A Survey on the Development of Self-Organizing Maps for Unsupervised Intrusion Detection
Qu, Xiaofei, Yang, Lin, Guo, Kai, Ma, Linru, Sun, Meng, Ke, Mingxing, Li, Mu
Published in Mobile networks and applications (01.04.2021)
Published in Mobile networks and applications (01.04.2021)
Get full text
Journal Article
Statistics-Enhanced Direct Batch Growth Self-Organizing Mapping for Efficient DoS Attack Detection
Qu, Xiaofei, Yang, Lin, Guo, Kai, Ma, Linru, Feng, Tao, Ren, Shuangyin, Sun, Meng
Published in IEEE access (2019)
Published in IEEE access (2019)
Get full text
Journal Article
Direct Batch Growth Hierarchical Self-organizing Mapping Based on Statistics for Efficient Network Intrusion Detection
Qu, Xiaofei, Yang, Lin, Guo, Kai, Sun, Meng, Ma, Linru, Feng, Tao, Ren, Shuangyin, Li, Kechao, Ma, Xin
Published in IEEE access (01.01.2020)
Published in IEEE access (01.01.2020)
Get full text
Journal Article
Joint Communication and Control Optimization of a UAV-Assisted Multi-Vehicle Platooning System in Uncertain Communication Environment
Duan, Xuting, Zhao, Yihan, Tian, Daxin, Zhou, Jianshan, Ma, Linru, Zhang, Long
Published in IEEE transactions on vehicular technology (01.03.2024)
Published in IEEE transactions on vehicular technology (01.03.2024)
Get full text
Journal Article
Adversarial Attacking and Defensing Modulation Recognition With Deep Learning in Cognitive-Radio-Enabled IoT
Zhang, Zhenju, Ma, Linru, Liu, Mingqian, Chen, Yunfei, Zhao, Nan
Published in IEEE internet of things journal (15.04.2024)
Published in IEEE internet of things journal (15.04.2024)
Get full text
Journal Article
Attack Scenario Construction Based on Rule and Fuzzy Clustering
Get full text
Book Chapter
Conference Proceeding
Consensus tracking control for uncertain non‐strict feedback multi‐agent system under cyber attack via resilient neuroadaptive approach
Ma, Xiaoshan, Yang, Lin, Ma, Linru, Dong, Wenhan, Jin, Ming, Zhang, Long, Yang, Feng, Lin, Yan
Published in International journal of robust and nonlinear control (10.05.2022)
Published in International journal of robust and nonlinear control (10.05.2022)
Get full text
Journal Article
Distributed neuroadaptive monitoring fault‐tolerant consensus control for nonlinear multi‐agent systems with actuator faults
Ma, Xiaoshan, Yang, Lin, Ma, Linru, Yang, Feng, Dong, Wenhan, Zhang, Long, Jin, Ming, Lin, Yan
Published in International journal of robust and nonlinear control (01.06.2022)
Published in International journal of robust and nonlinear control (01.06.2022)
Get full text
Journal Article
An Immunology-Inspired Network Security Architecture
Yu, Quan, Ren, Jing, Zhang, Jiyan, Liu, Siyang, Fu, Yinjin, Li, Ying, Ma, Linru, Jing, Jian, Zhang, Wei
Published in IEEE wireless communications (01.10.2020)
Published in IEEE wireless communications (01.10.2020)
Get full text
Journal Article
Memory-Augmented Insider Threat Detection with Temporal-Spatial Fusion
Li, Dongyang, Yang, Lin, Zhang, Hongguang, Wang, Xiaolei, Ma, Linru
Published in Security and communication networks (26.04.2022)
Published in Security and communication networks (26.04.2022)
Get full text
Journal Article
Saliency-guided meta-hallucinator for few-shot learning
Zhang, Hongguang, Liu, Chun, Wang, Jiandong, Ma, Linru, Koniusz, Piotr, Torr, Philip H. S., Yang, Lin
Published in Science China. Information sciences (01.10.2024)
Published in Science China. Information sciences (01.10.2024)
Get full text
Journal Article
Image-Based Insider Threat Detection via Geometric Transformation
Li, Dongyang, Yang, Lin, Zhang, Hongguang, Wang, Xiaolei, Ma, Linru, Xiao, Junchao
Published in Security and communication networks (2021)
Published in Security and communication networks (2021)
Get full text
Journal Article
Virtualization Security Risks and Solutions of Cloud Computing via Divide-Conquer Strategy
Xiangyang Luo, Lin Yang, Linru Ma, Shanming Chu, Hao Dai
Published in 2011 Third International Conference on Multimedia Information Networking and Security (01.11.2011)
Published in 2011 Third International Conference on Multimedia Information Networking and Security (01.11.2011)
Get full text
Conference Proceeding
An information flow control approach in composite services
Yu, Bo, Yang, Lin, Chen, Shuhui, Wang, Yongjun, Ma, Linru
Published in IET Conference Proceedings (2013)
Published in IET Conference Proceedings (2013)
Get full text
Conference Proceeding
A Blockchain-based Covert Document Communication System Model
Su, Wenlei, Ma, Linru
Published in 2023 8th International Conference on Computer and Communication Systems (ICCCS) (21.04.2023)
Published in 2023 8th International Conference on Computer and Communication Systems (ICCCS) (21.04.2023)
Get full text
Conference Proceeding
A Scalable Multi-hash Remote Attestation Approach for Trusted Transaction
Deng Chuan, Yang Lin, Ma Linru
Published in 2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control (01.10.2011)
Published in 2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control (01.10.2011)
Get full text
Conference Proceeding
Rule-Based Security Capabilities Matching for Web Services
Yu, Bo, Yang, Lin, Wang, Yongjun, Zhang, Bofeng, Cao, Yuan, Ma, Linru, Luo, Xiangyang
Published in Wireless personal communications (01.12.2013)
Published in Wireless personal communications (01.12.2013)
Get full text
Journal Article