Verified email at
Cited by
Cited by
Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges
Q Yan, FR Yu, Q Gong, J Li
IEEE communications surveys & tutorials 18 (1), 602-622, 2015
Industrial internet: A survey on the enabling technologies, applications, and challenges
JQ Li, FR Yu, G Deng, C Luo, Z Ming, Q Yan
IEEE Communications Surveys & Tutorials 19 (3), 1504-1526, 2017
When big data meets software-defined networking: SDN for big data and big data for SDN
L Cui, FR Yu, Q Yan
IEEE network 30 (1), 58-65, 2016
Distributed denial of service attacks in software-defined networking with cloud computing
Q Yan, FR Yu
IEEE Communications Magazine 53 (4), 52-59, 2015
A hybrid path planning method in unmanned air/ground vehicle (UAV/UGV) cooperative systems
J Li, G Deng, C Luo, Q Lin, Q Yan, Z Ming
IEEE Transactions on Vehicular Technology 65 (12), 9585-9596, 2016
Anomaly intrusion detection method based on HMM
Y Qiao, XW Xin, Y Bin, S Ge
Electronics letters 38 (13), 1, 2002
Interference alignment and its applications: A survey, research issues, and challenges
N Zhao, FR Yu, M Jin, Q Yan, VCM Leung
IEEE Communications Surveys & Tutorials 18 (3), 1779-1803, 2016
A multi-level DDoS mitigation framework for the industrial Internet of Things
Q Yan, W Huang, X Luo, Q Gong, FR Yu
IEEE Communications Magazine 56 (2), 30-36, 2018
Physical layer security issues in interference-alignment-based wireless networks
N Zhao, FR Yu, M Li, Q Yan, VCM Leung
IEEE Communications Magazine 54 (8), 162-168, 2016
DDSE: A novel evolutionary algorithm based on degree-descending search strategy for influence maximization in social networks
L Cui, H Hu, S Yu, Q Yan, Z Ming, Z Wen, N Lu
Journal of Network and Computer Applications 103, 119-130, 2018
Software-defined device-to-device (D2D) communications in virtual wireless networks with imperfect network state information (NSI)
MYK Chua, FR Yu, C Liang, B Sun, Q Yan
IEEE Transactions on Vehicular Technology 65 (9), 7349-7360, 2015
Adaptive composite operator selection and parameter control for multiobjective evolutionary algorithm
Q Lin, Z Liu, Q Yan, Z Du, CAC Coello, Z Liang, W Wang, J Chen
Information Sciences 339, 332-352, 2016
Automatically synthesizing DoS attack traces using generative adversarial networks
Q Yan, M Wang, W Huang, X Luo, FR Yu
International journal of machine learning and cybernetics 10 (12), 3387-3396, 2019
Effective software‐defined networking controller scheduling method to mitigate DDoS attacks
Q Yan, Q Gong, FR Yu
Electronics Letters 53 (7), 469-471, 2017
A novel context-aware recommendation algorithm with two-level SVD in social networks
L Cui, W Huang, Q Yan, FR Yu, Z Wen, N Lu
Future Generation Computer Systems 86, 1459-1470, 2018
QoS aware transcoding for live streaming in edge-clouds aided HetNets: An enhanced actor-critic approach
Z Zhang, R Wang, FR Yu, F Fu, Q Yan
IEEE Transactions on Vehicular Technology 68 (11), 11295-11308, 2019
Detection of DDoS attacks against wireless SDN controllers based on the fuzzy synthetic evaluation decision-making model.
Q Yan, Q Gong, F Deng
Adhoc & Sensor Wireless Networks 33, 2016
Joint offloading and resource allocation in mobile edge computing systems: An actor-critic approach
Z Zhang, FR Yu, F Fu, Q Yan, Z Wang
2018 IEEE global communications conference (GLOBECOM), 1-6, 2018
Proof-of-play: A novel consensus model for blockchain-based peer-to-peer gaming system
HY Yuen, F Wu, W Cai, HCB Chan, Q Yan, VCM Leung
Proceedings of the 2019 ACM international symposium on blockchain and secure …, 2019
Using MTD and SDN-based honeypots to defend DDoS attacks in IoT
X Luo, Q Yan, M Wang, W Huang
2019 Computing, Communications and IoT Applications (ComComAp), 392-395, 2019
The system can't perform the operation now. Try again later.
Articles 1–20