Yuanbo Guo

Orcid: 0000-0003-0185-203X

According to our database1, Yuanbo Guo authored at least 65 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Trigger-free cybersecurity event detection based on contrastive learning.
J. Supercomput., December, 2023

CNN-Cap: Effective Convolutional Neural Network-based Capacitance Models for Interconnect Capacitance Extraction.
ACM Trans. Design Autom. Electr. Syst., July, 2023

A semantic-based method for analysing unknown malicious behaviours via hyper-spherical variational auto-encoders.
IET Inf. Secur., March, 2023

Real-Time Sensor Fault Identification and Remediation for Single-Phase Grid-Connected Converters Using Hybrid Observers With Unknown Input Adaptation.
IEEE Trans. Ind. Electron., 2023

Dual-Vector-Based Predictive Torque Control for Fault-Tolerant Inverter-Fed Induction Motor Drives With Adaptive Switching Instant.
IEEE Trans. Ind. Electron., 2023

Modulated-Virtual-Vector-Based Predictive Current Control for Dual Three-Phase PMSM With Enhanced Steady-State Performance.
Proceedings of the 49th Annual Conference of the IEEE Industrial Electronics Society, 2023

Coordinated Passive Maneuvering Target Tracking by Multiple Underwater Vehicles Based on Asynchronous Sequential Filtering.
Proceedings of the Intelligent Robotics and Applications - 16th International Conference, 2023

2022
An end-to-end method for advanced persistent threats reconstruction in large-scale networks based on alert and log correlation.
J. Inf. Secur. Appl., 2022

A privacy-preserving and verifiable federated learning method based on blockchain.
Comput. Commun., 2022

EFC/H∞ Based Dual-mode Switching Global Control of the First-order Parallel Rotating Double Inverted Pendulum System.
Proceedings of the IECON 2022, 2022

Design of Digital-controlled Two-stage AC/DC Converter Based on GaN HEMT.
Proceedings of the IECON 2022, 2022

Event-triggered MPC for Collision Avoidance of Autonomous Vehicles Considering Trajectory Tracking Performance.
Proceedings of the International Conference on Advanced Robotics and Mechatronics , 2022

2021
Privacy-preserving and communication-efficient federated learning in Internet of Things.
Comput. Secur., 2021

CNN-Cap: Effective Convolutional Neural Network Based Capacitance Models for Full-Chip Parasitic Extraction.
Proceedings of the IEEE/ACM International Conference On Computer Aided Design, 2021

2020
Two-Round Password-Based Authenticated Key Exchange from Lattices.
Wirel. Commun. Mob. Comput., 2020

A Novel Attack-and-Defense Signaling Game for Optimal Deceptive Defense Strategy Choice.
Wirel. Commun. Mob. Comput., 2020

MCKC: a modified cyber kill chain model for cognitive APTs analysis within Enterprise multimedia network.
Multim. Tools Appl., 2020

内部威胁检测中用户属性画像方法与应用 (User Attributes Profiling Method and Application in Insider Threat Detection).
计算机科学, 2020

A Risk Analysis Framework for Social Engineering Attack Based on User Profiling.
J. Organ. End User Comput., 2020

Highly efficient federated learning with strong privacy preservation in cloud computing.
Comput. Secur., 2020

Sentiment Classification for Chinese Text Based on Interactive Multitask Learning.
IEEE Access, 2020

2019
Robust Control Strategy Design for Single-Phase Grid-Connected Converters Under System Perturbations.
IEEE Trans. Ind. Electron., 2019

Multifeature Named Entity Recognition in Information Security Based on Adversarial Learning.
Secur. Commun. Networks, 2019

HeteMSD: A Big Data Analytics Framework for Targeted Cyber-Attacks Detection Using Heterogeneous Multisource Data.
Secur. Commun. Networks, 2019

一种基于知识图谱的扩展攻击图生成方法 (Extended Attack Graph Generation Method Based on Knowledge Graph).
计算机科学, 2019

小样本下未知内部威胁检测的方法研究 (Method for Unknown Insider Threat Detection with Small Samples).
计算机科学, 2019

Dual carrier based PWM strategy for common-mode voltage reduction of three-phase voltage source inverters.
IEICE Electron. Express, 2019

Collaborative detection of cybersecurity threats in bigdata.
Int. Arab J. Inf. Technol., 2019

Zero-Day Vulnerability Risk Assessment and Attack Path Analysis Using Security Metric.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Parameter-Estimation-Based Adaptive MTPA Control for Interior Permanent Magnet Synchronous Motors.
Proceedings of the 6th International Conference on Control, 2019

A Self-Attention-Based Approach for Named Entity Recognition in Cybersecurity.
Proceedings of the 15th International Conference on Computational Intelligence and Security, 2019

