Yingxu Lai
Orcid: 0000-0001-9844-1717
According to our database1,
Yingxu Lai
authored at least 70 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A Packet Sequence Permutation-Aware Approach to Robust Network Traffic Classification.
IEEE Netw. Lett., September, 2024
Abnormal Logical Representation Learning for Intrusion Detection in Industrial Control Systems.
IEEE Trans. Ind. Informatics, August, 2024
An adaptive classification and updating method for unknown network traffic in open environments.
Comput. Networks, January, 2024
NCMFuzzer: Using non-critical field mutation and test case combination to improve the efficiency of ICS protocol fuzzing.
Comput. Secur., 2024
AGCM: A multi-stage attack correlation and scenario reconstruction method based on graph aggregation.
Comput. Commun., 2024
Proceedings of the Information Security - 27th International Conference, 2024
2023
IEEE Trans. Green Commun. Netw., December, 2023
IEEE Trans. Veh. Technol., October, 2023
MSGAN: multi-stage generative adversarial network-based data recovery in cyber-attacks.
Neural Comput. Appl., October, 2023
Comput. Networks, July, 2023
IEEE/ACM Trans. Netw., June, 2023
Transfer learning-based self-learning intrusion detection system for in-vehicle networks.
Neural Comput. Appl., May, 2023
MDFD: A multi-source data fusion detection framework for Sybil attack detection in VANETs.
Comput. Networks, April, 2023
Intrusion Detection System Based on In-Depth Understandings of Industrial Control Logic.
IEEE Trans. Ind. Informatics, March, 2023
Selective forwarding attack detection and network recovery mechanism based on cloud-edge cooperation in software-defined wireless sensor network.
Comput. Secur., March, 2023
Ad Hoc Networks, March, 2023
EEFED: Personalized Federated Learning of Execution&Evaluation Dual Network for CPS Intrusion Detection.
IEEE Trans. Inf. Forensics Secur., 2023
Authentication methods for internet of vehicles based on trusted connection architecture.
Simul. Model. Pract. Theory, 2023
Future Gener. Comput. Syst., 2023
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023
Mining of Potential Relationships based on the Knowledge Graph of Industrial Control Systems.
Proceedings of the 15th IEEE International Symposium on Autonomous Decentralized System, 2023
Proceedings of the 15th IEEE International Symposium on Autonomous Decentralized System, 2023
2022
Simul. Model. Pract. Theory, 2022
Correction to: DEIDS: a novel intrusion detection system for industrial control systems.
Neural Comput. Appl., 2022
Neural Comput. Appl., 2022
IEEE Commun. Lett., 2022
Domain Adversarial Neural Network-Based Intrusion Detection System for In-Vehicle Network Variant Attacks.
IEEE Commun. Lett., 2022
Stealthy attack detection method based on Multi-feature long short-term memory prediction model.
Future Gener. Comput. Syst., 2022
Identifying malicious nodes in wireless sensor networks based on correlation detection.
Comput. Secur., 2022
Proceedings of the IFIP Networking Conference, 2022
Model Heterogeneous Federated Learning for Intrusion Detection based on knowledge distillation.
Proceedings of the 12th International Conference on Communication and Network Security, 2022
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022
Proceedings of the IEEE Global Communications Conference, 2022
2021
MIF: A multi-step attack scenario reconstruction and attack chains extraction method based on multi-information fusion.
Comput. Networks, 2021
Proceedings of the 7th IEEE International Conference on Network Intelligence and Digital Content, 2021
2020
Simul. Model. Pract. Theory, 2020
Explaining the Attributes of a Deep Learning Based Intrusion Detection System for Industrial Control Networks.
Sensors, 2020
Sensors, 2020
Protection of Sensitive Data in Industrial Internet Based on Three-Layer Local/Fog/Cloud Storage.
Secur. Commun. Networks, 2020
基于链上链下相结合的日志安全存储与检索 (Log Security Storage and Retrieval Based on Combination ofOn-chain and Off-chain).
计算机科学, 2020
2019
Industrial Anomaly Detection and Attack Classification Method Based on Convolutional Neural Network.
Secur. Commun. Networks, 2019
Industrial Control Intrusion Detection Approach Based on Multiclassification GoogLeNet-LSTM Model.
Secur. Commun. Networks, 2019
一种面向WSN的双向身份认证协议及串空间模型 (Bilateral Authentication Protocol for WSN and Certification by Strand Space Model).
计算机科学, 2019
Int. J. Simul. Process. Model., 2019
2018
Int. J. Simul. Process. Model., 2018
2017
Simul. Model. Pract. Theory, 2017
Proceedings of the 13th IEEE International Symposium on Autonomous Decentralized System, 2017
Proceedings of the 2017 International Conference on Cryptography, Security and Privacy, 2017
2016
Anomaly detection in Industrial Autonomous Decentralized System based on time series.
Simul. Model. Pract. Theory, 2016
A Security Authentication Protocol for Trusted Domains in an Autonomous Decentralized System.
Int. J. Distributed Sens. Networks, 2016
2015
Simul. Model. Pract. Theory, 2015
Simul. Model. Pract. Theory, 2015
Int. J. Simul. Process. Model., 2015
IEICE Trans. Inf. Syst., 2015
Comput. J., 2015
Proceedings of the Twelfth IEEE International Symposium on Autonomous Decentralized Systems, 2015
Proceedings of the Twelfth IEEE International Symposium on Autonomous Decentralized Systems, 2015
2014
BJUT at TREC 2014 Contextual Suggestion Track: Hybrid Recommendation Based on Open-web Information.
Proceedings of The Twenty-Third Text REtrieval Conference, 2014
Proceedings of the 2014 IEEE International Parallel & Distributed Processing Symposium Workshops, 2014
2013
Proceedings of The Twenty-Second Text REtrieval Conference, 2013
Proceedings of The Twenty-Second Text REtrieval Conference, 2013
2012
Proceedings of the 14th IEEE International Conference on High Performance Computing and Communication & 9th IEEE International Conference on Embedded Software and Systems, 2012
2010
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010
2009
Proceedings of the Advances in Information Security and Assurance, 2009
Proceedings of the Ninth International Conference on Intelligent Systems Design and Applications, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
Proceedings of the Advances in Electrical Engineering and Computational Science, 2008
Proceedings of the Ninth ACIS International Conference on Software Engineering, 2008
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008