2025
Causal Inference-Based Adversarial Domain Adaptation for Cross-Domain Industrial Intrusion Detection.
IEEE Trans. Ind. Informatics, January, 2025
Fast image reconstruction method using radial harmonic Fourier moments and its application in digital watermarking.
J. Frankl. Inst., 2025
2024
A Blockchain-Based Authentication Scheme for Energy Trading in Electric Transportation.
IEEE Trans. Smart Grid, November, 2024
Label-Only Membership Inference Attack Based on Model Explanation.
Neural Process. Lett., October, 2024
An n-Dimensional Chaotic Map with Application in Reversible Data Hiding for Medical Images.
Entropy, March, 2024
A secure fractal compression scheme based on irregular Latin square, Julia and 2D-FCICM.
Digit. Signal Process., 2024
TransferFuzz: Fuzzing with Historical Trace for Verifying Propagated Vulnerability Code.
CoRR, 2024
AutoFirm: Automatically Identifying Reused Libraries inside IoT Firmware at Large-Scale.
CoRR, 2024
Breaking Secure Aggregation: Label Leakage from Aggregated Gradients in Federated Learning.
Proceedings of the IEEE INFOCOM 2024, 2024
2023
Cross-Domain Industrial Intrusion Detection Deep Model Trained With Imbalanced Data.
IEEE Internet Things J., 2023
2022
Retransmission-Based TCP Fingerprints for Fine-Grain IoV Edge Device Identification.
IEEE Trans. Veh. Technol., 2022
Vulnerability association evaluation of Internet of thing devices based on attack graph.
Int. J. Distributed Sens. Networks, 2022
A series-connected asymmetrical PWM half-bridge three-level converter with reduced circulating current.
IEICE Electron. Express, 2022
An Asymmetrical PWM Full-bridge converter with Current-doubler Rectifier for Medium voltage applications.
Proceedings of the IEEE International Conference on Industrial Technology, 2022
Half-bridge integrated ZVS three-level DC-DC converter with Wide ZVS range and Reduced Circulting current.
Proceedings of the IEEE International Conference on Industrial Technology, 2022
2021
The Iot Malware Classification Method Based On Visual Local Features.
Proceedings of the ICNCC 2021: The 10th International Conference on Networks, Communication and Computing, Beijing, China, December 10, 2021
2020
A Time-efficient Multi-Protocol Probe Scheme for Fine-grain IoT Device Identification.
Sensors, 2020
Location-Aware Wi-Fi Authentication Scheme Using Smart Contract.
Sensors, 2020
Large-Scale IoT Devices Firmware Identification Based on Weak Password.
IEEE Access, 2020
Cross-Layer Protocol Fingerprint for Large-Scale Fine-Grain Devices Identification.
IEEE Access, 2020
Trusted Cloud Service Selection Algorithm Based on Lightweight Intuitionistic Fuzzy Numbers.
IEEE Access, 2020
Exploring Shodan From the Perspective of Industrial Control Systems.
IEEE Access, 2020
Towards Pattern-aware Privacy-preserving Real-time Data Collection.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
2019
WiLabel: Behavior-Based Room Type Automatic Annotation for Indoor Floorplan.
IEEE Access, 2019
2018
基于协议状态图遍历的RTSP协议漏洞挖掘 (Mining RTSP Protocol Vulnerabilities Based on Traversal of Protocol State Graph).
计算机科学, 2018
Normal Cloud Model-Based Algorithm for Multi-Attribute Trusted Cloud Service Selection.
IEEE Access, 2018
Localizing Access Point Through Simple Gesture.
IEEE Access, 2018
Malware Variants Detection Using Behavior Destructive Features.
Proceedings of the 2018 IEEE Symposium on Privacy-Aware Computing, 2018
2017
Discovering Routers as Secondary Landmarks for Accurate IP Geolocation.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017
Proof of Vote: A High-Performance Consensus Protocol Based on Vote Mechanism & Consortium Blockchain.
Proceedings of the 19th IEEE International Conference on High Performance Computing and Communications; 15th IEEE International Conference on Smart City; 3rd IEEE International Conference on Data Science and Systems, 2017
An improved P2P file system scheme based on IPFS and Blockchain.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017
2015
A Fuzzy Similarity Elimination Algorithm for Indoor Fingerprint Positioning.
Int. J. Distributed Sens. Networks, 2015
2014
Adaptive Heterogeneous Network Handoff of Smartphone Based on the Closed Control Loop.
Int. J. Distributed Sens. Networks, 2014
Optimization of Sampling Cell Size for Fingerprint Positioning.
Int. J. Distributed Sens. Networks, 2014
LARES: latency-reduced neighbour discovery for contagious diseases prevention.
Int. J. Ad Hoc Ubiquitous Comput., 2014
2013
Efficient Deterministic Anchor Deployment for Sensor Network Positioning.
Int. J. Distributed Sens. Networks, 2013
2011
Congestion-Aware Indoor Emergency Navigation Algorithm for Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2011