Yingxu Lai

Orcid: 0000-0001-9844-1717

According to our database1, Yingxu Lai authored at least 70 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Packet Sequence Permutation-Aware Approach to Robust Network Traffic Classification.
IEEE Netw. Lett., September, 2024

Abnormal Logical Representation Learning for Intrusion Detection in Industrial Control Systems.
IEEE Trans. Ind. Informatics, August, 2024

An adaptive classification and updating method for unknown network traffic in open environments.
Comput. Networks, January, 2024

NCMFuzzer: Using non-critical field mutation and test case combination to improve the efficiency of ICS protocol fuzzing.
Comput. Secur., 2024

AGCM: A multi-stage attack correlation and scenario reconstruction method based on graph aggregation.
Comput. Commun., 2024

MVDetector: Malicious Vehicles Detection Under Sybil Attacks in VANETs.
Proceedings of the Information Security - 27th International Conference, 2024

2023
A Multi-Perspective Feature Approach to Few-Shot Classification of IoT Traffic.
IEEE Trans. Green Commun. Netw., December, 2023

Broadcast and Silence Period (BSP): A Pseudonym Change Strategy.
IEEE Trans. Veh. Technol., October, 2023

MSGAN: multi-stage generative adversarial network-based data recovery in cyber-attacks.
Neural Comput. Appl., October, 2023

Relational reasoning-based approach for network protocol reverse engineering.
Comput. Networks, July, 2023

A Two-Phase Approach to Fast and Accurate Classification of Encrypted Traffic.
IEEE/ACM Trans. Netw., June, 2023

Transfer learning-based self-learning intrusion detection system for in-vehicle networks.
Neural Comput. Appl., May, 2023

MDFD: A multi-source data fusion detection framework for Sybil attack detection in VANETs.
Comput. Networks, April, 2023

Intrusion Detection System Based on In-Depth Understandings of Industrial Control Logic.
IEEE Trans. Ind. Informatics, March, 2023

Selective forwarding attack detection and network recovery mechanism based on cloud-edge cooperation in software-defined wireless sensor network.
Comput. Secur., March, 2023

Detection method to eliminate Sybil attacks in Vehicular Ad-hoc Networks.
Ad Hoc Networks, March, 2023

EEFED: Personalized Federated Learning of Execution&Evaluation Dual Network for CPS Intrusion Detection.
IEEE Trans. Inf. Forensics Secur., 2023

Authentication methods for internet of vehicles based on trusted connection architecture.
Simul. Model. Pract. Theory, 2023

A data skew-based unknown traffic classification approach for TLS applications.
Future Gener. Comput. Syst., 2023

Fast tracing method for Sybil attack in VANETs.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023

Mining of Potential Relationships based on the Knowledge Graph of Industrial Control Systems.
Proceedings of the 15th IEEE International Symposium on Autonomous Decentralized System, 2023

Intrusion Detection System for Industrial Control Systems Based on Imbalanced Data.
Proceedings of the 15th IEEE International Symposium on Autonomous Decentralized System, 2023

2022
WSN node access authentication protocol based on trusted computing.
Simul. Model. Pract. Theory, 2022

Correction to: DEIDS: a novel intrusion detection system for industrial control systems.
Neural Comput. Appl., 2022

DEIDS: a novel intrusion detection system for industrial control systems.
Neural Comput. Appl., 2022

A Few-Shot Learning Based Approach to IoT Traffic Classification.
IEEE Commun. Lett., 2022

Domain Adversarial Neural Network-Based Intrusion Detection System for In-Vehicle Network Variant Attacks.
IEEE Commun. Lett., 2022

Stealthy attack detection method based on Multi-feature long short-term memory prediction model.
Future Gener. Comput. Syst., 2022

Identifying malicious nodes in wireless sensor networks based on correlation detection.
Comput. Secur., 2022

Malicious attack detection based on traffic-flow information fusion.
Proceedings of the IFIP Networking Conference, 2022

Model Heterogeneous Federated Learning for Intrusion Detection based on knowledge distillation.
Proceedings of the 12th International Conference on Communication and Network Security, 2022

FITIC: A Few-shot Learning Based IoT Traffic Classification Method.
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022

Zen-tor: A Zero Knowledge Known-Unknown Traffic Classification Method.
Proceedings of the IEEE Global Communications Conference, 2022

2021
MIF: A multi-step attack scenario reconstruction and attack chains extraction method based on multi-information fusion.
Comput. Networks, 2021

Privacy-Preserving Verifiable Collaborative Learning with Chain Aggregation.
Proceedings of the 7th IEEE International Conference on Network Intelligence and Digital Content, 2021

