Sequential model based intrusion detection system for IoT servers using deep learning methods M Zhong, Y Zhou, G Chen Sensors 21 (4), 1113, 2021 | 85 | 2021 |
Higher-order percolation in simplicial complexes D Zhao, R Li, H Peng, M Zhong, W Wang Chaos, Solitons & Fractals 155, 111701, 2022 | 26 | 2022 |
Disintegrate hypergraph networks by attacking hyperedge H Peng, C Qian, D Zhao, M Zhong, X Ling, W Wang Journal of King Saud University-Computer and Information Sciences 34 (7 …, 2022 | 24 | 2022 |
Targeting attack hypergraph networks H Peng, C Qian, D Zhao, M Zhong, J Han, W Wang Chaos: An Interdisciplinary Journal of Nonlinear Science 32 (7), 2022 | 22 | 2022 |
Percolation on simplicial complexes D Zhao, R Li, H Peng, M Zhong, W Wang Applied Mathematics and Computation 431, 127330, 2022 | 12 | 2022 |
EXAMINER: Automatically locating inconsistent instructions between real devices and CPU emulators for ARM M Jiang, T Xu, Y Zhou, Y Hu, M Zhong, L Wu, X Luo, K Ren Proceedings of the 27th ACM International Conference on Architectural …, 2022 | 8 | 2022 |
Efficient text-based evolution algorithm to hard-label adversarial attacks on text H Peng, Z Wang, D Zhao, Y Wu, J Han, S Guo, S Ji, M Zhong Journal of King Saud University-Computer and Information Sciences 35 (5), 101539, 2023 | 7 | 2023 |
Robustness of higher-order interdependent networks H Peng, Y Zhao, D Zhao, M Zhong, Z Hu, J Han, R Li, W Wang Chaos, Solitons & Fractals 171, 113485, 2023 | 6 | 2023 |
Reliability analysis of interdependent hypergraph network under different attack strategies H Peng, Z Xie, D Zhao, M Zhong, J Han, W Wang International Journal of Modern Physics C 34 (02), 2350027, 2023 | 6 | 2023 |
TextCheater: A Query-Efficient Textual Adversarial Attack in the Hard-Label Setting H Peng, S Guo, D Zhao, X Zhang, J Han, S Ji, X Yang, M Zhong IEEE Transactions on Dependable and Secure Computing, 2023 | 5 | 2023 |
Message passing approach to analyze the robustness of hypergraph H Peng, C Qian, D Zhao, M Zhong, J Han, R Li, W Wang arXiv preprint arXiv:2302.14594, 2023 | 5 | 2023 |
A security log analysis scheme using deep learning algorithm for IDSs in social network M Zhong, Y Zhou, G Chen Security and Communication Networks 2021 (1), 5542543, 2021 | 5 | 2021 |
Message-passing approach to higher-order percolation H Peng, C Qian, D Zhao, M Zhong, J Han, T Zhou, W Wang Physica A: Statistical Mechanics and its Applications 634, 129446, 2024 | 3 | 2024 |
Digital contact tracing on hypergraphs Y Nie, M Zhong, R Li, D Zhao, H Peng, X Zhong, T Lin, W Wang Chaos: An Interdisciplinary Journal of Nonlinear Science 33 (6), 2023 | 3 | 2023 |
Robustness of directed higher-order networks D Zhao, X Ling, X Zhang, H Peng, M Zhong, C Qian, W Wang Chaos: An Interdisciplinary Journal of Nonlinear Science 33 (8), 2023 | 2 | 2023 |
Automatically Locating ARM Instructions Deviation between Real Devices and CPU Emulators M Jiang, T Xu, Y Zhou, Y Hu, M Zhong, L Wu, X Luo, K Ren arXiv preprint arXiv:2105.14273, 2021 | 2 | 2021 |
Robustness of interdependent directed higher-order networks against cascading failures D Zhao, X Ling, H Peng, M Zhong, J Han, W Wang Physica D: Nonlinear Phenomena 462, 134126, 2024 | 1 | 2024 |
Malgne: Enhancing the performance and efficiency of cfg-based malware detector by graph node embedding in low dimension space H Peng, J Yang, D Zhao, X Xu, Y Pu, J Han, X Yang, M Zhong, S Ji IEEE Transactions on Information Forensics and Security, 2024 | 1 | 2024 |
Cascading failures on interdependent hypergraph C Qian, D Zhao, M Zhong, H Peng, W Wang Communications in Nonlinear Science and Numerical Simulation, 108237, 2024 | | 2024 |
TextJuggler: Fooling text classification tasks by generating high-quality adversarial examples H Peng, Z Wang, C Wei, D Zhao, G Xu, J Han, S Guo, M Zhong, S Ji Knowledge-Based Systems, 112188, 2024 | | 2024 |