关注
Zhe Tu
Zhe Tu
在 bjtu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Distributed network intrusion detection system in satellite-terrestrial integrated networks using federated learning
K Li, H Zhou, Z Tu, W Wang, H Zhang
IEEE Access 8, 214852-214865, 2020
552020
A routing optimization method for software-defined SGIN based on deep reinforcement learning
Z Tu, H Zhou, K Li, G Li, Q Shen
2019 IEEE Globecom Workshops (GC Wkshps), 1-6, 2019
212019
An energy-efficient topology design and DDoS attacks mitigation for green software-defined satellite network
Z Tu, H Zhou, K Li, M Li, A Tian
IEEE Access 8, 211434-211450, 2020
202020
Cskb: A cyber security knowledge base based on knowledge graph
K Li, H Zhou, Z Tu, B Feng
Security and Privacy in Digital Economy: First International Conference …, 2020
152020
A blockchain-based trust and reputation model with dynamic evaluation mechanism for IoT
Z Tu, H Zhou, K Li, H Song, Y Yang
Computer Networks 218, 109404, 2022
122022
Blockchain empowered federated learning for distributed network security behaviour knowledge base in 6G
K Li, H Zhou, Z Tu, F Liu, H Zhang
Security and Communication Networks 2022 (1), 4233238, 2022
82022
DCTG: Degree Constrained Topology Generation Algorithm for Software-defined Satellite Network.
Z Tu, H Zhou, K Li, G Li
J. Internet Serv. Inf. Secur. 9 (4), 49-58, 2019
82019
Blockchain-based access control and behavior regulation system for IoT
H Song, Z Tu, Y Qin
Sensors 22 (21), 8339, 2022
72022
Cyber-attack behavior knowledge graph based on CAPEC and CWE towards 6G
W Wang, H Zhou, K Li, Z Tu, F Liu
International Symposium on Mobile Internet Security, 352-364, 2021
72021
A blockchain-based user identity authentication method for 5G
Z Tu, H Zhou, K Li, H Song, W Wang
International Symposium on Mobile Internet Security, 335-351, 2021
42021
Blockchain-Empowered Token-Based Access Control System with User Reputation Evaluation.
Y Yang, Z Tu, Y Liu, H Zhou
Computers, Materials & Continua 77 (3), 3163-3184, 2023
22023
AT-GCN: A DDoS attack path tracing system based on attack traceability knowledge base and GCN
K Li, H Zhou, Z Tu, O Liu, H Zhang
Computer Networks 236, 110036, 2023
22023
Blockchain-based differentiated authentication mechanism for 6G heterogeneous networks
Z Tu, H Zhou, K Li, H Song, W Quan
Peer-to-Peer Networking and Applications 16 (2), 727-748, 2023
22023
A Blockchain‐Enabled Trusted Protocol Based on Whole‐Process User Behavior in 6G Network
Z Tu, H Zhou, K Li, H Song, Y Yang
Security and Communication Networks 2022 (1), 8188977, 2022
22022
Deep Learning Based Intelligent Congestion Control for Space Network
K Li, H Zhou, H Zhang, Z Tu, G Li
Space Information Networks: 4th International Conference, SINC 2019, Wuzhen …, 2020
12020
SLSA: A link stability based algorithm for the topology optimization of IGSO/MEO double-layered satellite network
K Li, H Zhou, Z Tu, G Li
Research Briefs on Information and Communication Technology Evolution 5, 51-61, 2019
12019
School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing 100044, China {21120151, zhe_tu, 20120099, hchzhou}@ bjtu. edu. cn
Y Yang, Z Tu, H Song, H Zhou
Mobile Internet Security: 6th International Symposium, MobiSec 2022, Jeju …, 2023
2023
A Token-Based Access Control Mechanism for the Internet of Things Using Blockchain
Y Yang, Z Tu, H Song, H Zhou
International Symposium on Mobile Internet Security, 195-206, 2022
2022
信息网络内生恶意行为检测框架
涂哲, 周华春, 李坤, 王玮琳
电信科学 36 (10), 37-45, 2020
2020
Malicious Behavior Feature Graph for Knowledge Reasoning of DDoS Attacks in 6G
K Li, H Zhou, Z Tu, F Liu, L Li
系统目前无法执行此操作,请稍后再试。
文章 1–20