متابعة
Yingxu Lai
Yingxu Lai
بريد إلكتروني تم التحقق منه على bjut.edu.cn
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
FL-GUARD: A detection and defense system for DDoS attack in SDN
J Liu, Y Lai, S Zhang
Proceedings of the 2017 international conference on cryptography, security …, 2017
622017
Intrusion detection of industrial control system based on Modbus TCP protocol
W Yusheng, F Kefeng, L Yingxu, L Zenghui, Z Ruikang, Y Xiangzhen, ...
2017 IEEE 13th International Symposium on Autonomous Decentralized System …, 2017
522017
Identifying malicious nodes in wireless sensor networks based on correlation detection
Y Lai, L Tong, J Liu, Y Wang, T Tang, Z Zhao, H Qin
Computers & Security 113, 102540, 2022
512022
Keyword extraction by entropy difference between the intrinsic and extrinsic mode
Z Yang, J Lei, K Fan, Y Lai
Physica A: Statistical Mechanics and its Applications 392 (19), 4523-4531, 2013
462013
Industrial anomaly detection and attack classification method based on convolutional neural network
Y Lai, J Zhang, Z Liu
Security and Communication Networks 2019 (1), 8124254, 2019
452019
MIF: A multi-step attack scenario reconstruction and attack chains extraction method based on multi-information fusion
B Mao, J Liu, Y Lai, M Sun
Computer Networks 198, 108340, 2021
402021
EEFED: Personalized federated learning of execution&evaluation dual network for CPS intrusion detection
X Huang, J Liu, Y Lai, B Mao, H Lyu
IEEE Transactions on Information Forensics and Security 18, 41-56, 2022
382022
A data mining framework for building intrusion detection models based on IPv6
Z Liu, Y Lai
International Conference on Information Security and Assurance, 608-618, 2009
382009
Research on intrusion detection of industrial control system
YX Lai, ZH Liu, X Cai, KX Yang
Journal on Communications 38 (2), 143-156, 2017
372017
Industrial control intrusion detection approach based on multiclassification GoogLeNet‐LSTM model
A Chu, Y Lai, J Liu
Security and Communication Networks 2019 (1), 6757685, 2019
342019
A data transmission approach based on ant colony optimization and threshold proxy re-encryption in wsns
J Liu, Z Liu, C Sun, J Zhuang
Journal of Artificial Intelligence and Technology 2 (1), 23-31, 2022
312022
On monitoring and predicting mobile network traffic abnormality
Y Lai, Y Chen, Z Liu, Z Yang, X Li
Simulation Modelling Practice and Theory 50, 176-188, 2015
292015
MDFD: A multi-source data fusion detection framework for Sybil attack detection in VANETs
Y Chen, Y Lai, Z Zhang, H Li, Y Wang
Computer Networks 224, 109608, 2023
262023
DEIDS: a novel intrusion detection system for industrial control systems
H Gu, Y Lai, Y Wang, J Liu, M Sun, B Mao
Neural Computing and Applications 34 (12), 9793-9811, 2022
242022
Explaining the attributes of a deep learning based intrusion detection system for industrial control networks
Z Wang, Y Lai, Z Liu, J Liu
Sensors 20 (14), 3817, 2020
242020
基于字符串相似性聚类的网络短文本舆情热点发现技术
杨震, 段立娟, 赖英旭
北京工业大学学报 36 (5), 669-673, 2010
232010
Study on authentication protocol of SDN trusted domain
R Zhou, Y Lai, Z Liu, J Liu
2015 IEEE Twelfth International Symposium on Autonomous Decentralized …, 2015
212015
Authentication methods for internet of vehicles based on trusted connection architecture
H Zhang, Y Lai, Y Chen
Simulation Modelling Practice and Theory 122, 102681, 2023
202023
A few-shot learning based approach to IoT traffic classification
Z Zhao, Y Lai, Y Wang, W Jia, H He
IEEE Communications Letters 26 (3), 537-541, 2021
202021
Vulnerability mining method for the modbus TCP using an anti-sample fuzzer
Y Lai, H Gao, J Liu
Sensors 20 (7), 2040, 2020
202020
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20