FL-GUARD: A detection and defense system for DDoS attack in SDN J Liu, Y Lai, S Zhang Proceedings of the 2017 international conference on cryptography, security …, 2017 | 62 | 2017 |
Intrusion detection of industrial control system based on Modbus TCP protocol W Yusheng, F Kefeng, L Yingxu, L Zenghui, Z Ruikang, Y Xiangzhen, ... 2017 IEEE 13th International Symposium on Autonomous Decentralized System …, 2017 | 52 | 2017 |
Identifying malicious nodes in wireless sensor networks based on correlation detection Y Lai, L Tong, J Liu, Y Wang, T Tang, Z Zhao, H Qin Computers & Security 113, 102540, 2022 | 51 | 2022 |
Keyword extraction by entropy difference between the intrinsic and extrinsic mode Z Yang, J Lei, K Fan, Y Lai Physica A: Statistical Mechanics and its Applications 392 (19), 4523-4531, 2013 | 46 | 2013 |
Industrial anomaly detection and attack classification method based on convolutional neural network Y Lai, J Zhang, Z Liu Security and Communication Networks 2019 (1), 8124254, 2019 | 45 | 2019 |
MIF: A multi-step attack scenario reconstruction and attack chains extraction method based on multi-information fusion B Mao, J Liu, Y Lai, M Sun Computer Networks 198, 108340, 2021 | 40 | 2021 |
EEFED: Personalized federated learning of execution&evaluation dual network for CPS intrusion detection X Huang, J Liu, Y Lai, B Mao, H Lyu IEEE Transactions on Information Forensics and Security 18, 41-56, 2022 | 38 | 2022 |
A data mining framework for building intrusion detection models based on IPv6 Z Liu, Y Lai International Conference on Information Security and Assurance, 608-618, 2009 | 38 | 2009 |
Research on intrusion detection of industrial control system YX Lai, ZH Liu, X Cai, KX Yang Journal on Communications 38 (2), 143-156, 2017 | 37 | 2017 |
Industrial control intrusion detection approach based on multiclassification GoogLeNet‐LSTM model A Chu, Y Lai, J Liu Security and Communication Networks 2019 (1), 6757685, 2019 | 34 | 2019 |
A data transmission approach based on ant colony optimization and threshold proxy re-encryption in wsns J Liu, Z Liu, C Sun, J Zhuang Journal of Artificial Intelligence and Technology 2 (1), 23-31, 2022 | 31 | 2022 |
On monitoring and predicting mobile network traffic abnormality Y Lai, Y Chen, Z Liu, Z Yang, X Li Simulation Modelling Practice and Theory 50, 176-188, 2015 | 29 | 2015 |
MDFD: A multi-source data fusion detection framework for Sybil attack detection in VANETs Y Chen, Y Lai, Z Zhang, H Li, Y Wang Computer Networks 224, 109608, 2023 | 26 | 2023 |
DEIDS: a novel intrusion detection system for industrial control systems H Gu, Y Lai, Y Wang, J Liu, M Sun, B Mao Neural Computing and Applications 34 (12), 9793-9811, 2022 | 24 | 2022 |
Explaining the attributes of a deep learning based intrusion detection system for industrial control networks Z Wang, Y Lai, Z Liu, J Liu Sensors 20 (14), 3817, 2020 | 24 | 2020 |
基于字符串相似性聚类的网络短文本舆情热点发现技术 杨震, 段立娟, 赖英旭 北京工业大学学报 36 (5), 669-673, 2010 | 23 | 2010 |
Study on authentication protocol of SDN trusted domain R Zhou, Y Lai, Z Liu, J Liu 2015 IEEE Twelfth International Symposium on Autonomous Decentralized …, 2015 | 21 | 2015 |
Authentication methods for internet of vehicles based on trusted connection architecture H Zhang, Y Lai, Y Chen Simulation Modelling Practice and Theory 122, 102681, 2023 | 20 | 2023 |
A few-shot learning based approach to IoT traffic classification Z Zhao, Y Lai, Y Wang, W Jia, H He IEEE Communications Letters 26 (3), 537-541, 2021 | 20 | 2021 |
Vulnerability mining method for the modbus TCP using an anti-sample fuzzer Y Lai, H Gao, J Liu Sensors 20 (7), 2040, 2020 | 20 | 2020 |