Yuanbo Guo
Orcid: 0000-0003-0185-203X
According to our database1,
Yuanbo Guo
authored at least 70 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Optimization of mitigation deployment using deep reinforcement learning over an enhanced ATT &CK.
Computing, December, 2024
Flux-Weakening Scheme for Four-Switch Inverter-Fed IM Drives With Optimized Overmodulation-Based Modulated Predictive Torque Control.
IEEE Trans. Ind. Electron., November, 2024
Digital-Twin-Based CPS Anomaly Diagnosis and Security Defense Countermeasure Recommendation.
IEEE Internet Things J., May, 2024
J. Netw. Comput. Appl., 2024
FairQuantize: Achieving Fairness Through Weight Quantization for Dermatological Disease Diagnosis.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2024, 2024
2023
J. Supercomput., December, 2023
CNN-Cap: Effective Convolutional Neural Network-based Capacitance Models for Interconnect Capacitance Extraction.
ACM Trans. Design Autom. Electr. Syst., July, 2023
A semantic-based method for analysing unknown malicious behaviours via hyper-spherical variational auto-encoders.
IET Inf. Secur., March, 2023
Real-Time Sensor Fault Identification and Remediation for Single-Phase Grid-Connected Converters Using Hybrid Observers With Unknown Input Adaptation.
IEEE Trans. Ind. Electron., 2023
Dual-Vector-Based Predictive Torque Control for Fault-Tolerant Inverter-Fed Induction Motor Drives With Adaptive Switching Instant.
IEEE Trans. Ind. Electron., 2023
Modulated-Virtual-Vector-Based Predictive Current Control for Dual Three-Phase PMSM With Enhanced Steady-State Performance.
Proceedings of the 49th Annual Conference of the IEEE Industrial Electronics Society, 2023
Coordinated Passive Maneuvering Target Tracking by Multiple Underwater Vehicles Based on Asynchronous Sequential Filtering.
Proceedings of the Intelligent Robotics and Applications - 16th International Conference, 2023
2022
An end-to-end method for advanced persistent threats reconstruction in large-scale networks based on alert and log correlation.
J. Inf. Secur. Appl., 2022
Comput. Commun., 2022
EFC/H∞ Based Dual-mode Switching Global Control of the First-order Parallel Rotating Double Inverted Pendulum System.
Proceedings of the IECON 2022, 2022
Proceedings of the IECON 2022, 2022
Event-triggered MPC for Collision Avoidance of Autonomous Vehicles Considering Trajectory Tracking Performance.
Proceedings of the International Conference on Advanced Robotics and Mechatronics , 2022
2021
Privacy-preserving and communication-efficient federated learning in Internet of Things.
Comput. Secur., 2021
CNN-Cap: Effective Convolutional Neural Network Based Capacitance Models for Full-Chip Parasitic Extraction.
Proceedings of the IEEE/ACM International Conference On Computer Aided Design, 2021
2020
Wirel. Commun. Mob. Comput., 2020
A Novel Attack-and-Defense Signaling Game for Optimal Deceptive Defense Strategy Choice.
Wirel. Commun. Mob. Comput., 2020
MCKC: a modified cyber kill chain model for cognitive APTs analysis within Enterprise multimedia network.
Multim. Tools Appl., 2020
内部威胁检测中用户属性画像方法与应用 (User Attributes Profiling Method and Application in Insider Threat Detection).
计算机科学, 2020
J. Organ. End User Comput., 2020
Highly efficient federated learning with strong privacy preservation in cloud computing.
Comput. Secur., 2020
IEEE Access, 2020
2019
Robust Control Strategy Design for Single-Phase Grid-Connected Converters Under System Perturbations.
IEEE Trans. Ind. Electron., 2019
Multifeature Named Entity Recognition in Information Security Based on Adversarial Learning.
Secur. Commun. Networks, 2019
HeteMSD: A Big Data Analytics Framework for Targeted Cyber-Attacks Detection Using Heterogeneous Multisource Data.
