Zobrazeno 1 - 10
of 451
pro vyhledávání: '"Chen, Zhiyan"'
Autor:
Chen, Zhiyan
Internet of Things (IoT) has weaknesses due to the vulnerabilities in the wireless medium and massively interconnected nodes that form an extensive attack surface for adversaries. It is essential to ensure security including IoT networks and applicat
Externí odkaz:
http://hdl.handle.net/10393/45716
Host-Based Network Intrusion Detection via Feature Flattening and Two-stage Collaborative Classifier
Network Intrusion Detection Systems (NIDS) have been extensively investigated by monitoring real network traffic and analyzing suspicious activities. However, there are limitations in detecting specific types of attacks with NIDS, such as Advanced Pe
Externí odkaz:
http://arxiv.org/abs/2306.09451
Publikováno v:
Frontiers in Pharmacology, Vol 15 (2024)
Background and aimPathological changes in the central nervous system (CNS) begin before the clinical symptoms of Alzheimer’s Disease (AD) manifest, with the hippocampus being one of the first affected structures. Current treatments fail to alter AD
Externí odkaz:
https://doaj.org/article/4faab178320d40a68716fd3c2013495d
Autor:
Chen, Zhiyan1,2 (AUTHOR), Hao, Shuai1,2 (AUTHOR), Li, Haozhe1,3 (AUTHOR), Dong, Xiaohan1,2 (AUTHOR), Chen, Xihao1,3 (AUTHOR), Yuan, Jushigang1,3 (AUTHOR), Sidorenko, Alexander4 (AUTHOR), Huang, Jiang1,3 (AUTHOR) jhuang@hust.edu.cn, Gu, Yanlong1,2 (AUTHOR) klgyl@hust.edu.cn
Publikováno v:
Advanced Science. 8/14/2024, Vol. 11 Issue 30, p1-10. 10p.
Autor:
Chen, Zhiyan, Liu, Jinxin, Shen, Yu, Simsek, Murat, Kantarci, Burak, Mouftah, Hussein T., Djukic, Petar
Despite its technological benefits, Internet of Things (IoT) has cyber weaknesses due to the vulnerabilities in the wireless medium. Machine learning (ML)-based methods are widely used against cyber threats in IoT networks with promising performance.
Externí odkaz:
http://arxiv.org/abs/2204.03433
Autor:
Chen, Zhiyan, Kantarci, Burak
Mobile Crowdsensing systems are vulnerable to various attacks as they build on non-dedicated and ubiquitous properties. Machine learning (ML)-based approaches are widely investigated to build attack detection systems and ensure MCS systems security.
Externí odkaz:
http://arxiv.org/abs/2202.07802
Publikováno v:
In Asian Journal of Psychiatry September 2024 99
Publikováno v:
In Computer Networks August 2024 250
Autor:
Chen, Taiyan, Yuan, Jushigang, Sheng, Keyan, Chen, Xihao, Chen, Zhiyan, Hao, Shuai, Huang, Jiang
Publikováno v:
In Radiation Physics and Chemistry August 2024 221
Autor:
Xu, Suhui, Zhou, Tianhao, Wang, Jiamin, Guo, Ge, Chen, Zhiyan, Li, Huaxiang, Yang, Zhenquan, Gao, Yajun
Publikováno v:
In Food Chemistry 15 January 2025 463 Part 3