Chase Qishi Wu
Chase Qishi Wu
Professor of Computer Science, New Jersey Institute of Technology
Verified email at - Homepage
Cited by
Cited by
A survey of game theory as applied to network security
S Roy, C Ellis, S Shiva, D Dasgupta, V Shandilya, Q Wu
2010 43rd Hawaii International Conference on System Sciences, 1-10, 2010
On computing mobile agent routes for data fusion in distributed sensor networks
Q Wu, NSV Rao, J Barhen, SS Iyenger, VK Vaishnavi, H Qi, ...
IEEE Transactions on Knowledge and Data Engineering 16 (6), 740-753, 2004
AVOIDIT: A cyber attack taxonomy
C Simmons, C Ellis, S Shiva, D Dasgupta, Q Wu
University of Memphis, Technical Report CS-09-003, 2009
An effective convolutional neural network based on SMOTE and Gaussian mixture model for intrusion detection in imbalanced dataset
H Zhang, L Huang, CQ Wu, Z Li
Computer Networks 177, 107315, 2020
Ultrascience net: Network testbed for large-scale science applications
NSV Rao, WR Wing, SM Carter, Q Wu
IEEE communications magazine 43 (11), S12-S17, 2005
End-to-end delay minimization for scientific workflows in clouds under budget constraint
CQ Wu, X Lin, D Yu, W Xu, L Li
IEEE Transactions on Cloud Computing 3 (2), 169-181, 2014
Performance modeling and workflow scheduling of microservice-based applications in clouds
L Bao, C Wu, X Bu, N Ren, M Shen
IEEE Transactions on Parallel and Distributed Systems 30 (9), 2114-2129, 2019
CHEETAH: Circuit-switched high-speed end-to-end transport architecture testbed
X Zheng, M Veeraraghavan, NSV Rao, Q Wu, M Zhu
IEEE Communications Magazine 43 (8), S11-S17, 2005
On efficient deployment of sensors on planar grid
Q Wu, NSV Rao, X Du, SS Iyengar, VK Vaishnavi
Computer Communications 30 (14-15), 2721-2734, 2007
An effective deep learning based scheme for network intrusion detection
H Zhang, CQ Wu, S Gao, Z Wang, Y Xu, Y Liu
2018 24th International Conference on Pattern Recognition (ICPR), 682-687, 2018
On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks
Q Wu, S Shiva, S Roy, C Ellis, V Datla
Proceedings of the 2010 spring simulation multiconference, 1-8, 2010
Fusion of threshold rules for target detection in wireless sensor networks
M Zhu, S Ding, Q Wu, RR Brooks, NSV Rao, SS Iyengar
ACM Transactions on Sensor Networks (TOSN) 6 (2), 1-7, 2010
Secure cell relay routing protocol for sensor networks
X Du, Y Xiao, HH Chen, Q Wu
Wireless Communications and Mobile Computing 6 (3), 375-391, 2006
On scientific workflow scheduling in clouds under budget constraint
X Lin, CQ Wu
2013 42nd International Conference on Parallel Processing, 90-99, 2013
Transferring compressive-sensing-based device-free localization across target diversity
J Wang, X Chen, D Fang, CQ Wu, Z Yang, T Xing
IEEE Transactions on Industrial Electronics 62 (4), 2397-2409, 2014
Control plane for advance bandwidth scheduling in ultra high-speed networks
NSV Rao, Q Wu, S Ding, SM Carter, WR Wing, A Banerjee, D Ghosal, ...
Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on …, 2006
On trust models for communication security in vehicular ad-hoc networks
N Fan, CQ Wu
Ad Hoc Networks 90, 101740, 2019
Supporting distributed application workflows in heterogeneous computing environments
Q Wu, Y Gu
2008 14th IEEE International Conference on Parallel and Distributed Systems …, 2008
Complexity analysis and algorithm design for advance bandwidth scheduling in dedicated networks
Y Lin, Q Wu
IEEE/ACM Transactions on Networking 21 (1), 14-27, 2012
A cost-effective scheduling algorithm for scientific workflows in clouds
M Zhu, Q Wu, Y Zhao
2012 ieee 31st international performance computing and communications …, 2012
The system can't perform the operation now. Try again later.
Articles 1–20