Qiang Liu
Cited by
Cited by
Extreme learning machines [trends & controversies]
E Cambria, GB Huang, LLC Kasun, H Zhou, CM Vong, J Lin, J Yin, Z Cai, ...
IEEE intelligent systems 28 (6), 30-59, 2013
A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View
Q Liu, P Li, W Zhao, W Cai, S Yu, VCM Leung
IEEE Access 6, 12103-12117, 2018
Virtual network embedding for evolving networks
Z Cai, F Liu, N Xiao, Q Liu, Z Wang
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010
A survey of clustering with deep learning: From the perspective of network architecture
E Min, X Guo, Q Liu, G Zhang, J Cui, J Long
IEEE Access 6, 39501-39514, 2018
A survey on security-aware measurement in SDN
H Zhang, Z Cai, Q Liu, Q Xiao, Y Li, CF Cheang
Security and Communication Networks 2018, 2018
Hyperparameter selection of one-class support vector machine by self-adaptive data shifting
S Wang, Q Liu, E Zhu, F Porikli, J Yin
Pattern Recognition 74, 198-211, 2018
Applying a new localized generalization error model to design neural networks trained with extreme learning machine
Q Liu, J Yin, VCM Leung, JH Zhai, Z Cai, J Lin
Neural Computing and Applications 27 (1), 59-66, 2016
FADE: Forwarding assessment based detection of collaborative grey hole attacks in WMNs
Q Liu, J Yin, VCM Leung, Z Cai
IEEE Transactions on Wireless Communications 12 (10), 5124-5137, 2013
Heterogeneous metric learning of categorical data with hierarchical couplings
C Zhu, L Cao, Q Liu, J Yin, V Kumar
IEEE Transactions on Knowledge and Data Engineering 30 (7), 1254-1267, 2018
A secure and practical mechanism of outsourcing extreme learning machine in cloud computing
J Lin, J Yin, Z Cai, Q Liu, K Li, V Leung
IEEE Intelligent Systems 28 (6), 35-38, 2013
TR-IDS: Anomaly-based intrusion detection through text-convolutional neural network and random forest
E Min, J Long, Q Liu, J Cui, W Chen
Security and Communication Networks 2018, 2018
Random Fourier extreme learning machine with ℓ2, 1-norm regularization
S Zhou, X Liu, Q Liu, S Wang, C Zhu, J Yin
Neurocomputing 174, 143-153, 2016
Financial time series prediction using ℓ2, 1RF-ELM
J Xue, SH Zhou, Q Liu, X Liu, J Yin
Neurocomputing 277, 176-186, 2018
Su-ids: A semi-supervised and unsupervised framework for network intrusion detection
E Min, J Long, Q Liu, J Cui, Z Cai, J Ma
International Conference on Cloud Computing and Security, 322-334, 2018
A DDoS Detection Method for Socially Aware Networking Based on Forecasting Fusion Feature Sequence
J Cheng, J Zhou, Q Liu, X Tang, Y Guo
The Computer Journal, 1-12, 2018
Distance based multiple kernel ELM: A fast multiple kernel learning approach
C Zhu, X Liu, Q Liu, Y Ming, J Yin
Mathematical Problems in Engineering 2015, 2015
Gastrin suppresses the interdependent expression of p16 and anion exchanger 1 favoring growth inhibition of gastric cancer cells
H Tian, N Zhang, WH Suo, T Wang, LJ Song, J Wu, Q Liu, WW Shen, ...
International journal of cancer 127 (6), 1462-1474, 2010
MI-ELM: Highly Efficient Multi-Instance Learning Based on Hierarchical Extreme Learning Machine
Q Liu, S Zhou, C Zhu, X Liu, J Yin
Neurocomputing, 2015
Incremental multiple kernel extreme learning machine and its application in Robo-advisors
J Xue, Q Liu, M Li, X Liu, Y Ye, S Wang, J Yin
Soft Computing 22 (11), 3507-3517, 2018
Comparative study of CNN and RNN for deep learning based intrusion detection system
J Cui, J Long, E Min, Q Liu, Q Li
International Conference on Cloud Computing and Security, 159-170, 2018
The system can't perform the operation now. Try again later.
Articles 1–20