2025
Communication Security and Stability in NNCSs: Realistic DoS Attacks Model and ISTA-Supervised Adaptive Event-Triggered Controller Design.
IEEE Trans. Cybern., February, 2025
A blockchain-oriented covert communication technology with controlled security level based on addressing confusion ciphertext.
,
,
,
,
,
,
,
,
,
,
Frontiers Comput. Sci., February, 2025
PHCG: PLC Honeypoint Communication Generator for Industrial IoT.
IEEE Trans. Mob. Comput., January, 2025
A high-performance real-time container file monitoring approach based on virtual machine introspection.
J. Supercomput., January, 2025
A Heterogeneous and Adaptive Architecture for Decision-Tree-Based ACL Engine on FPGA.
IEEE Trans. Computers, January, 2025
Query-Efficient Model Inversion Attacks: An Information Flow View.
IEEE Trans. Inf. Forensics Secur., 2025
2024
Dynamic Task Offloading for Multi-UAVs in Vehicular Edge Computing With Delay Guarantees: A Consensus ADMM-Based Optimization.
IEEE Trans. Mob. Comput., December, 2024
ThreatInsight: Innovating Early Threat Detection Through Threat-Intelligence-Driven Analysis and Attribution.
IEEE Trans. Knowl. Data Eng., December, 2024
A Privacy-Preserving Federated Learning Framework With Lightweight and Fair in IoT.
IEEE Trans. Netw. Serv. Manag., October, 2024
Design of Intelligent Control Under Machine Learning Supervision and Signal Compression Mechanism Design for NCSs Under DoS Attacks.
IEEE Trans. Intell. Transp. Syst., October, 2024
Efficient Maximal Biclique Enumeration on Large Signed Bipartite Graphs.
IEEE Trans. Knowl. Data Eng., September, 2024
A Novel Network Forensic Framework for Advanced Persistent Threat Attack Attribution Through Deep Learning.
IEEE Trans. Intell. Transp. Syst., September, 2024
An Efficient Incentive Mechanism for Federated Learning in Vehicular Networks.
IEEE Netw., September, 2024
Judgment Prediction Based on Tensor Decomposition With Optimized Neural Networks.
IEEE Trans. Neural Networks Learn. Syst., August, 2024
PANNER: POS-Aware Nested Named Entity Recognition Through Heterogeneous Graph Neural Network.
IEEE Trans. Comput. Soc. Syst., August, 2024
STIDNet: Identity-Aware Face Forgery Detection With Spatiotemporal Knowledge Distillation.
IEEE Trans. Comput. Soc. Syst., August, 2024
ESC&RAO: Enabling Seamless Connectivity Resource Allocation in Tactile IoT for Consumer Electronics.
IEEE Trans. Consumer Electron., August, 2024
Exploring highly concise and accurate text matching model with tiny weights.
World Wide Web (WWW), July, 2024
TC-Match: Fast Time-constrained Continuous Subgraph Matching.
Proc. VLDB Endow., July, 2024
Reversible Image Thumbnail Preservation With High-Visual Naturalness.
IEEE Internet Things J., May, 2024
Recursive Multi-Tree Construction With Efficient Rule Sifting for Packet Classification on FPGA.
IEEE/ACM Trans. Netw., April, 2024
Structure-Aware Prototypical Neural Process for Few-Shot Graph Classification.
IEEE Trans. Neural Networks Learn. Syst., April, 2024
Collaborative Meta-Path Modeling for Explainable Recommendation.
IEEE Trans. Comput. Soc. Syst., April, 2024
BlockSC: A Blockchain Empowered Spatial Crowdsourcing Service in Metaverse While Preserving User Location Privacy.
IEEE J. Sel. Areas Commun., April, 2024
Optimizing Mobility-Aware Task Offloading in Smart Healthcare for Internet of Medical Things Through Multiagent Reinforcement Learning.
IEEE Internet Things J., April, 2024
A Novel Smart Contract Reentrancy Vulnerability Detection Model based on BiGAS.
J. Signal Process. Syst., March, 2024
Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection.