2018
网络资产探测技术研究 (Research on Network Asset Detection Technology).
计算机科学, 2018

2017
低冗余二维码汉字编码研究 (Research on Lower Redundancy of Two-dimension Barcode Encoding in Chinese Characters).
计算机科学, 2017

网络安全事件关联分析技术与工具研究 (Survey on Network Security Event Correlation Analysis Methods and Tools).
计算机科学, 2017

基于开源工具集的大数据网络安全态势感知及预警架构 (Framework for Big Data Network Security Situational Awareness and Threat Warning Based on Open Source Toolset).
计算机科学, 2017

An Insider Threat Detection Method Based on Business Process Mining.
Int. J. Bus. Data Commun. Netw., 2017

An improved CBPWM method to balance the output voltage of eight-switch three-phase inverter under neutral-point potential unbalance condition.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

Online grid inductance estimation for electric traction PWM rectifier based on dual-frequency harmonic current injection.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

2016
大数据环境下威胁的协作式检测综述 (Review of Collaborative Detection of Threat in Big Data).
计算机科学, 2016

Prediction of ship roll motion based on combination of phase space reconstruction theory and Elman network.
Proceedings of the IEEE International Conference on Information and Automation, 2016

Business Process Mining based Insider Threat Detection System.
Proceedings of the Advances on P2P, 2016

2015
基于无线信道特征的密钥生成与提取研究 (Generation and Extraction of Secret Keys Based on Properties of Wireless Channels).
计算机科学, 2015

2014
Partitioning OWL Knowledge Bases for Parallel Reasoning.
Proceedings of the 2014 IEEE International Conference on Semantic Computing, 2014

2013
Incentive-Based Optimal Nodes Selection Mechanism for Threshold Key Management in MANETs with Selfish Nodes.
Int. J. Distributed Sens. Networks, 2013

2012
Mechanism Design Based Nodes Selection Model for Threshold Key Management in MANETs.
Proceedings of the 11th IEEE International Conference on Trust, 2012

TNC-eSA: An Echanced Security Access Solution to Office Networks.
Proceedings of the Information Computing and Applications - Third International Conference, 2012

A TNC Protocol for 3GPP-WLAN Integrated Environment.
Proceedings of the Information Computing and Applications - Third International Conference, 2012

2010
Security Topology Control Method for Wireless Sensor Networks with Node-Failure Tolerance Based on Self-Regeneration.
EURASIP J. Wirel. Commun. Netw., 2010

2008
Adaptive Algorithms to Mitigate Inefficiency in Reliability Differentiation Mechanisms for Wireless Sensor Networks.
Proceedings of the MSN 2008, 2008

2007
A Requirements Driven Framework for Benchmarking Semantic Web Knowledge Base Systems.
IEEE Trans. Knowl. Data Eng., 2007

Document-Centric Query Answering for the Semantic Web.
Proceedings of the 2007 IEEE / WIC / ACM International Conference on Web Intelligence, 2007

SSWS 2007 PC Co-chairs' Message.
Proceedings of the On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, 2007

2006
Large Scale Knowledge Base Systems: An Empirical Evaluation Perspective.
Proceedings of the Proceedings, 2006

2005
LUBM: A benchmark for OWL knowledge base systems.
J. Web Semant., 2005

Rapid Benchmarking for Semantic Web Knowledge Base Systems.
Proceedings of the Semantic Web - ISWC 2005, 4th International Semantic Web Conference, 2005

On Logical Consequence for Collections of OWL Documents.
Proceedings of the Semantic Web - ISWC 2005, 4th International Semantic Web Conference, 2005

An Intrusion-Resilient Authorization and Authentication Framework for Grid Computing Infrastructure.
Proceedings of the Computational Science, 2005

A Study on the Secure and Intrusion-Tolerant Authorization and Authentication System Applied to the Distributed Environment.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

2004
An efficient and secure fault-tolerant conference-key distribution scheme.
IEEE Trans. Consumer Electron., 2004

An intrusion-tolerant authorization and authentication scheme in distributed environments.
ACM SIGOPS Oper. Syst. Rev., 2004

Practical Secret Sharing Scheme Realizing Generalized Adversary Structure.
J. Comput. Sci. Technol., 2004

Choosing the best knowledge base system for large semantic web applications.
Proceedings of the 13th international conference on World Wide Web, 2004

An Evaluation of Knowledge Base Systems for Large OWL Datasets.
Proceedings of the Semantic Web, 2004

An Initial Investigation into Querying an Untrustworthy and Inconsistent Web.
Proceedings of the ISWC*04 Workshop on Trust, 2004

2003
Benchmarking DAML+OIL Repositories.
Proceedings of the Semantic Web, 2003


  Loading...