追蹤
Liang Zhang
Liang Zhang
Research Scientist, University of Arizona
在 email.arizona.edu 的電子郵件地址已通過驗證
標題
引用次數
引用次數
年份
A network security situation assessment method based on adversarial deep learning
H Yang, R Zeng, G Xu, L Zhang
Applied Soft Computing 102, 107096, 2021
532021
Network security situation assessment with network attack behavior classification
H Yang, Z Zhang, L Xie, L Zhang
International Journal of Intelligent Systems, 2022
242022
Coherently distributed wideband LFM source localization
J Yu, L Zhang, K Liu
IEEE Signal Processing Letters 22 (4), 504-508, 2014
242014
Separation and localization of multiple distributed wideband chirps using the fractional Fourier transform
J Yu, L Zhang, K Liu, D Liu
EURASIP Journal on Wireless Communications and Networking 2015, 1-8, 2015
142015
Key node recognition in complex networks based on the K-shell method
XIE Lixia, SUN Honghong, Y Hongyu, Z Liang
Journal of Tsinghua University (Science and Technology) 62 (5), 849-861, 2022
132022
基于攻击图的主机安全评估方法
杨宏宇, 袁海航, 张良
通信学报 43 (2), 89-99, 2022
62022
Low-complexity spatial parameter estimation for coherently distributed linear chirp source
L Zhang, Y Liu, J Yu, K Liu
IEEE Access 6, 75843-75854, 2018
52018
A novel fractional filter design and cross-term elimination in Wigner distribution
J Yu, K Liu, L Zhang, P Luo
International Journal of Distributed Sensor Networks 11 (10), 189308, 2015
52015
基于K-shell的复杂网络关键节点识别方法
谢丽霞, 孙红红, 杨宏宇, 张良
清华大学学报 (自然科学版), 2022
42022
Network security situation assessments with parallel feature extraction and an improved BiGRU
Y Hongyu, Z Zixin, Z Liang
Journal of Tsinghua University (Science and Technology) 62 (5), 842-848, 2022
42022
Malware detection based on visualization of recombined API instruction sequence
H Yang, Y Zhang, L Zhang, X Cheng
Connection Science 34 (1), 2630-2651, 2022
32022
Linear Chirp Signal DOA Estimation Using Sparse Time–Frequency Dictionary
L Zhang, CY Hung, J Yu, K Liu
International Journal of Wireless Information Networks 27, 568-574, 2020
32020
MRFM: A timely detection method for DDoS attacks in IoT with multidimensional reconstruction and function mapping
L Xie, B Yuan, H Yang, Z Hu, L Jiang, L Zhang, X Cheng
Computer Standards & Interfaces 89, 103829, 2024
22024
A novel Android malware detection method with API semantics extraction
H Yang, Y Wang, L Zhang, X Cheng, Z Hu
Computers & Security 137, 103651, 2024
22024
Risk Assessment Method of IoT Host Based on Attack Graph
H Yang, H Yuan, L Zhang
Mobile Networks and Applications, 1-10, 2023
22023
Using Features at Multiple Temporal and Spatial Resolutions to Predict Human Behavior in Real Time
L Zhang, J Lieffers, A Pyarelal
Computational Theory of Mind for Human-Machine Teams: First International …, 2023
22023
Source Code Vulnerability Detection Using Vulnerability Dependency Representation Graph
H Yang, H Yang, L Zhang, X Cheng
2022 IEEE International Conference on Trust, Security and Privacy in …, 2022
22022
IoT botnet detection with feature reconstruction and interval optimization
H Yang, Z Wang, L Zhang, X Cheng
International Journal of Intelligent Systems 37 (12), 12009-12034, 2022
22022
基于并行特征提取和改进 BiGRU 的网络安全态势评估
杨宏宇, 张梓锌, 张良
清华大学学报 (自然科学版), 2022
22022
一种基于主机重要度的网络主机节点风险评估方法
杨宏宇, 袁海航, 张良
北京邮电大学学报 45 (2), 16, 2022
22022
系統目前無法執行作業,請稍後再試。
文章 1–20