Zhiping Cai(蔡志平)
Cited by
Cited by
Extreme learning machines [trends & controversies]
E Cambria, GB Huang, LLC Kasun, H Zhou, CM Vong, J Lin, J Yin, Z Cai, ...
IEEE intelligent systems 28 (6), 30-59, 2013
Security and privacy in the medical internet of things: a review
W Sun, Z Cai, Y Li, F Liu, S Fang, G Wang
Security and Communication Networks 2018, 1-9, 2018
Data processing and text mining technologies on electronic medical records: a review
W Sun, Z Cai, Y Li, F Liu, S Fang, G Wang
Journal of healthcare engineering 2018, 2018
A survey on edge computing systems and tools
F Liu, G Tang, Y Li, Z Cai, X Zhang, T Zhou
Proceedings of the IEEE 107 (8), 1537-1562, 2019
Network intrusion detection through stacking dilated convolutional autoencoders
Y Yu, J Long, Z Cai
Security and Communication Networks 2017, 2017
Virtual network embedding for evolving networks
Z Cai, F Liu, N Xiao, Q Liu, Z Wang
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010
Flow level detection and filtering of low-rate DDoS
C Zhang, Z Cai, W Chen, X Luo, J Yin
Computer Networks 56 (15), 3417-3431, 2012
Computation-efficient offloading and trajectory scheduling for multi-UAV assisted mobile edge computing
J Zhang, L Zhou, F Zhou, BC Seet, H Zhang, Z Cai, J Wei
IEEE Transactions on Vehicular Technology 69 (2), 2114-2125, 2019
A novel code data dissemination scheme for Internet of Things through mobile vehicle of smart cities
H Teng, Y Liu, A Liu, NN Xiong, Z Cai, T Wang, X Liu
Future Generation Computer Systems 94, 351-367, 2019
RRED: robust RED algorithm to counter low-rate denial-of-service attacks
C Zhang, J Yin, Z Cai, W Chen
IEEE Communications Letters 14 (5), 489-491, 2010
Cloze test helps: Effective video anomaly detection via learning to complete video events
G Yu, S Wang, Z Cai, E Zhu, C Xu, J Yin, M Kloft
Proceedings of the 28th ACM International Conference on Multimedia, 583-591, 2020
Adaptive data and verified message disjoint security routing for gathering big data in energy harvesting networks
X Liu, A Liu, T Wang, K Ota, M Dong, Y Liu, Z Cai
Journal of Parallel and Distributed Computing 135, 140-155, 2020
A survey on security-aware measurement in SDN
H Zhang, Z Cai, Q Liu, Q Xiao, Y Li, CF Cheang
Security and Communication Networks 2018, 2018
Counter tree: A scalable counter architecture for per-flow traffic measurement
M Chen, S Chen, Z Cai
IEEE/ACM Transactions on Networking 25 (2), 1249-1262, 2016
Edge computing: platforms, applications and challenges
Z Zhao, F Liu, Z Cai, N Xiao
J. Comput. Res. Dev 55 (2), 327-337, 2018
Securing display path for security-sensitive applications on mobile devices
J Cui, Y Zhang, Z Cai, A Liu, Y Li
Computers, Materials and Continua 55 (1), 17, 2018
A distributed TCAM coprocessor architecture for integrated longest prefix matching, policy filtering, and content filtering
Z Cai, Z Wang, K Zheng, J Cao
IEEE Transactions on Computers 62 (3), 417-427, 2011
Consensus one-step multi-view subspace clustering
P Zhang, X Liu, J Xiong, S Zhou, W Zhao, E Zhu, Z Cai
IEEE Transactions on Knowledge and Data Engineering 34 (10), 4676-4689, 2020
Using imbalanced triangle synthetic data for machine learning anomaly detection
M Luo, K Wang, Z Cai, A Liu, Y Li, CF Cheang
Comput., Mater. Continua 58 (1), 15-26, 2019
Session-based network intrusion detection using a deep learning architecture
Y Yu, J Long, Z Cai
Modeling Decisions for Artificial Intelligence: 14th International …, 2017
The system can't perform the operation now. Try again later.
Articles 1–20