关注
Kun Li
Kun Li
在 bjtu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Distributed network intrusion detection system in satellite-terrestrial integrated networks using federated learning
K Li, H Zhou, Z Tu, W Wang, H Zhang
IEEE Access 8, 214852-214865, 2020
522020
A routing optimization method for software-defined SGIN based on deep reinforcement learning
Z Tu, H Zhou, K Li, G Li, Q Shen
2019 IEEE Globecom Workshops (GC Wkshps), 1-6, 2019
212019
An energy-efficient topology design and DDoS attacks mitigation for green software-defined satellite network
Z Tu, H Zhou, K Li, M Li, A Tian
IEEE Access 8, 211434-211450, 2020
182020
Cskb: A cyber security knowledge base based on knowledge graph
K Li, H Zhou, Z Tu, B Feng
Security and Privacy in Digital Economy: First International Conference …, 2020
142020
A blockchain-based trust and reputation model with dynamic evaluation mechanism for IoT
Z Tu, H Zhou, K Li, H Song, Y Yang
Computer Networks 218, 109404, 2022
112022
Trusted multi-domain ddos detection based on federated learning
Z Yin, K Li, H Bi
Sensors 22 (20), 7753, 2022
82022
Blockchain empowered federated learning for distributed network security behaviour knowledge base in 6G
K Li, H Zhou, Z Tu, F Liu, H Zhang
Security and Communication Networks 2022 (1), 4233238, 2022
82022
Online botnet detection method based on ensemble learning
Q Shen, Z Tu, K Li, YJ Qin, HC Zhou
Appl. Res. Comput 39, 1845-1851, 2022
72022
Cyber-attack behavior knowledge graph based on CAPEC and CWE towards 6G
W Wang, H Zhou, K Li, Z Tu, F Liu
International Symposium on Mobile Internet Security, 352-364, 2021
72021
DCTG: Degree Constrained Topology Generation Algorithm for Software-defined Satellite Network.
Z Tu, H Zhou, K Li, G Li
J. Internet Serv. Inf. Secur. 9 (4), 49-58, 2019
62019
A blockchain-based user identity authentication method for 5G
Z Tu, H Zhou, K Li, H Song, W Wang
International Symposium on Mobile Internet Security, 335-351, 2021
42021
AT-GCN: A DDoS attack path tracing system based on attack traceability knowledge base and GCN
K Li, H Zhou, Z Tu, O Liu, H Zhang
Computer Networks 236, 110036, 2023
22023
A Blockchain‐Enabled Trusted Protocol Based on Whole‐Process User Behavior in 6G Network
Z Tu, H Zhou, K Li, H Song, Y Yang
Security and Communication Networks 2022 (1), 8188977, 2022
22022
Blockchain-based differentiated authentication mechanism for 6G heterogeneous networks
Z Tu, H Zhou, K Li, H Song, W Quan
Peer-to-Peer Networking and Applications 16 (2), 727-748, 2023
12023
Deep Learning Based Intelligent Congestion Control for Space Network
K Li, H Zhou, H Zhang, Z Tu, G Li
Space Information Networks: 4th International Conference, SINC 2019, Wuzhen …, 2020
12020
SLSA: A link stability based algorithm for the topology optimization of IGSO/MEO double-layered satellite network
K Li, H Zhou, Z Tu, G Li
Research Briefs on Information and Communication Technology Evolution 5, 51-61, 2019
12019
Multi-Domain Malicious Behavior Knowledge Base Framework for Multi-Type DDoS Behavior Detection.
O Liu, K Li, Z Yin, D Gao, H Zhou
Intelligent Automation & Soft Computing 37 (3), 2023
2023
Check for updates A Graph Neural Network Detection Scheme for Malicious Behavior Knowledge Base
OY Liu, K Li, Z Yin, H Zhou
Mobile Internet Security: 6th International Symposium, MobiSec 2022, Jeju …, 2023
2023
A Graph Neural Network Detection Scheme for Malicious Behavior Knowledge Base
OY Liu, K Li, Z Yin, H Zhou
International Symposium on Mobile Internet Security, 122-133, 2022
2022
Malicious Behavior Feature Graph for Knowledge Reasoning of DDoS Attacks in 6G
K Li, H Zhou, Z Tu, F Liu, L Li
系统目前无法执行此操作,请稍后再试。
文章 1–20