Beibei Li

Orcid: 0000-0002-0485-1975

Affiliations:
  • Sichuan University, Chengdu, China


According to our database1, Beibei Li authored at least 71 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
FSMFLog: Discovering Anomalous Logs Combining Full Semantic Information and Multifeature Fusion.
IEEE Internet Things J., February, 2024

AN-GCN: An Anonymous Graph Convolutional Network Against Edge-Perturbing Attacks.
IEEE Trans. Neural Networks Learn. Syst., January, 2024

Joint Power and Coverage Control of Massive UAVs in Post-Disaster Emergency Networks: An Aggregative Game-Theoretic Learning Approach.
IEEE Trans. Netw. Sci. Eng., 2024

HomeSentinel: Intelligent Anti-Fingerprinting for IoT Traffic in Smart Homes.
IEEE Trans. Inf. Forensics Secur., 2024

Chaos-Based Index-of-Min Hashing Scheme for Cancellable Biometrics Security.
IEEE Trans. Inf. Forensics Secur., 2024

KMSQ: Efficient and Privacy-Preserving Keyword-Oriented Multidimensional Similarity Query in eHealthcare.
IEEE Internet Things J., 2024

FedRFC: Federated Learning with Recursive Fuzzy Clustering for improved non-IID data training.
Future Gener. Comput. Syst., 2024

A robust Wide & Deep learning framework for log-based anomaly detection.
Appl. Soft Comput., 2024

Enhanced Tensorial Self-representation Subspace Learning for Incomplete Multi-view Clustering.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

A Cooperative Differential Evolution Based Intrusion Detection System for Unknown Cyberattacks.
Proceedings of the IEEE INFOCOM 2024, 2024

A Robust Malicious Traffic Detection Framework with Low-quality Labeled Data.
Proceedings of the IEEE International Conference on Communications, 2024

GraphCyber: Identifying IP Usage Scenarios for Cyberspace Mapping.
Proceedings of the IEEE International Conference on Communications, 2024

Towards Inductive Robustness: Distilling and Fostering Wave-Induced Resonance in Transductive GCNs against Graph Adversarial Attacks.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
EPPSQ: Achieving efficient and privacy-preserving statistics queries over encrypted data in smart grids.
Future Gener. Comput. Syst., December, 2023

Artificial immunity based distributed and fast anomaly detection for Industrial Internet of Things.
Future Gener. Comput. Syst., November, 2023

An artificial immunity based intrusion detection system for unknown cyberattacks.
Appl. Soft Comput., November, 2023

Fast Attack Detection Method for Imbalanced Data in Industrial Cyber-Physical Systems.
J. Artif. Intell. Soft Comput. Res., October, 2023

Incentive-Based Federated Learning for Digital-Twin-Driven Industrial Mobile Crowdsensing.
IEEE Internet Things J., October, 2023

$\bm {P}^{\bm {3}}$: Privacy-Preserving Prediction of Real-Time Energy Demands in EV Charging Networks.
IEEE Trans. Ind. Informatics, March, 2023

A Novel Generation Method for Diverse Privacy Image Based on Machine Learning.
Comput. J., March, 2023

Defending Byzantine attacks in ensemble federated learning: A reputation-based phishing approach.
Future Gener. Comput. Syst., 2023

Graph Agent Network: Empowering Nodes with Decentralized Communications Capabilities for Adversarial Resilience.
CoRR, 2023

Sufficient Control of Complex Networks.
CoRR, 2023

FedCliP: Federated Learning with Client Pruning.
CoRR, 2023

Fuzzing Logical Bugs in eBPF Verifier with Bound-Violation Indicator.
Proceedings of the IEEE International Conference on Communications, 2023

A Lightweight Few-Shot Attack Detection Scheme for Industrial Cognitive Radio Networks.
Proceedings of the IEEE Global Communications Conference, 2023

Threat-Aware Data Transmission in Software-Defined Networks.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

2022
Federated Anomaly Detection on System Logs for the Internet of Things: A Customizable and Communication-Efficient Approach.
IEEE Trans. Netw. Serv. Manag., 2022

FEEL: Federated End-to-End Learning With Non-IID Data for Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., 2022

Two-Tier NOMA-Based Wireless Powered Communication Networks.
IEEE Syst. J., 2022

Attacker Traceability on Ethereum through Graph Analysis.
Secur. Commun. Networks, 2022

Resource Provisioning for Mitigating Edge DDoS Attacks in MEC-Enabled SDVN.
IEEE Internet Things J., 2022

BBNP: A Blockchain-Based Novel Paradigm for Fair and Secure Smart Grid Communications.
IEEE Internet Things J., 2022

