2024
Coordinated cyber-physical attacks based on different attack strategies for cascading failure analysis in smart grids.
Wirel. Networks, July, 2024
Cooperative Adaptive Fault-Tolerant Braking Control for Urban Rail Trains with Prescribed Performance.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2024
2023
Passive GNSS-based SAR imaging with sub-apertures combination.
Signal Image Video Process., July, 2023
2022
A Novel Dynamic Channel Assembling Strategy in Cognitive Radio Networks With Fine-Grained Flow Classification.
IEEE Internet Things J., 2022
2021
Social Collective Attack Model and Procedures for Large-Scale Cyber-Physical Systems.
Sensors, 2021
A Self-Powered Hybrid SSHI Circuit with a Wide Operation Range for Piezoelectric Energy Harvesting.
Sensors, 2021
Quantitative cyber-physical security analysis methodology for industrial control systems based on incomplete information Bayesian game.
Comput. Secur., 2021
CPMTD: Cyber-physical moving target defense for hardening the security of power system against false data injected attack.
Comput. Secur., 2021
Network-based multidimensional moving target defense against false data injection attack in power system.
Comput. Secur., 2021
Decimetre Level Range Resolution for Beidou B3I Signal-Based Passive SAR Imaging - Proof-of-Concept Experimental Demonstrations.
IEEE Access, 2021
A Self-Powered Multi-Input Bridgeless Series-SSHI Circuit for Piezoelectric Energy Harvesting.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2021
2020
High resolution for software-defined GPS-based SAR imaging using waveform-modulated range-compressed pulse: field experimental demonstration.
Signal Image Video Process., 2020
Enhanced Passive GNSS-Based Radar Imaging Based on Coherent Integrated Multi-Satellite Signals.
Sensors, 2020
An RBF-ARX Model-Based Variable-Gain Feedback RMPC Algorithm.
IEEE Access, 2020
Integrated Defense Mechanism Based on Attack Goals against Three Attack Strategies in Smart Grid.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Multi-dimensional Security Risk Assessment Model Based on Three Elements in the IoT System.
Proceedings of the 9th IEEE/CIC International Conference on Communications in China, 2020
2019
EPLC: An Efficient Privacy-Preserving Line-Loss Calculation Scheme for Residential Areas of Smart Grid.
Secur. Commun. Networks, 2019
6Tree: Efficient dynamic discovery of active addresses in the IPv6 address space.
Comput. Networks, 2019
A Privacy-Preserving and Identity-Based Personalized Recommendation Scheme for Encrypted Tasks in Crowdsourcing.
IEEE Access, 2019
2018
False Data Injection Attack Based on Hyperplane Migration of Support Vector Machine in Transmission Network of the Smart Grid.
Symmetry, 2018
Influence of Different Coupling Modes on the Robustness of Smart Grid under Targeted Attack.
Sensors, 2018
Critical Nodes Identification of Power Grids Based on Network Efficiency.
IEICE Trans. Inf. Syst., 2018
Successive direct load altering attack in smart grid.
Comput. Secur., 2018
Degrading Detection Performance of Wireless IDSs Through Poisoning Feature Selection.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018
Cross-Layer Attack Path Exploration for Smart Grid Based on Knowledge of Target Network.
Proceedings of the Knowledge Science, Engineering and Management, 2018
Context based Detections against Legal False Price Data and Malicious Disconnect Commands in Smart Grid.
Proceedings of the 18th International Conference on Computational Science and Applications, 2018
Cascading Failure Based on Load Redistribution of a Smart Grid with Different Coupling Modes.
Proceedings of the Computational Science - ICCS 2018, 2018
2017
Trust on the Ratee: A Trust Management System for Social Internet of Vehicles.
Wirel. Commun. Mob. Comput., 2017
Command Disaggregation Attack and Mitigation in Industrial Internet of Things.
Sensors, 2017
An experimental study: An interpretative division method on principal component analysis.
J. Intell. Fuzzy Syst., 2017
Modeling cyber-physical attacks based on probabilistic colored Petri nets and mixed-strategy game theory.
Int. J. Crit. Infrastructure Prot., 2017
Parallelization of skyline probability computation over uncertain preferences.
Concurr. Comput. Pract. Exp., 2017
Parallelization of group-based skyline computation for multi-core processors.
Concurr. Comput. Pract. Exp., 2017
Ratee-Based Trust Management System for Internet of Vehicles.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
Multidimensional Trust-Based Anomaly Detection System in Internet of Things.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
Enhance the robustness of cyber-physical systems by adding interdependency.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017
Load Scheduling of Thermostatical House-Hold Appliances Against Abrupt Changes in Smart Grid.
