×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Image search
Paste the image URL
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Scie... [10]
THE STATE KEY LA... [2]
Authors
CHENGZHONG XU [5]
FONG SIMON JAMES [3]
JEROME YEN [1]
Document Type
Journal article [7]
Conference paper [2]
Patent [1]
Date Issued
2024 [2]
2023 [2]
2022 [1]
2021 [1]
2020 [1]
2016 [1]
More...
Language
英語English [9]
Source Publication
IEEE Internet of... [3]
2007 IEEE Intern... [1]
ACM Transactions... [1]
IEEE Transaction... [1]
International Jo... [1]
Journal of Paral... [1]
More...
Indexed By
SCIE [7]
CPCI-S [1]
Funding Organization
Funding Project
Efficient Integr... [1]
Research on Key ... [1]
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-10 of 10
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Issue Date Ascending
Issue Date Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Submit date Ascending
Submit date Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
一种基于混合信息迁移的物联网入侵检测方法
Patent
专利类型: 发明专利Invention,
Authors:
WU JIASHU
;
WANG YANG
;
YE KEJIANG
;
XU CHENGZHONG
Favorite
|
|
Submit date:2022/08/29
Internet Of Things
Intrusion Detection
Domain Adaptation
Semantic Transfer
Open set dandelion network for IoT intrusion detection
Journal article
Wu, Jiashu, Dai, Hao, Kent, Kenneth B., Yen, Jerome, Xu, Chengzhong, Wang, Yang. Open set dandelion network for IoT intrusion detection[J]. ACM Transactions on Internet Technology, 2024, 24(1), 1-26.
Authors:
Wu, Jiashu
;
Dai, Hao
;
Kent, Kenneth B.
;
Yen, Jerome
;
Xu, Chengzhong
; et al.
Favorite
|
TC[WOS]:
0
TC[Scopus]:
0
IF:
3.9
/
3.6
|
Submit date:2024/03/07
Domain Adaptation
Internet Of Things
Intrusion Detection
Open-set Domain Adaptation
Dandelion Network
Adaptive Bi-Recommendation and Self-Improving Network for Heterogeneous Domain Adaptation-Assisted IoT Intrusion Detection
Journal article
Wu,Jiashu, Wang,Yang, Dai,Hao, Xu,Chengzhong, Kent,Kenneth B.. Adaptive Bi-Recommendation and Self-Improving Network for Heterogeneous Domain Adaptation-Assisted IoT Intrusion Detection[J]. IEEE Internet of Things Journal, 2023, 10(15), 13205-13220.
Authors:
Wu,Jiashu
;
Wang,Yang
;
Dai,Hao
;
Xu,Chengzhong
;
Kent,Kenneth B.
Favorite
|
TC[WOS]:
5
TC[Scopus]:
9
IF:
8.2
/
9.0
|
Submit date:2023/08/03
Adaptive Bi-recommendation (Abr)
Domain ADaptation (Da)
Internet Of Things (Iot)
Intrusion Detection
Self-improving (Si)
Heterogeneous Domain Adaptation for IoT Intrusion Detection: A Geometric Graph Alignment Approach
Journal article
Wu, Jiashu, Dai, Hao, Wang, Yang, Ye, Kejiang, Xu, Chengzhong. Heterogeneous Domain Adaptation for IoT Intrusion Detection: A Geometric Graph Alignment Approach[J]. IEEE Internet of Things Journal, 2023, 10(12), 10764-10777.
Authors:
Wu, Jiashu
;
Dai, Hao
;
Wang, Yang
;
Ye, Kejiang
;
Xu, Chengzhong
Favorite
|
TC[WOS]:
8
TC[Scopus]:
16
IF:
8.2
/
9.0
|
Submit date:2023/07/19
Domain ADaptation (Da)
Geometric Graph Alignment (Gga)
Internet Of Things (Iot)
Intrusion Detection
Pseudo-label Election
Joint Semantic Transfer Network for IoT Intrusion Detection
Journal article
Jiashu Wu, Yang Wang, Binhui Xie, Shuang Li, Hao Dai, Kejiang Ye, Chengzhong Xu. Joint Semantic Transfer Network for IoT Intrusion Detection[J]. IEEE Internet of Things Journal, 2022, 10(4), 3368-3382.
