Showing 1 - 13 results of 13 for search 'Yuanbo GUO', query time: 0.04s
Refine Results
-
1
Research on password-authenticated key exchange protocol over lattices by Yuanbo GUO, Anqi YIN
Published 2022-12-01
Article -
2
Knowledge triple extraction in cybersecurity with adversarial active learning by Tao LI, Yuanbo GUO, Ankang JU
Published 2020-10-01
Article -
3
Study on user behavior profiling in insider threat detection by Yuanbo GUO, Chunhui LIU, Jing KONG, Yifeng WANG
Published 2018-12-01
Article -
4
Research on active defense based on multi-stage cyber deception game by Yongjin HU, Jun MA, Yuanbo GUO, Han ZHANG
Published 2020-08-01
Article -
5
Multi-step attack detection method based on network communication anomaly recognition by Ankang JU, Yuanbo GUO, Tao LI, Ziwei YE
Published 2019-07-01
Article -
6
Research on coreference resolution technology of entity in information security by Han ZHANG, Yongjin HU, Yuanbo GUO, Jicheng CHEN
Published 2020-02-01
Article -
7
Method based on contrastive learning for fine-grained unknown malicious traffic classification by Yifeng WANG, Yuanbo GUO, Qingli CHEN, Chen FANG, Renhao LIN
Published 2022-10-01
Article -
8
Method to generate cyber deception traffic based on adversarial sample by Yongjin HU, Yuanbo GUO, Jun MA, Han ZHANG, Xiuqing MAO
Published 2020-09-01
Article -
9
Intelligent planning method for cyber defense strategies based on bounded rationality by Yingze LIU, Yuanbo GUO, Chen FANG, Yongfei LI, Qingli CHEN
Published 2023-05-01
Article -
10
Provably secure quantum resistance two-server password-authenticated key exchange protocol by Anqi YIN, Yuanbo GUO, Ding WANG, Tongzhou QU, Lin CHEN
Published 2022-03-01
Article -
11
Fusion of Focal Loss’s cyber threat intelligence entity extraction by Yuanbo GUO, Yongfei LI, Qingli CHEN, Chen FANG, Yangyang HU
Published 2022-07-01
Article -
12
Edge computing privacy protection method based on blockchain and federated learning by Chen FANG, Yuanbo GUO, Yifeng WANG, Yongjin HU, Jiali MA, Han ZHANG, Yangyang HU
Published 2021-11-01
Article -
13
Method based on contrastive incremental learning for fine-grained malicious traffic classification by Yifeng WANG, Yuanbo GUO, Qingli CHEN, Chen FANG, Renhao LIN, Yongliang ZHOU, Jiali MA
Published 2023-03-01
Article