Zhihong Tian

Orcid: 0000-0002-9409-5359

According to our database1, Zhihong Tian authored at least 229 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Recursive Multi-Tree Construction With Efficient Rule Sifting for Packet Classification on FPGA.
IEEE/ACM Trans. Netw., April, 2024

Structure-Aware Prototypical Neural Process for Few-Shot Graph Classification.
IEEE Trans. Neural Networks Learn. Syst., April, 2024

Collaborative Meta-Path Modeling for Explainable Recommendation.
IEEE Trans. Comput. Soc. Syst., April, 2024

BlockSC: A Blockchain Empowered Spatial Crowdsourcing Service in Metaverse While Preserving User Location Privacy.
IEEE J. Sel. Areas Commun., April, 2024

Optimizing Mobility-Aware Task Offloading in Smart Healthcare for Internet of Medical Things Through Multiagent Reinforcement Learning.
IEEE Internet Things J., April, 2024

Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection.
IEEE Trans. Software Eng., March, 2024

Intelligent Event-Triggered Control Supervised by Mini-Batch Machine Learning and Data Compression Mechanism for T-S Fuzzy NCSs Under DoS Attacks.
IEEE Trans. Fuzzy Syst., March, 2024

Efficient Regular Simple Path Queries under Transitive Restricted Expressions.
Proc. VLDB Endow., March, 2024

Fundus Image Enhancement via Semi-Supervised GAN and Anatomical Structure Preservation.
IEEE Trans. Emerg. Top. Comput. Intell., February, 2024

Influence Maximization via Vertex Countering.
Proc. VLDB Endow., February, 2024

Labels Are Culprits: Defending Gradient Attack on Privacy.
IEEE Internet Things J., February, 2024

Size-Constrained Community Search on Large Networks: An Effective and Efficient Solution.
IEEE Trans. Knowl. Data Eng., January, 2024

Performance Analysis and Design of Intelligent Optimising Integral-Based Event-Trigger Control for Autonomous Ground Vehicles Under DoS Attacks.
IEEE Trans. Intell. Veh., January, 2024

An Access Control Method Against Unauthorized and Noncompliant Behaviors of Real-Time Data in Industrial IoT.
IEEE Internet Things J., January, 2024

ICRB: An improved consensus-based redactable blockchain considering contextual consistency.
Trans. Emerg. Telecommun. Technol., January, 2024

Privacy-Preserving Convolutional Neural Network Classification Scheme With Multiple Keys.
IEEE Trans. Serv. Comput., 2024

Lossless Data Hiding in NTRU Cryptosystem by Polynomial Encoding and Modulation.
IEEE Trans. Inf. Forensics Secur., 2024

Stability Analysis of Networked Control Systems Under DoS Attacks and Security Controller Design With Mini-Batch Machine Learning Supervision.
IEEE Trans. Inf. Forensics Secur., 2024

Manifold Constraints for Imperceptible Adversarial Attacks on Point Clouds.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Evaluation Mechanism for Decentralized Collaborative Pattern Learning in Heterogeneous Vehicular Networks.
IEEE Trans. Intell. Transp. Syst., November, 2023

Digital Twin-Based Cyber Range for Industrial Internet of Things.
IEEE Consumer Electron. Mag., November, 2023

Decentralized Cooperative Caching for Sustainable Metaverse Via Meta Self-Supervision Learning.
IEEE Wirel. Commun., October, 2023

Personalized sampling graph collection with local differential privacy for link prediction.
World Wide Web (WWW), September, 2023

REMSF: A Robust Ensemble Model of Malware Detection Based on Semantic Feature Fusion.
IEEE Internet Things J., September, 2023

Diverse classifiers with label dependencies for long-tail relation extraction in big data.
Comput. Electr. Eng., September, 2023

A covert channel over blockchain based on label tree without long waiting times.
Comput. Networks, August, 2023