MEMBER: A multi-task learning model with hybrid deep features for network intrusion detection.
Comput. Secur., 2022

MSCCS: A Monero-based security-enhanced covert communication system.
Comput. Networks, 2022

IDROP: Intelligently detecting Return-Oriented Programming using real-time execution flow and LSTM.
Proceedings of the IEEE International Conference on Trust, 2022

User Behavior Simulation in ICS Cyber Ranges.
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022

Incentive and Knowledge Distillation Based Federated Learning for Cross-Silo Applications.
Proceedings of the IEEE INFOCOM 2022, 2022

LogTracer: Efficient Anomaly Tracing Combining System Log Detection and Provenance Graph.
Proceedings of the IEEE Global Communications Conference, 2022

2021
DeepFed: Federated Deep Learning for Intrusion Detection in Industrial Cyber-Physical Systems.
IEEE Trans. Ind. Informatics, 2021

Privacy-Preserving Aggregation for Federated Learning-Based Navigation in Vehicular Fog.
IEEE Trans. Ind. Informatics, 2021

SP-SMOTE: A novel space partitioning based synthetic minority oversampling technique.
Knowl. Based Syst., 2021

A novel privacy preserving data aggregation scheme with data integrity and fault tolerance for smart grid communications.
Frontiers Comput. Sci., 2021

JSContana: Malicious JavaScript detection using adaptable context analysis and key feature extraction.
Comput. Secur., 2021

An immune-based risk assessment method for digital virtual assets.
Comput. Secur., 2021

HD-NSA: A real-valued negative selection algorithm based on hierarchy division.
Appl. Soft Comput., 2021

FLPhish: Reputation-based Phishing Byzantine Defense in Ensemble Federated Learning.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

Locating False Data Injection Attacks on Smart Grids Using D-FACTS Devices.
Proceedings of the Service-Oriented Computing - 19th International Conference, 2021

FS-IDS: A Novel Few-Shot Learning Based Intrusion Detection System for SCADA Networks.
Proceedings of the ICC 2021, 2021

On Secure and Efficient Data Sharing for Smart Grids: An Anti-Collusion Scheme.
Proceedings of the ICC 2021, 2021

Achieving Blockchain-based Privacy-Preserving Location Proofs under Federated Learning.
Proceedings of the ICC 2021, 2021

Honeypot-Enabled Optimal Defense Strategy Selection for Smart Grids.
Proceedings of the IEEE Global Communications Conference, 2021

FedVANET: Efficient Federated Learning with Non-IID Data for Vehicular Ad Hoc Networks.
Proceedings of the IEEE Global Communications Conference, 2021

2020
Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems
Wireless Networks, Springer, ISBN: 978-3-030-58671-3, 2020

On Feasibility and Limitations of Detecting False Data Injection Attacks on Power Grid State Estimation Using D-FACTS Devices.
IEEE Trans. Ind. Informatics, 2020

Toward efficient and effective bullying detection in online social network.
Peer-to-Peer Netw. Appl., 2020

Anti-Honeypot Enabled Optimal Attack Strategy for Industrial Cyber-Physical Systems.
IEEE Open J. Comput. Soc., 2020

Adaptive consensus for heterogeneous multi-agent systems under sensor and actuator attacks.
Autom., 2020

Semi-Supervised Malware Clustering Based on the Weight of Bytecode and API.
IEEE Access, 2020

Classification of Malware Variant Based on Ensemble Learning.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

ReAL: A New ResNet-ALSTM Based Intrusion Detection System for the Internet of Energy.
Proceedings of the 45th IEEE Conference on Local Computer Networks, 2020

2019
On Reliability Analysis of Smart Grids under Topology Attacks: A Stochastic Petri Net Approach.
ACM Trans. Cyber Phys. Syst., 2019

Efficient privacy-preserving data merging and skyline computation over multi-source encrypted data.
Inf. Sci., 2019

Towards insider threats detection in smart grid communication systems.
IET Commun., 2019

Security and Efficiency Enhanced Revocable Access Control for Fog-Based Smart Grid System.
IEEE Access, 2019

2018
State Estimation Based Energy Theft Detection Scheme with Privacy Preservation in Smart Grid.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

PAMA: A Proactive Approach to Mitigate False Data Injection Attacks in Smart Grids.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system.
J. Parallel Distributed Comput., 2017

HMM-Based Fast Detection of False Data Injections in Advanced Metering Infrastructure.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
DDOA: A Dirichlet-Based Detection Scheme for Opportunistic Attacks in Smart Grid Cyber-Physical System.
IEEE Trans. Inf. Forensics Secur., 2016

BLITHE: Behavior Rule-Based Insider Threat Detection for Smart Grid.
IEEE Internet Things J., 2016


  Loading...