FL-GUARD: A detection and defense system for DDoS attack in SDN J Liu, Y Lai, S Zhang Proceedings of the 2017 international conference on cryptography, security …, 2017 | 62 | 2017 |
Identifying malicious nodes in wireless sensor networks based on correlation detection Y Lai, L Tong, J Liu, Y Wang, T Tang, Z Zhao, H Qin Computers & Security 113, 102540, 2022 | 51 | 2022 |
MIF: A multi-step attack scenario reconstruction and attack chains extraction method based on multi-information fusion B Mao, J Liu, Y Lai, M Sun Computer Networks 198, 108340, 2021 | 40 | 2021 |
EEFED: Personalized federated learning of execution&evaluation dual network for CPS intrusion detection X Huang, J Liu, Y Lai, B Mao, H Lyu IEEE Transactions on Information Forensics and Security 18, 41-56, 2022 | 38 | 2022 |
Industrial control intrusion detection approach based on multiclassification GoogLeNet‐LSTM model A Chu, Y Lai, J Liu Security and Communication Networks 2019 (1), 6757685, 2019 | 34 | 2019 |
A data transmission approach based on ant colony optimization and threshold proxy re-encryption in wsns J Liu, Z Liu, C Sun, J Zhuang Journal of Artificial Intelligence and Technology 2 (1), 23-31, 2022 | 31 | 2022 |
DEIDS: a novel intrusion detection system for industrial control systems H Gu, Y Lai, Y Wang, J Liu, M Sun, B Mao Neural Computing and Applications 34 (12), 9793-9811, 2022 | 24 | 2022 |
Explaining the attributes of a deep learning based intrusion detection system for industrial control networks Z Wang, Y Lai, Z Liu, J Liu Sensors 20 (14), 3817, 2020 | 24 | 2020 |
Study on authentication protocol of SDN trusted domain R Zhou, Y Lai, Z Liu, J Liu 2015 IEEE Twelfth International Symposium on Autonomous Decentralized …, 2015 | 21 | 2015 |
Vulnerability mining method for the modbus TCP using an anti-sample fuzzer Y Lai, H Gao, J Liu Sensors 20 (7), 2040, 2020 | 20 | 2020 |
Intrusion detection system based on in-depth understandings of industrial control logic M Sun, Y Lai, Y Wang, J Liu, B Mao, H Gu IEEE Transactions on Industrial Informatics 19 (3), 2295-2306, 2022 | 17 | 2022 |
Protection of Sensitive Data in Industrial Internet Based on Three‐Layer Local/Fog/Cloud Storage J Liu, C Yuan, Y Lai, H Qin Security and Communication Networks 2020 (1), 2017930, 2020 | 15 | 2020 |
WSN node access authentication protocol based on trusted computing J Liu, L Liu, Z Liu, Y Lai, H Qin, S Luo Simulation Modelling Practice and Theory 117, 102522, 2022 | 13 | 2022 |
A trusted access method in software-defined network J Liu, Y Lai, Z Diao, Y Chen Simulation Modelling Practice and Theory 74, 28-45, 2017 | 12 | 2017 |
Cross-heterogeneous domain authentication scheme based on blockchain J Liu, Y Liu, Y Lai, R Li, S Wu, S Mian Journal of Artificial Intelligence and Technology 1 (2), 92-100, 2021 | 11 | 2021 |
Stealthy attack detection method based on Multi-feature long short-term memory prediction model J Wang, Y Lai, J Liu Future Generation Computer Systems 137, 248-259, 2022 | 10 | 2022 |
Trusted connection protocol between networks 赖英旭, 刘岩, 刘静 Journal of Software 30 (12), 3730-3749, 2019 | 7 | 2019 |
Analysis of industrial control systems traffic based on time series L Yingxu, J Jiao, L Jing 2015 IEEE Twelfth International Symposium on Autonomous Decentralized …, 2015 | 6 | 2015 |
Risk‐Based Dynamic Identity Authentication Method Based on the UCON Model J Liu, R Liu, Y Lai Security and Communication Networks 2022 (1), 2509267, 2022 | 5 | 2022 |
Cloud resource orchestration optimisation based on ARIMA H Qin, M Yu, Y Lai, Z Liu, J Liu International Journal of Simulation and Process Modelling 14 (5), 420-430, 2019 | 5 | 2019 |