Yuefei Zhu
Orcid: 0000-0002-9559-8783
According to our database1,
Yuefei Zhu
authored at least 81 papers
between 2004 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
AECR: Automatic attack technique intelligence extraction based on fine-tuned large language model.
Comput. Secur., 2025
2024
Sensors, February, 2024
Frontiers Comput. Sci., February, 2024
MCRe: A Unified Framework for Handling Malicious Traffic With Noise Labels Based on Multidimensional Constraint Representation.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Geosci. Remote. Sens. Lett., 2024
ULDC: Unsupervised Learning-Based Data Cleaning for Malicious Traffic With High Noise.
Comput. J., 2024
2023
Comput. Secur., 2023
Meta-TFEN: A Multi-Modal Deep Learning Approach for Encrypted Malicious Traffic Detection.
Proceedings of the 33rd International Telecommunication Networks and Applications Conference, 2023
Towards Efficient and Privacy-Preserving Anomaly Detection of Blockchain-Based Cryptocurrency Transactions.
Proceedings of the Information and Communications Security - 25th International Conference, 2023
2022
Anomaly Detection as a Service: An Outsourced Anomaly Detection Scheme for Blockchain in a Privacy-Preserving Manner.
IEEE Trans. Netw. Serv. Manag., December, 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEICE Trans. Inf. Syst., 2022
2021
Comput. Secur., 2021
Proceedings of the ISEEIE 2021: International Symposium on Electrical, Electronics and Information Engineering, Seoul Republic of Korea, February 19, 2021
2020
Enhancing network intrusion detection classifiers using supervised adversarial training.
J. Supercomput., 2020
IEEE Access, 2020
2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
2017
IEEE Access, 2017
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017
2016
计算机科学, 2016
2015
IEEE Trans. Mob. Comput., 2015
2014
High-Payload Image-Hiding Scheme Based on Best-Block Matching and Multi-layered Syndrome-Trellis Codes.
Proceedings of the Web Information Systems Engineering - WISE 2014, 2014
A Method of Multiple Encryption and Sectional Encryption Protocol Reverse Engineering.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014
2013
IEEE J. Sel. Areas Commun., 2013
J. Networks, 2013
J. Networks, 2013
Cryptanalysis and enhancements of efficient three-party password-based key exchange scheme.
Int. J. Commun. Syst., 2013
Int. Arab J. Inf. Technol., 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
2012
Secur. Commun. Networks, 2012
A Secure Lightweight RFID Binding Proof Protocol for Medication Errors and Patient Safety.
J. Medical Syst., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
2011
Cryptanalysis and Enhancements of Three-Party Authenticated Key Exchange Protocol using ECC.
J. Inf. Sci. Eng., 2011
A novel lightweight authentication scheme with anonymity for roaming service in global mobility networks.
Int. J. Netw. Manag., 2011
Int. Arab J. Inf. Technol., 2011
2010
Int. J. Netw. Secur., 2010
IEEE Commun. Lett., 2010
Security analysis of a cocktail protocol with the authentication and key agreement on the UMTS.
IEEE Commun. Lett., 2010
Multi-Session Data Gathering with Compressive Sensing for Large-Scale Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2010
2009
Client-to-client Password-Based Authenticated Key Establishment in a Cross-Realm Setting.
J. Networks, 2009
J. Networks, 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Advances in Data and Web Management, Joint International Conferences, 2009
Proceedings of the Information Security Practice and Experience, 2009
2008
Int. J. Netw. Secur., 2008
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008
Forward Secure Password-Based Authenticated Key Distribution in the Three-Party Setting.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2008
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Constant-Round Password-Based Authenticated Key Exchange Protocol for Dynamic Groups.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008
2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
Proceedings of the Computational Intelligence and Security, International Conference, 2007
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
2006
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Web Information Systems, 2006
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006
Proceedings of the Grid and Cooperative Computing Workshops, 2006
Proceedings of the Computational Intelligence and Security, International Conference, 2006
A Lightweight Scheme for Trust Relationship Establishment in Ubiquitous Sensor Networks.
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006
2005
Proceedings of the Advances in Web-Age Information Management, 2005
Proceedings of the Advances in Web-Age Information Management, 2005
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
2004
Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2004), 2004
Proceedings of the Applied Cryptography and Network Security, 2004