Yingsa Hou

ORCID: 0009-0007-5717-860X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Smart Grid Security and Resilience
  • Technology and Security Systems
  • Information and Cyber Security
  • Smart Grid and Power Systems
  • Advanced Decision-Making Techniques
  • Legal and Policy Issues
  • Photoacoustic and Ultrasonic Imaging
  • Data Management and Algorithms
  • Advanced Malware Detection Techniques
  • Advanced Clustering Algorithms Research
  • Blockchain Technology Applications and Security
  • Border Security and International Relations
  • Advanced Authentication Protocols Security
  • Software Reliability and Analysis Research
  • Wireless Body Area Networks
  • Data Mining Algorithms and Applications
  • Software-Defined Networks and 5G
  • E-commerce and Technology Innovations
  • Optical Imaging and Spectroscopy Techniques
  • Thermography and Photoacoustic Techniques
  • Network Security and Intrusion Detection
  • Vehicular Ad Hoc Networks (VANETs)
  • Big Data Technologies and Applications
  • Anomaly Detection Techniques and Applications
  • Risk and Safety Analysis

Inner Mongolia Electric Power (China)
2019-2024

North China Electric Power University
2023

Xinjiang Entry-Exit Inspection and Quarantine Bureau
2018

Jilin Province Science and Technology Department
2014

Jilin University
2014

As a key area of new infrastructure, 5G development strategy is constantly clear, and various industries have developed around 5G. However, services, architecture, technologies, openness the network make security issues become focus. This article focuses on relevant application scenarios in power field, analyzes discusses risks that technology brings to grid, this basis, proposes technical solutions enhance for industry applications, follow-up suggestions.

10.1109/iaeac50856.2021.9390826 article EN 2022 IEEE 6th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC ) 2021-03-12

In order to improve the information security level of intelligent substation, this paper proposes an substation assessment tool through research and analysis risk method, proves that can effectively detect it. It is great significance carry out on industrial control systems, especially security.

10.1109/itaic.2019.8785820 article EN 2022 IEEE 10th Joint International Information Technology and Artificial Intelligence Conference (ITAIC) 2019-05-01

In order to evaluate the network security risks and implement effective defenses in industrial control system, a risk assessment method for systems based on attack graphs is proposed. Use concept of elements translate attacks into state migration problems build an graph model. view current subjective evaluation expert experience, atomic probability assignment CVSS system were introduced status system. Finally, taking centralized thermal power plant as experimental background, case analysis...

10.1109/iaeac.2018.8577847 article EN 2018-10-01

Aiming at the current status and risks of industrial control system information security, a security protection was proposed from technical management levels. At level, it strengthen by setting up firewall protection, isolating engineer stations, conducting tests, deploying network monitoring. improves safety through measures such as real-time maintenance updating existing systems technology standards. Finally, feasibility this proved experiments, which has certain reference significance for...

10.1109/itaic49862.2020.9338955 article EN 2022 IEEE 10th Joint International Information Technology and Artificial Intelligence Conference (ITAIC) 2020-12-11

10.1109/imcec59810.2024.10575588 article EN 2022 IEEE 5th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC) 2024-05-24

In order to enhance the network security protection level of intelligent substation, this paper puts forward a model substation defense system through analysis risk and demand, using example proved feasibility effectiveness system. It is provides new solution.

10.1109/iaeac47372.2019.8997736 article EN 2022 IEEE 6th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC ) 2019-12-01

With the rapid development of electricity Internet Things, intelligent terminals in power system are widely interconnected and ubiquitously connected. The have become main target springboard for attacking grid. In this context, researches carried out on security protection Things. First, combined with architecture connotation basic characteristics summarized. Then risk summarized based risks it faced, finally corresponding countermeasures proposed from four aspects, namely encryption...

10.1109/itnec52019.2021.9586995 article EN 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC) 2021-10-15

The mainstream technology of network security protection has gradually transited from the past "rule base" to dynamic perception based on big data. development knowledge atlas injected new vitality into research. Based limited Boltzmann machine, this paper realizes deep learning features, maps them high dimensional space low layer by layer, and builds a map. Then, proposes situational awareness framework, which integrates series technologies automation tools, It can automatically efficiently...

10.1109/itoec57671.2023.10292013 article EN 2018 IEEE 4th Information Technology and Mechatronics Engineering Conference (ITOEC) 2023-09-15

In photoacoustic tomography (PAT), object identification and classification are usually performed as postprocessing processes after image reconstruction. Since useful information about the target implied in raw signal can be lost during reconstruction, this two-step scheme reduce accuracy of tissue characterization. For learning-based methods, it is time consuming to train network each subtask separately. paper, we report on an end-to-end joint learning framework for simultaneous...

10.1049/2023/6615953 article EN cc-by IET Signal Processing 2023-12-22

The rapid development of cloud computing and Internet Things technology has caused the explosive growth data scale high complexity models, leading to cluster research facing many new problems challenges, such as massive environments. This paper deeply studies parallel CKLDC-means clustering algorithm based on Hadoop platform, gives design method strategy. Experiments multiple sets different sizes show that designed a good acceleration ratio expansion rate, is suitable for analysis mining data.

10.1109/itaic54216.2022.9836938 article EN 2022 IEEE 10th Joint International Information Technology and Artificial Intelligence Conference (ITAIC) 2022-06-17
Coming Soon ...