Proceedings of the 10th International Symposium on Computational Intelligence and Design, 2017
An Interweaved Time Series Locally Connected Recurrent Neural Network Model on Crime Forecasting.
Proceedings of the Neural Information Processing - 24th International Conference, 2017
Top-k Skyline Groups Queries.
Proceedings of the 20th International Conference on Extending Database Technology, 2017
An effective semi-supervised model for intrusion detection using feature selection based LapSVM.
Proceedings of the International Conference on Computer, 2017
Computing skyline groups: an experimental evaluation.
Proceedings of the ACM Turing 50th Celebration Conference, 2017
2016
Using Trust of Social Ties for Recommendation.
IEICE Trans. Inf. Syst., 2016
Securing Power System State Estimation.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Cooperation Stimulation and Security in Wireless Ad Hoc Networks - A Power-Efficient Bayesian Game Approach.
Proceedings of the 24th IEEE International Symposium on Modeling, 2016
Intrusion detection in SCADA systems by traffic periodicity and telemetry analysis.
Proceedings of the IEEE Symposium on Computers and Communication, 2016
Discovering Multi-type Correlated Events with Time Series for Exception Detection of Complex Systems.
Proceedings of the IEEE International Conference on Data Mining Workshops, 2016
2015
A Collaborative Intrusion Detection Mechanism Against False Data Injection Attack in Advanced Metering Infrastructure.
IEEE Trans. Smart Grid, 2015
Modeling and Evaluating Information Diffusion for Spam Detection in Micro-blogging Networks.
KSII Trans. Internet Inf. Syst., 2015
Preserving the Privacy of Social Recommendation with a Differentially Private Approach.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015
Matrix Factorization Approach Based on Temporal Hierarchical Dirichlet Process.
Proceedings of the Intelligence Science and Big Data Engineering. Big Data and Machine Learning Techniques, 2015
Social recommendation using quantified social tie strength.
Proceedings of the Seventh International Conference on Advanced Computational Intelligence, 2015
Preserving network privacy with a hierarchical structure approach.
Proceedings of the 12th International Conference on Fuzzy Systems and Knowledge Discovery, 2015
2014
SocAware: A Middleware for Social Applications in Online Social Networks.
Proceedings of the 13th IEEE International Conference on Trust, 2014
Keep the Fakes Out: Defending Against Sybil Attack in P2P Systems.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
2013
A layered encryption mechanism for networked critical infrastructures.
IEEE Netw., 2013
Worm Detection without Knowledge Base in Industrial Networks.
J. Commun., 2013
Scaling Inter-domain Routing System via Path Exploration Aggregation.
KSII Trans. Internet Inf. Syst., 2013
Secure process control system of industrial networks.
Proceedings of the 15th IEEE International Conference on Communication Technology, 2013
Unveil the Spams in Weibo.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013
CBSTM: Cloud-based Behavior Similarity Transmission Method to Detect Industrial Worms.
Proceedings of the 2013 The Second International Conference on Innovative Computing and Cloud Computing, 2013
2012
AS Alliance based security enhancement for inter-domain routing protocol.
Math. Comput. Model., 2012
Shedding light on the use of AS relationships for path inference.
J. Commun. Networks, 2012
A Systematic Approach to Evaluating the Trustworthiness of the Internet Inter-Domain Routing Information.
IEICE Trans. Inf. Syst., 2012
2011
k-Fault tolerance of the Internet AS graph.
Comput. Networks, 2011
2010
On Evaluating BGP Routing Stress Attack.
J. Commun., 2010
EPSP: Enhancing Network Protocol with Social-Aware Plane.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010
2009
TTM Based Security Enhancement for Inter-domain Routing Protocol.
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009
A Packet-Based Anomaly Detection Model for Inter-domain Routing.
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009
An Alliance Based Reputation Model for Internet Autonomous System Trust Evaluation.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009
Routing Policy Conflict Detection without Violating ISP's Privacy.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
An Enhanced Router Topology Discovery Model.
Proceedings of the 7th Annual Conference on Communication Networks and Services Research, 2009
Reputation Mechanism for Inter-domain Routing Security Management.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009
2008
MASK: An efficient mechanism to extend inter-domain IP spoofing preventions.
Sci. China Ser. F Inf. Sci., 2008
The progress of the national first-rate course "computer networks" in NUDT.
