24 results on '"Yingxu Lai"'
Search Results
2. Mining of Potential Relationships based on the Knowledge Graph of Industrial Control Systems.
3. Fast tracing method for Sybil attack in VANETs.
4. Model Heterogeneous Federated Learning for Intrusion Detection based on knowledge distillation.
5. Zen-tor: A Zero Knowledge Known-Unknown Traffic Classification Method.
6. Malicious attack detection based on traffic-flow information fusion.
7. FITIC: A Few-shot Learning Based IoT Traffic Classification Method.
8. Privacy-Preserving Verifiable Collaborative Learning with Chain Aggregation.
9. Intrusion Detection of Industrial Control System Based on Modbus TCP Protocol.
10. FL-GUARD: A Detection and Defense System for DDoS Attack in SDN.
11. Study on Authentication Protocol of SDN Trusted Domain.
12. Analysis of Industrial Control Systems Traffic Based on Time Series.
13. Trust-Based Security for the Spanning Tree Protocol.
14. Study and Implementation of Trust Evaluation Access Control Mechanism Based on XEN.
15. Framework of Web content filtering for IPv6.
16. Design and Implementation of Distributed Intelligent Firewall Based on IPv6.
17. Trusted Computing Based Mobile DRM Authentication Scheme.
18. A Data Mining Framework for Building Intrusion Detection Models Based on IPv6.
19. Unknown Malicious Identification.
20. A Feature Selection for Malicious Detection.
21. Unknown Malicious Executable Defection.
22. BJUT at TREC 2014 Contextual Suggestion Track: Hybrid Recommendation Based on Open-web Information.
23. BJUT at TREC 2013 Temporal Summarization Track.
24. BJUT at TREC 2013 Microblog Track.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.