IEEE Trans. Software Eng., March, 2024
Intelligent Event-Triggered Control Supervised by Mini-Batch Machine Learning and Data Compression Mechanism for T-S Fuzzy NCSs Under DoS Attacks.
IEEE Trans. Fuzzy Syst., March, 2024
Efficient Regular Simple Path Queries under Transitive Restricted Expressions.
Proc. VLDB Endow., March, 2024
Fundus Image Enhancement via Semi-Supervised GAN and Anatomical Structure Preservation.
IEEE Trans. Emerg. Top. Comput. Intell., February, 2024
DNN Inference Acceleration for Smart Devices in Industry 5.0 by Decentralized Deep Reinforcement Learning.
IEEE Trans. Consumer Electron., February, 2024
Influence Maximization via Vertex Countering.
Proc. VLDB Endow., February, 2024
Labels Are Culprits: Defending Gradient Attack on Privacy.
IEEE Internet Things J., February, 2024
Size-Constrained Community Search on Large Networks: An Effective and Efficient Solution.
IEEE Trans. Knowl. Data Eng., January, 2024
Performance Analysis and Design of Intelligent Optimising Integral-Based Event-Trigger Control for Autonomous Ground Vehicles Under DoS Attacks.
IEEE Trans. Intell. Veh., January, 2024
An Access Control Method Against Unauthorized and Noncompliant Behaviors of Real-Time Data in Industrial IoT.
IEEE Internet Things J., January, 2024
ICRB: An improved consensus-based redactable blockchain considering contextual consistency.
Trans. Emerg. Telecommun. Technol., January, 2024
Privacy-Preserving Convolutional Neural Network Classification Scheme With Multiple Keys.
IEEE Trans. Serv. Comput., 2024
Lossless Data Hiding in NTRU Cryptosystem by Polynomial Encoding and Modulation.
IEEE Trans. Inf. Forensics Secur., 2024
Stability Analysis of Networked Control Systems Under DoS Attacks and Security Controller Design With Mini-Batch Machine Learning Supervision.
IEEE Trans. Inf. Forensics Secur., 2024
FedGA: A greedy approach to enhance federated learning with Non-IID data.
Knowl. Based Syst., 2024
Research on Covert Communication Technology Based on Matrix Decomposition of Digital Currency Transaction Amount.
,
,
,
,
,
,
,
,
,
,
KSII Trans. Internet Inf. Syst., 2024
Analysis on unit maximum capacity of orthogonal multiple watermarking for multimedia signals in B5G wireless communications.
Digit. Commun. Networks, 2024
Imperceptible Adversarial Attacks on Point Clouds Guided by Point-to-Surface Field.
CoRR, 2024
Data tampering detection and recovery scheme based on multi-branch target extraction for internet of vehicles.
Comput. Networks, 2024
Ada-FFL: Adaptive computing fairness federated learning.
CAAI Trans. Intell. Technol., 2024
Active and Passive Attack Detection Methods for Malicious Encrypted Traffic.
Proceedings of the 20th International Conference on Wireless and Mobile Computing, 2024
LT-Defense: Searching-free Backdoor Defense via Exploiting the Long-tailed Effect.
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024
SymAttack: Symmetry-aware Imperceptible Adversarial Attacks on 3D Point Clouds.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Reparameterization Head for Efficient Multi-Input Networks.
Proceedings of the IEEE International Conference on Acoustics, 2024
FLAT: Flux-Aware Imperceptible Adversarial Attacks on 3D Point Clouds.
Proceedings of the Computer Vision - ECCV 2024, 2024
CORES: Convolutional Response-based Score for Out-of-distribution Detection.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
Federated Spectral Graph Neural Networks.
Proceedings of the 11th International Conference on Behavioural and Social Computing, 2024
Manifold Constraints for Imperceptible Adversarial Attacks on Point Clouds.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Evaluation Mechanism for Decentralized Collaborative Pattern Learning in Heterogeneous Vehicular Networks.
IEEE Trans. Intell. Transp. Syst., November, 2023
Digital Twin-Based Cyber Range for Industrial Internet of Things.