GraphNAS++: Distributed Architecture Search for Graph Neural Networks.
IEEE Trans. Knowl. Data Eng., July, 2023

CSKG4APT: A Cybersecurity Knowledge Graph for Advanced Persistent Threat Organization Attribution.
IEEE Trans. Knowl. Data Eng., June, 2023

Dynamic Prototype Network Based on Sample Adaptation for Few-Shot Malware Detection.
IEEE Trans. Knowl. Data Eng., May, 2023

Residual long short-term memory network with multi-source and multi-frequency information fusion: An application to China's stock market.
Inf. Sci., April, 2023

Adaptive Information Hiding Method Based on Feature Extraction for Visible Light Communication.
IEEE Commun. Mag., April, 2023

Super-resolution-based part collaboration network for vehicle re-identification.
World Wide Web (WWW), March, 2023

Adaptive Asynchronous Clustering Algorithms for Wireless Mesh Networks.
IEEE Trans. Knowl. Data Eng., March, 2023

CDTier: A Chinese Dataset of Threat Intelligence Entity Relationships.
IEEE Trans. Sustain. Comput., 2023

A Semi-Centralized Trust Management Model Based on Blockchain for Data Exchange in IoT System.
IEEE Trans. Serv. Comput., 2023

A Blockchain-Empowered Federated Learning in Healthcare-Based Cyber Physical Systems.
IEEE Trans. Netw. Sci. Eng., 2023

Privacy Protection Method Based On Multidimensional Feature Fusion Under 6G Networks.
IEEE Trans. Netw. Sci. Eng., 2023

A Malicious Mining Code Detection Method Based on Multi-Features Fusion.
IEEE Trans. Netw. Sci. Eng., 2023

Imbalanced Malware Family Classification Using Multimodal Fusion and Weight Self-Learning.
IEEE Trans. Intell. Transp. Syst., 2023

MUSEDA: Multilingual Unsupervised and Supervised Embedding for Domain Adaption.
Knowl. Based Syst., 2023

Rethinking Perturbation Directions for Imperceptible Adversarial Attacks on Point Clouds.
IEEE Internet Things J., 2023

CWEmd: A Lightweight Similarity Measurement for Resource-Constrained Vehicular Networks.
IEEE Internet Things J., 2023

Do Not Trust the Clouds Easily: The Insecurity of Content Security Policy Based on Object Storage.
IEEE Internet Things J., 2023

Power normalized cepstral robust features of deep neural networks in a cloud computing data privacy protection scheme.
Neurocomputing, 2023

Detecting Smart Contract Project Anomalies in Metaverse.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

Improving Precision of Detecting Deserialization Vulnerabilities with Bytecode Analysis.
Proceedings of the 31st IEEE/ACM International Symposium on Quality of Service, 2023

Hierarchical Name-based Routing for Content Provider Mobility in ICN.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

Matching Words for Out-of-distribution Detection.
Proceedings of the IEEE International Conference on Data Mining, 2023

Smart Contract Firewall: Protecting the on-Chain Smart Contract Projects.
Proceedings of the IEEE Global Communications Conference, 2023

A Survey of Deception Defense: Approaches Used to Counter Malicious Behavior.
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023

Research on the Exploitability of Binary Software Vulnerabilities.
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023

Intrusion Detection Techniques Analysis in Cloud Computing.
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023

C2MDNIF: A Cross Chain based Method for Domain Name Information Fusion.
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023

OPTIMA-DEM: An Optimized Threat Behavior Prediction Method using DEMATEL-ISM.
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023

Vulnerability Correlation, Multi-step Attack and Exploit Chain in Breach and Attack Simulation.
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023

Deep Manifold Attack on Point Clouds via Parameter Plane Stretching.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
From Data and Model Levels: Improve the Performance of Few-Shot Malware Classification.
IEEE Trans. Netw. Serv. Manag., December, 2022

VRepChain: A Decentralized and Privacy-Preserving Reputation System for Social Internet of Vehicles Based on Blockchain.
IEEE Trans. Veh. Technol., 2022

