关注
Yuyang Zhou
Yuyang Zhou
在 seu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Building an efficient intrusion detection system based on feature selection and ensemble classifier
Y Zhou, G Cheng, S Jiang, M Dai
Computer networks 174, 107247, 2020
5592020
An SDN-enabled proactive defense framework for DDoS mitigation in IoT networks
Y Zhou, G Cheng, S Yu
IEEE Transactions on Information Forensics and Security 16, 5366-5380, 2021
442021
Cost-effective moving target defense against DDoS attacks using trilateral game and multi-objective Markov decision processes
Y Zhou, G Cheng, S Jiang, Y Zhao, Z Chen
Computers & Security 97, 101976, 2020
342020
A Cost-effective Shuffling Method against DDoS Attacks using Moving Target Defense
Y Zhou, G Cheng, S Jiang, Y Hu, Y Zhao, Z Chen
Proceedings of the 6th ACM Workshop on Moving Target Defense, 57-66, 2019
222019
Toward proactive and efficient DDoS mitigation in IIoT systems: A moving target defense approach
Y Zhou, G Cheng, Y Zhao, Z Chen, S Jiang
IEEE Transactions on Industrial Informatics 18 (4), 2734-2744, 2021
202021
A quantitative framework for network resilience evaluation using Dynamic Bayesian Network
S Jiang, L Yang, G Cheng, X Gao, T Feng, Y Zhou
Computer Communications 194, 387-398, 2022
182022
Length matters: Fast internet encrypted traffic service classification based on multi-PDU lengths
Z Chen, G Cheng, B Jiang, S Tang, S Guo, Y Zhou
2020 16th International Conference on Mobility, Sensing and Networking (MSN …, 2020
172020
BSD‐Guard: A Collaborative Blockchain‐Based Approach for Detection and Mitigation of SDN‐Targeted DDoS Attacks
S Jiang, L Yang, X Gao, Y Zhou, T Feng, Y Song, K Liu, G Cheng
Security and Communication Networks 2022 (1), 1608689, 2022
152022
Secure IoT edge: Threat situation awareness based on network traffic
Y Zhao, G Cheng, Y Duan, Z Gu, Y Zhou, L Tang
Computer Networks 201, 108525, 2021
152021
Length matters: Scalable fast encrypted internet traffic service classification based on multiple protocol data unit length sequence with composite deep learning
Z Chen, G Cheng, Z Xu, S Guo, Y Zhou, Y Zhao
Digital Communications and Networks 8 (3), 289-302, 2022
132022
移动目标防御的攻击面动态转移技术研究综述
周余阳, 程光, 郭春生, 戴冕
软件学报 29 (9), 2799-2820, 2018
12*2018
Towards Early and Accurate Network Intrusion Detection Using Graph Embedding
X Hu, W Gao, G Cheng, R Li, Y Zhou, H Wu
IEEE Transactions on Information Forensics and Security, 2023
82023
Effectiveness evaluation method for cyber deception based on dynamic bayesian attack graph
H Wu, Y Gu, G Cheng, Y Zhou
Proceedings of the 3rd International Conference on Computer Science and …, 2020
82020
软件定义网络的测量方法研究
戴冕, 程光, 周余阳
Journal of Software 30 (6), 2019
52019
基于贝叶斯攻击图的网络攻击面风险评估方法
周余阳, 程光, 郭春生
网络与信息安全学报 4 (6), 11-22, 2018
42018
MalPurifier: Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks
Y Zhou, G Cheng, Z Chen, S Yu
arXiv preprint arXiv:2312.06423, 2023
12023
Resource-Efficient Low-Rate DDoS Mitigation With Moving Target Defense in Edge Clouds
Y Zhou, G Cheng, Z Ouyang, Z Chen
IEEE Transactions on Network and Service Management, 2024
2024
MTDroid: A Moving Target Defense based Android Malware Detector against Evasion Attacks
Y Zhou, G Cheng, S Yu, Z Chen, Y Hu
IEEE Transactions on Information Forensics and Security, 2024
2024
WFF-EGNN: Encrypted Traffic Classification based on Weaved Flow Fragment via Ensemble Graph Neural Networks
Z Chen, G Cheng, D Niu, X Qiu, Y Zhao, Y Zhou
IEEE Transactions on Machine Learning in Communications and Networking, 2023
2023
Higher Layers, Better Results: Application Layer Feature Engineering in Encrypted Traffic Classification
Z Chen, G Cheng, Z Wei, Z Xu, N Fu, Y Zhou
International Conference on Wireless Algorithms, Systems, and Applications …, 2022
2022
系统目前无法执行此操作,请稍后再试。
文章 1–20