Jiangchuan Chen

ORCID: 0000-0001-7002-1761
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Anomaly Detection Techniques and Applications
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Artificial Immune Systems Applications
  • Fault Detection and Control Systems
  • Internet Traffic Analysis and Secure E-voting
  • Target Tracking and Data Fusion in Sensor Networks
  • Smart Grid Security and Resilience

Sichuan University
2024

China West Normal University
2023

With the rapid development of UAVs (Unmanned Aerial Vehicles), abnormal state detection has become a critical technology to ensure flight safety UAVs. The position and orientation system (POS) data, etc., used evaluate UAV status are from different sensors. traditional model ignores difference POS data in frequency domain during feature learning, which leads loss key information limits further improvement performance. To deal with this improve safety, paper presents method for detecting...

10.3390/electronics12061299 article EN Electronics 2023-03-08

The number of Unmanned Aerial Vehicles (UAVs) used in various industries has increased exponentially, and abnormal detection UAVs is one the primary technical means to ensure that can work normally. Currently, most anomaly models are trained using on-board logs from drones. However, some cases, these be problematic due data encryption, inconsistent descriptions characteristics, imbalanced positive negative samples. Consequently, may not directly usable for training models. Given above...

10.3390/app13074301 article EN cc-by Applied Sciences 2023-03-28

Unmanned aerial vehicles (UAVs) have experienced rapid development, permeating diverse domains. However, addressing security challenges in UAV networks remains daunting due to resource limitations and the high autonomy of terminals. The current research on network intrusion detection lacks an efficient process covering each terminal a lightweight collaborative response mechanism between UAVs ground stations, which affects performance detection. In this article, inspired by vaccine...

10.1109/jiot.2024.3426054 article EN IEEE Internet of Things Journal 2024-07-10

Application‐layer distributed denial of service (DDoS) attacks have become the main threat to Web server security. Because application‐layer DDoS strong concealability and high authenticity, intrusion detection technologies that rely solely on judging client authenticity cannot accurately detect such attacks. In addition, are periodic repetitive, attack targets suddenly in a short period. this study, we propose an efficient system based improved random forest. Firstly, logs preprocessed...

10.1155/2024/9044391 article EN cc-by International Journal of Intelligent Systems 2024-01-01
Coming Soon ...