Distributed network intrusion detection system in satellite-terrestrial integrated networks using federated learning K Li, H Zhou, Z Tu, W Wang, H Zhang IEEE Access 8, 214852-214865, 2020 | 55 | 2020 |
A routing optimization method for software-defined SGIN based on deep reinforcement learning Z Tu, H Zhou, K Li, G Li, Q Shen 2019 IEEE Globecom Workshops (GC Wkshps), 1-6, 2019 | 21 | 2019 |
An energy-efficient topology design and DDoS attacks mitigation for green software-defined satellite network Z Tu, H Zhou, K Li, M Li, A Tian IEEE Access 8, 211434-211450, 2020 | 20 | 2020 |
Cskb: A cyber security knowledge base based on knowledge graph K Li, H Zhou, Z Tu, B Feng Security and Privacy in Digital Economy: First International Conference …, 2020 | 15 | 2020 |
A blockchain-based trust and reputation model with dynamic evaluation mechanism for IoT Z Tu, H Zhou, K Li, H Song, Y Yang Computer Networks 218, 109404, 2022 | 12 | 2022 |
Blockchain empowered federated learning for distributed network security behaviour knowledge base in 6G K Li, H Zhou, Z Tu, F Liu, H Zhang Security and Communication Networks 2022 (1), 4233238, 2022 | 8 | 2022 |
DCTG: Degree Constrained Topology Generation Algorithm for Software-defined Satellite Network. Z Tu, H Zhou, K Li, G Li J. Internet Serv. Inf. Secur. 9 (4), 49-58, 2019 | 8 | 2019 |
Blockchain-based access control and behavior regulation system for IoT H Song, Z Tu, Y Qin Sensors 22 (21), 8339, 2022 | 7 | 2022 |
Cyber-attack behavior knowledge graph based on CAPEC and CWE towards 6G W Wang, H Zhou, K Li, Z Tu, F Liu International Symposium on Mobile Internet Security, 352-364, 2021 | 7 | 2021 |
A blockchain-based user identity authentication method for 5G Z Tu, H Zhou, K Li, H Song, W Wang International Symposium on Mobile Internet Security, 335-351, 2021 | 4 | 2021 |
Blockchain-Empowered Token-Based Access Control System with User Reputation Evaluation. Y Yang, Z Tu, Y Liu, H Zhou Computers, Materials & Continua 77 (3), 3163-3184, 2023 | 2 | 2023 |
AT-GCN: A DDoS attack path tracing system based on attack traceability knowledge base and GCN K Li, H Zhou, Z Tu, O Liu, H Zhang Computer Networks 236, 110036, 2023 | 2 | 2023 |
Blockchain-based differentiated authentication mechanism for 6G heterogeneous networks Z Tu, H Zhou, K Li, H Song, W Quan Peer-to-Peer Networking and Applications 16 (2), 727-748, 2023 | 2 | 2023 |
A Blockchain‐Enabled Trusted Protocol Based on Whole‐Process User Behavior in 6G Network Z Tu, H Zhou, K Li, H Song, Y Yang Security and Communication Networks 2022 (1), 8188977, 2022 | 2 | 2022 |
Deep Learning Based Intelligent Congestion Control for Space Network K Li, H Zhou, H Zhang, Z Tu, G Li Space Information Networks: 4th International Conference, SINC 2019, Wuzhen …, 2020 | 1 | 2020 |
SLSA: A link stability based algorithm for the topology optimization of IGSO/MEO double-layered satellite network K Li, H Zhou, Z Tu, G Li Research Briefs on Information and Communication Technology Evolution 5, 51-61, 2019 | 1 | 2019 |
School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing 100044, China {21120151, zhe_tu, 20120099, hchzhou}@ bjtu. edu. cn Y Yang, Z Tu, H Song, H Zhou Mobile Internet Security: 6th International Symposium, MobiSec 2022, Jeju …, 2023 | | 2023 |
A Token-Based Access Control Mechanism for the Internet of Things Using Blockchain Y Yang, Z Tu, H Song, H Zhou International Symposium on Mobile Internet Security, 195-206, 2022 | | 2022 |
信息网络内生恶意行为检测框架 涂哲, 周华春, 李坤, 王玮琳 电信科学 36 (10), 37-45, 2020 | | 2020 |
Malicious Behavior Feature Graph for Knowledge Reasoning of DDoS Attacks in 6G K Li, H Zhou, Z Tu, F Liu, L Li | | |