Linru Ma

ORCID: 0000-0002-3016-3519
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Anomaly Detection Techniques and Applications
  • Internet Traffic Analysis and Secure E-voting
  • Wireless Signal Modulation Classification
  • Blockchain Technology Applications and Security
  • Software-Defined Networks and 5G
  • Distributed Control Multi-Agent Systems
  • Advanced Steganography and Watermarking Techniques
  • Advanced Malware Detection Techniques
  • Neural Networks Stability and Synchronization
  • Network Packet Processing and Optimization
  • Network Traffic and Congestion Control
  • Advanced Sensor and Control Systems
  • Advanced Multi-Objective Optimization Algorithms
  • Mobile Ad Hoc Networks
  • Adaptive Control of Nonlinear Systems
  • Evolutionary Algorithms and Applications
  • Software Testing and Debugging Techniques
  • Cryptographic Implementations and Security
  • Metaheuristic Optimization Algorithms Research
  • Traffic control and management
  • Security and Verification in Computing
  • Adversarial Robustness in Machine Learning
  • UAV Applications and Optimization
  • Vehicular Ad Hoc Networks (VANETs)

Systems Engineering Society of China
2023-2025

PLA Academy of Military Science
2024

China Electronics Standardization Institute
2011

National University of Defense Technology
2005

As an artificial neural network method, self-organizing mapping facilities efficient complete and visualize high-dimensional data topology representation, valid in a number of applications such as intrusion detection. However, there remains challenge to accurately depict the traffic with unbalanced distribution, which deteriorates performance e.g. DoS attack Hence, we propose new model "statistic-enhanced directed batch growth mapping", renew definition threshold used evaluate/control neuron...

10.1109/access.2019.2922737 article EN cc-by-nc-nd IEEE Access 2019-01-01

Abstract Multi‐agent system (MAS) is a common cyber‐physical (CPS). Due to it often uses relatively open network platform, vulnerable malicious cyber attacks in the process of operation, so control scheme design critical ensure operation security. In this article, we propose new resilient neuroadaptive dynamic surface for non‐linear MASs with potential (false data injection and denial‐of‐service), uncertainty, unknown gain, output constraints which are usually seen on CPSs. scheme,...

10.1002/rnc.6035 article EN International Journal of Robust and Nonlinear Control 2022-02-21

Abstract This article proposes a distributed neuroadaptive monitoring fault‐tolerant consensus control scheme for class of uncertain, nonlinear, strict feedback multi‐agent systems which have actuator faults and all the coefficients in them are unknown. provides each agent with local monitor combined switching to solve failure. Simultaneously, it guarantees tracking error satisfies prescribed transient steady‐state performance, even if there exist actuators switching. Furthermore, time...

10.1002/rnc.6090 article EN International Journal of Robust and Nonlinear Control 2022-03-22

In the context of intelligent and networked transportation, vehicle platoon control technology is an essential measure for improving overall traffic efficiency, reducing driving energy consumption, increasing driver comfort safety, easing congestion. However, in high-speed mobile states, vehicles face uncertain communication environment, making it difficult to meet demand multi-vehicle cooperative control. To address existing research deficiencies, this paper investigates a UAV-assisted...

10.1109/tvt.2023.3326800 article EN IEEE Transactions on Vehicular Technology 2023-11-01

Modulation recognition using deep learning (DL) can efficiently recognize modulated signals in cognitive radio-enabled Internet of Things (IoT). However, it is vulnerable to the attack adversarial examples designed by attackers, leading a decrease its accuracy. Different techniques be used for attacks, but these attacks have limited efficiency. This article proposes double loop iterative method. from traditional methods, new method designs an additional external iteration high When...

10.1109/jiot.2023.3345937 article EN IEEE Internet of Things Journal 2023-12-22

With the rapid development of heterogeneous network technologies, such as mobile edge computing, satellite communications, self-organizing networks, and wired Internet, satisfying users’ increasingly diversified complex communication needs in dynamic evolving environments has become a critical research topic. Ensuring secure reliable information transmission is essential for stable operation these environments. Addressing this challenge, study proposed multi-objective optimized multipath...

10.3390/electronics13142697 article EN Electronics 2024-07-10

A new evaluation mechanism was proposed to enhance the representation of data topology in directed batch growth hierarchical self-organizing mapping. In mechanism, threshold and correlation worked a case-sensitive manner through statistic calculation input data. Since model enabled more thorough from both horizontal vertical directions, it naturally held great potential detecting various traffic attacks. Numerical experiments network intrusion detection were carried out on datasets KDD99,...

10.1109/access.2020.2976810 article EN cc-by IEEE Access 2020-01-01

In this paper, a simulation environment for evaluating the effectiveness and performance cost of moving target defense (MTD) is presented. This based on SimPy, which process-based discrete-event framework worked standard Python. our MTD environment, we develop typical topology to contain different deployments (MT) techniques. Meanwhile, processes attackers, defenders, services, users are analyzed modeled in also provides an extendable interface MT technologies future. case study, quantify...

10.1145/3371676.3371692 article EN 2019-11-15

This article delves into the routing architecture and reliable transmission service framework of dual-network layered networks, with a focus on analyzing their core design ideas implementation strategies. In context increasing network complexity today, traditional single-network architectures are unable to meet diverse application needs. Therefore, as an innovative solution, gradually receiving attention from both academia industry. first analyzes key technical elements in architecture,...

10.3390/electronics13234749 article EN Electronics 2024-11-30

The whale optimization algorithm (WOA) and sine cosine (SCA) exhibit limitations, such as premature convergence local optima, for solving large-scale problems. To address this problem, a novel hybrid called WOSCA is proposed. leverages orthogonal Latin squares to obtain the initial population with balanced dispersion neat comparability, integrates search mechanism of SCA into WOA enhance balance algorithm's exploration exploitation. Moreover, avoid falling optimum diversity population,...

10.1145/3650400.3650573 article EN Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer Engineering 2023-10-20

This paper briefly introduces the network boundaries can be effectively protected using defense in depth system and shortcomings of its technical means. Then introduced data mining technology applications firewall policy optimization, traffic identification, intrusion detection areas at different levels depth, lists a variety specific application modes, which enhance dynamic adaptation automated optimization capabilities to wide range attacks flow changes.

10.1109/imccc.2011.128 article EN 2011-10-01

The communication method in which both parties could modify certain types of shared resources without attracting the attention other users is called covert communication. Blockchain an integrated technology system platform that combines cryptography, mathematics, computer programming, game, and disciplines. Generally, researchers believe blockchain, as a distributed storage database can still guarantee security unreliable network environment, has excellent characteristics such open,...

10.1109/icccs57501.2023.10150544 article EN 2022 7th International Conference on Computer and Communication Systems (ICCCS) 2023-04-21

The communication method in which both parties could modify certain types of shared resources without attracting the attention other users is called covert communication. Generally, researchers believe that blockchain, as a distributed storage database can still guarantee security an unreliable network environment, has excellent characteristics such open, decentralized, untrusted, anonymous, tamper prevention, traceability, and contract execution automation. More more studies have applied it...

10.1117/12.3004063 article EN 2023-10-11
Coming Soon ...