Transaction-based classification and detection approach for Ethereum smart contract T Hu, X Liu, T Chen, X Zhang, X Huang, W Niu, J Lu, K Zhou, Y Liu Information Processing & Management 58 (2), 102462, 2021 | 186 | 2021 |
An insider threat detection approach based on mouse dynamics and deep learning T Hu, W Niu, X Zhang, X Liu, J Lu, Y Liu Security and communication networks 2019 (1), 3898951, 2019 | 86 | 2019 |
Dataether: Data exploration framework for ethereum T Chen, Z Li, Y Zhang, X Luo, A Chen, K Yang, B Hu, T Zhu, S Deng, T Hu, ... 2019 IEEE 39th International Conference on Distributed Computing Systems …, 2019 | 59 | 2019 |
Practical evaluation of encrypted traffic classification based on a combined method of entropy estimation and neural networks K Zhou, W Wang, C Wu, T Hu Etri Journal 42 (3), 311-323, 2020 | 35 | 2020 |
Time series forecasting and classification models based on recurrent with attention mechanism and generative adversarial networks K Zhou, W Wang, T Hu, K Deng Sensors 20 (24), 7211, 2020 | 33 | 2020 |
Comparison of time series forecasting based on statistical ARIMA model and LSTM with attention mechanism K Zhou, WY Wang, T Hu, CH Wu Journal of physics: conference series 1631 (1), 012141, 2020 | 29 | 2020 |
A large-scale empirical study on control flow identification of smart contracts T Chen, Z Li, Y Zhang, X Luo, T Wang, T Hu, X Xiao, D Wang, J Huang, ... 2019 ACM/IEEE International Symposium on Empirical Software Engineering and …, 2019 | 27 | 2019 |
Federated synthetic data generation with differential privacy B Xin, Y Geng, T Hu, S Chen, W Yang, S Wang, L Huang Neurocomputing 468, 1-10, 2022 | 25 | 2022 |
Detecting malware on X86-based IoT devices in autonomous driving W Niu, X Zhang, X Du, T Hu, X Xie, N Guizani IEEE Wireless Communications 26 (4), 80-87, 2019 | 21 | 2019 |
A black-box attack on neural networks based on swarm evolutionary algorithm X Liu, T Hu, K Ding, Y Bai, W Niu, J Lu Information Security and Privacy: 25th Australasian Conference, ACISP 2020 …, 2020 | 18 | 2020 |
Application of improved asynchronous advantage actor critic reinforcement learning model on anomaly detection K Zhou, W Wang, T Hu, K Deng Entropy 23 (3), 274, 2021 | 17 | 2021 |
Tracking the insider attacker: A blockchain traceability system for insider threats T Hu, B Xin, X Liu, T Chen, K Ding, X Zhang Sensors 20 (18), 5297, 2020 | 15 | 2020 |
Integrating traffics with network device logs for anomaly detection J Lu, F Lv, Z Zhuo, X Zhang, X Liu, T Hu, W Deng Security and Communication Networks 2019 (1), 5695021, 2019 | 15 | 2019 |
A low-query black-box adversarial attack based on transferability K Ding, X Liu, W Niu, T Hu, Y Wang, X Zhang Knowledge-Based Systems 226, 107102, 2021 | 14 | 2021 |
Securing the private key in your blockchain wallet: a continuous authentication approach based on behavioral biometric T Hu, X Liu, W Niu, K Ding, Y Wang, X Zhang Journal of Physics: Conference Series 1631 (1), 012104, 2020 | 14 | 2020 |
Using XGBoost to discover infected hosts based on HTTP traffic W Niu, T Li, X Zhang, T Hu, T Jiang, H Wu Security and Communication Networks 2019 (1), 2182615, 2019 | 9 | 2019 |
Rule anomaly-free mechanism of security function chaining in 5g G Li, H Zhou, B Feng, G Li, H Zhang, T Hu IEEE Access 6, 13653-13662, 2018 | 9 | 2018 |
Sparse adversarial attack for video via gradient-based keyframe selection Y Xu, X Liu, M Yin, T Hu, K Ding ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and …, 2022 | 6 | 2022 |
Sparse black-box inversion attack with limited information Y Xu, X Liu, T Hu, B Xin, R Yang ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and …, 2023 | 5 | 2023 |
Gru and multi-autoencoder based insider threat detection for cyber security F Meng, P Lu, J Li, T Hu, M Yin, F Lou 2021 IEEE Sixth International Conference on Data Science in Cyberspace (DSC …, 2021 | 5 | 2021 |