li, Yunhe Cui, Lianshan Yan, Wei Pan, Rong Qu:
A hybrid EDA for load balancing in multicast with network coding. Appl. Soft Comput. 59: 363-377 (2017) - [c2]Yunhe Cui, Lianshan Yan, Huanlai Xing, Hui Yang, Jin Chen, Wei Pan:
SD-HDC: Software-Defined Hybrid Optical/Electrical Data Center Architecture. GLOBECOM 2017: 1-6 - 2016
- [j1]Yunhe Cui, Lianshan Yan, Saifei Li, Huanlai Xing, Wei Pan, Jian Zhu, Xiaoyang Zheng:
SD-Anti-DDoS: Fast and efficient DDoS defense in software-defined networks. J. Netw. Comput. Appl. 68: 65-79 (2016) - 2012
- [c1]Ping Deng, Yunhe Cui:
An Improved Distance Estimation Algorithm Based on Generalized CRT. VTC Fall 2012: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 20:37 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint