关注
Bin Yuan
Bin Yuan
Associate Professor of School of Cyber Science and Engineering, Huazhong University of Science and
在 hust.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Defending against flow table overloading attack in software-defined networks
B Yuan, D Zou, S Yu, H Jin, W Qiang, J Shen
IEEE Transactions on Services Computing 12 (2), 231-246, 2016
1032016
Exploring New Opportunities to Defeat Low-rate DDoS Attack in Container-based Cloud Environment
Z Li, HJ Jin, D Zou, B Yuan
IEEE Transactions on Parallel and Distributed Systems 31 (3), 695-706, 2020
622020
Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation
B Yuan, Y Jia, L Xing, D Zhao, XF Wang, D Zou, H Jin, Y Zhang
552020
Dseom: A framework for dynamic security evaluation and optimization of mtd in container-based cloud
H Jin, Z Li, D Zou, B Yuan
IEEE Transactions on Dependable and Secure Computing 18 (3), 1125-1136, 2019
532019
Deployment of robust security scheme in SDN based 5G network over NFV enabled cloud environment
IH Abdulqadder, D Zou, IT Aziz, B Yuan, W Dai
IEEE Transactions on Emerging Topics in Computing 9 (2), 866-877, 2018
502018
SecSDN-cloud: defeating vulnerable attacks through secure software-defined networks
IH Abdulqadder, D Zou, IT Aziz, B Yuan, W Li
IEEE Access 6, 8292-8301, 2018
382018
Towards effective detection of recent DDoS attacks: A deep learning approach
I Ortet Lopes, D Zou, FA Ruambo, S Akbar, B Yuan
Security and Communication Networks 2021 (1), 5710028, 2021
362021
A practical byzantine-based approach for faulty switch tolerance in software-defined networks
B Yuan, H Jin, D Zou, LT Yang, S Yu
IEEE Transactions on Network and Service Management 15 (2), 825-839, 2018
252018
Who's in control? On security risks of disjointed IoT device management channels
Y Jia, B Yuan, L Xing, D Zhao, Y Zhang, XF Wang, Y Liu, K Zheng, ...
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
202021
Secure Data Transportation With Software-Defined Networking and k-n Secret Sharing for High-Confidence IoT Services
B Yuan, C Lin, H Zhao, D Zou, LT Yang, H Jin, C Rong
IEEE Internet of Things Journal 7 (9), 7967-7981, 2020
202020
HostWatcher: Protecting hosts in cloud data centers through software-defined networking
B Yuan, D Zou, H Jin, S Yu, LT Yang
Future Generation Computer Systems 105, 964-972, 2020
142020
Validating user flows to protect software defined network environments
IH Abdulqadder, D Zou, IT Aziz, B Yuan
Security and Communication Networks 2018 (1), 1308678, 2018
102018
A domain-divided configurable security model for cloud computing-based telecommunication services
J Shen, D Zou, H Jin, B Yuan, W Dai
The Journal of Supercomputing 75, 109-122, 2019
92019
Fine-grained Code Clone Detection with Block-based Splitting of Abstract Syntax Tree
HJ Tiancheng Hu, Zijing Xu, Yilin Fang, Yueming Wu*, Bin Yuan*, Deqing Zou
32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
82023
Solving anomalies in NFV-SDN based service function chaining composition for IoT network
D Zou, Z Huang, B Yuan, H Chen, H Jin
IEEE Access 6, 62286-62295, 2018
82018
Enhanced attack aware security provisioning scheme in SDN/NFV enabled over 5G network
IH Abdulqadder, D Zou, IT Aziz, B Yuan
2018 27th International Conference on Computer Communication and Networks …, 2018
82018
A fine-grained multi-tenant permission management framework for SDN and NFV
D Zou, Y Lu, B Yuan, H Chen, H Jin
IEEE Access 6, 25562-25572, 2018
82018
P-verifier: Understanding and mitigating security risks in cloud-based iot access policies
Z Jin, L Xing, Y Fang, Y Jia, B Yuan, Q Liu
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
72022
Modeling software defined security using multi-level security mechanism for SDN environment
IH Abdulqadder, D Zou, IT Aziz, B Yuan
2017 IEEE 17th International Conference on Communication Technology (ICCT …, 2017
72017
Smartpatch: Verifying the authenticity of the trigger-event in the IoT platform
B Yuan, Y Wu, M Yang, L Xing, X Wang, D Zou, H Jin
IEEE Transactions on Dependable and Secure Computing 20 (2), 1656-1674, 2022
62022
系统目前无法执行此操作,请稍后再试。
文章 1–20