An Anonymity Vulnerability in Tor.
IEEE/ACM Trans. Netw., 2022

DeepAutoD: Research on Distributed Machine Learning Oriented Scalable Mobile Communication Security Unpacking System.
IEEE Trans. Netw. Sci. Eng., 2022

Epidemic Risk Assessment by a Novel Communication Station Based Method.
IEEE Trans. Netw. Sci. Eng., 2022

A VMD and LSTM Based Hybrid Model of Load Forecasting for Power Grid Security.
IEEE Trans. Ind. Informatics, 2022

An Edge-AI Based Forecasting Approach for Improving Smart Microgrid Efficiency.
IEEE Trans. Ind. Informatics, 2022

IEPSBP: A Cost-Efficient Image Encryption Algorithm Based on Parallel Chaotic System for Green IoT.
IEEE Trans. Green Commun. Netw., 2022

Applying artificial bee colony algorithm to the multidepot vehicle routing problem.
Softw. Pract. Exp., 2022

STG2P: A two-stage pipeline model for intrusion detection based on improved LightGBM and K-means.
Simul. Model. Pract. Theory, 2022

Large-Capacity Local Multi-Dimensional Information Hiding Method for 6G Networks.
IEEE Netw., 2022

A framework for personalized recommendation with conditional generative adversarial networks.
Knowl. Inf. Syst., 2022

A novel flow-vector generation approach for malicious traffic detection.
J. Parallel Distributed Comput., 2022

Leveraging transferability and improved beam search in textual adversarial attacks.
Neurocomputing, 2022

TPRPF: a preserving framework of privacy relations based on adversarial training for texts in big data.
Frontiers Comput. Sci., 2022

Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection.
CoRR, 2022

ConsPrompt: Easily Exploiting Contrastive Samples for Few-shot Prompt Learning.
CoRR, 2022

A Blockchain-Based Distributed Computational Resource Trading System for Industrial Internet of Things Considering Multiple Preferences.
CoRR, 2022

MRI radiogenomics for intelligent diagnosis of breast tumors and accurate prediction of neoadjuvant chemotherapy responses-a review.
Comput. Methods Programs Biomed., 2022

Improving adversarial transferability by temporal and spatial momentum in urban speaker recognition systems.
Comput. Electr. Eng., 2022

StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing.
Proceedings of the 31st USENIX Security Symposium, 2022

WGAN-GP and LSTM based Prediction Model for Aircraft 4- D Traj ectory.
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022

2021
Spatiotemporal Data Cleaning and Knowledge Fusion.
Proceedings of the MDATA: A New Knowledge Representation Model, 2021

Knowledge Extraction: Automatic Classification of Matching Rules.
Proceedings of the MDATA: A New Knowledge Representation Model, 2021

Entity Alignment: Optimization by Seed Selection.
Proceedings of the MDATA: A New Knowledge Representation Model, 2021

Classifying encrypted traffic using adaptive fingerprints with multi-level attributes.
World Wide Web, 2021

An Aerial-Computing-Assisted Architecture for Large-Scale Sensor Networks.
IEEE Wirel. Commun., 2021

Introduction to the Special Section on Artificial Intelligence Security: Adversarial Attack and Defense.
IEEE Trans. Netw. Sci. Eng., 2021

LocJury: An IBN-Based Location Privacy Preserving Scheme for IoCV.
IEEE Trans. Intell. Transp. Syst., 2021

Honeypot Identification in Softwarized Industrial Cyber-Physical Systems.
IEEE Trans. Ind. Informatics, 2021

A Novel Web Attack Detection System for Internet of Things via Ensemble Classification.
IEEE Trans. Ind. Informatics, 2021

Contract and Lyapunov Optimization-Based Load Scheduling and Energy Management for UAV Charging Stations.
IEEE Trans. Green Commun. Netw., 2021

