Follow
Lv Qiujian
Lv Qiujian
Unknown affiliation
Verified email at iie.ac.cn
Title
Cited by
Cited by
Year
Big data driven hidden Markov model based individual mobility prediction at points of interest
Q Lv, Y Qiao, N Ansari, J Liu, J Yang
IEEE Transactions on Vehicular Technology 66 (6), 5204-5216, 2016
1542016
A novel deep framework for dynamic malware detection based on API sequence intrinsic features
C Li, Q Lv, N Li, Y Wang, D Sun, Y Qiao
Computers & Security 116, 102686, 2022
502022
DMalNet: Dynamic malware analysis based on API feature engineering and graph learning
C Li, Z Cheng, H Zhu, L Wang, Q Lv, Y Wang, N Li, D Sun
Computers & Security 122, 102872, 2022
262022
Risk prediction for imbalanced data in cyber security: a Siamese network-based deep learning classification framework
D Sun, Z Wu, Y Wang, Q Lv, B Hu
2019 international joint conference on neural networks (IJCNN), 1-8, 2019
212019
Hidden Markov Model based user mobility analysis in LTE network
Q Lv, Z Mei, Y Qiao, Y Zhong, Z Lei
2014 International Symposium on wireless personal multimedia communications …, 2014
202014
A few-shot class-incremental learning approach for intrusion detection
T Wang, Q Lv, B Hu, D Sun
2021 International Conference on Computer Communications and Networks (ICCCN …, 2021
192021
A hybrid model based on multi-dimensional features for insider threat detection
B Lv, D Wang, Y Wang, Q Lv, D Lu
Wireless Algorithms, Systems, and Applications: 13th International …, 2018
172018
Itdbert: Temporal-semantic representation for insider threat detection
W Huang, H Zhu, C Li, Q Lv, Y Wang, H Yang
2021 IEEE Symposium on Computers and Communications (ISCC), 1-7, 2021
152021
Towards a user and role-based behavior analysis method for insider threat detection
Q Lv, Y Wang, L Wang, D Wang
2018 international conference on network infrastructure and digital content …, 2018
132018
CVSS-based multi-factor dynamic risk assessment model for network system
T Wang, Q Lv, B Hu, D Sun
2020 IEEE 10th International Conference on Electronics Information and …, 2020
102020
Linking virtual identities across service domains: An online behavior modeling approach
Y Wu, Q Lv, Y Qiao, J Yang
2017 International Conference on Intelligent Environments (IE), 122-129, 2017
72017
Heat-supply of thermal power plant in wind-heat conflict
Q Lv, B Hu, H Wang, N Zhang, L Liu
Electric Power Automation Equipment 36 (7), 236-244, 2017
72017
Anomaly detection in unstructured logs using attention-based Bi-LSTM network
D Yu, X Hou, C Li, Q Lv, Y Wang, N Li
2021 7th IEEE International Conference on Network Intelligence and Digital …, 2021
62021
Measuring geospatial properties: Relating online content browsing behaviors to users’ points of interest
Q Lv, Y Qiao, Y Zhang, FB Abdesslem, W Lin, J Yang
Wireless Personal Communications 101, 1469-1498, 2018
62018
Density weighted diversity based query strategy for active learning
T Wang, X Zhao, Q Lv, B Hu, D Sun
2021 IEEE 24th International Conference on Computer Supported Cooperative …, 2021
52021
Improving mobility prediction performance with state based prediction method when the user departs from routine
A Li, Q Lv, Y Qiao, J Yang
2016 IEEE International Conference on Big Data Analysis (ICBDA), 1-7, 2016
52016
Spatial and temporal mobility analysis in LTE mobile network
Q Lv, Y Di, Y Qiao, Z Lei, C Dong
2015 IEEE Wireless Communications and Networking Conference (WCNC), 795-800, 2015
52015
Kairos:: Practical Intrusion Detection and Investigation using Whole-system Provenance
Z Cheng, Q Lv, J Liang, Y Wang, D Sun, T Pasquier, X Han
arXiv preprint arXiv:2308.05034, 2023
42023
Cyevent2vec: Attributed heterogeneous information network based event embedding framework for cyber security events analysis
X Ma, L Wang, Q Lv, Y Wang, Q Zhang, J Jiang
2022 International Joint Conference on Neural Networks (IJCNN), 01-08, 2022
42022
MMSP: A LSTM Based Framework for Multi-Step Attack Prediction in Mixed Scenarios
Z Cheng, D Sun, L Wang, Q Lv, Y Wang
2022 IEEE Symposium on Computers and Communications (ISCC), 1-6, 2022
22022
The system can't perform the operation now. Try again later.
Articles 1–20