Secur. Commun. Networks, 2019
一种基于知识图谱的扩展攻击图生成方法 (Extended Attack Graph Generation Method Based on Knowledge Graph).
计算机科学, 2019
计算机科学, 2019
Dual carrier based PWM strategy for common-mode voltage reduction of three-phase voltage source inverters.
IEICE Electron. Express, 2019
Int. Arab J. Inf. Technol., 2019
Zero-Day Vulnerability Risk Assessment and Attack Path Analysis Using Security Metric.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
Parameter-Estimation-Based Adaptive MTPA Control for Interior Permanent Magnet Synchronous Motors.
Proceedings of the 6th International Conference on Control, 2019
Proceedings of the 15th International Conference on Computational Intelligence and Security, 2019
2018
2017
低冗余二维码汉字编码研究 (Research on Lower Redundancy of Two-dimension Barcode Encoding in Chinese Characters).
计算机科学, 2017
网络安全事件关联分析技术与工具研究 (Survey on Network Security Event Correlation Analysis Methods and Tools).
计算机科学, 2017
基于开源工具集的大数据网络安全态势感知及预警架构 (Framework for Big Data Network Security Situational Awareness and Threat Warning Based on Open Source Toolset).
计算机科学, 2017
Int. J. Bus. Data Commun. Netw., 2017
An improved CBPWM method to balance the output voltage of eight-switch three-phase inverter under neutral-point potential unbalance condition.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017
Online grid inductance estimation for electric traction PWM rectifier based on dual-frequency harmonic current injection.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017
2016
计算机科学, 2016
Prediction of ship roll motion based on combination of phase space reconstruction theory and Elman network.
Proceedings of the IEEE International Conference on Information and Automation, 2016
Proceedings of the Advances on P2P, 2016
2015
基于无线信道特征的密钥生成与提取研究 (Generation and Extraction of Secret Keys Based on Properties of Wireless Channels).
计算机科学, 2015
2014
Proceedings of the 2014 IEEE International Conference on Semantic Computing, 2014
2013
Incentive-Based Optimal Nodes Selection Mechanism for Threshold Key Management in MANETs with Selfish Nodes.
Int. J. Distributed Sens. Networks, 2013
2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the Information Computing and Applications - Third International Conference, 2012
Proceedings of the Information Computing and Applications - Third International Conference, 2012
2010
Security Topology Control Method for Wireless Sensor Networks with Node-Failure Tolerance Based on Self-Regeneration.
EURASIP J. Wirel. Commun. Netw., 2010
2008
Adaptive Algorithms to Mitigate Inefficiency in Reliability Differentiation Mechanisms for Wireless Sensor Networks.
Proceedings of the MSN 2008, 2008
2007
A Requirements Driven Framework for Benchmarking Semantic Web Knowledge Base Systems.
IEEE Trans. Knowl. Data Eng., 2007
Proceedings of the 2007 IEEE / WIC / ACM International Conference on Web Intelligence, 2007
Proceedings of the On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, 2007
2006
Proceedings of the Proceedings, 2006
2005
Proceedings of the Semantic Web - ISWC 2005, 4th International Semantic Web Conference, 2005
Proceedings of the Semantic Web - ISWC 2005, 4th International Semantic Web Conference, 2005
An Intrusion-Resilient Authorization and Authentication Framework for Grid Computing Infrastructure.
Proceedings of the Computational Science, 2005
A Study on the Secure and Intrusion-Tolerant Authorization and Authentication System Applied to the Distributed Environment.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005
2004
IEEE Trans. Consumer Electron., 2004
An intrusion-tolerant authorization and authentication scheme in distributed environments.
ACM SIGOPS Oper. Syst. Rev., 2004
J. Comput. Sci. Technol., 2004
Proceedings of the 13th international conference on World Wide Web, 2004
Proceedings of the Semantic Web, 2004
Proceedings of the ISWC*04 Workshop on Trust, 2004
2003