关注
Yingxu Lai
Yingxu Lai
在 bjut.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
FL-GUARD: A detection and defense system for DDoS attack in SDN
J Liu, Y Lai, S Zhang
Proceedings of the 2017 international conference on cryptography, security …, 2017
452017
Keyword extraction by entropy difference between the intrinsic and extrinsic mode
Z Yang, J Lei, K Fan, Y Lai
Physica A: Statistical Mechanics and its Applications 392 (19), 4523-4531, 2013
412013
Intrusion detection of industrial control system based on Modbus TCP protocol
W Yusheng, F Kefeng, L Yingxu, L Zenghui, Z Ruikang, Y Xiangzhen, ...
2017 IEEE 13th International Symposium on Autonomous Decentralized System …, 2017
392017
A data mining framework for building intrusion detection models based on IPv6
Z Liu, Y Lai
Advances in Information Security and Assurance: Third International …, 2009
352009
Industrial anomaly detection and attack classification method based on convolutional neural network
Y Lai, J Zhang, Z Liu
Security and Communication Networks 2019, 1-11, 2019
302019
On monitoring and predicting mobile network traffic abnormality
Y Lai, Y Chen, Z Liu, Z Yang, X Li
Simulation Modelling Practice and Theory 50, 176-188, 2015
282015
Research on intrusion detection of industrial control system
YX Lai, ZH Liu, XT Cai, KX Yang
Journal on Communications 38 (2), 143-156, 2017
262017
基于字符串相似性聚类的网络短文本舆情热点发现技术
杨震, 段立娟, 赖英旭
北京工业大学学报, 669-673, 2010
222010
Study on authentication protocol of SDN trusted domain
R Zhou, Y Lai, Z Liu, J Liu
2015 IEEE Twelfth International Symposium on Autonomous Decentralized …, 2015
192015
Industrial control intrusion detection approach based on multiclassification GoogLeNet-LSTM model
A Chu, Y Lai, J Liu
Security and Communication Networks 2019, 1-11, 2019
182019
Short text sentiment classification based on context reconstruction
Z Yang, YX Lai, LJ Duan, YJ Li
Acta Automatica Sinica 38 (1), 55-67, 2012
172012
An efficient LKH tree balancing algorithm for group key management
Z Liu, Y Lai, X Ren, S Bu
2012 International Conference on Control Engineering and Communication …, 2012
152012
Short texts classification through reference document expansion
Z Yang, K Fan, Y Lai, K Gao, Y Wang
Chinese Journal of Electronics 23 (2), 315-321, 2014
142014
Research on sybil attack in defense blockchain based on improved PBFT algorithm
YX Lai, Z Bo, J Liu
Journal on Communications 41 (9), 104-117, 2020
132020
Design and analysis on trusted network equipment access authentication protocol
Y Lai, Y Chen, Q Zou, Z Liu, Z Yang
Simulation Modelling Practice and Theory 51, 157-169, 2015
132015
A data transmission approach based on ant colony optimization and threshold proxy re-encryption in wsns
J Liu, Z Liu, C Sun, J Zhuang
Journal of Artificial Intelligence and Technology 2 (1), 23-31, 2022
122022
Explaining the attributes of a deep learning based intrusion detection system for industrial control networks
Z Wang, Y Lai, Z Liu, J Liu
Sensors 20 (14), 3817, 2020
112020
Vulnerability mining method for the modbus tcp using an anti-sample fuzzer
Y Lai, H Gao, J Liu
Sensors 20 (7), 2040, 2020
112020
Online public opinion hotspot detection and analysis based on short text clustering using string distance
Z Yang, L Duan, Y Lai
Journal of Beijing University of Technology 36 (5), 669-673, 2010
112010
A feature selection for malicious detection
Y Lai
2008 Ninth ACIS International Conference on Software Engineering, Artificial …, 2008
112008
系统目前无法执行此操作,请稍后再试。
文章 1–20