关注
Yingxu Lai
Yingxu Lai
在 bjut.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
FL-GUARD: A detection and defense system for DDoS attack in SDN
J Liu, Y Lai, S Zhang
Proceedings of the 2017 international conference on cryptography, security …, 2017
582017
Intrusion detection of industrial control system based on Modbus TCP protocol
W Yusheng, F Kefeng, L Yingxu, L Zenghui, Z Ruikang, Y Xiangzhen, ...
2017 IEEE 13th International Symposium on Autonomous Decentralized System …, 2017
482017
Keyword extraction by entropy difference between the intrinsic and extrinsic mode
Z Yang, J Lei, K Fan, Y Lai
Physica A: Statistical Mechanics and its Applications 392 (19), 4523-4531, 2013
472013
Industrial anomaly detection and attack classification method based on convolutional neural network
Y Lai, J Zhang, Z Liu
Security and Communication Networks 2019 (1), 8124254, 2019
372019
A data mining framework for building intrusion detection models based on IPv6
Z Liu, Y Lai
International Conference on Information Security and Assurance, 608-618, 2009
372009
Identifying malicious nodes in wireless sensor networks based on correlation detection
Y Lai, L Tong, J Liu, Y Wang, T Tang, Z Zhao, H Qin
Computers & Security 113, 102540, 2022
342022
Research on intrusion detection of industrial control system
YX Lai, ZH Liu, X Cai, KX Yang
Journal on Communications 38 (2), 143-156, 2017
342017
MIF: A multi-step attack scenario reconstruction and attack chains extraction method based on multi-information fusion
B Mao, J Liu, Y Lai, M Sun
Computer Networks 198, 108340, 2021
302021
Industrial control intrusion detection approach based on multiclassification GoogLeNet‐LSTM model
A Chu, Y Lai, J Liu
Security and Communication Networks 2019 (1), 6757685, 2019
282019
On monitoring and predicting mobile network traffic abnormality
Y Lai, Y Chen, Z Liu, Z Yang, X Li
Simulation Modelling Practice and Theory 50, 176-188, 2015
282015
A data transmission approach based on ant colony optimization and threshold proxy re-encryption in wsns
J Liu, Z Liu, C Sun, J Zhuang
Journal of Artificial Intelligence and Technology 2 (1), 23-31, 2022
262022
基于字符串相似性聚类的网络短文本舆情热点发现技术
杨震, 段立娟, 赖英旭
北京工业大学学报, 669-673, 2010
232010
Study on authentication protocol of SDN trusted domain
R Zhou, Y Lai, Z Liu, J Liu
2015 IEEE Twelfth International Symposium on Autonomous Decentralized …, 2015
222015
EEFED: Personalized federated learning of execution&evaluation dual network for CPS intrusion detection
X Huang, J Liu, Y Lai, B Mao, H Lyu
IEEE Transactions on Information Forensics and Security 18, 41-56, 2022
202022
Explaining the attributes of a deep learning based intrusion detection system for industrial control networks
Z Wang, Y Lai, Z Liu, J Liu
Sensors 20 (14), 3817, 2020
202020
Short text sentiment classification based on context reconstruction
Z Yang, YX Lai, LJ Duan, YJ Li
Acta Automatica Sinica 38 (1), 55-67, 2012
182012
An efficient LKH tree balancing algorithm for group key management
Z Liu, Y Lai, X Ren, S Bu
2012 International Conference on Control Engineering and Communication …, 2012
172012
DEIDS: a novel intrusion detection system for industrial control systems
H Gu, Y Lai, Y Wang, J Liu, M Sun, B Mao
Neural Computing and Applications 34 (12), 9793-9811, 2022
162022
A few-shot learning based approach to IoT traffic classification
Z Zhao, Y Lai, Y Wang, W Jia, H He
IEEE Communications Letters 26 (3), 537-541, 2021
162021
Vulnerability mining method for the modbus tcp using an anti-sample fuzzer
Y Lai, H Gao, J Liu
Sensors 20 (7), 2040, 2020
162020
系统目前无法执行此操作,请稍后再试。
文章 1–20