兰州大学机构库

Browse/Search Results:  1-10 of 7961 Help

  Show only claimed items
Selected(0)Clear Items/Page:    Sort:
A novel clustering algorithm based on PageRank and minimax similarity 期刊论文
Neural Computing and Applications, 2019, 卷号: 31, 期号: 11, 页码: 7769-7780
Authors:  Liu, Qidong;  Zhang, RS(张瑞生);  Liu, X(刘忻);  Liu, Yunyun;  Zhao, ZL(赵志立);  Hu, RJ(胡荣静)
Favorite  |    Submit date:2020/08/28
Cluster analysis  Density-based clustering  Minimax similarity  PageRank  
TCN enhanced novel malicious traffic detection for IoT devices 期刊论文
CONNECTION SCIENCE, 2022, 卷号: 34, 期号: 1, 页码: 1322-1341
Authors:  Liu, X(刘忻);  Liu Ziang;  Zhang Yingli;  Zhang Wenqiang;  Lv Dong;  Zhou, QG(周庆国)
Favorite  |    Submit date:2022/07/01
Network security  malicious detection  TCN  DPI  IoT  
A logistics privacy protection system based on cloud computing 会议论文
5th International Conference on Frontier Computing, FC 2016, Tokyo, Japan
Authors:  Liu, X(刘忻);  Hu, Bingmeng;  Zhou, QG(周庆国);  Liu, Jingfeng
Favorite  |    Submit date:2020/08/31
A blockchain assisted multi-gateway authentication scheme for IIoT based on group 期刊论文
Peer-to-Peer Networking and Applications, 2023, 卷号: 16, 期号: 1, 页码: 245-259
Authors:  Liu, X(刘忻);  Wang, Miao;  Wang, Tanyang;  Zhang, RS(张瑞生)
Favorite  |    Submit date:2023/07/18
Blockchain  Energy conservation  Energy utilization  Gateways (computer networks)  National security  Security systems  Authentication scheme  Block-chain  Communicationtechnology  Consensus algorithms  Industrial internet of thing  Industrial production  Multi-gateway  PBFT  Process safety  Production process  Authentication  multi-gateway  blockchain  IIoT  
MECGuard: GRU enhanced attack detection in Mobile Edge Computing environment 期刊论文
COMPUTER COMMUNICATIONS, 2021, 卷号: 172, 页码: 1-9
Authors:  Liu, X(刘忻);  Zhang, Wenqiang;  Zhou, Xiaokang;  Zhou, QG(周庆国)
Favorite  |    Submit date:2021/04/16
5G mobile communication systems  Anomaly detection  Decision trees  Deep learning  Electromagnetic compatibility  Network architecture  Anomaly detection  Attack detection  Commercialisation  Computing devices  Computing environments  Computing services  Edge computing  Edge computing security  Edge server  Gated recurrent unit  
Code classification with graph neural networks: Have you ever struggled to make it work? 期刊论文
EXPERT SYSTEMS WITH APPLICATIONS, 2023, 卷号: 233
Authors:  Yu, Qingchen;  Liu, X(刘忻);  Zhou, QG(周庆国);  Zhuge, Jianwei;  Wu, Chunming
Favorite  |    Submit date:2023/09/04
Codes (symbols)  Deep learning  Message passing  Network coding  Network security  Classification tasks  Code classification  Deep learning  Graph neural networks  Message-passing  Model learning  Network-based  Problem formulation  Software vulnerabilities  Vulnerability detection  
Novel supply chain vulnerability detection based on heterogeneous-graph-driven hash similarity in IoT 期刊论文
Future Generation Computer Systems-The International Journal of eScience, 2023, 卷号: 148, 页码: 201-210
Authors:  Ye, Guodong;  Liu, X(刘忻);  Fan, Siqi;  Tan, Yuan;  Zhou, QG(周庆国);  Zhou, R(周睿);  Zhou, Xiaokang
Favorite  |    Submit date:2023/09/04
Embeddings  Graph neural networks  Internet of things  Binary code similarity  Code reuse  Code similarities  Detection approach  Heterogeneous graph  Security issues  Supply chain vulnerability  Third parties  Traditional devices  Vulnerability detection  
A Robust Authentication Scheme With Continuously Updated Information for Vehicular Sensor Networks 期刊论文
IEEE Access, 2018, 卷号: 6, 页码: 70473-70486
Authors:  Liu, X(刘忻);  Zhang, RS(张瑞生)
Favorite  |    Submit date:2019/10/25
Authentication  continuously updated information  decentralized  security and privacy  fast-authentication  
OwlEye: An Advanced Detection System of Web Attacks Based on HMM 会议论文
2018 16TH IEEE INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP, 16TH IEEE INT CONF ON PERVAS INTELLIGENCE AND COMP, 4TH IEEE INT CONF ON BIG DATA INTELLIGENCE AND COMP, 3RD IEEE CYBER SCI AND TECHNOL CONGRESS (DASC/PICOM/DATACOM/CYBERSCITECH)
Authors:  Liu, X(刘忻);  Yu, Qingchen;  Zhou, Xiaokang;  Zhou, QG(周庆国)
Favorite  |    Submit date:2019/09/27
Web Attack  Security  Hidden Markov Model  
An efficient discrete differential evolution algorithm based on community structure for influence maximization 期刊论文
APPLIED INTELLIGENCE, 2022, 卷号: 52, 期号: 11, 页码: 12497-12515
Authors:  Li, Huan;  Zhang, RS(张瑞生);  Liu, X(刘忻)
Favorite  |    Submit date:2022/11/08
Evolutionary algorithms  Candidate nodes  Community structures  Discrete differential evolution algorithm  Influence analysis  Influence maximizations  Influential nodes  Network marketing  Node sets  Propagation models  Social network