Automated vulnerability detection of blockchain smart contacts based on BERT artificial intelligent model
Yiting, Feng, Zhaofeng, Ma, Pengfei, Duan, Shoushan, Luo
Published in China communications (01.07.2024)
Published in China communications (01.07.2024)
Get full text
Journal Article
Blockchain-enabled privacy protection and access control scheme towards sensitive digital assets management
Pengfei, Duan, Zhaofeng, Ma, Yuqing, Zhang, Jingyu, Wang, Shoushan, Luo
Published in China communications (01.07.2024)
Published in China communications (01.07.2024)
Get full text
Journal Article
An SSL-PUF Based Access Authentication and Key Distribution Scheme for the Space-Air-Ground Integrated Network
Xu, Liwei, Wu, Han, Xie, Jianguo, Yuan, Qiong, Sun, Ying, Shi, Guozhen, Luo, Shoushan
Published in Entropy (Basel, Switzerland) (06.05.2023)
Published in Entropy (Basel, Switzerland) (06.05.2023)
Get full text
Journal Article
Secure two-party computation of solid triangle area and tetrahedral volume based on cloud platform
Zhang, Jing, Li, Lixiang, Tang, Yongli, Luo, Shoushan, Yang, Yixian, Xin, Yang
Published in PloS one (13.06.2019)
Published in PloS one (13.06.2019)
Get full text
Journal Article
Intrusion Detection Based on State Context and Hierarchical Trust in Wireless Sensor Networks
Zhang, Zhihua, Zhu, Hongliang, Luo, Shoushan, Xin, Yang, Liu, Xiaoming
Published in IEEE access (01.01.2017)
Published in IEEE access (01.01.2017)
Get full text
Journal Article
Using User Behavior to Measure Privacy on Online Social Networks
Li, Xuefeng, Xin, Yang, Zhao, Chensu, Yang, Yixian, Luo, Shoushan, Chen, Yuling
Published in IEEE access (2020)
Published in IEEE access (2020)
Get full text
Journal Article
Detection of selective forwarding attacks based on adaptive learning automata and communication quality in wireless sensor networks
Zhu, Hongliang, Zhang, Zhihua, Du, Juan, Luo, Shoushan, Xin, Yang
Published in International journal of distributed sensor networks (01.11.2018)
Published in International journal of distributed sensor networks (01.11.2018)
Get full text
Journal Article
A Filter Feature Selection Algorithm Based on Mutual Information for Intrusion Detection
Zhao, Fei, Zhao, Jiyong, Niu, Xinxin, Luo, Shoushan, Xin, Yang
Published in Applied sciences (01.09.2018)
Published in Applied sciences (01.09.2018)
Get full text
Journal Article
Online Mining Intrusion Patterns from IDS Alerts
Zhang, Kai, Luo, Shoushan, Xin, Yang, Zhu, Hongliang, Chen, Yuling
Published in Applied sciences (01.04.2020)
Published in Applied sciences (01.04.2020)
Get full text
Journal Article
Online Intrusion Scenario Discovery and Prediction Based on Hierarchical Temporal Memory (HTM)
Zhang, Kai, Zhao, Fei, Luo, Shoushan, Xin, Yang, Zhu, Hongliang, Chen, Yuling
Published in Applied sciences (01.04.2020)
Published in Applied sciences (01.04.2020)
Get full text
Journal Article
A Search Efficient Privacy-Preserving Location-Sharing Scheme in Mobile Online Social Networks
Yang, Guangcan, Luo, Shoushan, Xin, Yang, Zhu, Hongliang, Wang, Jingkai, Li, Mingzhen, Wang, Yunfeng
Published in Applied sciences (01.12.2020)
Published in Applied sciences (01.12.2020)
Get full text
Journal Article
An Efficient Approach for LBS Privacy Preservation in Mobile Social Networks
Yang, Guangcan, Luo, Shoushan, Zhu, Hongliang, Xin, Yang, Li, Mingzhen, Wang, Yunfeng
Published in Applied sciences (16.01.2019)
Published in Applied sciences (16.01.2019)
Get full text
Journal Article