Follow
Yingxu Lai
Yingxu Lai
Verified email at bjut.edu.cn
Title
Cited by
Cited by
Year
FL-GUARD: A detection and defense system for DDoS attack in SDN
J Liu, Y Lai, S Zhang
Proceedings of the 2017 international conference on cryptography, security …, 2017
572017
Intrusion detection of industrial control system based on Modbus TCP protocol
W Yusheng, F Kefeng, L Yingxu, L Zenghui, Z Ruikang, Y Xiangzhen, ...
2017 IEEE 13th International Symposium on Autonomous Decentralized System …, 2017
482017
Keyword extraction by entropy difference between the intrinsic and extrinsic mode
Z Yang, J Lei, K Fan, Y Lai
Physica A: Statistical Mechanics and its Applications 392 (19), 4523-4531, 2013
462013
Industrial anomaly detection and attack classification method based on convolutional neural network
Y Lai, J Zhang, Z Liu
Security and Communication Networks 2019, 1-11, 2019
372019
A data mining framework for building intrusion detection models based on IPv6
Z Liu, Y Lai
International Conference on Information Security and Assurance, 608-618, 2009
372009
Research on intrusion detection of industrial control system
YX Lai, ZH Liu, X Cai, KX Yang
Journal on Communications 38 (2), 143-156, 2017
342017
Identifying malicious nodes in wireless sensor networks based on correlation detection
Y Lai, L Tong, J Liu, Y Wang, T Tang, Z Zhao, H Qin
Computers & Security 113, 102540, 2022
302022
MIF: A multi-step attack scenario reconstruction and attack chains extraction method based on multi-information fusion
B Mao, J Liu, Y Lai, M Sun
Computer Networks 198, 108340, 2021
292021
Industrial control intrusion detection approach based on multiclassification GoogLeNet-LSTM model
A Chu, Y Lai, J Liu
Security and Communication Networks 2019, 1-11, 2019
282019
On monitoring and predicting mobile network traffic abnormality
Y Lai, Y Chen, Z Liu, Z Yang, X Li
Simulation Modelling Practice and Theory 50, 176-188, 2015
282015
A data transmission approach based on ant colony optimization and threshold proxy re-encryption in wsns
J Liu, Z Liu, C Sun, J Zhuang
Journal of Artificial Intelligence and Technology 2 (1), 23-31, 2022
252022
基于字符串相似性聚类的网络短文本舆情热点发现技术
杨震, 段立娟, 赖英旭
北京工业大学学报, 669-673, 2010
232010
Study on authentication protocol of SDN trusted domain
R Zhou, Y Lai, Z Liu, J Liu
2015 IEEE Twelfth International Symposium on Autonomous Decentralized …, 2015
222015
Explaining the attributes of a deep learning based intrusion detection system for industrial control networks
Z Wang, Y Lai, Z Liu, J Liu
Sensors 20 (14), 3817, 2020
202020
Short text sentiment classification based on context reconstruction
Z Yang, YX Lai, LJ Duan, YJ Li
Acta Automatica Sinica 38 (1), 55-67, 2012
182012
EEFED: Personalized federated learning of execution&evaluation dual network for CPS intrusion detection
X Huang, J Liu, Y Lai, B Mao, H Lyu
IEEE Transactions on Information Forensics and Security 18, 41-56, 2022
172022
An efficient LKH tree balancing algorithm for group key management
Z Liu, Y Lai, X Ren, S Bu
2012 International Conference on Control Engineering and Communication …, 2012
172012
Vulnerability mining method for the modbus tcp using an anti-sample fuzzer
Y Lai, H Gao, J Liu
Sensors 20 (7), 2040, 2020
162020
Short texts classification through reference document expansion
Z Yang, K Fan, Y Lai, K Gao, Y Wang
Chinese Journal of Electronics 23 (2), 315-321, 2014
152014
DEIDS: a novel intrusion detection system for industrial control systems
H Gu, Y Lai, Y Wang, J Liu, M Sun, B Mao
Neural Computing and Applications 34 (12), 9793-9811, 2022
142022
The system can't perform the operation now. Try again later.
Articles 1–20