Rong Jiang

Orcid: 0000-0003-4160-8349

Affiliations:
  • National University of Defense Technology, College of Computer Science and Technology, China (PhD 2014)
  • University of Waterloo, Department of Electrical and Computer Engineering, Canada (2013)


According to our database1, Rong Jiang authored at least 32 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A survey on cybersecurity knowledge graph construction.
Comput. Secur., January, 2024

2022
Multiple Sequential Network Attacks Detection Based on DTW-HMM.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

A Survey on Threat Hunting: Approaches and Applications.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

2021
Detection and Defense Methods of Cyber Attacks.
Proceedings of the MDATA: A New Knowledge Representation Model, 2021

A Distributed Framework for APT Attack Analysis.
Proceedings of the MDATA: A New Knowledge Representation Model, 2021

Target relational attention-oriented knowledge graph reasoning.
Neurocomputing, 2021

A Survey of Cyber Security Approaches for Prediction.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

2020
Multi-source knowledge fusion: a survey.
World Wide Web, 2020

Knowledge-Infused Pre-trained Models for KG Completion.
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020

Striking a Balance in Unsupervised Fine-Grained Domain Adaptation Using Adversarial Learning.
Proceedings of the Knowledge Science, Engineering and Management, 2020

A Review of APT Attack Detection Methods and Defense Strategies.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

An APT Attack Analysis Framework Based on Self-define Rules and Mapreduce.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

2019
Needle in a Haystack: Attack Detection from Large-Scale System Audit.
Proceedings of the 19th IEEE International Conference on Communication Technology, 2019

Research of Trojan Attack Effect Evaluation Based on FAHP.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Multi-source Knowledge Fusion: A Survey.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

HDGS: A Hybrid Dialogue Generation System using Adversarial Learning.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Intrusion Detection Results Analysis Based on Variational Auto-Encoder.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

FSM-Based Cyber Security Status Analysis Method.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

2018
Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data.
Future Gener. Comput. Syst., 2018

Analysis on the Related Evaluation Technique of Composite Attack in Network Confrontation.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
Neural Network Based Web Log Analysis for Web Intrusion Detection.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

A Framework to Construct Knowledge Base for Cyber Security.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

KGBIAC: Knowledge Graph Based Intelligent Alert Correlation Framework.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2016
A Secure Communication Protocol with Privacy-Preserving Monitoring and Controllable Linkability for V2G.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

2015
Efficient self-healing group key management with dynamic revocation and collusion resistance for SCADA in smart grid.
Secur. Commun. Networks, 2015

EAPSG: Efficient authentication protocol for secure group communications in maritime wideband communication networks.
Peer-to-Peer Netw. Appl., 2015

2014
MMACS: A multi-authority cloud access scheme with mixed access structure.
Proceedings of the IEEE International Conference on Communications, 2014

SEGR: A secure and efficient group roaming scheme for machine to machine communications between 3GPP and WiMAX networks.
Proceedings of the IEEE International Conference on Communications, 2014

2013
HRKT: A Hierarchical Route Key Tree based Group Key Management for Wireless Sensor Networks.
KSII Trans. Internet Inf. Syst., 2013

EAP-Based Group Authentication and Key Agreement Protocol for Machine-Type Communications.
Int. J. Distributed Sens. Networks, 2013

LGTH: A lightweight group authentication protocol for machine-type communication in LTE networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Robust group key management with revocation and collusion resistance for SCADA in smart grid.
Proceedings of the 2013 IEEE Global Communications Conference, 2013


  Loading...