2025
TAMT: Privacy-Preserving Task Assignment With Multi-Threshold Range Search for Spatial Crowdsourcing Applications.
IEEE Trans. Big Data, February, 2025
2024
FSMFLog: Discovering Anomalous Logs Combining Full Semantic Information and Multifeature Fusion.
IEEE Internet Things J., February, 2024
AN-GCN: An Anonymous Graph Convolutional Network Against Edge-Perturbing Attacks.
IEEE Trans. Neural Networks Learn. Syst., January, 2024
Joint Power and Coverage Control of Massive UAVs in Post-Disaster Emergency Networks: An Aggregative Game-Theoretic Learning Approach.
,
,
,
,
,
,
,
,
,
,
,
IEEE Trans. Netw. Sci. Eng., 2024
HomeSentinel: Intelligent Anti-Fingerprinting for IoT Traffic in Smart Homes.
IEEE Trans. Inf. Forensics Secur., 2024
Chaos-Based Index-of-Min Hashing Scheme for Cancellable Biometrics Security.
IEEE Trans. Inf. Forensics Secur., 2024
KMSQ: Efficient and Privacy-Preserving Keyword-Oriented Multidimensional Similarity Query in eHealthcare.
IEEE Internet Things J., 2024
FedRFC: Federated Learning with Recursive Fuzzy Clustering for improved non-IID data training.
Future Gener. Comput. Syst., 2024
Multi-Pair Temporal Sentence Grounding via Multi-Thread Knowledge Transfer Network.
CoRR, 2024
Grimm: A Plug-and-Play Perturbation Rectifier for Graph Neural Networks Defending against Poisoning Attacks.
CoRR, 2024
A robust Wide & Deep learning framework for log-based anomaly detection.
Appl. Soft Comput., 2024
Enhanced Tensorial Self-representation Subspace Learning for Incomplete Multi-view Clustering.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
A Cooperative Differential Evolution Based Intrusion Detection System for Unknown Cyberattacks.
Proceedings of the IEEE INFOCOM 2024, 2024
A Robust Malicious Traffic Detection Framework with Low-quality Labeled Data.
Proceedings of the IEEE International Conference on Communications, 2024
GraphCyber: Identifying IP Usage Scenarios for Cyberspace Mapping.
Proceedings of the IEEE International Conference on Communications, 2024
Towards Inductive Robustness: Distilling and Fostering Wave-Induced Resonance in Transductive GCNs against Graph Adversarial Attacks.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
EPPSQ: Achieving efficient and privacy-preserving statistics queries over encrypted data in smart grids.
Future Gener. Comput. Syst., December, 2023
Artificial immunity based distributed and fast anomaly detection for Industrial Internet of Things.
Future Gener. Comput. Syst., November, 2023
An artificial immunity based intrusion detection system for unknown cyberattacks.
Appl. Soft Comput., November, 2023
Fast Attack Detection Method for Imbalanced Data in Industrial Cyber-Physical Systems.
J. Artif. Intell. Soft Comput. Res., October, 2023
Incentive-Based Federated Learning for Digital-Twin-Driven Industrial Mobile Crowdsensing.
IEEE Internet Things J., October, 2023
$\bm {P}^{\bm {3}}$: Privacy-Preserving Prediction of Real-Time Energy Demands in EV Charging Networks.
IEEE Trans. Ind. Informatics, March, 2023
A Novel Generation Method for Diverse Privacy Image Based on Machine Learning.
Comput. J., March, 2023
Defending Byzantine attacks in ensemble federated learning: A reputation-based phishing approach.
Future Gener. Comput. Syst., 2023
Graph Agent Network: Empowering Nodes with Decentralized Communications Capabilities for Adversarial Resilience.
CoRR, 2023
Sufficient Control of Complex Networks.
CoRR, 2023
FedCliP: Federated Learning with Client Pruning.
CoRR, 2023
Fuzzing Logical Bugs in eBPF Verifier with Bound-Violation Indicator.
Proceedings of the IEEE International Conference on Communications, 2023
A Lightweight Few-Shot Attack Detection Scheme for Industrial Cognitive Radio Networks.
Proceedings of the IEEE Global Communications Conference, 2023
Threat-Aware Data Transmission in Software-Defined Networks.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023
2022
Federated Anomaly Detection on System Logs for the Internet of Things: A Customizable and Communication-Efficient Approach.
IEEE Trans. Netw. Serv. Manag., 2022
FEEL: Federated End-to-End Learning With Non-IID Data for Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., 2022
Two-Tier NOMA-Based Wireless Powered Communication Networks.
IEEE Syst. J., 2022
Attacker Traceability on Ethereum through Graph Analysis.
Secur. Commun. Networks, 2022
Resource Provisioning for Mitigating Edge DDoS Attacks in MEC-Enabled SDVN.
IEEE Internet Things J., 2022
BBNP: A Blockchain-Based Novel Paradigm for Fair and Secure Smart Grid Communications.
