Hao Hu

Orcid: 0000-0003-4888-6368

Affiliations:
  • Zhengzhou Information Science Technology Institute, China


According to our database1, Hao Hu authored at least 21 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
WF-MTD: Evolutionary Decision Method for Moving Target Defense Based on Wright-Fisher Process.
IEEE Trans. Dependable Secur. Comput., 2023

2022
Cybersecurity Threat Assessment Integrating Qualitative Differential and Evolutionary Games.
IEEE Trans. Netw. Serv. Manag., 2022

Moving target defense of routing randomization with deep reinforcement learning against eavesdropping attack.
Digit. Commun. Networks, 2022

2021
An Adaptive IP Hopping Approach for Moving Target Defense Using a Light-Weight CNN Detector.
Secur. Commun. Networks, 2021

Optimal Network Defense Strategy Selection Method: A Stochastic Differential Game Model.
Secur. Commun. Networks, 2021

Optimal temporospatial strategy selection approach to moving target defense: A FlipIt differential game model.
Comput. Secur., 2021

2020
GDM: A General Distributed Method for Cross-Domain Service Function Chain Embedding.
IEEE Trans. Netw. Serv. Manag., 2020

Optimal Decision Making Approach for Cyber Security Defense Using Evolutionary Game.
IEEE Trans. Netw. Serv. Manag., 2020

Optimal Timing Selection Approach to Moving Target Defense: A FlipIt Attack-Defense Game Model.
Secur. Commun. Networks, 2020

SOCMTD: Selecting Optimal Countermeasure for Moving Target Defense Using Dynamic Game.
KSII Trans. Internet Inf. Syst., 2020

Attack scenario reconstruction approach using attack graph and alert data mining.
J. Inf. Secur. Appl., 2020

Network dynamic defense system based on holographic transformation.
Int. J. Distributed Sens. Networks, 2020

2019
Improved schemes for visual secret sharing based on random grids.
Multim. Tools Appl., 2019

2018
Security Metric Methods for Network Multistep Attacks Using AMC and Big Data Correlation Analysis.
Secur. Commun. Networks, 2018

Security risk situation quantification method based on threat prediction for multimedia communication network.
Multim. Tools Appl., 2018

面向风险评估的专家权重自适应调整方法 (Self-adaption Adjustment Method for Experts in Risk Assessment).
计算机科学, 2018

Improved Contrast for Threshold Random-grid-based Visual Cryptography.
KSII Trans. Internet Inf. Syst., 2018

Optimal Network Defense Strategy Selection Based on Incomplete Information Evolutionary Game.
IEEE Access, 2018

2017
Quantitative Method for Network Security Situation Based on Attack Prediction.
Secur. Commun. Networks, 2017

2016
General construction for XOR-based visual cryptography and its extended capability.
Multim. Tools Appl., 2016

2015
像素不扩展视觉密码的边缘增强研究 (Edge Enhancement on Size Invariant Visual Cryptography).
计算机科学, 2015


  Loading...