A Novel Way to Generate Adversarial Network Traffic Samples against Network Traffic Classification.
Wirel. Commun. Mob. Comput., 2021
CP-ABE-Based Secure and Verifiable Data Deletion in Cloud.
Secur. Commun. Networks, 2021
A Novel Attack-and-Defense Signaling Game for Optimal Deceptive Defense Strategy Choice.
Wirel. Commun. Mob. Comput., 2020
A Risk Analysis Framework for Social Engineering Attack Based on User Profiling.
J. Organ. End User Comput., 2020
An Insider Threat Detection Method Based on Business Process Mining.
Int. J. Bus. Data Commun. Netw., 2017
大数据环境下威胁的协作式检测综述 (Review of Collaborative Detection of Threat in Big Data).
计算机科学, 2016
Business Process Mining based Insider Threat Detection System.
Proceedings of the Advances on P2P, 2016
PRIAM: Privacy Preserving Identity and Access Management Scheme in Cloud.
KSII Trans. Internet Inf. Syst., 2014
Key-Policy Weighted Attribute based Encryption for fine-grained access control.
Proceedings of the IEEE International Conference on Communications, 2014
Ciphertext-Policy Weighted Attribute Based Encryption for Fine-Grained Access Control.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
TNC-eSA: An Echanced Security Access Solution to Office Networks.
Proceedings of the Information Computing and Applications - Third International Conference, 2012
A TNC Protocol for 3GPP-WLAN Integrated Environment.
Proceedings of the Information Computing and Applications - Third International Conference, 2012