Proceedings of the First ACM Summit on Computing Education in China, 2008
SEM: A Security Evaluation Model for Inter-domain Routing System in the Internet.
Proceedings of the IP Operations and Management, 8th IEEE International Workshop, 2008
Security Broadcast Based on Linear Network Coding in WSN.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008
ROUSSEAU: A Monitoring System for Inter-domain Routing Security.
Proceedings of the Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008), 2008
Cooperative Management Framework for Inter-domain Routing System.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008
AS Alliance in Inter-Domain Routing.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2007
Optimizing Network Configurations Based on Potential Profit Loss.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Credit based Fairness Control in Wireless Sensor Network.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Evaluating Internal BGP Networks from the Data Plane.
Proceedings of the NETWORKING 2007. Ad Hoc and Sensor Networks, 2007
A Stream-Data Oriented Secure Routing Protocol in Wireless Sensor Networks.
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007
A Framework for Congestion Control for Reliable Data Delivery in Wireless Sensor Networks.
Proceedings of the Integrated Network Management, 2007
Does the Average Path Length Grow in the Internet?.
Proceedings of the Information Networking. Towards Ubiquitous Networking and Services, 2007
PR-MAC: Path-Oriented Real-Time MAC Protocol for Wireless Sensor Network.
Proceedings of the Embedded Software and Systems, [Third] International Conference, 2007
A Delay Sensitive Feedback Control Data Aggregation Approach in Wireless Sensor Network.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007
On the Power-Law of the Internet and the Hierarchy of BGP Convergence.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2007
Research Algorithm Based on Ant-Cooperation for Grid Service.
Proceedings of the Grid and Cooperative Computing, 2007
Translator Trust for the Internet Inter-domain Routing.
Proceedings of the Future Generation Communication and Networking, 2007
Pricing Models of Inter-Domain Multicasting Applications.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007
An Effective Secure Routing for False Data Injection Attack in Wireless Sensor Network.
Proceedings of the Managing Next Generation Networks and Services, 2007
2006
Path Selection of Reliable Data Delivery in Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, 2006
A Fast Traffic Planning Algorithm in Lifetime Optimization of Sensor Networks.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006
Brief Announcement: A Synthetic Public Key Management Scheme for Large-Scale MANET.
Proceedings of the Stabilization, 2006
The Hierarchy of BGP Convergence on the Self-Organized Internet.
Proceedings of the 12th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2006), 2006
Reliable Data Delivery in Wireless Sensor Networks: An Energy-Efficient, Cluster-Based Approach.
Proceedings of the Next Generation Teletraffic and Wired/Wireless Advanced Networking, 2006
A practical pricing model of inter-domain multicasting based on game theory.
Proceedings of the 5th Workshop on Network and System Support for Games, 2006
BGPSep_S: An Algorithm for Constructing IBGP Configurations with Complete Visibility.
Proceedings of the Distributed Computing and Networking, 8th International Conference, 2006
BGPSep_D: An Improved Algorithm for Constructing Correct and Scalable IBGP Configurations Based on Vertexes Degree.
Proceedings of the High Performance Computing and Communications, 2006
Research on Self-Organized Evolution of P2P Network Structure.
Proceedings of the Grid and Cooperative Computing, 2006
Energy Efficient Multipath Routing Using Network Coding in Wireless Sensor Networks.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, 2006
A Diversity-Controllable Genetic Algorithm for Optimal Fused Traffic Planning on Sensor Networks.
Proceedings of the Advances in Computer Systems Architecture, 11th Asia-Pacific Conference, 2006
A Systematic Compression Approach for Route Tables in a BGP Monitor.
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006
2005
A New Price Mechanism Inducing Peers to Achieve Optimal Welfare.
Proceedings of the Networking, 2005
Fully-Distributed and Highly-Parallelized Implementation Model of BGP4 Based on Clustered Routers.
Proceedings of the Networking, 2005
LQPD: An Efficient Long Query Path Driven Replication Strategy in Unstructured P2P Network.
Proceedings of the Networking, 2005
ARS: An Synchronization Algorithm Maintaining Single Image Among Nodes' Forwarding Tables of Clustered Router.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005
An efficient random walks based approach to reducing file locating delay in unstructured P2P network.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005
Rule-Based Anomaly Detection of Inter-domain Routing System.
Proceedings of the Advanced Parallel Processing Technologies, 6th International Workshop, 2005
2004
Systematic Robustness-Testing RI-Pro of BGP.
Proceedings of the Parallel and Distributed Processing and Applications, 2004