关注
Tianbo Wang
Tianbo Wang
在 buaa.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
HNN: a novel model to study the intrusion detection based on multi-feature correlation and temporal-spatial analysis
S Lei, C Xia, Z Li, X Li, T Wang
IEEE Transactions on Network Science and Engineering 8 (4), 3257-3274, 2021
262021
A novel intrusion detector based on deep learning hybrid methods
S Wang, C Xia, T Wang
2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity …, 2019
212019
Capturing dynamics of information diffusion in SNS: A survey of methodology and techniques
H Li, C Xia, T Wang, S Wen, C Chen, Y Xiang
ACM Computing Surveys (CSUR) 55 (1), 1-51, 2021
182021
SADI: A novel model to study the propagation of social worms in hierarchical networks
T Wang, C Xia, S Wen, H Xue, Y Xiang, S Tu
IEEE Transactions on Dependable and Secure Computing 16 (1), 142-155, 2019
172019
The spatial–temporal perspective: The study of the propagation of modern social worms
T Wang, C Xia, Z Li, X Liu, Y Xiang
IEEE Transactions on Information Forensics and Security 12 (11), 2558-2573, 2017
172017
Secure and temporary access delegation with equality test for cloud-assisted IoV
W Li, C Xia, C Wang, T Wang
IEEE Transactions on Intelligent Transportation Systems 23 (11), 20187-20201, 2022
152022
Detection, traceability, and propagation of mobile malware threats
L Chen, C Xia, S Lei, T Wang
IEEE Access 9, 14576-14598, 2021
122021
A behavior-aware SLA-based framework for guaranteeing the security conformance of cloud service
X Liu, C Xia, T Wang, L Zhong, X Li
Frontiers of Computer Science 14, 1-17, 2020
122020
Robust reasoning over heterogeneous textual information for fact verification
Y Wang, C Xia, C Si, B Yao, T Wang
IEEE Access 8, 157140-157150, 2020
112020
The temporal characteristic of human mobility: Modeling and analysis of social worm propagation
T Wang, C Xia, Q Jia
IEEE Communications Letters 19 (7), 1169-1172, 2015
112015
Epidemic heterogeneity and hierarchy: A study of wireless hybrid worm propagation
T Wang, C Xia, X Li, Y Xiang
IEEE Transactions on Mobile Computing 21 (5), 1639-1656, 2020
92020
CloudSec: A novel approach to verifying security conformance at the bottom of the cloud
X Liu, C Xia, T Wang, L Zhong
2017 IEEE International Congress on Big Data (BigData Congress), 569-576, 2017
62017
From the dialectical perspective: Modeling and exploiting of hybrid worm propagation
T Wang, H Li, C Xia, H Zhang, P Zhang
IEEE Transactions on Information Forensics and Security 18, 1610-1624, 2023
52023
The Graph Reasoning Approach Based on the Dynamic Knowledge Auxiliary for Complex Fact Verification
Y Wang, C Xia, C Si, C Zhang, T Wang
Electronics 9 (9), 1472, 2020
52020
Ghscn: A graph neural network-based api popularity prediction method in service ecosystem
Z Li, X Liu, T Wang, W He, C Xia
IEEE Access 8, 137032-137051, 2020
42020
Topic reconstruction: A novel method based on LDA oriented to intrusion detection
S Lei, C Xia, T Wang, S Wang
Algorithms and Architectures for Parallel Processing: 19th International …, 2020
32020
PPBFL: A Privacy Protected Blockchain-based Federated Learning Model
Y Li, C Xia, W Lin, T Wang
arXiv preprint arXiv:2401.01204, 2024
22024
Applying Value-Based Deep Reinforcement Learning on KPI Time Series Anomaly Detection
Y Zhang, T Wang
2022 IEEE 15th International Conference on Cloud Computing (CLOUD), 197-202, 2022
22022
A heterogeneous graph attention network-based web service link prediction
W He, C Xia, Z Li, X Liu, T Wang
2021 3rd International Conference on Computer Communication and the Internet …, 2021
22021
LCHI: Low‐Order Correlation and High‐Order Interaction Integrated Model Oriented to Network Intrusion Detection
S Lei, C Xia, T Wang
Wireless Communications and Mobile Computing 2021 (1), 6830372, 2021
22021
系统目前无法执行此操作,请稍后再试。
文章 1–20