Sifan Li

Orcid: 0009-0004-0482-1479

According to our database1, Sifan Li authored at least 17 papers between 2020 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Real-Time Collaborative Intrusion Detection System in UAV Networks Using Deep Learning.
IEEE Internet Things J., October, 2024

ECF-IDS: An Enhanced Cuckoo Filter-Based Intrusion Detection System for In-Vehicle Network.
IEEE Trans. Netw. Serv. Manag., August, 2024

Deep convolutional encoder-decoder networks based on ensemble learning for semantic segmentation of high-resolution aerial imagery.
CCF Trans. High Perform. Comput., August, 2024

HDA-IDS: A Hybrid DoS Attacks Intrusion Detection System for IoT by using semi-supervised CL-GAN.
Expert Syst. Appl., March, 2024

A modular fault diagnosis method for rolling bearing based on mask kernel and multi-head self-attention mechanism.
Trans. Inst. Meas. Control, 2024

False message detection in Internet of Vehicle through machine learning and vehicle consensus.
Inf. Process. Manag., 2024

Real-time fusion multi-tier DNN-based collaborative IDPS with complementary features for secure UAV-enabled 6G networks.
Expert Syst. Appl., 2024

A Multimodal Fake News Detection Model with Self-supervised Unimodal Label Generation.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024

Robust Intrusion Detection System in CAN Bus through Multi-Scale Feature Fusion.
Proceedings of the IEEE International Conference on Communications, 2024

2023
Meta pseudo labels for anomaly detection via partially observed anomalies.
Eng. Appl. Artif. Intell., November, 2023

Dynamic Ferroelectric Transistor-Based Reservoir Computing for Spatiotemporal Information Processing.
Adv. Intell. Syst., June, 2023

Towards Cyber Security for Low-Carbon Transportation: Overview, Challenges and Future Directions.
CoRR, 2023

Image Aesthetics Assessment Based on Visual Perception and Textual Semantic Understanding.
Proceedings of the Digital Multimedia Communications, 2023

Detection of Targeted Attacks Using Medium-Interaction Honeypot for Unmanned Aerial Vehicle.
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023

2022
Ferroelectric memory based on two-dimensional materials for neuromorphic computing.
Neuromorph. Comput. Eng., 2022

2020
A Malicious Webpage Detection Algorithm Based on Image Semantics.
Traitement du Signal, 2020

Using Deep Learning to Identify Security Risks of Personal Mobile Devices in Enterprise Networks.
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020


  Loading...