Showing 1 - 15 results of 15 for search 'Yuanbo GUO', query time: 0.02s
Refine Results
-
1
Knowledge triple extraction in cybersecurity with adversarial active learning by Tao LI, Yuanbo GUO, Ankang JU
Published 2020-10-01Get full text
Article -
2
Knowledge triple extraction in cybersecurity with adversarial active learning by Tao LI, Yuanbo GUO, Ankang JU
Published 2020-10-01Get full text
Article -
3
Contrastive Learning Algorithm for Low-Resource Cryptographic Attack Event Detection by Peng Luo, Rangjia Cai, Yuanbo Guo
Published 2025-01-01Get full text
Article -
4
Study on user behavior profiling in insider threat detection by Yuanbo GUO, Chunhui LIU, Jing KONG, Yifeng WANG
Published 2018-12-01Get full text
Article -
5
Incentive-Based Optimal Nodes Selection Mechanism for Threshold Key Management in MANETs with Selfish Nodes by Yuanbo Guo, Jianfeng Ma, Chao Wang, Kuiwu Yang
Published 2013-05-01Get full text
Article -
6
Multi-step attack detection method based on network communication anomaly recognition by Ankang JU, Yuanbo GUO, Tao LI, Ziwei YE
Published 2019-07-01Get full text
Article -
7
Method to generate cyber deception traffic based on adversarial sample by Yongjin HU, Yuanbo GUO, Jun MA, Han ZHANG, Xiuqing MAO
Published 2020-09-01Get full text
Article -
8
Method to generate cyber deception traffic based on adversarial sample by Yongjin HU, Yuanbo GUO, Jun MA, Han ZHANG, Xiuqing MAO
Published 2020-09-01Get full text
Article -
9
Method based on contrastive learning for fine-grained unknown malicious traffic classification by Yifeng WANG, Yuanbo GUO, Qingli CHEN, Chen FANG, Renhao LIN
Published 2022-10-01Get full text
Article -
10
Intelligent planning method for cyber defense strategies based on bounded rationality by Yingze LIU, Yuanbo GUO, Chen FANG, Yongfei LI, Qingli CHEN
Published 2023-05-01Get full text
Article -
11
Provably secure quantum resistance two-server password-authenticated key exchange protocol by Anqi YIN, Yuanbo GUO, Ding WANG, Tongzhou QU, Lin CHEN
Published 2022-03-01Get full text
Article -
12
Fusion of Focal Loss’s cyber threat intelligence entity extraction by Yuanbo GUO, Yongfei LI, Qingli CHEN, Chen FANG, Yangyang HU
Published 2022-07-01Get full text
Article -
13
-
14
Edge computing privacy protection method based on blockchain and federated learning by Chen FANG, Yuanbo GUO, Yifeng WANG, Yongjin HU, Jiali MA, Han ZHANG, Yangyang HU
Published 2021-11-01Get full text
Article -
15
Method based on contrastive incremental learning for fine-grained malicious traffic classification by Yifeng WANG, Yuanbo GUO, Qingli CHEN, Chen FANG, Renhao LIN, Yongliang ZHOU, Jiali MA
Published 2023-03-01Get full text
Article