Jieren Cheng
Jieren Cheng
Professor, Hainan University
Verified email at hainu.edu.cn - Homepage
Cited by
Cited by
An abnormal network flow feature sequence prediction approach for DDoS attacks detection in big data environment
J Cheng, R Xu, X Tang, VS Sheng, C Cai
Comput. Mater. Continua 55 (1), 95-119, 2018
程杰仁, 殷建平, 刘运, 钟经伟
计算机研究与发展, 375-378, 2008
DDoS attack detection algorithm using IP address features
J Cheng, J Yin, Y Liu, Z Cai, M Li
International Workshop on Frontiers in Algorithmics, 207-215, 2009
DDoS attack detection using IP address feature interaction
J Cheng, J Yin, Y Liu, Z Cai, C Wu
2009 International Conference on Intelligent Networking and Collaborative …, 2009
Design and implementation of teaching system for mobile cross-platform
Z Zheng, J Cheng, J Peng
International Journal of Multimedia and Ubiquitous Engineering 10 (2), 287-296, 2015
DDoS attack detection method based on linear prediction model
J Cheng, J Yin, C Wu, B Zhang, Y Liu
International Conference on Intelligent Computing, 1004-1013, 2009
Singular point probability improve LSTM network performance for long-term traffic flow prediction
B Liu, J Cheng, K Cai, P Shi, X Tang
National Conference of Theoretical Computer Science, 328-340, 2017
Trend prediction of internet public opinion based on collaborative filtering
X Chen, M Xia, J Cheng, X Tang, J Zhang
2016 12th International Conference on Natural Computation, Fuzzy Systems and …, 2016
Detecting DDoS attacks using conditional entropy
Y Liu, J Yin, J Cheng, B Zhang
2010 International Conference on Computer Application and System Modeling …, 2010
Detecting distributed denial of service attack based on address correlation value
C Jieren, Y Jianping, L Yun, C Zhiping, L Min
Journal of Computer Research and Development 46 (8), 1334, 2009
用 VB 设计通用试题库管理系统的关键技术
程杰仁, 龚德良, 张娟
计算机应用与软件 21 (8), 122-123, 2004
A DDoS detection method for socially aware networking based on forecasting fusion feature sequence
J Cheng, J Zhou, Q Liu, X Tang, Y Guo
The computer journal 61 (7), 959-970, 2018
Detection approach of DDoS attacks based on conditional random fields
Y Liu, ZP Cai, P Zhong, JP Yin, JR Cheng
Ruanjian Xuebao/Journal of Software 22 (8), 1897-1910, 2011
A change-point DDoS attack detection method based on half interaction anomaly degree
J Cheng, X Tang, J Yin
International Journal of Autonomous and Adaptive Communications Systems 10 …, 2017
2, Yin Jianping1, Liu Yun1, and Zhong Jingwei11 (School of Computer Science, National University of Defense Technology, Changsha 410073) 2 (Department of Mathematics, Xiangnan …
C Jieren
Journal of Computer Research and Development S 1, 2008
郑兆华, 彭金莲, 邱锡光, 程杰仁
计算机教育, 80-83, 2014
Contourlet-DCT based multiple robust watermarkings for medical images
X Wu, J Li, R Tu, J Cheng, UA Bhatti, J Ma
Multimedia Tools and Applications 78 (7), 8463-8480, 2019
Adaptive DDoS attack detection method based on multiple-kernel learning
J Cheng, C Zhang, X Tang, VS Sheng, Z Dong, J Li
Security and Communication Networks 2018, 2018
基于条件随机场的 DDoS 攻击检测方法
刘运, 蔡志平, 钟平, 殷建平, 程杰仁
软件学报, 2011
史伟奇, 程杰仁, 唐湘滟, 刘运, 张波云
计算机工程与设计 29 (22), 5725-5728, 2008
The system can't perform the operation now. Try again later.
Articles 1–20