Authors:
Jiashu Wu
;
Yang Wang
;
Binhui Xie
;
Shuang Li
;
Hao Dai
; et al.
Favorite
|
TC[WOS]:
11
TC[Scopus]:
13
IF:
8.2
/
9.0
|
Submit date:2023/01/30
Domain ADaptation (Da)
Heterogeneity, Internet Of Things (Iot)
Intrusion Detection (Id)
Semantic Transfer
IDS Intelligent Configuration Scheme against Advanced Adaptive Attacks
Journal article
Xia, Zhuoqun, Tan, Jingjing, Gu, Ke, Li, Xiong, Jia, Weijia. IDS Intelligent Configuration Scheme against Advanced Adaptive Attacks[J]. IEEE Transactions on Network Science and Engineering, 2021, 8(2), 995-1008.
Authors:
Xia, Zhuoqun
;
Tan, Jingjing
;
Gu, Ke
;
Li, Xiong
;
Jia, Weijia
Favorite
|
TC[WOS]:
9
TC[Scopus]:
10
IF:
6.7
/
6.0
|
Submit date:2021/12/07
Advanced Adaptive Attack
Evolutionary Game
Evolutionary Stability Strategy
Intelligent Configuration
Intrusion Detection System.
Detection resource allocation scheme for two-layer cooperative IDSs in smart grids
Journal article
Xia, Zhuoqun, Tan, Jingjing, Gu, Ke, Jia, Wei Jia. Detection resource allocation scheme for two-layer cooperative IDSs in smart grids[J]. Journal of Parallel and Distributed Computing, 2020, 147, 236-247.
Authors:
Xia, Zhuoqun
;
Tan, Jingjing
;
Gu, Ke
;
Jia, Wei Jia
Favorite
|
TC[WOS]:
11
TC[Scopus]:
13
IF:
3.4
/
3.4
|
Submit date:2021/12/07
Intrusion Detection System
Resource Allocation
Sharing Strategy
Smart Grids
A Modular Approach for Implementation of Honeypots in Cyber Security
Journal article
Muneeb Mirza, Muhammad Usman, Robert P. Biuk-Aghai, Simon Fong. A Modular Approach for Implementation of Honeypots in Cyber Security[J]. International Journal of Applied Engineering Research, 2016, 11(8), 5446-5451.
Authors:
Muneeb Mirza
;
Muhammad Usman
;
Robert P. Biuk-Aghai
;
Simon Fong
Favorite
|
|
Submit date:2019/02/13
Honeypots
Intrusion Detection System
Antimalware
Signature
Cyber Security
Network Security
Antivirus
A Logical Model for Detecting Irregular Actions in Physical Access Environment
Conference paper
António Leong, Simon Fong, Zhuang Yan. A Logical Model for Detecting Irregular Actions in Physical Access Environment[C]:IEEE COMPUTER SOC, 10662 LOS VAQUEROS CIRCLE, PO BOX 3014, LOS ALAMITOS, CA 90720-1264 USA, 2007, 560-564.
Authors:
António Leong
;
Simon Fong
;
Zhuang Yan
Favorite
|
TC[WOS]:
0
TC[Scopus]:
2
|
Submit date:2019/02/13
Access Control
Intrusion Detection
Smart-card
Mining suspicious patterns in physical environment
Conference paper
Simon Fong. Mining suspicious patterns in physical environment[C], 2007, 419-422.
Authors:
Simon Fong
Favorite
|
TC[WOS]:
0
TC[Scopus]:
0
|
Submit date:2019/02/13
Data-mining
Intrusion Detection
Physical Environment Security