Follow
Qiang Li
Qiang Li
Jilin University, Computer Science
Verified email at jlu.edu.cn - Homepage
Title
Cited by
Cited by
Year
A hand gesture recognition framework and wearable gesture-based interaction prototype for mobile devices
Z Lu, X Chen, Q Li, X Zhang, P Zhou
IEEE transactions on human-machine systems 44 (2), 293-299, 2014
3382014
A secure mechanism for big data collection in large scale internet of vehicle
L Guo, M Dong, K Ota, Q Li, T Ye, J Wu, J Li
IEEE Internet of Things Journal 4 (2), 601-610, 2017
1652017
Detection of forwarding-based malicious URLs in online social networks
J Cao, Q Li, Y Ji, Y He, D Guo
International Journal of Parallel Programming 44, 163-180, 2016
782016
Combating the evasion mechanisms of social bots
Y Ji, Y He, X Jiang, J Cao, Q Li
computers & security 58, 230-249, 2016
662016
STMTO: A smart and trust multi-UAV task offloading system
J Guo, G Huang, Q Li, NN Xiong, S Zhang, T Wang
Information Sciences 573, 519-540, 2021
612021
Combating the evolving spammers in online social networks
Q Fu, B Feng, D Guo, Q Li
Computers & Security 72, 60-73, 2018
572018
Multistage and elastic spam detection in mobile social networks through deep learning
B Feng, Q Fu, M Dong, D Guo, Q Li
IEEE Network 32 (4), 15-21, 2018
502018
Discovering suspicious APT behaviors by analyzing DNS activities
G Yan, Q Li, D Guo, X Meng
Sensors 20 (3), 731, 2020
412020
Revealing privacy vulnerabilities of anonymous trajectories
S Chang, C Li, H Zhu, T Lu, Q Li
IEEE Transactions on Vehicular Technology 67 (12), 12061-12071, 2018
332018
Discovering hidden suspicious accounts in online social networks
J Cao, Q Fu, Q Li, D Guo
Information Sciences 394, 123-140, 2017
322017
A mulitiprocess mechanism of evading behavior-based bot detection approaches
Y Ji, Y He, D Zhu, Q Li, D Guo
Information Security Practice and Experience: 10th International Conference …, 2014
312014
Stopping the cyberattack in the early stage: assessing the security risks of social network users
B Feng, Q Li, Y Ji, D Guo, X Meng
Security and Communication Networks 2019 (1), 3053418, 2019
292019
SIoTFog: Byzantine-resilient IoT fog networking
J Xu, K Ota, M Dong, A Liu, Q Li
Frontiers of information technology & electronic engineering 19 (12), 1546-1557, 2018
292018
BTS: A blockchain-based trust system to deter malicious data reporting in intelligent Internet of Things
T Li, W Liu, A Liu, M Dong, K Ota, NN Xiong, Q Li
IEEE Internet of Things Journal 9 (22), 22327-22342, 2021
282021
Discovering suspicious APT families through a large-scale domain graph in information-centric IoT
Z Ma, Q Li, X Meng
IEEE Access 7, 13917-13926, 2019
272019
Towards fast and lightweight spam account detection in mobile social networks through fog computing
J Zhang, Q Li, X Wang, B Feng, D Guo
Peer-to-Peer Networking and Applications 11, 778-792, 2018
262018
Less‐Coordinated Atomic Copper‐Dimer Boosted Carbon–Carbon Coupling During Electrochemical CO2 Reduction
K Yang, Y Sun, S Chen, M Li, M Zheng, L Ma, W Fan, Y Zheng, Q Li, ...
Small 19 (36), 2301536, 2023
252023
Discovering unknown advanced persistent threat using shared features mined by neural networks
L Shang, D Guo, Y Ji, Q Li
Computer Networks 189, 107937, 2021
232021
Detecting mobile advanced persistent threats based on large-scale DNS logs
Z Xiang, D Guo, Q Li
Computers & Security 96, 101933, 2020
232020
BPT: A blockchain-based privacy information preserving system for trust data collection over distributed mobile-edge network
T Li, W Liu, S Xie, M Dong, K Ota, NN Xiong, Q Li
IEEE Internet of Things Journal 9 (11), 8036-8052, 2021
212021
The system can't perform the operation now. Try again later.
Articles 1–20