A network security situation assessment method based on adversarial deep learning H Yang, R Zeng, G Xu, L Zhang Applied Soft Computing 102, 107096, 2021 | 54 | 2021 |
Network security situation assessment with network attack behavior classification H Yang, Z Zhang, L Xie, L Zhang International Journal of Intelligent Systems, 2022 | 24 | 2022 |
Coherently distributed wideband LFM source localization J Yu, L Zhang, K Liu IEEE Signal Processing Letters 22 (4), 504-508, 2014 | 24 | 2014 |
Key node recognition in complex networks based on the K-shell method XIE Lixia, SUN Honghong, Y Hongyu, Z Liang Journal of Tsinghua University (Science and Technology) 62 (5), 849-861, 2022 | 15 | 2022 |
Separation and localization of multiple distributed wideband chirps using the fractional Fourier transform J Yu, L Zhang, K Liu, D Liu EURASIP Journal on Wireless Communications and Networking 2015, 1-8, 2015 | 14 | 2015 |
基于攻击图的主机安全评估方法 杨宏宇, 袁海航, 张良 通信学报 43 (2), 89-99, 2022 | 6 | 2022 |
Low-complexity spatial parameter estimation for coherently distributed linear chirp source L Zhang, Y Liu, J Yu, K Liu IEEE Access 6, 75843-75854, 2018 | 5 | 2018 |
A novel fractional filter design and cross-term elimination in Wigner distribution J Yu, K Liu, L Zhang, P Luo International Journal of Distributed Sensor Networks 11 (10), 189308, 2015 | 5 | 2015 |
Risk Assessment Method of IoT Host Based on Attack Graph H Yang, H Yuan, L Zhang Mobile Networks and Applications, 1-10, 2023 | 4 | 2023 |
基于K-shell的复杂网络关键节点识别方法 谢丽霞, 孙红红, 杨宏宇, 张良 清华大学学报 (自然科学版), 2022 | 4 | 2022 |
Network security situation assessments with parallel feature extraction and an improved BiGRU Y Hongyu, Z Zixin, Z Liang Journal of Tsinghua University (Science and Technology) 62 (5), 842-848, 2022 | 4 | 2022 |
MRFM: A timely detection method for DDoS attacks in IoT with multidimensional reconstruction and function mapping L Xie, B Yuan, H Yang, Z Hu, L Jiang, L Zhang, X Cheng Computer Standards & Interfaces 89, 103829, 2024 | 3 | 2024 |
Malware detection based on visualization of recombined API instruction sequence H Yang, Y Zhang, L Zhang, X Cheng Connection Science 34 (1), 2630-2651, 2022 | 3 | 2022 |
Linear Chirp Signal DOA Estimation Using Sparse Time–Frequency Dictionary L Zhang, CY Hung, J Yu, K Liu International Journal of Wireless Information Networks 27, 568-574, 2020 | 3 | 2020 |
MRAN: Multimodal relationship-aware attention network for fake news detection H Yang, J Zhang, L Zhang, X Cheng, Z Hu Computer Standards & Interfaces 89, 103822, 2024 | 2 | 2024 |
A novel Android malware detection method with API semantics extraction H Yang, Y Wang, L Zhang, X Cheng, Z Hu Computers & Security 137, 103651, 2024 | 2 | 2024 |
Using Features at Multiple Temporal and Spatial Resolutions to Predict Human Behavior in Real Time L Zhang, J Lieffers, A Pyarelal Computational Theory of Mind for Human-Machine Teams: First International …, 2023 | 2 | 2023 |
Source Code Vulnerability Detection Using Vulnerability Dependency Representation Graph H Yang, H Yang, L Zhang, X Cheng 2022 IEEE International Conference on Trust, Security and Privacy in …, 2022 | 2 | 2022 |
IoT botnet detection with feature reconstruction and interval optimization H Yang, Z Wang, L Zhang, X Cheng International Journal of Intelligent Systems 37 (12), 12009-12034, 2022 | 2 | 2022 |
基于并行特征提取和改进 BiGRU 的网络安全态势评估 杨宏宇, 张梓锌, 张良 清华大学学报 (自然科学版), 2022 | 2 | 2022 |