IEEE Consumer Electron. Mag., November, 2023
Decentralized Cooperative Caching for Sustainable Metaverse Via Meta Self-Supervision Learning.
IEEE Wirel. Commun., October, 2023
Personalized sampling graph collection with local differential privacy for link prediction.
World Wide Web (WWW), September, 2023
REMSF: A Robust Ensemble Model of Malware Detection Based on Semantic Feature Fusion.
IEEE Internet Things J., September, 2023
Diverse classifiers with label dependencies for long-tail relation extraction in big data.
Comput. Electr. Eng., September, 2023
A covert channel over blockchain based on label tree without long waiting times.
Comput. Networks, August, 2023
GraphNAS++: Distributed Architecture Search for Graph Neural Networks.
IEEE Trans. Knowl. Data Eng., July, 2023
CSKG4APT: A Cybersecurity Knowledge Graph for Advanced Persistent Threat Organization Attribution.
IEEE Trans. Knowl. Data Eng., June, 2023
Dynamic Prototype Network Based on Sample Adaptation for Few-Shot Malware Detection.
IEEE Trans. Knowl. Data Eng., May, 2023
Residual long short-term memory network with multi-source and multi-frequency information fusion: An application to China's stock market.
Inf. Sci., April, 2023
Adaptive Information Hiding Method Based on Feature Extraction for Visible Light Communication.
IEEE Commun. Mag., April, 2023
Super-resolution-based part collaboration network for vehicle re-identification.
World Wide Web (WWW), March, 2023
Adaptive Asynchronous Clustering Algorithms for Wireless Mesh Networks.
IEEE Trans. Knowl. Data Eng., March, 2023
CDTier: A Chinese Dataset of Threat Intelligence Entity Relationships.
IEEE Trans. Sustain. Comput., 2023
A Semi-Centralized Trust Management Model Based on Blockchain for Data Exchange in IoT System.
IEEE Trans. Serv. Comput., 2023
A Blockchain-Empowered Federated Learning in Healthcare-Based Cyber Physical Systems.
IEEE Trans. Netw. Sci. Eng., 2023
Privacy Protection Method Based On Multidimensional Feature Fusion Under 6G Networks.
IEEE Trans. Netw. Sci. Eng., 2023
A Malicious Mining Code Detection Method Based on Multi-Features Fusion.
IEEE Trans. Netw. Sci. Eng., 2023
Imbalanced Malware Family Classification Using Multimodal Fusion and Weight Self-Learning.
IEEE Trans. Intell. Transp. Syst., 2023
MUSEDA: Multilingual Unsupervised and Supervised Embedding for Domain Adaption.
Knowl. Based Syst., 2023
Rethinking Perturbation Directions for Imperceptible Adversarial Attacks on Point Clouds.
IEEE Internet Things J., 2023
CWEmd: A Lightweight Similarity Measurement for Resource-Constrained Vehicular Networks.
IEEE Internet Things J., 2023
Do Not Trust the Clouds Easily: The Insecurity of Content Security Policy Based on Object Storage.
IEEE Internet Things J., 2023
Power normalized cepstral robust features of deep neural networks in a cloud computing data privacy protection scheme.
Neurocomputing, 2023
Detecting Smart Contract Project Anomalies in Metaverse.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023
Improving Precision of Detecting Deserialization Vulnerabilities with Bytecode Analysis.
Proceedings of the 31st IEEE/ACM International Symposium on Quality of Service, 2023
Hierarchical Name-based Routing for Content Provider Mobility in ICN.
Proceedings of the International Wireless Communications and Mobile Computing, 2023
Matching Words for Out-of-distribution Detection.
Proceedings of the IEEE International Conference on Data Mining, 2023
Smart Contract Firewall: Protecting the on-Chain Smart Contract Projects.
Proceedings of the IEEE Global Communications Conference, 2023
A Survey of Deception Defense: Approaches Used to Counter Malicious Behavior.
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023
Research on the Exploitability of Binary Software Vulnerabilities.
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023
Intrusion Detection Techniques Analysis in Cloud Computing.
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023
C2MDNIF: A Cross Chain based Method for Domain Name Information Fusion.