Deep-Green: A Dispersed Energy-Efficiency Computing Paradigm for Green Industrial IoT.
IEEE Trans. Green Commun. Netw., 2021

An Energy-Efficient In-Network Computing Paradigm for 6G.
IEEE Trans. Green Commun. Netw., 2021

A Topic Representation Model for Online Social Networks Based on Hybrid Human-Artificial Intelligence.
IEEE Trans. Comput. Soc. Syst., 2021

Malicious mining code detection based on ensemble learning in cloud computing environment.
Simul. Model. Pract. Theory, 2021

StFuzzer: Contribution-Aware Coverage-Guided Fuzzing for Smart Devices.
Secur. Commun. Networks, 2021

Attribution Classification Method of APT Malware in IoT Using Machine Learning Techniques.
Secur. Commun. Networks, 2021

Hierarchical Core Maintenance on Large Dynamic Graphs.
Proc. VLDB Endow., 2021

The Security of Internet of Vehicles Network: Adversarial Examples for Trajectory Mode Detection.
IEEE Netw., 2021

AutoD: Intelligent Blockchain Application Unpacking Based on JNI Layer Deception Call.
IEEE Netw., 2021

Building Agile and Resilient UAV Networks Based on SDN and Blockchain.
IEEE Netw., 2021

Secure Data Sharing Framework via Hierarchical Greedy Embedding in Darknets.
Mob. Networks Appl., 2021

Research on Intelligent Detection of Command Level Stack Pollution for Binary Program Analysis.
Mob. Networks Appl., 2021

A multiple-kernel clustering based intrusion detection scheme for 5G and IoT networks.
Int. J. Mach. Learn. Cybern., 2021

Power Grid-Oriented Cascading Failure Vulnerability Identifying Method Based on Wireless Sensors.
J. Sensors, 2021

Multi-party transaction framework for drone services based on alliance blockchain in smart cities.
J. Inf. Secur. Appl., 2021

IoT root union: A decentralized name resolving system for IoT based on blockchain.
Inf. Process. Manag., 2021

CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques.
IEEE Internet Things J., 2021

Multi-Candidate Voting Model Based on Blockchain.
IEEE CAA J. Autom. Sinica, 2021

Editorial: Intelligence and Safety for Humanoid Robots: Design, Control, and Applications.
Frontiers Neurorobotics, 2021

PWG-IDS: An Intrusion Detection Model for Solving Class Imbalance in IIoT Networks Using Generative Adversarial Networks.
CoRR, 2021

TREATED: Towards Universal Defense against Textual Adversarial Attacks.
CoRR, 2021

A method of chained recommendation for charging piles in internet of vehicles.
Computing, 2021

Proof of Learning (PoLe): Empowering neural network training with consensus building on blockchains.
Comput. Networks, 2021

An Interactive System for Unfair Rating Detection Models in a Customized Perspective.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Mask is All You Need: Rethinking Mask R-CNN for Dense and Arbitrary-Shaped Scene Text Detection.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

NASGuard: A Novel Accelerator Architecture for Robust Neural Architecture Search (NAS) Networks.
Proceedings of the 48th ACM/IEEE Annual International Symposium on Computer Architecture, 2021

PROCESS: Privacy-Preserving On-Chain Certificate Status Service.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

PRGAN: Personalized Recommendation with Conditional Generative Adversarial Networks.
Proceedings of the IEEE International Conference on Data Mining, 2021

CODEs: Chamfer Out-of-Distribution Examples against Overconfidence Issue.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

A Novel Malware Encrypted Traffic Detection Framework Based On Ensemble Learning.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

Generate Adversarial Examples Combined with Image Entropy Distribution.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

2020
Topic representation model based on microblogging behavior analysis.
World Wide Web, 2020

SoftSystem: Smart Edge Computing Device Selection Method for IoT Based on Soft Set Technique.
Wirel. Commun. Mob. Comput., 2020

A Reputation Management Scheme for Efficient Malicious Vehicle Identification over 5G Networks.
IEEE Wirel. Commun., 2020

