39 results on '"Yin, Mingyong"'
Search Results
2. Adaptive CNN-Based Image Compression Model for Improved Remote Desktop Experience
3. Cross-domain network attack detection enabled by heterogeneous transfer learning
4. A Knowledge Graph-Based Consistency Detection Method for Network Security Policies.
5. Anomalous process detection for Internet of Things based on K-Core
6. Dual-IoTID: A Session-Based Dual IoT Device Identification Model.
7. Optimization of Internet of Things Remote Desktop Protocol for Low-Bandwidth Environments Using Convolutional Neural Networks
8. Leaving the Business Security Burden to LiSEA: A Low-Intervention Security Embedding Architecture for Business APIs
9. N-Accesses: A Blockchain-Based Access Control Framework for Secure IoT Data Management
10. CLAST: Efficient Certificateless Sequential Aggregate Signature Scheme for Industrial Internet of Things Environments
11. Branchy-TEE: Deep Learning Security Inference Acceleration Using Trusted Execution Environment
12. Exploring the construction and infiltration strategies of social bots in sina microblog
13. Launching a Robust Backdoor Attack under Capability Constrained Scenarios
14. Analysis on the Reliability of Non-repairable and Repairable Network Storage Systems
15. A Robust Adversarial Example Attack Based on Video Augmentation
16. TCP-Gvegas with prediction and adaptation in multi-hop ad hoc networks
17. Security Enhancements for Data-Driven Systems: A Blockchain-Based Trustworthy Data Sharing Scheme
18. A Novel Steganography Method for Character-Level Text Image Based on Adversarial Attacks
19. Sparse Adversarial Attack For Video Via Gradient-Based Keyframe Selection
20. ContainerGuard: A Real-Time Attack Detection System in Container-Based Big Data Platform
21. Packet Forwarding Authentication Method Based on Pre-sequence in SDN
22. Scorpio: an Automated Penetration Testing Tool and Its Integration with a Cyber Range
23. Detecting Insider Threat from Behavioral Logs Based on Ensemble and Self-Supervised Learning
24. Inferring Users’ Social Roles with a Multi-Level Graph Neural Network Model
25. GRU and Multi-autoencoder based Insider Threat Detection for Cyber Security
26. An Effective Algorithm for Intrusion Detection Using Random Shapelet Forest
27. Analysis on the Reliability of Non-repairable and Repairable Network Storage Systems
28. A Subjective Expressions Extracting Method for Social Opinion Mining
29. An Attack Vector Evaluation Method for Smart City Security Protection
30. Dynamics on Hybrid Complex Network: Botnet Modeling and Analysis of Medical IoT
31. An Automatic Event Detection Method for Massive Wireless Access Prediction
32. Multiagent Reinforcement Learning Dynamic Spectrum Access in Cognitive Radios
33. A novel recommender algorithm using information entropy and secondary-clustering
34. A novel user-interest model based on mixed measure
35. A rank sequence method for detecting black hole attack in ad hoc network
36. TCP-Gvegas with prediction and adaptation in multi-hop ad hoc networks
37. Analysis on the instantaneous availability of series repairable systems in cyber warfare environment
38. Passive mode discovery of network topology
39. A rank sequence method for detecting black hole attack in ad hoc network.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.