- Network Security and Intrusion Detection
- Wireless Communication Security Techniques
- Cloud Data Security Solutions
- Advanced Malware Detection Techniques
- Chaos-based Image/Signal Encryption
- Information and Cyber Security
- Cellular Automata and Applications
- Digital and Cyber Forensics
- Chaos control and synchronization
- Advanced Steganography and Watermarking Techniques
- Security and Verification in Computing
- Anomaly Detection Techniques and Applications
- Cooperative Communication and Network Coding
- Access Control and Trust
- Error Correcting Code Techniques
- graph theory and CDMA systems
- Smart Grid Security and Resilience
- Software-Defined Networks and 5G
- Caching and Content Delivery
- Cybercrime and Law Enforcement Studies
China Mobile (China)
2019-2023
Institute of Information Engineering
2018-2019
Chinese Academy of Sciences
2018-2019
University of Chinese Academy of Sciences
2019
Shanghai Jiao Tong University
2012
Computer and network technology is developing rapidly, meanwhile various cyber security incidents have occurred frequently. New vulnerabilities many new risks emerged endlessly, which caused serious threats to business security. So the role value of threat intelligence are increasing. However, there still some problems intelligence. The information can be tampered in existing sharing mechanism. At same time, no corresponding feedback mechanism for quality provided by providers. There a lack...
Cloud computing is becoming more and popular its security arising as well. In order to solve issues take evaluation in cloud computing, corresponding hierarchical design model introduced an approach of based on attack graph proposed environment. Firstly, network threat automatic methods are presented get information for generating automatically. By using symbolic checking algorithm, generated visualized. Then, by combining the characteristics Markov Chain with graph, two metrics computing....
In wireless network applications, such as routing decision, selection, etc., the Multi-Attribute Decision Making (MADM) is widely used. The MADM approach can address multi-objective decision making issues effectively. However, when parameters vary greatly, traditional algorithm not effective anymore. To solve this problem, in paper, we propose pairwise-based algorithm. PMADM, only two nodes' utilities are calculated and compared at each time. PMADM much more accurate than Moreover, also...
With the rapid development of Internet Things, emerging botnet attacks have become more rampant and harmful. In order to detect botnet, method based on artificial intelligence is proposed in paper, which detects domain name core C&C server botnet. The corresponding detection model established 9 types features are given for algorithm. Particularly, we apply pronunciation TLD into machine learning improve accuracy detection. We use statistical methods reduce false positive rate. results fed...
Physical-layer secret key generation (PKG) is an emerging technique to address the distribution problem and precoding matrix index (PMI)-based PKG approaches can thwart eavesdropping attempts. However, existing schemes based on PMI only considered square channel matrices, which restricts practical application. In this paper, we propose a new scheme called NS-PMI-PKG yield keys for non-square matrices in time-division duplex (TDD) mode. Specifically, includes two vital steps, i.e., codebook...
Secret keys generated from wireless channel can provide high level of security. The error correction code (ECC) based information reconciliation method owns the benefits security and efficiency. In this paper, we designed a highly robust secret key reconcile system using low-density parity-check (LDPC) codes to correct disagreed bits. system, cache some high-quality bits in cyclic shift buffer (CSB) for compensation, which effectively reduce over-all disagreement rate (KDR). Combined with...