Follow
Qingjia Huang
Qingjia Huang
中国科学院信息工程研究所
Verified email at iie.ac.cn
Title
Cited by
Cited by
Year
Clustering approach based on mini batch kmeans for intrusion detection system over big data
K Peng, VCM Leung, Q Huang
IEEE access 6, 11897-11906, 2018
2492018
Cost-efficient task scheduling for executing large programs in the cloud
S Su, J Li, Q Huang, X Huang, K Shuang, J Wang
Parallel Computing 39 (4-5), 177-188, 2013
2112013
Enhanced energy-efficient scheduling for parallel applications in cloud
Q Huang, S Su, J Li, P Xu, K Shuang, X Huang
2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2012
1472012
A survey on mobile edge computing: Focusing on service adoption and provision
K Peng, V Leung, X Xu, L Zheng, J Wang, Q Huang
Wireless Communications and Mobile Computing 2018, 2018
1152018
Cost-conscious scheduling for large graph processing in the cloud
J Li, S Su, X Cheng, Q Huang, Z Zhang
2011 IEEE international conference on high performance computing and …, 2011
1022011
Using multi-features and ensemble learning method for imbalanced malware classification
Y Zhang, Q Huang, X Ma, Z Yang, J Jiang
2016 IEEE Trustcom/BigDataSE/ISPA, 965-973, 2016
692016
Prediction-based dynamic resource scheduling for virtualized cloud systems
Q Huang, K Shuang, P Xu, J Li, X Liu, S Su
Journal of Networks 9 (2), 375, 2014
512014
Reducing operational costs through consolidation with resource prediction in the cloud
J Li, K Shuang, S Su, Q Huang, P Xu, X Cheng, J Wang
2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2012
412012
Migration-based elastic consolidation scheduling in cloud data center
Q Huang, S Su, S Xu, J Li, P Xu, K Shuang
2013 IEEE 33rd International Conference on Distributed Computing Systems …, 2013
312013
Based on multi-features and clustering ensemble method for automatic malware categorization
Y Zhang, C Rong, Q Huang, Y Wu, Z Yang, J Jiang
2017 IEEE Trustcom/BigDataSE/ICESS, 73-82, 2017
262017
A comprehensive study of co-residence threat in multi-tenant public paas clouds
W Zhang, X Jia, C Wang, S Zhang, Q Huang, M Wang, P Liu
Information and Communications Security: 18th International Conference …, 2016
222016
Enhanced energy-efficient scheduling for parallel tasks using partial optimal slacking
S Su, Q Huang, J Li, X Cheng, P Xu, K Shuang
The Computer Journal 58 (2), 246-257, 2015
222015
Energy-and resource-aware computation offloading for complex tasks in edge environment
K Peng, B Zhao, S Xue, Q Huang
Complexity 2020, 1-14, 2020
132020
Security-aware computation offloading for mobile edge computing-enabled smart city
K Peng, P Liu, P Tao, Q Huang
Journal of Cloud Computing 10 (1), 47, 2021
82021
Findevasion: an effective environment-sensitive malware detection system for the cloud
X Jia, G Zhou, Q Huang, W Zhang, D Tian
Digital Forensics and Cyber Crime: 9th International Conference, ICDF2C 2017 …, 2018
82018
A light-weight and accurate method of static integer-overflow-to-buffer-overflow vulnerability detection
M Xu, S Li, L Xu, F Li, W Huo, J Ma, X Li, Q Huang
Information Security and Cryptology: 14th International Conference, Inscrypt …, 2019
62019
Non-transferable blockchain-based identity authentication
Y Fu, J Shao, Q Huang, Q Zhou, H Feng, X Jia, R Wang, W Feng
Peer-to-Peer Networking and Applications 16 (3), 1354-1364, 2023
52023
ET-GAN: cross-language emotion transfer based on cycle-consistent generative adversarial networks
X Jia, J Tai, H Zhou, Y Li, W Zhang, H Du, Q Huang
arXiv preprint arXiv:1905.11173, 2019
52019
Seef-aldr: A speaker embedding enhancement framework via adversarial learning based disentangled representation
J Tai, X Jia, Q Huang, W Zhang, H Du, S Zhang
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
42020
Using the Rgb Image of Machine Code to Classify the Malware
J Chen, X Jia, C Zhao, W Zhang, Q Huang
2020 IEEE 5th International Conference on Cloud Computing and Big Data …, 2020
22020
The system can't perform the operation now. Try again later.
Articles 1–20