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023
OPTIMA-DEM: An Optimized Threat Behavior Prediction Method using DEMATEL-ISM.
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023
Vulnerability Correlation, Multi-step Attack and Exploit Chain in Breach and Attack Simulation.
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023
Deep Manifold Attack on Point Clouds via Parameter Plane Stretching.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
From Data and Model Levels: Improve the Performance of Few-Shot Malware Classification.
IEEE Trans. Netw. Serv. Manag., December, 2022
VRepChain: A Decentralized and Privacy-Preserving Reputation System for Social Internet of Vehicles Based on Blockchain.
IEEE Trans. Veh. Technol., 2022
An Anonymity Vulnerability in Tor.
IEEE/ACM Trans. Netw., 2022
DeepAutoD: Research on Distributed Machine Learning Oriented Scalable Mobile Communication Security Unpacking System.
IEEE Trans. Netw. Sci. Eng., 2022
Epidemic Risk Assessment by a Novel Communication Station Based Method.
IEEE Trans. Netw. Sci. Eng., 2022
A VMD and LSTM Based Hybrid Model of Load Forecasting for Power Grid Security.
IEEE Trans. Ind. Informatics, 2022
An Edge-AI Based Forecasting Approach for Improving Smart Microgrid Efficiency.
IEEE Trans. Ind. Informatics, 2022
IEPSBP: A Cost-Efficient Image Encryption Algorithm Based on Parallel Chaotic System for Green IoT.
IEEE Trans. Green Commun. Netw., 2022
Applying artificial bee colony algorithm to the multidepot vehicle routing problem.
Softw. Pract. Exp., 2022
STG2P: A two-stage pipeline model for intrusion detection based on improved LightGBM and K-means.
Simul. Model. Pract. Theory, 2022
Large-Capacity Local Multi-Dimensional Information Hiding Method for 6G Networks.
IEEE Netw., 2022
A framework for personalized recommendation with conditional generative adversarial networks.
Knowl. Inf. Syst., 2022
A novel flow-vector generation approach for malicious traffic detection.
J. Parallel Distributed Comput., 2022
Leveraging transferability and improved beam search in textual adversarial attacks.
Neurocomputing, 2022
TPRPF: a preserving framework of privacy relations based on adversarial training for texts in big data.
Frontiers Comput. Sci., 2022
Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection.
CoRR, 2022
ConsPrompt: Easily Exploiting Contrastive Samples for Few-shot Prompt Learning.
CoRR, 2022
A Blockchain-Based Distributed Computational Resource Trading System for Industrial Internet of Things Considering Multiple Preferences.
CoRR, 2022
MRI radiogenomics for intelligent diagnosis of breast tumors and accurate prediction of neoadjuvant chemotherapy responses-a review.
Comput. Methods Programs Biomed., 2022
Improving adversarial transferability by temporal and spatial momentum in urban speaker recognition systems.
Comput. Electr. Eng., 2022
StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing.
Proceedings of the 31st USENIX Security Symposium, 2022
WGAN-GP and LSTM based Prediction Model for Aircraft 4- D Traj ectory.
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022
2021
Spatiotemporal Data Cleaning and Knowledge Fusion.
Proceedings of the MDATA: A New Knowledge Representation Model, 2021
Knowledge Extraction: Automatic Classification of Matching Rules.
Proceedings of the MDATA: A New Knowledge Representation Model, 2021
Entity Alignment: Optimization by Seed Selection.
Proceedings of the MDATA: A New Knowledge Representation Model, 2021
Classifying encrypted traffic using adaptive fingerprints with multi-level attributes.
World Wide Web, 2021
An Aerial-Computing-Assisted Architecture for Large-Scale Sensor Networks.
IEEE Wirel. Commun., 2021
Introduction to the Special Section on Artificial Intelligence Security: Adversarial Attack and Defense.
IEEE Trans. Netw. Sci. Eng., 2021
LocJury: An IBN-Based Location Privacy Preserving Scheme for IoCV.
IEEE Trans. Intell. Transp. Syst., 2021
Honeypot Identification in Softwarized Industrial Cyber-Physical Systems.
