FL-GUARD: A detection and defense system for DDoS attack in SDN J Liu, Y Lai, S Zhang Proceedings of the 2017 international conference on cryptography, security …, 2017 | 45 | 2017 |
Keyword extraction by entropy difference between the intrinsic and extrinsic mode Z Yang, J Lei, K Fan, Y Lai Physica A: Statistical Mechanics and its Applications 392 (19), 4523-4531, 2013 | 41 | 2013 |
Intrusion detection of industrial control system based on Modbus TCP protocol W Yusheng, F Kefeng, L Yingxu, L Zenghui, Z Ruikang, Y Xiangzhen, ... 2017 IEEE 13th International Symposium on Autonomous Decentralized System …, 2017 | 39 | 2017 |
A data mining framework for building intrusion detection models based on IPv6 Z Liu, Y Lai Advances in Information Security and Assurance: Third International …, 2009 | 35 | 2009 |
Industrial anomaly detection and attack classification method based on convolutional neural network Y Lai, J Zhang, Z Liu Security and Communication Networks 2019, 1-11, 2019 | 30 | 2019 |
On monitoring and predicting mobile network traffic abnormality Y Lai, Y Chen, Z Liu, Z Yang, X Li Simulation Modelling Practice and Theory 50, 176-188, 2015 | 28 | 2015 |
Research on intrusion detection of industrial control system YX Lai, ZH Liu, XT Cai, KX Yang Journal on Communications 38 (2), 143-156, 2017 | 26 | 2017 |
基于字符串相似性聚类的网络短文本舆情热点发现技术 杨震, 段立娟, 赖英旭 北京工业大学学报, 669-673, 2010 | 22 | 2010 |
Study on authentication protocol of SDN trusted domain R Zhou, Y Lai, Z Liu, J Liu 2015 IEEE Twelfth International Symposium on Autonomous Decentralized …, 2015 | 19 | 2015 |
Industrial control intrusion detection approach based on multiclassification GoogLeNet-LSTM model A Chu, Y Lai, J Liu Security and Communication Networks 2019, 1-11, 2019 | 18 | 2019 |
Short text sentiment classification based on context reconstruction Z Yang, YX Lai, LJ Duan, YJ Li Acta Automatica Sinica 38 (1), 55-67, 2012 | 17 | 2012 |
An efficient LKH tree balancing algorithm for group key management Z Liu, Y Lai, X Ren, S Bu 2012 International Conference on Control Engineering and Communication …, 2012 | 15 | 2012 |
Short texts classification through reference document expansion Z Yang, K Fan, Y Lai, K Gao, Y Wang Chinese Journal of Electronics 23 (2), 315-321, 2014 | 14 | 2014 |
Research on sybil attack in defense blockchain based on improved PBFT algorithm YX Lai, Z Bo, J Liu Journal on Communications 41 (9), 104-117, 2020 | 13 | 2020 |
Design and analysis on trusted network equipment access authentication protocol Y Lai, Y Chen, Q Zou, Z Liu, Z Yang Simulation Modelling Practice and Theory 51, 157-169, 2015 | 13 | 2015 |
A data transmission approach based on ant colony optimization and threshold proxy re-encryption in wsns J Liu, Z Liu, C Sun, J Zhuang Journal of Artificial Intelligence and Technology 2 (1), 23-31, 2022 | 12 | 2022 |
Explaining the attributes of a deep learning based intrusion detection system for industrial control networks Z Wang, Y Lai, Z Liu, J Liu Sensors 20 (14), 3817, 2020 | 11 | 2020 |
Vulnerability mining method for the modbus tcp using an anti-sample fuzzer Y Lai, H Gao, J Liu Sensors 20 (7), 2040, 2020 | 11 | 2020 |
Online public opinion hotspot detection and analysis based on short text clustering using string distance Z Yang, L Duan, Y Lai Journal of Beijing University of Technology 36 (5), 669-673, 2010 | 11 | 2010 |
A feature selection for malicious detection Y Lai 2008 Ninth ACIS International Conference on Software Engineering, Artificial …, 2008 | 11 | 2008 |