248 results on '"Hu, Changzhen"'
Search Results
2. A Novel Dynamic Event-Triggered Dissipative Filtering for T–S Fuzzy Systems with Asynchronous Constraints: A Novel Dynamic Event-Triggered Dissipative Filtering for T–S Fuzzy Systems with Asynchronous…
3. F-yolov7: fast and robust real-time UAV detection: F-YOLOv7: Fast and Robust Real-Time UAV Detection
4. Blockchain-based entity access control scheme for ubiquitous UAV swarm tasks: Blockchain-based entity access control scheme...
5. Packet header-based reweight-long short term memory (Rew-LSTM) method for encrypted network traffic classification
6. Defining and measuring the resilience of network services
7. IMUNE: A novel evolutionary algorithm for influence maximization in UAV networks
8. A blockchain-based ubiquitous entity authentication and management scheme with homomorphic encryption for FANET
9. TEDA: a trusted execution environment-and-blockchain-based data protection architecture for Internet of Things
10. Component-based modeling of cascading failure propagation in directed dual-weight software networks
11. MDGraph: A novel malware detection method based on memory dump and graph neural network
12. Blockchain-and-6G-based Ubiquitous UAV Task Security Management Architecture
13. DEFIA: Evaluate defense effectiveness by fusing behavior information of cyberattacks
14. TEBDS: A Trusted Execution Environment-and-Blockchain-supported IoT data sharing system
15. Calculation of utility of network services based on state manifolds
16. MaliCage: A packed malware family classification framework based on DNN and GAN
17. MDCHD: A novel malware detection method in cloud using hardware trace and deep learning
18. Riemannian manifold on stream data: Fourier transform and entropy-based DDoS attacks detection method
19. Distributed Set-Membership Fusion Estimation for Complex Networks With Communication Constraints
20. HBRSS: Providing high-secure data communication and manipulation in insecure cloud environments
21. BinDeep: A deep learning approach to binary code similarity detection
22. Research on Software Network Key Nodes Mining Methods Based on Complex Network
23. CJSpector: A Novel Cryptojacking Detection Method Using Hardware Trace and Deep Learning
24. Malware classification for the cloud via semi-supervised transfer learning
25. Network Risk Assessment Method Based on Asset Correlation Graph
26. Detecting Malicious URLs Using a Deep Learning Approach Based on Stacked Denoising Autoencoder
27. An Improved Prediction Model for the Network Security Situation
28. KEcruiser: A novel control flow protection for kernel extensions
29. DEPLEST: A blockchain-based privacy-preserving distributed database toward user behaviors in social networks
30. Dynamic defense strategy against advanced persistent threat under heterogeneous networks
31. Software structure characteristic measurement method based on weighted network
32. Establishing a software defect prediction model via effective dimension reduction
33. Establishing an Optimal Network Defense System: A Monte Carlo Graph Search Method
34. An Attack Graph Generation Method Based on Parallel Computing
35. Calculation of the Behavior Utility of a Network System: Conception and Principle
36. Analysis of Vulnerability Correlation Based on Data Fitting
37. Predicting Vulnerable Software Components Using Software Network Graph
38. An Online Approach to Defeating Return-Oriented-Programming Attacks
39. An Automatic Vulnerabilities Classification Method Based on Their Relevance
40. Defenses Against Wormhole Attacks in Wireless Sensor Networks
41. Optimal Attack Path Generation Based on Supervised Kohonen Neural Network
42. A Quantitative Method for Evaluating Network Security Based on Attack Graph
43. SulleyEX: A Fuzzer for Stateful Network Protocol
44. A Detecting Method of Array Bounds Defects Based on Symbolic Execution
45. A Practical Method to Confine Sensitive API Invocations on Commodity Hardware
46. A Driver Model Based on Emotion
47. CMFuzz: context-aware adaptive mutation for fuzzers
48. Outlier Detection for Time-Evolving Complex Networks
49. ADCaDeM: A Novel Method of Calculating Attack Damage Based on Differential Manifolds
50. Software Behavior Model Measuring Approach of Combining Structural Analysis and Language Set
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.