Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Follow
Zhiping Cai(蔡志平)
Title
Cited by
Cited by
Year
Extreme learning machines [trends & controversies]
E Cambria, GB Huang, LLC Kasun, H Zhou, CM Vong, J Lin, J Yin, Z Cai, ...
IEEE intelligent systems 28 (6), 30-59, 2013
4482013
Security and privacy in the medical internet of things: a review
W Sun, Z Cai, Y Li, F Liu, S Fang, G Wang
Security and Communication Networks 2018 (1), 5978636, 2018
3402018
A survey on edge computing systems and tools
F Liu, G Tang, Y Li, Z Cai, X Zhang, T Zhou
Proceedings of the IEEE 107 (8), 1537-1562, 2019
3062019
Data processing and text mining technologies on electronic medical records: a review
W Sun, Z Cai, Y Li, F Liu, S Fang, G Wang
Journal of healthcare engineering 2018 (1), 4302425, 2018
3052018
Network intrusion detection through stacking dilated convolutional autoencoders
Y Yu, J Long, Z Cai
Security and Communication Networks 2017 (1), 4184196, 2017
1812017
Computation-efficient offloading and trajectory scheduling for multi-UAV assisted mobile edge computing
J Zhang, L Zhou, F Zhou, BC Seet, H Zhang, Z Cai, J Wei
IEEE Transactions on Vehicular Technology 69 (2), 2114-2125, 2019
1802019
Cloze test helps: Effective video anomaly detection via learning to complete video events
G Yu, S Wang, Z Cai, E Zhu, C Xu, J Yin, M Kloft
Proceedings of the 28th ACM international conference on multimedia, 583-591, 2020
1682020
Virtual network embedding for evolving networks
Z Cai, F Liu, N Xiao, Q Liu, Z Wang
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010
1582010
Flow level detection and filtering of low-rate DDoS
C Zhang, Z Cai, W Chen, X Luo, J Yin
Computer Networks 56 (15), 3417-3431, 2012
1572012
A novel code data dissemination scheme for Internet of Things through mobile vehicle of smart cities
H Teng, Y Liu, A Liu, NN Xiong, Z Cai, T Wang, X Liu
Future Generation Computer Systems 94, 351-367, 2019
1442019
Deep fusion clustering network
W Tu, S Zhou, X Liu, X Guo, Z Cai, E Zhu, J Cheng
Proceedings of the AAAI Conference on Artificial Intelligence 35 (11), 9978-9987, 2021
1322021
RRED: robust RED algorithm to counter low-rate denial-of-service attacks
C Zhang, J Yin, Z Cai, W Chen
IEEE Communications Letters 14 (5), 489-491, 2010
1242010
Consensus one-step multi-view subspace clustering
P Zhang, X Liu, J Xiong, S Zhou, W Zhao, E Zhu, Z Cai
IEEE Transactions on Knowledge and Data Engineering 34 (10), 4676-4689, 2020
1232020
Adaptive data and verified message disjoint security routing for gathering big data in energy harvesting networks
X Liu, A Liu, T Wang, K Ota, M Dong, Y Liu, Z Cai
Journal of Parallel and Distributed Computing 135, 140-155, 2020
1042020
A survey on security‐aware measurement in SDN
H Zhang, Z Cai, Q Liu, Q Xiao, Y Li, CF Cheang
Security and Communication Networks 2018 (1), 2459154, 2018
1022018
Edge computing: platforms, applications and challenges
Z Zhao, F Liu, Z Cai, N Xiao
Journal of computer research and development 55 (2), 327-337, 2018
952018
Counter tree: A scalable counter architecture for per-flow traffic measurement
M Chen, S Chen, Z Cai
IEEE/ACM Transactions on Networking 25 (2), 1249-1262, 2016
882016
Securing display path for security-sensitive applications on mobile devices
J Cui, Y Zhang, Z Cai, A Liu, Y Li
Computers, Materials and Continua 55 (1), 17, 2018
812018
Su-ids: A semi-supervised and unsupervised framework for network intrusion detection
E Min, J Long, Q Liu, J Cui, Z Cai, J Ma
Cloud Computing and Security: 4th International Conference, ICCCS 2018 …, 2018
782018
A distributed TCAM coprocessor architecture for integrated longest prefix matching, policy filtering, and content filtering
Z Cai, Z Wang, K Zheng, J Cao
IEEE Transactions on Computers 62 (3), 417-427, 2011
742011
The system can't perform the operation now. Try again later.
Articles 1–20