Artificial Intelligence Security in 5G Networks: Adversarial Examples for Estimating a Travel Time Task.
IEEE Veh. Technol. Mag., 2020

Deep Learning Based Multi-Channel Intelligent Attack Detection for Data Security.
IEEE Trans. Sustain. Comput., 2020

Delving Deeper in Drone-Based Person Re-Id by Employing Deep Decision Forest and Attributes Fusion.
ACM Trans. Multim. Comput. Commun. Appl., 2020

DHPA: Dynamic Human Preference Analytics Framework: A Case Study on Taxi Drivers' Learning Curve Analysis.
ACM Trans. Intell. Syst. Technol., 2020

A Distributed Deep Learning System for Web Attack Detection on Edge Devices.
IEEE Trans. Ind. Informatics, 2020

Nei-TTE: Intelligent Traffic Time Estimation Based on Fine-Grained Time Derivation of Road Segments for Smart City.
IEEE Trans. Ind. Informatics, 2020

User and Entity Behavior Analysis under Urban Big Data.
Trans. Data Sci., 2020

Automatic Concept Extraction Based on Semantic Graphs From Big Data in Smart City.
IEEE Trans. Comput. Soc. Syst., 2020

A Low-Latency and Energy-Efficient Neighbor Discovery Algorithm for Wireless Sensor Networks.
Sensors, 2020

Preserving Location Privacy in UASN through Collaboration and Semantic Encapsulation.
IEEE Netw., 2020

Location Privacy Challenges in Mobile Edge Computing: Classification and Exploration.
IEEE Netw., 2020

Automated Attack and Defense Framework toward 5G Security.
IEEE Netw., 2020

Obstructive sleep apnea detection using ecg-sensor with convolutional neural networks.
Multim. Tools Appl., 2020

A novel routing verification approach based on blockchain for inter-domain routing in smart metropolitan area networks.
J. Parallel Distributed Comput., 2020

The effect of trade creation in China-Asean free trade area based on the gravity model.
J. Intell. Fuzzy Syst., 2020

AFLPro: Direction sensitive fuzzing.
J. Inf. Secur. Appl., 2020

Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles.
IEEE Internet Things J., 2020

A Survey on Access Control in the Age of Internet of Things.
IEEE Internet Things J., 2020

Deep Reinforcement Learning for Partially Observable Data Poisoning Attack in Crowdsensing Systems.
IEEE Internet Things J., 2020

Deep learning based emotion analysis of microblog texts.
Inf. Fusion, 2020

A consistency-guaranteed approach for Internet of Things <i>software refactoring</i>.
Int. J. Distributed Sens. Networks, 2020

Hierarchically defining Internet of Things security: From CIA to CACA.
Int. J. Distributed Sens. Networks, 2020

Research on android infiltration technology based on the silent installation of an accessibility service.
Int. J. Distributed Sens. Networks, 2020

Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city.
Future Gener. Comput. Syst., 2020

Advanced persistent threat organization identification based on software gene of malware.
Trans. Emerg. Telecommun. Technol., 2020

The QoS and privacy trade-off of adversarial deep learning: An evolutionary game approach.
Comput. Secur., 2020

IoT malicious traffic identification using wrapper-based feature selection mechanisms.
Comput. Secur., 2020

Security of Mobile Multimedia Data: The Adversarial Examples for Spatio-temporal Data.
Comput. Networks, 2020

Functional immunization of networks based on message passing.
Appl. Math. Comput., 2020

A Public Psychological Pressure Index for Social Networks.
IEEE Access, 2020

A Lightweight Privacy-Preserving Communication Protocol for Heterogeneous IoT Environment.
IEEE Access, 2020

Restricted Region Based Iterative Gradient Method for Non-Targeted Attack.
IEEE Access, 2020

Inferring Passengers' Interactive Choices on Public Transits via MA-AL: Multi-Agent Apprenticeship Learning.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

