Kun Lv

Orcid: 0000-0002-5411-5466

According to our database1, Kun Lv authored at least 19 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Micromotion Feature Extraction with VEMW Radar Based on Rotational Doppler Effect.
Remote. Sens., 2023

2019
DEPLEST: A blockchain-based privacy-preserving distributed database toward user behaviors in social networks.
Inf. Sci., 2019

Dynamic defense strategy against advanced persistent threat under heterogeneous networks.
Inf. Fusion, 2019

2018
Enhancing the Discrimination Ability of a Gas Sensor Array Based on a Novel Feature Selection and Fusion Framework.
Sensors, 2018

A Dynamic Hidden Forwarding Path Planning Method Based on Improved Q-Learning in SDN Environments.
Secur. Commun. Networks, 2018

An Effective Method to Generate Simulated Attack Data Based on Generative Adversarial Nets.
Proceedings of the 17th IEEE International Conference On Trust, 2018

An Improved Monte Carlo Graph Search Algorithm for Optimal Attack Path Analysis.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Establishing an Optimal Network Defense System: A Monte Carlo Graph Search Method.
Proceedings of the Science of Cyber Security - First International Conference, 2018

An Attack Graph Generation Method Based on Parallel Computing.
Proceedings of the Science of Cyber Security - First International Conference, 2018

Keystroke Biometrics for Freely Typed Text Based on CNN model.
Proceedings of the 22nd Pacific Asia Conference on Information Systems, 2018

A Partition Matching Method for Optimal Attack Path Analysis.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Estimation of 3-D Pose with 2-D Vision Based on Shape Matching Method.
Proceedings of the Neural Information Processing - 25th International Conference, 2018

A Monte Carlo Graph Search Algorithm with Ant Colony Optimization for Optimal Attack Path Analysis.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

A Double-Layer Detection and Classification Approach for Network Attacks.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Computation of Caging Grasps of Objects using Multi-Task Learning Method.
Proceedings of the 3rd International Conference on Advanced Robotics and Mechatronics, 2018

2017
A Quantitative Method for Evaluating Network Security Based on Attack Graph.
Proceedings of the Network and System Security - 11th International Conference, 2017

An Automatic Vulnerabilities Classification Method Based on Their Relevance.
Proceedings of the Network and System Security - 11th International Conference, 2017

Optimal Attack Path Generation Based on Supervised Kohonen Neural Network.
Proceedings of the Network and System Security - 11th International Conference, 2017

2006
Research of FNF Internal Fixation Operation Parametric Planning and Evaluation System.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2006


  Loading...