IEEE Internet Things J., 2022
MEMBER: A multi-task learning model with hybrid deep features for network intrusion detection.
Comput. Secur., 2022
MSCCS: A Monero-based security-enhanced covert communication system.
Comput. Networks, 2022
IDROP: Intelligently detecting Return-Oriented Programming using real-time execution flow and LSTM.
Proceedings of the IEEE International Conference on Trust, 2022
User Behavior Simulation in ICS Cyber Ranges.
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022
Incentive and Knowledge Distillation Based Federated Learning for Cross-Silo Applications.
Proceedings of the IEEE INFOCOM 2022, 2022
LogTracer: Efficient Anomaly Tracing Combining System Log Detection and Provenance Graph.
Proceedings of the IEEE Global Communications Conference, 2022
2021
DeepFed: Federated Deep Learning for Intrusion Detection in Industrial Cyber-Physical Systems.
IEEE Trans. Ind. Informatics, 2021
Privacy-Preserving Aggregation for Federated Learning-Based Navigation in Vehicular Fog.
IEEE Trans. Ind. Informatics, 2021
SP-SMOTE: A novel space partitioning based synthetic minority oversampling technique.
Knowl. Based Syst., 2021
A novel privacy preserving data aggregation scheme with data integrity and fault tolerance for smart grid communications.
Frontiers Comput. Sci., 2021
JSContana: Malicious JavaScript detection using adaptable context analysis and key feature extraction.
Comput. Secur., 2021
An immune-based risk assessment method for digital virtual assets.
Comput. Secur., 2021
HD-NSA: A real-valued negative selection algorithm based on hierarchy division.
Appl. Soft Comput., 2021
FLPhish: Reputation-based Phishing Byzantine Defense in Ensemble Federated Learning.
Proceedings of the IEEE Symposium on Computers and Communications, 2021
Locating False Data Injection Attacks on Smart Grids Using D-FACTS Devices.
Proceedings of the Service-Oriented Computing - 19th International Conference, 2021
FS-IDS: A Novel Few-Shot Learning Based Intrusion Detection System for SCADA Networks.
Proceedings of the ICC 2021, 2021
On Secure and Efficient Data Sharing for Smart Grids: An Anti-Collusion Scheme.
Proceedings of the ICC 2021, 2021
Achieving Blockchain-based Privacy-Preserving Location Proofs under Federated Learning.
Proceedings of the ICC 2021, 2021
Honeypot-Enabled Optimal Defense Strategy Selection for Smart Grids.
Proceedings of the IEEE Global Communications Conference, 2021
FedVANET: Efficient Federated Learning with Non-IID Data for Vehicular Ad Hoc Networks.
Proceedings of the IEEE Global Communications Conference, 2021
2020
Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems
Wireless Networks, Springer, ISBN: 978-3-030-58671-3, 2020
On Feasibility and Limitations of Detecting False Data Injection Attacks on Power Grid State Estimation Using D-FACTS Devices.
IEEE Trans. Ind. Informatics, 2020
Toward efficient and effective bullying detection in online social network.
Peer-to-Peer Netw. Appl., 2020
Anti-Honeypot Enabled Optimal Attack Strategy for Industrial Cyber-Physical Systems.
IEEE Open J. Comput. Soc., 2020
Adaptive consensus for heterogeneous multi-agent systems under sensor and actuator attacks.
Autom., 2020
Semi-Supervised Malware Clustering Based on the Weight of Bytecode and API.
IEEE Access, 2020
Classification of Malware Variant Based on Ensemble Learning.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
ReAL: A New ResNet-ALSTM Based Intrusion Detection System for the Internet of Energy.
Proceedings of the 45th IEEE Conference on Local Computer Networks, 2020
2019
On Reliability Analysis of Smart Grids under Topology Attacks: A Stochastic Petri Net Approach.
ACM Trans. Cyber Phys. Syst., 2019
Efficient privacy-preserving data merging and skyline computation over multi-source encrypted data.
Inf. Sci., 2019
Towards insider threats detection in smart grid communication systems.
IET Commun., 2019
Security and Efficiency Enhanced Revocable Access Control for Fog-Based Smart Grid System.
IEEE Access, 2019
2018
State Estimation Based Energy Theft Detection Scheme with Privacy Preservation in Smart Grid.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
PAMA: A Proactive Approach to Mitigate False Data Injection Attacks in Smart Grids.
Proceedings of the IEEE Global Communications Conference, 2018
2017
Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system.
J. Parallel Distributed Comput., 2017
HMM-Based Fast Detection of False Data Injections in Advanced Metering Infrastructure.
Proceedings of the 2017 IEEE Global Communications Conference, 2017
2016
DDOA: A Dirichlet-Based Detection Scheme for Opportunistic Attacks in Smart Grid Cyber-Physical System.
IEEE Trans. Inf. Forensics Secur., 2016
BLITHE: Behavior Rule-Based Insider Threat Detection for Smart Grid.
IEEE Internet Things J., 2016