Srid: State relation based intrusion detection for false data injection attacks in scada Y Wang, Z Xu, J Zhang, L Xu, H Wang, G Gu Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014 | 108 | 2014 |
Analysis of smart grid security standards Y Wang, D Ruan, D Gu, J Gao, D Liu, J Xu, F Chen, F Dai, J Yang 2011 IEEE International Conference on Computer Science and Automation …, 2011 | 67 | 2011 |
False data injection attacks identification for smart grids Z Hu, Y Wang, X Tian, X Yang, D Meng, R Fan 2015 Third International Conference on Technological Advances in Electrical …, 2015 | 37 | 2015 |
Computational intelligence algorithms analysis for smart grid cyber security Y Wang, D Ruan, J Xu, M Wen, L Deng Advances in Swarm Intelligence: First International Conference, ICSI 2010 …, 2010 | 25 | 2010 |
Back propagation neural network for short-term electricity load forecasting with weather features Y Wang, D Gu, J Xu, J Li 2009 International Conference on Computational Intelligence and Natural …, 2009 | 25 | 2009 |
Model of network intrusion detection system based on BP algorithm Y Wang, GX Huang, DG Peng 2006 1ST IEEE Conference on Industrial Electronics and Applications, 1-4, 2006 | 24 | 2006 |
An extension of differential fault analysis on AES W Li, D Gu, Y Wang, J Li, Z Liu 2009 Third International Conference on Network and System Security, 443-446, 2009 | 22 | 2009 |
Network intrusion detection with workflow feature definition using bp neural network Y Wang, D Gu, W Li, H Li, J Li Advances in Neural Networks–ISNN 2009: 6th International Symposium on Neural …, 2009 | 20 | 2009 |
Efficient user access control mechanism for wireless multimedia sensor networks M Wen, J Lei, J Li, Y Wang, K Chen Journal of Computational Information Systems 7 (9), 3325-3332, 2011 | 17 | 2011 |
Stuxnet vulnerabilities analysis of scada systems Y Wang, D Gu, D Peng, S Chen, H Yang International Conference on Network Computing and Information Security, 640-646, 2012 | 11 | 2012 |
RICB: integer overflow vulnerability dynamic analysis via buffer overflow Y Wang, D Gu, J Xu, M Wen, L Deng Forensics in Telecommunications, Information, and Multimedia: Third …, 2011 | 11 | 2011 |
Virus analysis on idt hooks of rootkits trojan Y Wang, D Gu, W Li, J Li, M Wen 2009 International Symposium on Information Engineering and Electronic …, 2009 | 11 | 2009 |
An adaptive key management framework for the wireless mesh and sensor networks M Wen, Z Yin, Y Wang, Y Long Wireless Sensor Network 2 (09), 689, 2010 | 9 | 2010 |
Denial of service detection with hybrid fuzzy set based feed forward neural network Y Wang, D Gu, M Wen, J Xu, H Li Advances in Neural Networks-ISNN 2010: 7th International Symposium on Neural …, 2010 | 8 | 2010 |
Hacking Risk Analysis of Web Trojan in Electric Power System Y Wang, D Gu, J Xu, H Du 2009 International Conference on Web Information Systems and Mining, 510-514, 2009 | 8 | 2009 |
Genetic algorithm rule definition for denial of services network intrusion detection Y Wang, D Gu, X Tian, J Li 2009 International Conference on Computational Intelligence and Natural …, 2009 | 8 | 2009 |
Forensics in Telecommunications, Information and Multimedia: Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers X Lai, D Gu, B Jin, Y Wang, H Li Springer Science & Business Media, 2011 | 6 | 2011 |
Classification of malicious software behaviour detection with hybrid set based feed forward neural network Y Wang, D Gu, M Wen, H Li, J Xu Advances in Neural Networks-ISNN 2010: 7th International Symposium on Neural …, 2010 | 6 | 2010 |
DualAcE: fine‐grained dual access control enforcement with multi‐privacy guarantee in DaaS X Tian, L Huang, Y Wang, C Sha, X Wang Security and Communication Networks 8 (8), 1494-1508, 2015 | 4 | 2015 |
Bad data injection attacks identification in power system on fast decoupled load flow Z Hu, Y Wang, L Zhang, R Fan 2016 IEEE Trustcom/BigDataSE/ISPA, 1970-1975, 2016 | 2 | 2016 |