IEEE Trans. Ind. Informatics, 2021
A Novel Web Attack Detection System for Internet of Things via Ensemble Classification.
IEEE Trans. Ind. Informatics, 2021
Contract and Lyapunov Optimization-Based Load Scheduling and Energy Management for UAV Charging Stations.
IEEE Trans. Green Commun. Netw., 2021
Deep-Green: A Dispersed Energy-Efficiency Computing Paradigm for Green Industrial IoT.
IEEE Trans. Green Commun. Netw., 2021
An Energy-Efficient In-Network Computing Paradigm for 6G.
IEEE Trans. Green Commun. Netw., 2021
A Topic Representation Model for Online Social Networks Based on Hybrid Human-Artificial Intelligence.
IEEE Trans. Comput. Soc. Syst., 2021
Malicious mining code detection based on ensemble learning in cloud computing environment.
Simul. Model. Pract. Theory, 2021
StFuzzer: Contribution-Aware Coverage-Guided Fuzzing for Smart Devices.
Secur. Commun. Networks, 2021
Attribution Classification Method of APT Malware in IoT Using Machine Learning Techniques.
Secur. Commun. Networks, 2021
Hierarchical Core Maintenance on Large Dynamic Graphs.
Proc. VLDB Endow., 2021
The Security of Internet of Vehicles Network: Adversarial Examples for Trajectory Mode Detection.
IEEE Netw., 2021
AutoD: Intelligent Blockchain Application Unpacking Based on JNI Layer Deception Call.
IEEE Netw., 2021
Building Agile and Resilient UAV Networks Based on SDN and Blockchain.
IEEE Netw., 2021
Secure Data Sharing Framework via Hierarchical Greedy Embedding in Darknets.
Mob. Networks Appl., 2021
Research on Intelligent Detection of Command Level Stack Pollution for Binary Program Analysis.
Mob. Networks Appl., 2021
A multiple-kernel clustering based intrusion detection scheme for 5G and IoT networks.
Int. J. Mach. Learn. Cybern., 2021
Power Grid-Oriented Cascading Failure Vulnerability Identifying Method Based on Wireless Sensors.
J. Sensors, 2021
Multi-party transaction framework for drone services based on alliance blockchain in smart cities.
J. Inf. Secur. Appl., 2021
IoT root union: A decentralized name resolving system for IoT based on blockchain.
Inf. Process. Manag., 2021
CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques.
IEEE Internet Things J., 2021
Multi-Candidate Voting Model Based on Blockchain.
IEEE CAA J. Autom. Sinica, 2021
Editorial: Intelligence and Safety for Humanoid Robots: Design, Control, and Applications.
Frontiers Neurorobotics, 2021
PWG-IDS: An Intrusion Detection Model for Solving Class Imbalance in IIoT Networks Using Generative Adversarial Networks.
CoRR, 2021
TREATED: Towards Universal Defense against Textual Adversarial Attacks.
CoRR, 2021
A method of chained recommendation for charging piles in internet of vehicles.
Computing, 2021
Proof of Learning (PoLe): Empowering neural network training with consensus building on blockchains.
Comput. Networks, 2021
An Interactive System for Unfair Rating Detection Models in a Customized Perspective.
Proceedings of the 20th IEEE International Conference on Trust, 2021
Mask is All You Need: Rethinking Mask R-CNN for Dense and Arbitrary-Shaped Scene Text Detection.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021
NASGuard: A Novel Accelerator Architecture for Robust Neural Architecture Search (NAS) Networks.
Proceedings of the 48th ACM/IEEE Annual International Symposium on Computer Architecture, 2021
PROCESS: Privacy-Preserving On-Chain Certificate Status Service.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
PRGAN: Personalized Recommendation with Conditional Generative Adversarial Networks.
Proceedings of the IEEE International Conference on Data Mining, 2021
CODEs: Chamfer Out-of-Distribution Examples against Overconfidence Issue.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021
A Novel Malware Encrypted Traffic Detection Framework Based On Ensemble Learning.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021
Generate Adversarial Examples Combined with Image Entropy Distribution.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021
2020
Topic representation model based on microblogging behavior analysis.
