Poison-Resilient Anomaly Detection: Mitigating Poisoning Attacks in Semi-Supervised Encrypted Traffic Anomaly Detection.
IEEE Trans. Netw. Sci. Eng., 2024
Attack detection based on invariant state set for SDN-enabled vehicle platoon control system.
Veh. Commun., 2022
Federated learning based multi-task feature fusion framework for code expressive semantic extraction.
Softw. Pract. Exp., 2022
CVDF DYNAMIC - A Dynamic Fuzzy Testing Sample Generation Framework Based on BI-LSTM and Genetic Algorithm.
Sensors, 2022
An Improved Selection Method Based on Crowded Comparison for Multi-Objective Optimization Problems in Intelligent Computing.
Mob. Networks Appl., 2022
IFAttn: Binary code similarity analysis based on interpretable features with attention.
Comput. Secur., 2022
Function-level obfuscation detection method based on Graph Convolutional Networks.
J. Inf. Secur. Appl., 2021
Security of multimedia communication with game trick based fast, efficient, and robust color-/gray-scale image encryption algorithm.
Trans. Emerg. Telecommun. Technol., 2021
Using IRP and local alignment method to detect distributed malware.
Comput. Secur., 2021
Deep Learning-Based Reverse Method of Binary Protocol.
Proceedings of the Security and Privacy in Digital Economy, 2020
An online log template extraction method based on hierarchical clustering.
EURASIP J. Wirel. Commun. Netw., 2019
nLSALog: An Anomaly Detection Framework for Log Sequence in Security Management.
IEEE Access, 2019
An Optimized Static Propositional Function Model to Detect Software Vulnerability.
IEEE Access, 2019
SMASH: A Malware Detection Method Based on Multi-Feature Ensemble Learning.
IEEE Access, 2019
A malware classification method based on memory dump grayscale image.
Digit. Investig., 2018