Distributed network intrusion detection system in satellite-terrestrial integrated networks using federated learning K Li, H Zhou, Z Tu, W Wang, H Zhang IEEE Access 8, 214852-214865, 2020 | 65 | 2020 |
A routing optimization method for software-defined SGIN based on deep reinforcement learning Z Tu, H Zhou, K Li, G Li, Q Shen 2019 IEEE Globecom Workshops (GC Wkshps), 1-6, 2019 | 23 | 2019 |
An energy-efficient topology design and DDoS attacks mitigation for green software-defined satellite network Z Tu, H Zhou, K Li, M Li, A Tian IEEE Access 8, 211434-211450, 2020 | 22 | 2020 |
Cskb: A cyber security knowledge base based on knowledge graph K Li, H Zhou, Z Tu, B Feng Security and Privacy in Digital Economy: First International Conference …, 2020 | 17 | 2020 |
A blockchain-based trust and reputation model with dynamic evaluation mechanism for IoT Z Tu, H Zhou, K Li, H Song, Y Yang Computer Networks 218, 109404, 2022 | 16 | 2022 |
Trusted multi-domain ddos detection based on federated learning Z Yin, K Li, H Bi Sensors 22 (20), 7753, 2022 | 12 | 2022 |
Blockchain empowered federated learning for distributed network security behaviour knowledge base in 6G K Li, H Zhou, Z Tu, F Liu, H Zhang Security and Communication Networks 2022 (1), 4233238, 2022 | 11 | 2022 |
DCTG: Degree Constrained Topology Generation Algorithm for Software-defined Satellite Network. Z Tu, H Zhou, K Li, G Li J. Internet Serv. Inf. Secur. 9 (4), 49-58, 2019 | 9 | 2019 |
Cyber-attack behavior knowledge graph based on CAPEC and CWE towards 6G W Wang, H Zhou, K Li, Z Tu, F Liu International Symposium on Mobile Internet Security, 352-364, 2021 | 8 | 2021 |
Online botnet detection method based on ensemble learning Q Shen, Z Tu, K Li, YJ Qin, HC Zhou Appl. Res. Comput 39, 1845-1851, 2022 | 7 | 2022 |
AT-GCN: A DDoS attack path tracing system based on attack traceability knowledge base and GCN K Li, H Zhou, Z Tu, O Liu, H Zhang Computer Networks 236, 110036, 2023 | 4 | 2023 |
A blockchain-based user identity authentication method for 5G Z Tu, H Zhou, K Li, H Song, W Wang International Symposium on Mobile Internet Security, 335-351, 2021 | 4 | 2021 |
Blockchain-based differentiated authentication mechanism for 6G heterogeneous networks Z Tu, H Zhou, K Li, H Song, W Quan Peer-to-Peer Networking and Applications 16 (2), 727-748, 2023 | 3 | 2023 |
A Blockchain‐Enabled Trusted Protocol Based on Whole‐Process User Behavior in 6G Network Z Tu, H Zhou, K Li, H Song, Y Yang Security and Communication Networks 2022 (1), 8188977, 2022 | 2 | 2022 |
Deep Learning Based Intelligent Congestion Control for Space Network K Li, H Zhou, H Zhang, Z Tu, G Li Space Information Networks: 4th International Conference, SINC 2019, Wuzhen …, 2020 | 1 | 2020 |
SLSA: A link stability based algorithm for the topology optimization of IGSO/MEO double-layered satellite network K Li, H Zhou, Z Tu, G Li Research Briefs on Information and Communication Technology Evolution 5, 51-61, 2019 | 1 | 2019 |
Multi-Domain Malicious Behavior Knowledge Base Framework for Multi-Type DDoS Behavior Detection. O Liu, K Li, Z Yin, D Gao, H Zhou Intelligent Automation & Soft Computing 37 (3), 2023 | | 2023 |
Check for updates A Graph Neural Network Detection Scheme for Malicious Behavior Knowledge Base OY Liu, K Li, Z Yin, H Zhou Mobile Internet Security: 6th International Symposium, MobiSec 2022, Jeju …, 2023 | | 2023 |
A Graph Neural Network Detection Scheme for Malicious Behavior Knowledge Base OY Liu, K Li, Z Yin, H Zhou International Symposium on Mobile Internet Security, 122-133, 2022 | | 2022 |
Malicious Behavior Feature Graph for Knowledge Reasoning of DDoS Attacks in 6G K Li, H Zhou, Z Tu, F Liu, L Li | | |