1.Cheng Jieren, Liu Jingxin,Xu Xinbin,Xia Dongwan,Liu Le, Sheng Victor S. A review of Chinese named entity recognition,2021,Ksii Transactions On Internet And Information Systems,vol:15 ,no :6 ,pp :2012-2030(IF:0.858; 4区)
2.Khaled Riad,Jieren Cheng. Adaptive XACML Access Policies for Heterogeneous Distributed Iot Environments,2021,Information Sciences,vol: 548,pp: 135-152.(IF:6.795; 1区)
3.Lei Feifei,Cheng Jieren*, Yang Yue, Tang Xiangyan,Sheng Victor S, Huang Chunzao. Improving Heterogeneous Network Knowledge Transfer Based on the Principle of Generative Adversarial.2021,Electronics,vol:10 , no :13(IF:2.412; 3区)
4.Jieren Cheng, Jiachen Zheng, Xiaomei Yu. An Ensemble Framework for Interpretable Malicious Code Detection,International Journal Of Intelligent Systems,2020,DOI:10.1002/int.22310.(IF:10.312; 1区)
5.Jieren Cheng, Junqi Li, Xiangyan Tang. A Novel DDoS Attack Detection Method Using Optimized Generalized Multiple Kernel Learning.Computers, Materials and Continua, 2020, vol. 62, no. 3, pp. 1423-1443.(IF:4.89; 1区)
6.Jieren Cheng, Yue Yang, Xiangyan Tang, Naixue Xiong, Yuan Zhang, Feifei Lei. Generative Adversarial Networks: A Literature Review,KSII Transactionaaas On Internet And Information Systems,2020,vol: 14 no: 12 pp: 4625-4647.(IF:0.858; 4区)
7.Jieren Cheng, Luyi Xie, Xiangyan, Naixue Xiong, Boyi Liu. A Survey of Security Threats and Defense on Blockchain,Multimedia Tools And Applications,2020,DOI: 10.1007/s11042-020-09368-6.(IF:2.757; 2区)
8.Jieren Cheng, Jun Li, Naixue Xiong, Meizhu Chen, Hao Guo,Xinzhi Yao. Lightweight Mobile Clients Privacy Protection Using Trusted Execution Environments for Blockchain,2020,CMC-Computers Materials & Continua,vol: 65 ,no: 3 ,pp: 2247-2262.(IF:4.89; 1区)
9.Jun Li,Jieren Cheng*, Naixue Xiong, Lougao Zhan, Yuan Zhang. A Distributed Privacy Preservation Approach for Big Data in Public Health Emergencies Using Smart Contract and SGX,2020,CMC-Computers Materials & Continua,vol: 65 ,no: 1, pp: 723-741.(IF:4.89; 1区)
10.Jieren Cheng, Yifu Liu, Xiangyan Tang,Sheng, Victor, Mengyang Li, junqi Li. DDoS Attack Detection via Multi-scale Convolutional Neural Network.2020,Computers, Materials and Continua,vol: 62 no: 3 pp: 1317-1333.(IF:4.89; 1区)
11.Jieren Cheng,Canting Cai, Xiangyan Tang. A DDoS Attack Information Fusion Method based on CNN for Multi-element Data. Computers, Materials and Continua, 2020, vol. 63, no. 1, pp. 131-150.(IF:4.89; 1区)
12.Ruomeng Xu,Jieren Cheng*, Fengkai Wang, Xiangyan Tang, Jinying Xu. A DRDoS Detection and Defense Method Based on Deep Forest in the Big Data Environment,Symmetry-Basel,2019,vol: 11 no: 1,(IF:2.713; 2区)
13.Chen Zhang,JierenCheng*,XiangyanTang. Novel DDoS Feature Representation Model Combining Deep Belief Network and Canonical Correlation Analysis. Computers, Materials and Continua,2019, vol. 61, no. 2, pp. 657-675.(IF:4.89; 1区)
14.Cheng Jieren, Li Mengyang, Tang Xiangyan, Sheng Victor S., Liu Yifu, Guo Wei. Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing,2019,Security and Communication Networks,DOI: 10.1155/2019/6809054.(IF:1.791; 4区)
15.Liu, Yifu,Cheng Jieren*, Tang Xiangyan, Li Mengyang, Xie Luyi. Multi-view DDoS Network Flow Feature Extraction Method via Convolutional Neural Network,2019,Cyberspace Safety and Security, Pt II,vol: 11983,pp: 30-41.(SCI)
16.Zhang Ruizhi,Cheng Jieren, Tang Xiangyan, Liu Qiang, He Xiangfeng. DDoS Attack Security Situation Assessment Model Using Fusion Feature Based on Fuzzy C-Means Clustering Algorithm,2018,Cloud Computing and Security, Pt II,vol: 11064,pp: 654-669.(SCI)
17.Cheng Jieren, Zhou Jinghe, Liu Qiang, Tang Xiangyan, Guo Yanxiang. A DDoS Detection Method for Socially Aware Networking Based on Forecasting Fusion Feature Sequence,2018,Computer Journal,vol: 61 ,no: 7 pp: 959-970.(IF:1.494; 3区)
18.Cheng Jieren, Xu Ruomeng, Tang Xiangyan, Sheng Victor S, Cai Canting. An Abnormal Network Flow Feature Sequence Prediction Approach for DDoS Attacks Detection in Big Data Environment,2018,cmc-Computers Materials & Continua,vol: 55 ,no: 1 ,pp: 95-119.(IF:4.89; 1区; ESI高被引论文,前1%)
19.Cheng Jieren, Li Mengyang, Tang Xiangyan, Sheng Victor S., Liu Yifu, Guo Wei. Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing,2018,Security And Communication Networks,DOI: 10.1155/2018/6459326.(IF:1.791; 4区)
20.Cheng Jieren, Liu Boyi, Cai Kuanqi, Tang Xiangyan, Zhang Boyun. ETC Intelligent Navigation Path Planning Method,2018,Journal Of Internet Technology,vol:19,no: 2 ,pp: 619-631.(IF:1.93; 4区)
21.Cheng Jieren, Zhang Chen, Tang Xiangyan, Sheng Victor , Dong Zhe, Li Junqi. Adaptive DDoS Attack Detection Method Based on Multiple-Kernel Learning,2018,Security And Communication Networks,DOI: 10.1155/2018/5198685.(IF:1.791; 4区)
22.Cheng Jieren, Cai Kuanqi, Liu Boyi, Tang Xiangyan. Design and Test of the Intelligent Rubber Tapping Technology Evaluation Equipment Based on Cloud Model,2017,Cloud Computing And Security, Pt I,vol: 10602子辑: I.(SCI)
23.Liu Boyi,Cheng Jieren*, Cai Kuanqi,Shi Pengchao, Tang Xiangyan. Singular Point Probability Improve LSTM Network Performance for Long-term Traffic Flow Prediction,2017,Theoretical Computer Science, Nctcs 2017,vol: 768,pp: 328-340.(IF:0.827; 4区)
24.Chen Xuegang,Cheng Jieren*, Yin Jianping, Tang Xiangyan, Zhang Jialu. Characterization of Bipolar Information Aggregation and Decomposition,2016,Natural Computation, Fuzzy Systems and Knowledge Discovery, pp: 305-310.(SCI)
25.Cheng Jieren, Liu Boyi, Tang Xiangyan. A Traffic-Congestion Detection Method for Bad Weather Based on Traffic Video,2016,Intelligence Computation and Applications,vol: 575, pp: 506-518.(SCI)