Linru Ma

Orcid: 0000-0002-3016-3519

According to our database1, Linru Ma authored at least 29 papers between 2005 and 2026.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

On csauthors.net:

Bibliography

2026
Adversarial Transfer Attack Against and Adaptive Defense for Intelligent Modulation Recognition.
IEEE Trans. Cogn. Commun. Netw., 2026

2025
A network integrated performance evaluation method based on multi-attribute decisions of topology and traffic.
Frontiers Comput. Sci., November, 2025

Robust Generative Defense Against Adversarial Attacks in Intelligent Modulation Recognition.
IEEE Trans. Cogn. Commun. Netw., April, 2025

Simplifying Scalable Subspace Clustering and Its Multi-View Extension by Anchor-to-Sample Kernel.
IEEE Trans. Image Process., 2025

Intrusion Detection for Internet of Things: An Anchor Graph Clustering Approach.
IEEE Trans. Inf. Forensics Secur., 2025

An integrated modeling, verification, and code generation for uncrewed aerial systems: less cost and more efficiency.
PeerJ Comput. Sci., 2025

Multi-objective evolutionary algorithm with two balancing mechanisms for heterogeneous UAV swarm path planning.
Appl. Soft Comput., 2025

Capturing Individuality and Commonality Between Anchor Graphs for Multi-View Clustering.
Proceedings of the Thirty-Fourth International Joint Conference on Artificial Intelligence, 2025

Poster: Boosting Inter-Procedural Vulnerability Detection via Retrieval-Augmented Generation.
Proceedings of the 31th IEEE International Conference on Parallel and Distributed Systems, 2025

Parse-LLM: A Prior-Free LLM Parser for Unknown System Logs.
Proceedings of the 34th ACM International Conference on Information and Knowledge Management, 2025

2024
Adversarial Attacking and Defensing Modulation Recognition With Deep Learning in Cognitive-Radio-Enabled IoT.
IEEE Internet Things J., April, 2024

Joint Communication and Control Optimization of a UAV-Assisted Multi-Vehicle Platooning System in Uncertain Communication Environment.
IEEE Trans. Veh. Technol., March, 2024

Towards secure and resilient unmanned aerial vehicles swarm network based on blockchain.
IET Blockchain, 2024

Audit-LLM: Multi-Agent Collaboration for Log-based Insider Threat Detection.
CoRR, 2024

Integrated Modeling, Verification, and Code Generation for Unmanned Aerial Systems.
CoRR, 2024

Saliency-guided meta-hallucinator for few-shot learning.
Sci. China Inf. Sci., 2024

Insider Threat Defense Strategies: Survey and Knowledge Integration.
Proceedings of the Knowledge Science, Engineering and Management, 2024

2023
WOSCA: A Hybrid Algorithm of Whale Optimization Algorithm and Sine Cosine Algorithm for Large-scale Optimization Problems.
Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering, 2023

A Blockchain-based Covert Document Communication System Model.
Proceedings of the 8th International Conference on Computer and Communication Systems, 2023

2022
MADDC: Multi-Scale Anomaly Detection, Diagnosis and Correction for Discrete Event Logs.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Image-Based Insider Threat Detection via Geometric Transformation.
Secur. Commun. Networks, 2021

A Survey on the Development of Self-Organizing Maps for Unsupervised Intrusion Detection.
Mob. Networks Appl., 2021

2020
An Immunology-Inspired Network Security Architecture.
IEEE Wirel. Commun., 2020

Direct Batch Growth Hierarchical Self-Organizing Mapping Based on Statistics for Efficient Network Intrusion Detection.
IEEE Access, 2020

2019
Statistics-Enhanced Direct Batch Growth Self-Organizing Mapping for Efficient DoS Attack Detection.
IEEE Access, 2019

Simulation Environment of Evaluation and Optimization for Moving Target Defense: A SimPy Approach.
Proceedings of the ICCNS 2019: The 9th International Conference on Communication and Network Security, 2019

2013
Rule-Based Security Capabilities Matching for Web Services.
Wirel. Pers. Commun., 2013

Model of Domain based RBAC and Supporting Technologies.
J. Comput., 2013

2005
Attack Scenario Construction Based on Rule and Fuzzy Clustering.
Proceedings of the Computational Intelligence and Security, International Conference, 2005


  Loading...