World Wide Web, 2020
SoftSystem: Smart Edge Computing Device Selection Method for IoT Based on Soft Set Technique.
Wirel. Commun. Mob. Comput., 2020
A Reputation Management Scheme for Efficient Malicious Vehicle Identification over 5G Networks.
IEEE Wirel. Commun., 2020
Artificial Intelligence Security in 5G Networks: Adversarial Examples for Estimating a Travel Time Task.
IEEE Veh. Technol. Mag., 2020
Deep Learning Based Multi-Channel Intelligent Attack Detection for Data Security.
IEEE Trans. Sustain. Comput., 2020
Delving Deeper in Drone-Based Person Re-Id by Employing Deep Decision Forest and Attributes Fusion.
ACM Trans. Multim. Comput. Commun. Appl., 2020
DHPA: Dynamic Human Preference Analytics Framework: A Case Study on Taxi Drivers' Learning Curve Analysis.
ACM Trans. Intell. Syst. Technol., 2020
A Distributed Deep Learning System for Web Attack Detection on Edge Devices.
IEEE Trans. Ind. Informatics, 2020
Nei-TTE: Intelligent Traffic Time Estimation Based on Fine-Grained Time Derivation of Road Segments for Smart City.
IEEE Trans. Ind. Informatics, 2020
User and Entity Behavior Analysis under Urban Big Data.
Trans. Data Sci., 2020
Automatic Concept Extraction Based on Semantic Graphs From Big Data in Smart City.
IEEE Trans. Comput. Soc. Syst., 2020
A Low-Latency and Energy-Efficient Neighbor Discovery Algorithm for Wireless Sensor Networks.
Sensors, 2020
Preserving Location Privacy in UASN through Collaboration and Semantic Encapsulation.
IEEE Netw., 2020
Location Privacy Challenges in Mobile Edge Computing: Classification and Exploration.
IEEE Netw., 2020
Automated Attack and Defense Framework toward 5G Security.
IEEE Netw., 2020
Obstructive sleep apnea detection using ecg-sensor with convolutional neural networks.
Multim. Tools Appl., 2020
A novel routing verification approach based on blockchain for inter-domain routing in smart metropolitan area networks.
J. Parallel Distributed Comput., 2020
The effect of trade creation in China-Asean free trade area based on the gravity model.
J. Intell. Fuzzy Syst., 2020
AFLPro: Direction sensitive fuzzing.
J. Inf. Secur. Appl., 2020
Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles.
IEEE Internet Things J., 2020
A Survey on Access Control in the Age of Internet of Things.
IEEE Internet Things J., 2020
Deep Reinforcement Learning for Partially Observable Data Poisoning Attack in Crowdsensing Systems.
IEEE Internet Things J., 2020
Deep learning based emotion analysis of microblog texts.
Inf. Fusion, 2020
A consistency-guaranteed approach for Internet of Things <i>software refactoring</i>.
Int. J. Distributed Sens. Networks, 2020
Hierarchically defining Internet of Things security: From CIA to CACA.
Int. J. Distributed Sens. Networks, 2020
Research on android infiltration technology based on the silent installation of an accessibility service.
Int. J. Distributed Sens. Networks, 2020
Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city.
Future Gener. Comput. Syst., 2020
Advanced persistent threat organization identification based on software gene of malware.
Trans. Emerg. Telecommun. Technol., 2020
The QoS and privacy trade-off of adversarial deep learning: An evolutionary game approach.
Comput. Secur., 2020
IoT malicious traffic identification using wrapper-based feature selection mechanisms.
Comput. Secur., 2020
Security of Mobile Multimedia Data: The Adversarial Examples for Spatio-temporal Data.
Comput. Networks, 2020
Functional immunization of networks based on message passing.
Appl. Math. Comput., 2020
A Public Psychological Pressure Index for Social Networks.
IEEE Access, 2020
A Lightweight Privacy-Preserving Communication Protocol for Heterogeneous IoT Environment.
