Blockchain-based secure and trustworthy Internet of Things in SDN-enabled 5G-VANETs L Xie, Y Ding, H Yang, X Wang Ieee Access 7, 56656-56666, 2019 | 292 | 2019 |
Wireless network intrusion detection based on improved convolutional neural network H Yang, F Wang Ieee Access 7, 64366-64374, 2019 | 184 | 2019 |
A network security situation assessment method based on adversarial deep learning H Yang, R Zeng, G Xu, L Zhang Applied Soft Computing 102, 107096, 2021 | 73 | 2021 |
Next big thing in big data: the security of the ICT supply chain T Lu, X Guo, B Xu, L Zhao, Y Peng, H Yang 2013 International Conference on Social Computing, 1066-1073, 2013 | 63 | 2013 |
Combined wireless network intrusion detection model based on deep learning H Yang, G Qin, L Ye IEEE Access 7, 82624-82632, 2019 | 49 | 2019 |
Clustering and classification based anomaly detection H Yang, F Xie, Y Lu Fuzzy Systems and Knowledge Discovery: Third International Conference, FSKD …, 2006 | 37 | 2006 |
Network security situation assessment with network attack behavior classification H Yang, Z Zhang, L Xie, L Zhang International Journal of Intelligent Systems 37 (10), 6909-6927, 2022 | 34 | 2022 |
A novel algorithm for improving malicious node detection effect in wireless sensor networks H Yang, X Zhang, F Cheng Mobile Networks and Applications 26, 1564-1573, 2021 | 30 | 2021 |
Power consumption based android malware detection H Yang, R Tang Journal of Electrical and Computer Engineering 2016 (1), 6860217, 2016 | 30 | 2016 |
Intrusion detection solution to WLANs H Yang, L Xie, J Sun Proceedings of the IEEE 6th Circuits and Systems Symposium on Emerging …, 2004 | 22 | 2004 |
Key node recognition in complex networks based on the K-shell method XIE Lixia, SUN Honghong, Y Hongyu, L ZHANG Journal of tsinghua university (science and technology) 62 (5), 849-861, 2022 | 20 | 2022 |
An unsupervised learning‐based network threat situation assessment model for internet of things H Yang, R Zeng, F Wang, G Xu, J Zhang Security and Communication Networks 2020 (1), 6656066, 2020 | 20 | 2020 |
Intrusion detection for wireless local area network H Yang, L Xie, J Sun Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat …, 2004 | 20 | 2004 |
A Pythagorean fuzzy Petri net based security assessment model for civil aviation airport security inspection information system H Yang, Y Feng International Journal of Intelligent Systems 36 (5), 2122-2143, 2021 | 19 | 2021 |
Towards an analysis of software supply chain risk management S Du, T Lu, L Zhao, B Xu, X Guo, H Yang Proceedings of the World Congress on Engineering and Computer Science 1, 2013 | 19 | 2013 |
Research on SVM based network intrusion detection classification L Xie, D Zhu, H Yang 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery …, 2009 | 17 | 2009 |
Mitigating LFA through segment rerouting in IoT environment with traceroute flow abnormality detection L Xie, Y Ding, H Yang, Z Hu Journal of Network and Computer Applications 164, 102690, 2020 | 16 | 2020 |
MRAN: Multimodal relationship-aware attention network for fake news detection H Yang, J Zhang, L Zhang, X Cheng, Z Hu Computer Standards & Interfaces 89, 103822, 2024 | 11 | 2024 |
A novel Android malware detection method with API semantics extraction H Yang, Y Wang, L Zhang, X Cheng, Z Hu Computers & Security 137, 103651, 2024 | 11 | 2024 |
An adaptive IoT network security situation prediction model H Yang, L Zhang, X Zhang, J Zhang Mobile Networks and Applications, 1-11, 2022 | 10 | 2022 |