Dapeng Man

Orcid: 0000-0003-1177-3693

According to our database1, Dapeng Man authored at least 46 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Beyond Traditional Threats: A Persistent Backdoor Attack on Federated Learning.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
A novel cross-network node pair embedding methodology for anchor link prediction.
World Wide Web (WWW), September, 2023

A Novel Cross-Network Embedding for Anchor Link Prediction with Social Adversarial Attacks.
ACM Trans. Priv. Secur., 2023

Anchor Link Prediction for Privacy Leakage via De-Anonymization in Multiple Social Networks.
IEEE Trans. Dependable Secur. Comput., 2023

Privacy-Preserving Outsourcing of K-Means Clustering for Cloud-Device Collaborative Computing in Space-Air-Ground Integrated IoT.
IEEE Internet Things J., 2023

Bridging the Gaps of Both Modality and Language: Synchronous Bilingual CTC for Speech Translation and Speech Recognition.
CoRR, 2023

AI-based Intrusion Detection for Intelligence Internet of Vehicles.
IEEE Consumer Electron. Mag., 2023

Anchor Link Prediction via Network Structural Role for Privacy Leakage in Edge Computing.
Proceedings of the IEEE Global Communications Conference, 2023

2021
DAM-SE: A Blockchain-Based Optimized Solution for the Counterattacks in the Internet of Federated Learning Systems.
Secur. Commun. Networks, 2021

Intelligent Intrusion Detection Based on Federated Learning for Edge-Assisted Internet of Things.
Secur. Commun. Networks, 2021

Cache Pollution Detection Method Based on GBDT in Information-Centric Network.
Secur. Commun. Networks, 2021

Malware Detection Based on Multi-level and Dynamic Multi-feature Using Ensemble Learning at Hypervisor.
Mob. Networks Appl., 2021

ECBCM: A prestige-based edge computing blockchain security consensus model.
Trans. Emerg. Telecommun. Technol., 2021

On-path caching based on content relevance in Information-Centric Networking.
Comput. Commun., 2021

2020
An adaptive cache management approach in ICN with pre-filter queues.
Comput. Commun., 2020

An incentive mechanism for data sharing based on blockchain with smart contracts.
Comput. Electr. Eng., 2020

Sensitive Labels Matching Privacy Protection in Multi-Social Networks.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Indoor Localization Algorithm based on Attribute-Independent Weighted Naive Bayesian.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

Indoor tracking algorithm based on simplified Sage-Husa adaptive filter.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

2019
Location-Based Seeds Selection for Influence Blocking Maximization in Social Networks.
IEEE Access, 2019

A Dynamic Event Region Tracking Approach Based on Node Calibration.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Location-Aware Targeted Influence Blocking Maximization in Social Networks.
Proceedings of the 28th International Conference on Computer Communication and Networks, 2019

2018
Mathematical Performance Evaluation Model for Mobile Network Firewall Based on Queuing.
Wirel. Commun. Mob. Comput., 2018

Identification of unknown operating system type of Internet of Things terminal device based on RIPPER.
Int. J. Distributed Sens. Networks, 2018

Location-Aware Influence Blocking Maximization in Social Networks.
IEEE Access, 2018

Robust WLAN-Based Indoor Intrusion Detection Using PHY Layer Information.
IEEE Access, 2018

Multi-pattern Matching Algorithm based on Variable Step Size.
Proceedings of the 8th International Conference on Communication and Network Security, 2018

Research on Task Scheduling Model for Multi-core Processor.
Proceedings of the 8th International Conference on Communication and Network Security, 2018

PWiG: A Phase-based Wireless Gesture Recognition System.
Proceedings of the 2018 International Conference on Computing, 2018

Malware Detection Based on Dynamic Multi-Feature Using Ensemble Learning at Hypervisor.
Proceedings of the IEEE Global Communications Conference, 2018

Hybrid Classification of WEB Trojan Exploiting Small Volume of Labeled Data Vectors.
Proceedings of the 14th International Conference on Computational Intelligence and Security, 2018

2017
Device-Free Passive Identity Identification via WiFi Signals.
Sensors, 2017

Thwarting Nonintrusive Occupancy Detection Attacks from Smart Meters.
Secur. Commun. Networks, 2017

Two-Stage Mixed Queuing Model for Web Security Gateway Performance Evaluation.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

Wii: Device-Free Passive Identity Identification via WiFi Signals.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
iPil: improving passive indoor localisation via link-based CSI features.
Int. J. Ad Hoc Ubiquitous Comput., 2016

An adaptive wireless passive human detection via fine-grained physical layer information.
Ad Hoc Networks, 2016

WiSal: Ubiquitous WiFi-Based Device-Free Passive Subarea Localization without Intensive Site-Survey.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Robust WLAN-Based Indoor Fine-Grained Intrusion Detection.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
WiFi-Based Real-Time Calibration-Free Passive Human Motion Detection.
Sensors, 2015

Enhancing the Performance of Indoor Device-Free Passive Localization.
Int. J. Distributed Sens. Networks, 2015

FRID: Indoor Fine-Grained Real-Time Passive Human Motion Detection.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

2012
A Webpage Deletion Algorithm Based on Hierarchical Filtering.
Proceedings of the Web Information Systems and Mining - International Conference, 2012

2008
Study of Index Weight in Network Threat Evaluation Based on Improved Grey Theory.
Proceedings of the PACIIA 2008, 2008

A Method for Global Attack Graph Generation.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

2007
A Quantitative Evaluation Model for Network Security.
Proceedings of the Computational Intelligence and Security, International Conference, 2007


  Loading...