New cloaking region obfuscation for road network-indistinguishability and location privacy B Ma, X Lin, X Wang, B Liu, Y He, W Ni, RP Liu Proceedings of the 25th International Symposium on Research in Attacks …, 2022 | 12 | 2022 |
Multi-layer reverse engineering system for vehicular controller area network messages X Lin, B Ma, X Wang, Y He, RP Liu, W Ni 2022 IEEE 25th International Conference on Computer Supported Cooperative …, 2022 | 8 | 2022 |
Differential preserving in XGBoost model for encrypted traffic classification Z Wang, BH Ma, Y Zeng, XJ Lin, KC Shi, ZW Wang 2022 International Conference on Networking and Network Applications (NaNA …, 2022 | 6 | 2022 |
Location Privacy Threats and Protections in Future Vehicular Networks: A Comprehensive Review B Ma, X Wang, X Lin, Y Jiang, C Sun, Z Wang, G Yu, Y He, W Ni, RP Liu arXiv preprint arXiv:2305.04503, 2023 | 5 | 2023 |
Leveraging Byte-Level Features for LSTM-based Anomaly Detection in Controller Area Networks L Liang, X Lin, B Ma, X Wang, Y He, RP Liu, W Ni GLOBECOM 2022-2022 IEEE Global Communications Conference, 4903-4908, 2022 | 3 | 2022 |
Layered classification method for darknet traffic based on Weighted K-NN KC Shi, BH Ma, Y Zeng, XJ Lin, Z Wang, ZW Wang 2022 International Conference on Networking and Network Applications (NaNA …, 2022 | 2 | 2022 |
ByCAN: Reverse Engineering Controller Area Network (CAN) Messages from Bit to Byte Level X Lin, B Ma, X Wang, G Yu, Y He, RP Liu, W Ni IEEE Internet of Things Journal, 2024 | 1 | 2024 |
Vehicle Trajectory Obfuscation and Detection B Ma, Y Zhao, X Wang, Z Liu, X Lin, Z Wang, W Ni, RP Liu Cybersecurity for Smart Cities: Practices and Challenges, 121-134, 2023 | 1 | 2023 |
CAN-Trace Attack: Exploit CAN Messages to Uncover Driving Trajectories X Lin, B Ma, X Wang, G Yu, Y He, W Ni, RP Liu IEEE Transactions on Intelligent Transportation Systems, 2025 | | 2025 |
SW Forecaster: An Intelligent Data-Driven Approach for Water Usage Demand Forecasting A Ubaid, X Lin, FK Hussain 2024 IEEE International Conference on Cloud Computing Technology and Science …, 2024 | | 2024 |
Adaptive Cloaking Region Obfuscation in Road Networks B Ma, X Wang, Y Jiang, X Lin 2024 3rd Conference on Fully Actuated System Theory and Applications (FASTA …, 2024 | | 2024 |
Federated learning-based intrusion detection system for in-vehicle network using statistics of controller area network messages X Lin, D Ai, B Ma, X Wang, G Yu, Y He, W Ni, RP Liu International Conference on Network Simulation and Evaluation, 237-251, 2023 | | 2023 |
2024 IEEE International Conference on Cloud Computing Technology and Science (CloudCom)| 979-8-3315-0758-9/24/$31.00© 2024 IEEE| DOI: 10.1109/CLOUDCOM62794. 2024.00037 P Abeysinghe, S Akbari, KA Alam, Y Alhammadi, AA Almemari, ... | | |
CloudCom 2024 HZ Cochak, CC Miers, PHB Correia, A Marco, A Ubaid, X Lin, F Khadeer | | |