Zichan Ruan

ORCID: 0000-0003-0812-2275
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Internet Traffic Analysis and Secure E-voting
  • Anomaly Detection Techniques and Applications
  • Complex Network Analysis Techniques
  • Data Visualization and Analytics
  • Big Data Technologies and Applications
  • Bioinformatics and Genomic Networks
  • Advanced Computing and Algorithms
  • Opinion Dynamics and Social Influence
  • Image and Video Quality Assessment
  • Advanced Malware Detection Techniques

Deakin University
2016-2021

Southwest University
2014

10.1016/j.physa.2014.10.006 article EN Physica A Statistical Mechanics and its Applications 2014-10-15

Cyber security has been thrust into the limelight in modern technological era because of an array attacks often bypassing untrained intrusion detection systems (IDSs). Therefore, greater attention directed on being able deciphering better methods for identifying attack types to train IDSs more effectively. Keycyber-attack insights exist big data; however, efficient approach is required determine strong become effective key areas. Despite rising growth IDS research, there a lack studies...

10.1016/j.dcan.2017.07.004 article EN cc-by-nc-nd Digital Communications and Networks 2017-08-12

Summary With the large volume of network traffic flow, it is necessary to preprocess raw data before classification gain accurate results speedily. Feature selection an essential approach in preprocessing phase. The principal component analysis (PCA) recognized as effective and efficient method. In this paper, we classify flows by using PCA technique together with 6 machine learning algorithms—Naive Bayes, decision tree, 1‐nearest neighbor, random forest, support vector machine, H 2 O . We...

10.1002/cpe.4181 article EN Concurrency and Computation Practice and Experience 2017-07-07

With the large volume of network traffic flow, it is necessary to preprocess raw data before classification gain accurate results speedily. Feature selection an essential approach in preprocessing phase. The Principal Component Analysis (PCA) recognized as effective and efficient method. In this paper, we classify by using PCA technique together with six machine learning algorithms - Naive Bayes, Decision Tree, 1-Nearest Neighbor (NN), Random Forest, Support Vector Machine (SVM) H2O. We...

10.1109/cit.2016.22 article EN 2016-12-01

10.1007/s11042-017-5495-y article EN Multimedia Tools and Applications 2018-04-19

Network traffic analytics technology is a cornerstone for cyber security systems. We demonstrate its use through three popular and contemporary applications in intrusion detection, malware analysis botnet detection. However, automated faces the challenges raised by big data. In terms of data's characteristics --- volume, variety velocity, we review state art techniques to mitigate key including real-time classification, unknown efficiency classifiers. The new using statistical features,...

10.48550/arxiv.1804.09023 preprint EN other-oa arXiv (Cornell University) 2018-01-01

Microwave links are widely employed in cellular data networks due to high-speed Internet access and easy installation, thus reducing network implementation costs. However, these prone failure may lead performance degradation, unavailability service disruption. Early detection of any link failures is critical maintain quality, but the complex environment dynamic nature information makes this a complicated process. In work, we propose Long Short-Term Memory (LSTM)-based feature fusion...

10.1109/ijcnn52387.2021.9533814 article EN 2022 International Joint Conference on Neural Networks (IJCNN) 2021-07-18
Coming Soon ...