SESM: Emotional Social Semantic and Time Series Analysis of Learners' Comments.
Proceedings of the 2020 IEEE International Conference on Systems, Man, and Cybernetics, 2020

LGMal: A Joint Framework Based on Local and Global Features for Malware Detection.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

An IoT data sharing privacy preserving scheme.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

A Malware Detection Method for Health Sensor Data Based on Machine Learning.
Proceedings of the IEEE International Conference on Informatics, 2020

A defense scheme of voice control system against DolphinAttack.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

A Novel Malware Detection Framework Based on Weighted Heterograph.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

2019
Evaluating Reputation Management Schemes of Internet of Vehicles Based on Evolutionary Game Theory.
IEEE Trans. Veh. Technol., 2019

Real-Time Lateral Movement Detection Based on Evidence Reasoning Network for Edge Computing Environment.
IEEE Trans. Ind. Informatics, 2019

Automated Vulnerability Discovery and Exploitation in the Internet of Things.
Sensors, 2019

Erratum: Wang, Y. et al., A Privacy Preserving Scheme for Nearest Neighbor Query. <i>Sensors</i> 2018, <i>18</i>, 2440.
Sensors, 2019

A Fine-Grained Video Encryption Service Based on the Cloud-Fog-Local Architecture for Public and Private Videos.
Sensors, 2019

Low-Power Distributed Data Flow Anomaly-Monitoring Technology for Industrial Internet of Things.
Sensors, 2019

A Practical Neighbor Discovery Framework for Wireless Sensor Networks.
Sensors, 2019

Bidirectional self-adaptive resampling in internet of things big data learning.
Multim. Tools Appl., 2019

Trust architecture and reputation evaluation for internet of things.
J. Ambient Intell. Humaniz. Comput., 2019

Block-DEF: A secure digital evidence framework using blockchain.
Inf. Sci., 2019

HybridORAM: Practical oblivious cloud storage with constant bandwidth.
Inf. Sci., 2019

Toward a Comprehensive Insight Into the Eclipse Attacks of Tor Hidden Services.
IEEE Internet Things J., 2019

Timescale diversity facilitates the emergence of cooperation-extortion alliances in networked systems.
Neurocomputing, 2019

A data-driven method for future Internet route decision modeling.
Future Gener. Comput. Syst., 2019

Decision Propagation Networks for Image Classification.
CoRR, 2019

Automated Attack and Defense Framework for 5G Security on Physical and Logical Layers.
CoRR, 2019

Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles.
CoRR, 2019

Popularity-driven strategy updating rule promotes cooperation in the spatial prisoner's dilemma game.
Appl. Math. Comput., 2019

Crowdsourcing Approach for Developing Hands-On Experiments in Cybersecurity Education.
IEEE Access, 2019

Lightweight Anonymous Geometric Routing for Internet of Things.
IEEE Access, 2019

Salaxy: Enabling USB Debugging Mode Automatically to Control Android Devices.
IEEE Access, 2019

Quantitative Assessment of Wireless Connected Intelligent Robot Swarms Network Security Situation.
IEEE Access, 2019

Can the Max-Min Fairness-Based Coalitional Mechanism in Competitive Networks be Trustful?
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

Preserving Location Privacy in Mobile Edge Computing.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

A Genetic-Algorithm Based Method for Storage Location Assignments in Mobile Rack Warehouses.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Effective Recycling Planning for Dockless Sharing Bikes.
Proceedings of the 27th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2019

2018
A Data Leakage Prevention Method Based on the Reduction of Confidential and Context Terms for Smart Mobile Devices.
Wirel. Commun. Mob. Comput., 2018

Automatically Traceback RDP-Based Targeted Ransomware Attacks.
Wirel. Commun. Mob. Comput., 2018

A Privacy Preserving Scheme for Nearest Neighbor Query.
Sensors, 2018

Answering the Min-Cost Quality-Aware Query on Multi-Sources in Sensor-Cloud Systems.
Sensors, 2018

