UM

Browse/Search Results:  1-10 of 10 Help

Selected(0)Clear Items/Page:    Sort:
一种基于混合信息迁移的物联网入侵检测方法 Patent
专利类型: 发明专利Invention,
Authors:  WU JIASHU;  WANG YANG;  YE KEJIANG;  XU CHENGZHONG
Favorite |  | Submit date:2022/08/29
Internet Of Things  Intrusion Detection  Domain Adaptation  Semantic Transfer  
Open set dandelion network for IoT intrusion detection Journal article
Wu, Jiashu, Dai, Hao, Kent, Kenneth B., Yen, Jerome, Xu, Chengzhong, Wang, Yang. Open set dandelion network for IoT intrusion detection[J]. ACM Transactions on Internet Technology, 2024, 24(1), 1-26.
Authors:  Wu, Jiashu;  Dai, Hao;  Kent, Kenneth B.;  Yen, Jerome;  Xu, Chengzhong; et al.
Favorite | TC[WOS]:0 TC[Scopus]:0  IF:3.9/3.6 | Submit date:2024/03/07
Domain Adaptation  Internet Of Things  Intrusion Detection  Open-set Domain Adaptation  Dandelion Network  
Adaptive Bi-Recommendation and Self-Improving Network for Heterogeneous Domain Adaptation-Assisted IoT Intrusion Detection Journal article
Wu,Jiashu, Wang,Yang, Dai,Hao, Xu,Chengzhong, Kent,Kenneth B.. Adaptive Bi-Recommendation and Self-Improving Network for Heterogeneous Domain Adaptation-Assisted IoT Intrusion Detection[J]. IEEE Internet of Things Journal, 2023, 10(15), 13205-13220.
Authors:  Wu,Jiashu;  Wang,Yang;  Dai,Hao;  Xu,Chengzhong;  Kent,Kenneth B.
Favorite | TC[WOS]:5 TC[Scopus]:9  IF:8.2/9.0 | Submit date:2023/08/03
Adaptive Bi-recommendation (Abr)  Domain ADaptation (Da)  Internet Of Things (Iot)  Intrusion Detection  Self-improving (Si)  
Heterogeneous Domain Adaptation for IoT Intrusion Detection: A Geometric Graph Alignment Approach Journal article
Wu, Jiashu, Dai, Hao, Wang, Yang, Ye, Kejiang, Xu, Chengzhong. Heterogeneous Domain Adaptation for IoT Intrusion Detection: A Geometric Graph Alignment Approach[J]. IEEE Internet of Things Journal, 2023, 10(12), 10764-10777.
Authors:  Wu, Jiashu;  Dai, Hao;  Wang, Yang;  Ye, Kejiang;  Xu, Chengzhong
Favorite | TC[WOS]:8 TC[Scopus]:16  IF:8.2/9.0 | Submit date:2023/07/19
Domain ADaptation (Da)  Geometric Graph Alignment (Gga)  Internet Of Things (Iot)  Intrusion Detection  Pseudo-label Election  
Joint Semantic Transfer Network for IoT Intrusion Detection Journal article
Jiashu Wu, Yang Wang, Binhui Xie, Shuang Li, Hao Dai, Kejiang Ye, Chengzhong Xu. Joint Semantic Transfer Network for IoT Intrusion Detection[J]. IEEE Internet of Things Journal, 2022, 10(4), 3368-3382.
Authors:  Jiashu Wu;  Yang Wang;  Binhui Xie;  Shuang Li;  Hao Dai; et al.
Favorite | TC[WOS]:11 TC[Scopus]:13  IF:8.2/9.0 | Submit date:2023/01/30
Domain ADaptation (Da)  Heterogeneity, Internet Of Things (Iot)  Intrusion Detection (Id)  Semantic Transfer  
IDS Intelligent Configuration Scheme against Advanced Adaptive Attacks Journal article
Xia, Zhuoqun, Tan, Jingjing, Gu, Ke, Li, Xiong, Jia, Weijia. IDS Intelligent Configuration Scheme against Advanced Adaptive Attacks[J]. IEEE Transactions on Network Science and Engineering, 2021, 8(2), 995-1008.
Authors:  Xia, Zhuoqun;  Tan, Jingjing;  Gu, Ke;  Li, Xiong;  Jia, Weijia
Favorite | TC[WOS]:9 TC[Scopus]:10  IF:6.7/6.0 | Submit date:2021/12/07
Advanced Adaptive Attack  Evolutionary Game  Evolutionary Stability Strategy  Intelligent Configuration  Intrusion Detection System.  
Detection resource allocation scheme for two-layer cooperative IDSs in smart grids Journal article
Xia, Zhuoqun, Tan, Jingjing, Gu, Ke, Jia, Wei Jia. Detection resource allocation scheme for two-layer cooperative IDSs in smart grids[J]. Journal of Parallel and Distributed Computing, 2020, 147, 236-247.
Authors:  Xia, Zhuoqun;  Tan, Jingjing;  Gu, Ke;  Jia, Wei Jia
Favorite | TC[WOS]:11 TC[Scopus]:13  IF:3.4/3.4 | Submit date:2021/12/07
Intrusion Detection System  Resource Allocation  Sharing Strategy  Smart Grids  
A Modular Approach for Implementation of Honeypots in Cyber Security Journal article
Muneeb Mirza, Muhammad Usman, Robert P. Biuk-Aghai, Simon Fong. A Modular Approach for Implementation of Honeypots in Cyber Security[J]. International Journal of Applied Engineering Research, 2016, 11(8), 5446-5451.
Authors:  Muneeb Mirza;  Muhammad Usman;  Robert P. Biuk-Aghai;  Simon Fong
Favorite |  | Submit date:2019/02/13
Honeypots  Intrusion Detection System  Antimalware  Signature  Cyber Security  Network Security  Antivirus  
A Logical Model for Detecting Irregular Actions in Physical Access Environment Conference paper
António Leong, Simon Fong, Zhuang Yan. A Logical Model for Detecting Irregular Actions in Physical Access Environment[C]:IEEE COMPUTER SOC, 10662 LOS VAQUEROS CIRCLE, PO BOX 3014, LOS ALAMITOS, CA 90720-1264 USA, 2007, 560-564.
Authors:  António Leong;  Simon Fong;  Zhuang Yan
Favorite | TC[WOS]:0 TC[Scopus]:2 | Submit date:2019/02/13
Access Control  Intrusion Detection  Smart-card  
Mining suspicious patterns in physical environment Conference paper
Simon Fong. Mining suspicious patterns in physical environment[C], 2007, 419-422.
Authors:  Simon Fong
Favorite | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/02/13
Data-mining  Intrusion Detection  Physical Environment Security