Blockchain-based secure and trustworthy Internet of Things in SDN-enabled 5G-VANETs L Xie, Y Ding, H Yang, X Wang IEEE Access 7, 56656-56666, 2019 | 213 | 2019 |
Wireless network intrusion detection based on improved convolutional neural network H Yang, F Wang Ieee Access 7, 64366-64374, 2019 | 115 | 2019 |
Next big thing in big data: the security of the ICT supply chain T Lu, X Guo, B Xu, L Zhao, Y Peng, H Yang 2013 International Conference on Social Computing, 1066-1073, 2013 | 57 | 2013 |
Clustering and classification based anomaly detection H Yang, F Xie, Y Lu Fuzzy Systems and Knowledge Discovery: Third International Conference, FSKD …, 2006 | 36 | 2006 |
A network security situation assessment method based on adversarial deep learning H Yang, R Zeng, G Xu, L Zhang Applied Soft Computing 102, 107096, 2021 | 32 | 2021 |
Combined wireless network intrusion detection model based on deep learning H Yang, G Qin, L Ye IEEE Access 7, 82624-82632, 2019 | 28 | 2019 |
Power consumption based android malware detection H Yang, R Tang Journal of Electrical and Computer Engineering 2016, 2016 | 26 | 2016 |
Intrusion detection solution to WLANs H Yang, L Xie, J Sun Proceedings of the IEEE 6th Circuits and Systems Symposium on Emerging …, 2004 | 21 | 2004 |
Intrusion detection for wireless local area network H Yang, L Xie, J Sun Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat …, 2004 | 19 | 2004 |
A novel algorithm for improving malicious node detection effect in wireless sensor networks H Yang, X Zhang, F Cheng Mobile Networks and Applications 26, 1564-1573, 2021 | 17 | 2021 |
Research on SVM based network intrusion detection classification L Xie, D Zhu, H Yang 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery …, 2009 | 17 | 2009 |
Network security situation assessment with network attack behavior classification H Yang, Z Zhang, L Xie, L Zhang International Journal of Intelligent Systems 37 (10), 6909-6927, 2022 | 11 | 2022 |
An unsupervised learning-based network threat situation assessment model for internet of things H Yang, R Zeng, F Wang, G Xu, J Zhang Security and Communication Networks 2020, 1-11, 2020 | 11 | 2020 |
Mitigating LFA through segment rerouting in IoT environment with traceroute flow abnormality detection L Xie, Y Ding, H Yang, Z Hu Journal of Network and Computer Applications 164, 102690, 2020 | 10 | 2020 |
Research on cluster remote video surveillance system H Yang, L Xie, F Xie 2006 4th IEEE International Conference on Industrial Informatics, 1171-1174, 2006 | 10 | 2006 |
Towards an analysis of software supply chain risk management S Du, T Lu, L Zhao, B Xu, X Guo, H Yang Proceedings of the World Congress on Engineering and Computer Science 1, 2013 | 9 | 2013 |
Agent based intrusion detection for wireless local area network HY Yang, LX Xie Proceedings of 2004 International Conference on Machine Learning and …, 2004 | 9 | 2004 |
A Pythagorean fuzzy Petri net based security assessment model for civil aviation airport security inspection information system H Yang, Y Feng International Journal of Intelligent Systems 36 (5), 2122-2143, 2021 | 8 | 2021 |
Research on network anomaly detection based on clustering and classifier H Yang, F Xie, Y Lu 2006 International Conference on Computational Intelligence and Security 1 …, 2006 | 8 | 2006 |
A new approach to network anomaly attack detection H Yang, L Xie, F Xie 2008 Fifth International Conference on Fuzzy Systems and Knowledge Discovery …, 2008 | 7 | 2008 |