Ling Pang

Orcid: 0000-0001-6110-5402

According to our database1, Ling Pang authored at least 18 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Remote-sensing image data fusion processing technology based on multi-level fuzzy judgment.
J. Intell. Fuzzy Syst., 2023

2022
StinAttack: A Lightweight and Effective Adversarial Attack Simulation to Ensemble IDSs for Satellite- Terrestrial Integrated Network.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

Adversarial Attack Detection Based on Example Semantics and Model Activation Features.
Proceedings of the 5th International Conference on Data Science and Information Technology, 2022

Attack and Defense Methods for Graph Vertical Federation Learning.
Proceedings of the 5th International Conference on Computer Science and Software Engineering, 2022

2021
Multi-dimensional Intelligent Network Asset Identification.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

2020
Construction and Application of a Financial Big Data Analysis Model Based on Machine Learning.
Rev. d'Intelligence Artif., 2020

An Android Data Protection Scheme for System-as-Root Architectures.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

Building Undetectable Covert Channels Over Mobile Networks with Machine Learning.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

A Safety-Enhanced Dijkstra Routing Algorithm via SDN Framework.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

SDNVD-SCADA: A Formalized Vulnerability Detection Platform in SDN-Enabled SCADA System.
Proceedings of the Advanced Computer Architecture - 13th Conference, 2020

2019
Click-through Rate Prediction Based on Mobile Computing and Big Data Analysis.
Ingénierie des Systèmes d Inf., 2019

A heuristic fuzz test generator for Java native interface.
Proceedings of the 2nd ACM SIGSOFT International Workshop on Software Qualities and Their Dependencies, 2019

Neuron Selecting: Defending Against Adversarial Examples in Deep Neural Networks.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

2018
Balancing the QOS and Security in Dijkstra Algorithm by SDN Technology.
Proceedings of the Network and Parallel Computing, 2018

Automated Fuzz Generators for High-Coverage Tests Based on Program Branch Predications.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Remote Protocol Vulnerability Discovery for Intelligent Transportation Systems (ITS).
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2016
Analysis and Comparison of Routing Protocol of Wireless Sensor Network.
Int. J. Online Eng., 2016

2009
TRECVID 2009 of MCG-ICT-CAS.
Proceedings of the TRECVID 2009 workshop participants notebook papers, 2009


  Loading...