Search

Your search keyword '"Kangfeng Zheng"' showing total 187 results

Search Constraints

Start Over You searched for: Author "Kangfeng Zheng" Remove constraint Author: "Kangfeng Zheng"
187 results on '"Kangfeng Zheng"'

Search Results

101. Improving the Classification Effectiveness of Intrusion Detection by Using Improved Conditional Variational AutoEncoder and Deep Neural Network

102. User identification by keystroke dynamics using improved binary particle swarm optimisation

103. Semi-GSGCN: Social Robot Detection Research with Graph Neural Network.

104. A Nature-inspired Multiple Kernel Extreme Learning Machine Model for Intrusion Detection.

105. Efficient identity-based signature scheme with batch authentication for delay tolerant mobile sensor network

106. Virus Propagation Modeling and Convergence Analysis in Large-Scale Networks

107. Anti-Pollution Source Location Privacy Preserving Scheme in Wireless Sensor Networks

108. Detection of command and control in advanced persistent threat based on independent access

110. A Novel PUF-Based Key Management Scheme for DTMSN

111. An Efficient Algorithm for Time-Driven Data Gathering in Wireless Sensor Networks Using Inter-Session Network Coding

112. Secure Data Transmission and Modelling in Vehicular Ad Hoc Networks

113. Detecting Malicious Social Robots with Generative Adversarial Networks.

114. User Identification Using Real Environmental Human Computer Interaction Behavior.

115. An Evaluation Model of Botnet Based on Peer to Peer

116. A Secure Network Coding-based Data Gathering Model and Its Protocol in Wireless Sensor Networks

117. A Data Delivery Approach Based on Location and Velocity Vector for Delay Tolerant Mobile Sensor Networks

118. Biologically Inspired Anomaly Detection for Hierarchical Wireless Sensor Networks

119. A Danger Theory Based Mobile Virus Detection Model and Its Application in Inhibiting Virus

120. A study on energy efficient cluster-based network coding protocol for aggregated-data gathering in wireless sensor networks

121. Multiple-image compressed encryption and decryption by compressive holography

122. Detecting DDoS Attack Based on Empirical Mode Decomposition

123. PUF-Based Node Mutual Authentication Scheme for Delay Tolerant Mobile Sensor Network

124. An intrusion detection scheme based on anomaly mining in Internet of Things

125. An active defense model for Web Accessing DoS attacks

126. Epidemic Model of Mobile Phone Virus for Hybrid Spread Mode with Preventive Immunity and Mutation

127. A Novel VoIP Flooding Detection Method Basing on Call Duration

128. Pairing-Based Key Management Scheme for Heterogeneous Sensor Networks

129. Applying Multiple Residual Error Gray Forecast to Restrain Endpoints Effect in HHT of Network Traffic

130. Research of an Innovative P2P-Based Botnet

131. Access Model of Web Users Based on Multi-chains Hidden Markov Models

132. Design of a High Security GSM/UMTS Inter-System

133. A new method for watermark of color static image based on gradient field analysis

134. Improved Adoptable Scheme for Authentication and Key Agreement

135. A Novel Dynamic Immunization Model Basing on Alarm Information

136. An improved algorithm for IP alias resolution in network topology measurement

137. Research on Man-in-the-Middle Denial of Service Attack in SIP VoIP

138. A Secure Proxy Blind Signature Scheme Based on ECDLP

139. Security Analysis and Defense Strategy on Access Domain in 3G

140. Network Worm Propagating Model Based on Network Topology Unit

141. A Data Safety Transmission Solution in Web Application

142. Modeling of Man-in-the-Middle Attack in the Wireless Networks

143. Research of the Apriority Policy-based Multi-hop BFS Search Algorithm in P2P Network

144. Normalized and classified feature selection in text categorization

145. Feature Selection to Mine Joint Features from High-dimension Space for Android Malware Detection.

146. WORM-HUNTER: A Worm Guard System using Software-defined Networking.

148. ACO-BTM: A Behavior Trust Model in Cloud Computing Environment

149. Flow-based Anomaly Detection Using Access Behavior Profiling and Time-sequenced Relation Mining.

Catalog

Books, media, physical & digital resources