关注
Teng Hu
标题
引用次数
引用次数
年份
Transaction-based classification and detection approach for Ethereum smart contract
T Hu, X Liu, T Chen, X Zhang, X Huang, W Niu, J Lu, K Zhou, Y Liu
Information Processing & Management 58 (2), 102462, 2021
1862021
An insider threat detection approach based on mouse dynamics and deep learning
T Hu, W Niu, X Zhang, X Liu, J Lu, Y Liu
Security and communication networks 2019 (1), 3898951, 2019
862019
Dataether: Data exploration framework for ethereum
T Chen, Z Li, Y Zhang, X Luo, A Chen, K Yang, B Hu, T Zhu, S Deng, T Hu, ...
2019 IEEE 39th International Conference on Distributed Computing Systems …, 2019
592019
Practical evaluation of encrypted traffic classification based on a combined method of entropy estimation and neural networks
K Zhou, W Wang, C Wu, T Hu
Etri Journal 42 (3), 311-323, 2020
352020
Time series forecasting and classification models based on recurrent with attention mechanism and generative adversarial networks
K Zhou, W Wang, T Hu, K Deng
Sensors 20 (24), 7211, 2020
332020
Comparison of time series forecasting based on statistical ARIMA model and LSTM with attention mechanism
K Zhou, WY Wang, T Hu, CH Wu
Journal of physics: conference series 1631 (1), 012141, 2020
292020
A large-scale empirical study on control flow identification of smart contracts
T Chen, Z Li, Y Zhang, X Luo, T Wang, T Hu, X Xiao, D Wang, J Huang, ...
2019 ACM/IEEE International Symposium on Empirical Software Engineering and …, 2019
272019
Federated synthetic data generation with differential privacy
B Xin, Y Geng, T Hu, S Chen, W Yang, S Wang, L Huang
Neurocomputing 468, 1-10, 2022
252022
Detecting malware on X86-based IoT devices in autonomous driving
W Niu, X Zhang, X Du, T Hu, X Xie, N Guizani
IEEE Wireless Communications 26 (4), 80-87, 2019
212019
A black-box attack on neural networks based on swarm evolutionary algorithm
X Liu, T Hu, K Ding, Y Bai, W Niu, J Lu
Information Security and Privacy: 25th Australasian Conference, ACISP 2020 …, 2020
182020
Application of improved asynchronous advantage actor critic reinforcement learning model on anomaly detection
K Zhou, W Wang, T Hu, K Deng
Entropy 23 (3), 274, 2021
172021
Tracking the insider attacker: A blockchain traceability system for insider threats
T Hu, B Xin, X Liu, T Chen, K Ding, X Zhang
Sensors 20 (18), 5297, 2020
152020
Integrating traffics with network device logs for anomaly detection
J Lu, F Lv, Z Zhuo, X Zhang, X Liu, T Hu, W Deng
Security and Communication Networks 2019 (1), 5695021, 2019
152019
A low-query black-box adversarial attack based on transferability
K Ding, X Liu, W Niu, T Hu, Y Wang, X Zhang
Knowledge-Based Systems 226, 107102, 2021
142021
Securing the private key in your blockchain wallet: a continuous authentication approach based on behavioral biometric
T Hu, X Liu, W Niu, K Ding, Y Wang, X Zhang
Journal of Physics: Conference Series 1631 (1), 012104, 2020
142020
Using XGBoost to discover infected hosts based on HTTP traffic
W Niu, T Li, X Zhang, T Hu, T Jiang, H Wu
Security and Communication Networks 2019 (1), 2182615, 2019
92019
Rule anomaly-free mechanism of security function chaining in 5g
G Li, H Zhou, B Feng, G Li, H Zhang, T Hu
IEEE Access 6, 13653-13662, 2018
92018
Sparse adversarial attack for video via gradient-based keyframe selection
Y Xu, X Liu, M Yin, T Hu, K Ding
ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and …, 2022
62022
Sparse black-box inversion attack with limited information
Y Xu, X Liu, T Hu, B Xin, R Yang
ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and …, 2023
52023
Gru and multi-autoencoder based insider threat detection for cyber security
F Meng, P Lu, J Li, T Hu, M Yin, F Lou
2021 IEEE Sixth International Conference on Data Science in Cyberspace (DSC …, 2021
52021
系统目前无法执行此操作,请稍后再试。
文章 1–20