Analysis of vulnerabilities in maritime supply chains.
Reliab. Eng. Syst. Saf., 2018

Medical image semantic segmentation based on deep learning.
Neural Comput. Appl., 2018

Anchored neighborhood deep network for single-image super-resolution.
EURASIP J. Image Video Process., 2018

A Real-Time Correlation of Host-Level Events in Cyber Range Service for Smart Campus.
IEEE Access, 2018

Automatic Non-Taxonomic Relation Extraction from Big Data in Smart City.
IEEE Access, 2018

Study on Advanced Botnet Based on Publicly Available Resources.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

A Location Privacy-Aware Method for kNN Query in Location Based Services.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Automatic Taxonomy Construction for Eye Colors Data without Using Context Information.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Deep Learning Based Attribute Classification Insider Threat Detection for Data Security.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Structural Vulnerability of Complex Networks Under Multiple Edge-Based Attacks.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

How to Control Target Nodes in Dynamic Networks.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

An Intelligent Network Attack Detection Method Based on RNN.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
A Conditional Probability Computation Method for Vulnerability Exploitation Based on CVSS.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

2016
Optimization in e-commerce market network based on value order parameter.
Inf. Technol. Manag., 2016

Evaluation method for node importance in container supply chain network.
Int. J. Serv. Technol. Manag., 2016

Dynamic online consumer trust forming mechanism research based on Beijing, China.
Proceedings of the International Conference on Logistics, Informatics and Service Sciences, 2016

A Measurement Study on Mainline DHT and Magnet Link.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

Detection and Defense of SYN Flood Attacks Based on Dual Stack Network Firewall.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

2015
An efficient parallel algorithm for exact multi-pattern matching.
Secur. Commun. Networks, 2015

2013
A New Evolution Mechanism Model for B2B E-Commerce Network.
J. Electron. Commer. Organ., 2013

A new evolution model for B2C e-commerce market.
Inf. Technol. Manag., 2013

Data Spoofing Attacks by IPv6 Tunnels.
IEICE Trans. Commun., 2013

An Improved Common Vulnerability Scoring System Based on K-means.
Proceedings of the Trustworthy Computing and Services, 2013

The Analysis of County Science and Technology Worker Internet Usage and Its Influence Factors.
Proceedings of the Computer and Computing Technologies in Agriculture VII, 2013

2011
A New Chinese Public Welfare Operation Mode based on Value Network Model.
Proceedings of the ICEIS 2011, 2011

Study on the Knowledge -Sharing Network of Innovation Teams using Social Network Analysis.
Proceedings of the ICEIS 2011, 2011

Study on the Evolution Mechanisms of the Network Public Opinion.
Proceedings of the ICEIS 2011, 2011

2009
Building lightweight intrusion detection system using wrapper-based feature selection mechanisms.
Comput. Secur., 2009

Towards lightweight and efficient DDOS attacks detection for web server.
Proceedings of the 18th International Conference on World Wide Web, 2009

Optimal Network Security Strengthening Using Attack-Defense Game Model.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Optimizing Network Anomaly Detection Scheme Using Instance Selection Mechanism.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
A lightweight web server anomaly detection method based on transductive scheme and genetic algorithms.
Comput. Commun., 2008

UBSF: A novel online URL-Based Spam Filter.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

A Stochastic Game Theoretic Approach to Attack Prediction and Optimal Active Defense Strategy Decision.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

Alertclu: A Realtime Alert Aggregation and Correlation System.
Proceedings of the International Conference on Cyberworlds 2008, 2008

2007
A Game Theoretic Method for Decision and Analysis of the Optimal Active Defense Strategy.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2006
Defending against distributed denial-of-service attacks with an auction-based method.
Web Intell. Agent Syst., 2006

2004
Defending Against Flash Crowds and Malicious Traffic Attacks with An Auction-Based Method.
Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2004), 2004


  Loading...