IEEE Access, 2020
Restricted Region Based Iterative Gradient Method for Non-Targeted Attack.
IEEE Access, 2020
Inferring Passengers' Interactive Choices on Public Transits via MA-AL: Multi-Agent Apprenticeship Learning.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
SESM: Emotional Social Semantic and Time Series Analysis of Learners' Comments.
Proceedings of the 2020 IEEE International Conference on Systems, Man, and Cybernetics, 2020
LGMal: A Joint Framework Based on Local and Global Features for Malware Detection.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020
An IoT data sharing privacy preserving scheme.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
A Malware Detection Method for Health Sensor Data Based on Machine Learning.
Proceedings of the IEEE International Conference on Informatics, 2020
A defense scheme of voice control system against DolphinAttack.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020
A Novel Malware Detection Framework Based on Weighted Heterograph.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020
2019
Evaluating Reputation Management Schemes of Internet of Vehicles Based on Evolutionary Game Theory.
IEEE Trans. Veh. Technol., 2019
Real-Time Lateral Movement Detection Based on Evidence Reasoning Network for Edge Computing Environment.
IEEE Trans. Ind. Informatics, 2019
Automated Vulnerability Discovery and Exploitation in the Internet of Things.
Sensors, 2019
Erratum: Wang, Y. et al., A Privacy Preserving Scheme for Nearest Neighbor Query. <i>Sensors</i> 2018, <i>18</i>, 2440.
Sensors, 2019
A Fine-Grained Video Encryption Service Based on the Cloud-Fog-Local Architecture for Public and Private Videos.
Sensors, 2019
Low-Power Distributed Data Flow Anomaly-Monitoring Technology for Industrial Internet of Things.
Sensors, 2019
A Practical Neighbor Discovery Framework for Wireless Sensor Networks.
Sensors, 2019
Bidirectional self-adaptive resampling in internet of things big data learning.
Multim. Tools Appl., 2019
Trust architecture and reputation evaluation for internet of things.
J. Ambient Intell. Humaniz. Comput., 2019
Block-DEF: A secure digital evidence framework using blockchain.
Inf. Sci., 2019
HybridORAM: Practical oblivious cloud storage with constant bandwidth.
Inf. Sci., 2019
Toward a Comprehensive Insight Into the Eclipse Attacks of Tor Hidden Services.
IEEE Internet Things J., 2019
Timescale diversity facilitates the emergence of cooperation-extortion alliances in networked systems.
Neurocomputing, 2019
A data-driven method for future Internet route decision modeling.
Future Gener. Comput. Syst., 2019
Decision Propagation Networks for Image Classification.
CoRR, 2019
Automated Attack and Defense Framework for 5G Security on Physical and Logical Layers.
CoRR, 2019
Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles.
CoRR, 2019
Popularity-driven strategy updating rule promotes cooperation in the spatial prisoner's dilemma game.
Appl. Math. Comput., 2019
Crowdsourcing Approach for Developing Hands-On Experiments in Cybersecurity Education.
IEEE Access, 2019
Lightweight Anonymous Geometric Routing for Internet of Things.
IEEE Access, 2019
Salaxy: Enabling USB Debugging Mode Automatically to Control Android Devices.
IEEE Access, 2019
Quantitative Assessment of Wireless Connected Intelligent Robot Swarms Network Security Situation.
IEEE Access, 2019
Can the Max-Min Fairness-Based Coalitional Mechanism in Competitive Networks be Trustful?
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019
Preserving Location Privacy in Mobile Edge Computing.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
A Genetic-Algorithm Based Method for Storage Location Assignments in Mobile Rack Warehouses.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Effective Recycling Planning for Dockless Sharing Bikes.
,
,
,
,
,
,
,
,
,
,
Proceedings of the 27th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2019
2018
A Data Leakage Prevention Method Based on the Reduction of Confidential and Context Terms for Smart Mobile Devices.
Wirel. Commun. Mob. Comput., 2018
Automatically Traceback RDP-Based Targeted Ransomware Attacks.
Wirel. Commun. Mob. Comput., 2018
A Privacy Preserving Scheme for Nearest Neighbor Query.
