متابعة
Jing Liu
Jing Liu
بريد إلكتروني تم التحقق منه على bjut.edu.cn
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
FL-GUARD: A detection and defense system for DDoS attack in SDN
J Liu, Y Lai, S Zhang
Proceedings of the 2017 international conference on cryptography, security …, 2017
622017
Identifying malicious nodes in wireless sensor networks based on correlation detection
Y Lai, L Tong, J Liu, Y Wang, T Tang, Z Zhao, H Qin
Computers & Security 113, 102540, 2022
512022
MIF: A multi-step attack scenario reconstruction and attack chains extraction method based on multi-information fusion
B Mao, J Liu, Y Lai, M Sun
Computer Networks 198, 108340, 2021
402021
EEFED: Personalized federated learning of execution&evaluation dual network for CPS intrusion detection
X Huang, J Liu, Y Lai, B Mao, H Lyu
IEEE Transactions on Information Forensics and Security 18, 41-56, 2022
382022
Industrial control intrusion detection approach based on multiclassification GoogLeNet‐LSTM model
A Chu, Y Lai, J Liu
Security and Communication Networks 2019 (1), 6757685, 2019
342019
A data transmission approach based on ant colony optimization and threshold proxy re-encryption in wsns
J Liu, Z Liu, C Sun, J Zhuang
Journal of Artificial Intelligence and Technology 2 (1), 23-31, 2022
312022
DEIDS: a novel intrusion detection system for industrial control systems
H Gu, Y Lai, Y Wang, J Liu, M Sun, B Mao
Neural Computing and Applications 34 (12), 9793-9811, 2022
242022
Explaining the attributes of a deep learning based intrusion detection system for industrial control networks
Z Wang, Y Lai, Z Liu, J Liu
Sensors 20 (14), 3817, 2020
242020
Study on authentication protocol of SDN trusted domain
R Zhou, Y Lai, Z Liu, J Liu
2015 IEEE Twelfth International Symposium on Autonomous Decentralized …, 2015
212015
Vulnerability mining method for the modbus TCP using an anti-sample fuzzer
Y Lai, H Gao, J Liu
Sensors 20 (7), 2040, 2020
202020
Intrusion detection system based on in-depth understandings of industrial control logic
M Sun, Y Lai, Y Wang, J Liu, B Mao, H Gu
IEEE Transactions on Industrial Informatics 19 (3), 2295-2306, 2022
172022
Protection of Sensitive Data in Industrial Internet Based on Three‐Layer Local/Fog/Cloud Storage
J Liu, C Yuan, Y Lai, H Qin
Security and Communication Networks 2020 (1), 2017930, 2020
152020
WSN node access authentication protocol based on trusted computing
J Liu, L Liu, Z Liu, Y Lai, H Qin, S Luo
Simulation Modelling Practice and Theory 117, 102522, 2022
132022
A trusted access method in software-defined network
J Liu, Y Lai, Z Diao, Y Chen
Simulation Modelling Practice and Theory 74, 28-45, 2017
122017
Cross-heterogeneous domain authentication scheme based on blockchain
J Liu, Y Liu, Y Lai, R Li, S Wu, S Mian
Journal of Artificial Intelligence and Technology 1 (2), 92-100, 2021
112021
Stealthy attack detection method based on Multi-feature long short-term memory prediction model
J Wang, Y Lai, J Liu
Future Generation Computer Systems 137, 248-259, 2022
102022
Trusted connection protocol between networks
赖英旭, 刘岩, 刘静
Journal of Software 30 (12), 3730-3749, 2019
72019
Analysis of industrial control systems traffic based on time series
L Yingxu, J Jiao, L Jing
2015 IEEE Twelfth International Symposium on Autonomous Decentralized …, 2015
62015
Risk‐Based Dynamic Identity Authentication Method Based on the UCON Model
J Liu, R Liu, Y Lai
Security and Communication Networks 2022 (1), 2509267, 2022
52022
Cloud resource orchestration optimisation based on ARIMA
H Qin, M Yu, Y Lai, Z Liu, J Liu
International Journal of Simulation and Process Modelling 14 (5), 420-430, 2019
52019
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20