A Secure Ethernet Passive Optical Network Protocol for Industrial Internet of Things.
Proceedings of the 2024 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2024
UTPrompt: Cross-Task Backdoor Prompt Attacks Based on Universal Triggers.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024
Security in defect detection: A new one-pixel attack for fooling DNNs.
J. King Saud Univ. Comput. Inf. Sci., September, 2023
MIC: An Effective Defense Against Word-Level Textual Backdoor Attacks.
Proceedings of the Neural Information Processing - 30th International Conference, 2023
Evolving convolutional neural networks for intrusion detection system using hybrid multi-strategy aquila optimizer.
Proceedings of the GECCO '22: Genetic and Evolutionary Computation Conference, Companion Volume, Boston, Massachusetts, USA, July 9, 2022
Heuristic Network Security Risk Assessment Based on Attack Graph.
Proceedings of the Cloud Computing - 11th EAI International Conference, 2021
Complex-valued encoding metaheuristic optimization algorithm: A comprehensive survey.
Neurocomputing, 2020
A Complex-Valued Encoding Moth-Flame Optimization Algorithm for Global Optimization.
Proceedings of the Intelligent Computing Theories and Application, 2019
Two-Echelon Logistics Distribution Routing Optimization Problem Based on Colliding Bodies Optimization with Cue Ball.
Proceedings of the Intelligent Computing Theories and Application, 2018