Sensors, 2018
Answering the Min-Cost Quality-Aware Query on Multi-Sources in Sensor-Cloud Systems.
Sensors, 2018
Analysis of vulnerabilities in maritime supply chains.
Reliab. Eng. Syst. Saf., 2018
Anchored neighborhood deep network for single-image super-resolution.
EURASIP J. Image Video Process., 2018
A Real-Time Correlation of Host-Level Events in Cyber Range Service for Smart Campus.
IEEE Access, 2018
Automatic Non-Taxonomic Relation Extraction from Big Data in Smart City.
IEEE Access, 2018
Study on Advanced Botnet Based on Publicly Available Resources.
Proceedings of the Information and Communications Security - 20th International Conference, 2018
A Location Privacy-Aware Method for kNN Query in Location Based Services.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Automatic Taxonomy Construction for Eye Colors Data without Using Context Information.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Deep Learning Based Attribute Classification Insider Threat Detection for Data Security.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Structural Vulnerability of Complex Networks Under Multiple Edge-Based Attacks.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
How to Control Target Nodes in Dynamic Networks.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
An Intelligent Network Attack Detection Method Based on RNN.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
2017
A Conditional Probability Computation Method for Vulnerability Exploitation Based on CVSS.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
2016
Optimization in e-commerce market network based on value order parameter.
Inf. Technol. Manag., 2016
Evaluation method for node importance in container supply chain network.
Int. J. Serv. Technol. Manag., 2016
Dynamic online consumer trust forming mechanism research based on Beijing, China.
Proceedings of the International Conference on Logistics, Informatics and Service Sciences, 2016
A Measurement Study on Mainline DHT and Magnet Link.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016
Detection and Defense of SYN Flood Attacks Based on Dual Stack Network Firewall.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016
2015
An efficient parallel algorithm for exact multi-pattern matching.
Secur. Commun. Networks, 2015
2013
A New Evolution Mechanism Model for B2B E-Commerce Network.
J. Electron. Commer. Organ., 2013
A new evolution model for B2C e-commerce market.
Inf. Technol. Manag., 2013
Data Spoofing Attacks by IPv6 Tunnels.
IEICE Trans. Commun., 2013
An Improved Common Vulnerability Scoring System Based on K-means.
Proceedings of the Trustworthy Computing and Services, 2013
The Analysis of County Science and Technology Worker Internet Usage and Its Influence Factors.
Proceedings of the Computer and Computing Technologies in Agriculture VII, 2013
2011
A New Chinese Public Welfare Operation Mode based on Value Network Model.
Proceedings of the ICEIS 2011, 2011
Study on the Knowledge -Sharing Network of Innovation Teams using Social Network Analysis.
Proceedings of the ICEIS 2011, 2011
Study on the Evolution Mechanisms of the Network Public Opinion.
Proceedings of the ICEIS 2011, 2011
2009
Building lightweight intrusion detection system using wrapper-based feature selection mechanisms.
Comput. Secur., 2009
Towards lightweight and efficient DDOS attacks detection for web server.
Proceedings of the 18th International Conference on World Wide Web, 2009
Optimal Network Security Strengthening Using Attack-Defense Game Model.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009
Optimizing Network Anomaly Detection Scheme Using Instance Selection Mechanism.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
2008
A lightweight web server anomaly detection method based on transductive scheme and genetic algorithms.
Comput. Commun., 2008
UBSF: A novel online URL-Based Spam Filter.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008
A Stochastic Game Theoretic Approach to Attack Prediction and Optimal Active Defense Strategy Decision.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008
Alertclu: A Realtime Alert Aggregation and Correlation System.
Proceedings of the International Conference on Cyberworlds 2008, 2008
2007
A Game Theoretic Method for Decision and Analysis of the Optimal Active Defense Strategy.
Proceedings of the Computational Intelligence and Security, International Conference, 2007
2006
Defending against distributed denial-of-service attacks with an auction-based method.
Web Intell. Agent Syst., 2006
2004
Defending Against Flash Crowds and Malicious Traffic Attacks with An Auction-Based Method.
Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2004), 2004