2020
Vulnerability mining for Modbus TCP based on exception field positioning.
Simul. Model. Pract. Theory, 2020

Explaining the Attributes of a Deep Learning Based Intrusion Detection System for Industrial Control Networks.
Sensors, 2020

Vulnerability Mining Method for the Modbus TCP Using an Anti-Sample Fuzzer.
Sensors, 2020

Protection of Sensitive Data in Industrial Internet Based on Three-Layer Local/Fog/Cloud Storage.
Secur. Commun. Networks, 2020

基于链上链下相结合的日志安全存储与检索 (Log Security Storage and Retrieval Based on Combination ofOn-chain and Off-chain).
计算机科学, 2020

2019
Industrial Anomaly Detection and Attack Classification Method Based on Convolutional Neural Network.
Secur. Commun. Networks, 2019

Industrial Control Intrusion Detection Approach Based on Multiclassification GoogLeNet-LSTM Model.
Secur. Commun. Networks, 2019

一种面向WSN的双向身份认证协议及串空间模型 (Bilateral Authentication Protocol for WSN and Certification by Strand Space Model).
计算机科学, 2019

Cloud resource orchestration optimisation based on ARIMA.
Int. J. Simul. Process. Model., 2019

2018
Software behaviour analysis method based on behaviour template.
Int. J. Simul. Process. Model., 2018

2017
A trusted access method in software-defined network.
Simul. Model. Pract. Theory, 2017

Intrusion Detection of Industrial Control System Based on Modbus TCP Protocol.
Proceedings of the 13th IEEE International Symposium on Autonomous Decentralized System, 2017

FL-GUARD: A Detection and Defense System for DDoS Attack in SDN.
Proceedings of the 2017 International Conference on Cryptography, Security and Privacy, 2017

2016
Anomaly detection in Industrial Autonomous Decentralized System based on time series.
Simul. Model. Pract. Theory, 2016

A Security Authentication Protocol for Trusted Domains in an Autonomous Decentralized System.
Int. J. Distributed Sens. Networks, 2016

2015
Design and analysis on trusted network equipment access authentication protocol.
Simul. Model. Pract. Theory, 2015

On monitoring and predicting mobile network traffic abnormality.
Simul. Model. Pract. Theory, 2015

Android malware detection based on permission combinations.
Int. J. Simul. Process. Model., 2015

Software Abnormal Behavior Detection Based on Function Semantic Tree.
IEICE Trans. Inf. Syst., 2015

Sensational Headline Identification By Normalized Cross Entropy-Based Metric.
Comput. J., 2015

Study on Authentication Protocol of SDN Trusted Domain.
Proceedings of the Twelfth IEEE International Symposium on Autonomous Decentralized Systems, 2015

Analysis of Industrial Control Systems Traffic Based on Time Series.
Proceedings of the Twelfth IEEE International Symposium on Autonomous Decentralized Systems, 2015

2014
Research on Software Trust Analysis Based on Behavior.
IEICE Trans. Inf. Syst., 2014

BJUT at TREC 2014 Contextual Suggestion Track: Hybrid Recommendation Based on Open-web Information.
Proceedings of The Twenty-Third Text REtrieval Conference, 2014

Trust-Based Security for the Spanning Tree Protocol.
Proceedings of the 2014 IEEE International Parallel & Distributed Processing Symposium Workshops, 2014

2013
BJUT at TREC 2013 Microblog Track.
Proceedings of The Twenty-Second Text REtrieval Conference, 2013

BJUT at TREC 2013 Temporal Summarization Track.
Proceedings of The Twenty-Second Text REtrieval Conference, 2013

2012
Study and Implementation of Trust Evaluation Access Control Mechanism Based on XEN.
Proceedings of the 14th IEEE International Conference on High Performance Computing and Communication & 9th IEEE International Conference on Embedded Software and Systems, 2012

2010
Framework of Web content filtering for IPv6.
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010

2009
A Data Mining Framework for Building Intrusion Detection Models Based on IPv6.
Proceedings of the Advances in Information Security and Assurance, 2009

Design and Implementation of Distributed Intelligent Firewall Based on IPv6.
Proceedings of the Ninth International Conference on Intelligent Systems Design and Applications, 2009

Trusted Computing Based Mobile DRM Authentication Scheme.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Unknown Malicious Identification.
Proceedings of the Advances in Electrical Engineering and Computational Science, 2008

A Feature Selection for Malicious Detection.
Proceedings of the Ninth ACIS International Conference on Software Engineering, 2008

Unknown Malicious Executable Defection.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008


  Loading...