Zhuo Lv

Orcid: 0000-0002-2009-0168

According to our database1, Zhuo Lv authored at least 14 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Design and multilevel reconstruction method of intelligent power industry control system based on digital twins.
Concurr. Comput. Pract. Exp., July, 2024

Predicting the properties of metamaterials consisting of curved-wall triangles using ensemble neural networks with interpretability.
Eng. Appl. Artif. Intell., 2024

2023
A Reflection-Based Channel Fingerprint to Locate Physically Intrusive Devices in ICS.
IEEE Trans. Ind. Informatics, April, 2023

2022
Attack and protection schemes on fabric isomorphic crosschain systems.
Int. J. Distributed Sens. Networks, 2022

AWFC: Preventing Label Flipping Attacks Towards Federated Learning for Intelligent IoT.
Comput. J., 2022

Comprehensive defense scheme against container escape related to container management procedure.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2022

2021
Detecting Anomalies in Intelligent Vehicle Charging and Station Power Supply Systems With Multi-Head Attention Models.
IEEE Trans. Intell. Transp. Syst., 2021

2020
Machine Learning Methods for Industrial Protocol Security Analysis: Issues, Taxonomy, and Directions.
IEEE Access, 2020

DNS Rebinding Detection for Local Internet of Things Devices.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

Detecting Intrusions in Railway Signal Safety Data Networks with DBSCAN-ARIMA.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

2019
A Novel Approach for Traffic Anomaly Detection in Power Distributed Control System and Substation System.
Proceedings of the Network and System Security - 13th International Conference, 2019

An Efficient Vulnerability Detection Model for Ethereum Smart Contracts.
Proceedings of the Network and System Security - 13th International Conference, 2019

2018
A Control Flow Anomaly Detection Algorithm for Industrial Control Systems.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

2017
A New NURBS Based Skinning Algorithm of STL Model.
Proceedings of the 10th International Symposium on Computational Intelligence and Design, 2017


  Loading...