2024
MRFM: A timely detection method for DDoS attacks in IoT with multidimensional reconstruction and function mapping.
Comput. Stand. Interfaces, 2024
2023
A Multi-scene Webpage Fingerprinting Method Based on Multi-head Attention and Data Enhancement.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
2022
Network security situation assessment with network attack behavior classification.
Int. J. Intell. Syst., 2022
DRICP: Defect Risk Identification Using Sample Category Perception.
Proceedings of the IEEE International Conference on Trust, 2022
A Defect Heterogeneous Risk Assessment Method with Misclassification Cost.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2022
A Defect Level Assessment Method Based on Weighted Probability Ensemble.
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022
A Multi-stage APT Attack Detection Method Based on Sample Enhancement.
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022
2021
Comprehensive Degree Based Key Node Recognition Method in Complex Networks.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
2020
A Security Situation Assessment Model of Information System for Smart Mobile Devices.
Wirel. Commun. Mob. Comput., 2020
A Key Business Node Identification Model for Internet of Things Security.
Secur. Commun. Networks, 2020
Mitigating LFA through segment rerouting in IoT environment with traceroute flow abnormality detection.
J. Netw. Comput. Appl., 2020
Analysis Model of Node Failures and Impact for AANET.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020
A Key Business Node Identification Model for Business Process Based on AE-VIKOR Method.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020
2019
Blockchain-Based Secure and Trustworthy Internet of Things in SDN-Enabled 5G-VANETs.
IEEE Access, 2019
Mitigating Link-Flooding Attack with Segment Rerouting in SDN.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
2018
New Multi-Keyword Ciphertext Search Method for Sensor Network Cloud Platforms.
Sensors, 2018
Topology Control Algorithm and Channel Allocation Algorithm Based on Load Balancing in Wireless Sensor Network.
Ad Hoc Sens. Wirel. Networks, 2018
Dynamic Risk Access Control Model for Cloud Platform.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
2017
A self-adaptive chaos and Kalman filter-based particle swarm optimization for economic dispatch problem.
Soft Comput., 2017
2016
虚拟分组撤销策略的云存储访问控制模型 (Virtual Group Revocation Policy-based Cloud Storage Access Control Model).
计算机科学, 2016
Multi-objective Brain Storm Optimization Based on Estimating in Knee Region and Clustering in Objective-Space.
Proceedings of the Advances in Swarm Intelligence, 7th International Conference, 2016
2015
An Adaptive Brain Storm Optimization Algorithm for Multiobjective Optimization Problems.
Proceedings of the Advances in Swarm and Computational Intelligence, 2015
2014
A Modified Multi-Objective Optimization Based on Brain Storm Optimization Algorithm.
Proceedings of the Advances in Swarm Intelligence - 5th International Conference, 2014
Modified Brain Storm Optimization Algorithm for Multimodal Optimization.
Proceedings of the Advances in Swarm Intelligence - 5th International Conference, 2014
2013
Research on Security Evaluation of XML Communication Protocol.
J. Softw., 2013
Network Security Risk Assessment Based on Attack Graph.
J. Comput., 2013
Using information theory to measure call site information of system call in anomaly detection.
Proceedings of the 15th IEEE International Conference on Communication Technology, 2013
2008
A New Approach to Network Anomaly Attack Detection.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008