Computer Science ›› 2021, Vol. 48 ›› Issue (6): 343-348.doi: 10.11896/jsjkx.200700006
• Information Security • Previous Articles
WANG Ying-ying, CHANG Jun, WU Hao, ZHOU Xiang, PENG Yu
CLC Number:
[1]ZHENG D,HONG Z,WANG N,et al.An Improved LDA-Based ELM Classification for Intrusion Detection Algorithm in IoT Application[J].Sensors,2020,20(6),1706. [2]DALCONZO A,DRAGO I,MORICHETTA A,et al.A Survey on Big Data for Network Traffic Monitoring and Analysis[J].IEEE Transactions on Network and Service Management,2019,16(3):800-813. [3]STAN O,COHEN A,ELOVICI Y,et al.Intrusion DetectionSystem for the MIL-STD-1553 Communication Bus[J].IEEE Transactions on Aerospace and Electronic Systems,2019,PP(99):1-1. [4]LI Z,ZHAO X,HU F,et al.SoiCP:A Seamless Outdoor-Indoor Crowdsensing Positioning System[J].IEEE Internet of Things Journal,2019,6(5):8626-8644. [5]SEYEDI B,FOTOHI R.NIASHPT:a novel intelligent agent-based strategy using hello packet table(HPT) function for trust Internet of Things[J].The Journal of Supercomputing,2020,75(276):1-24. [6]YANG G,SHI X,FENG L,et al.CEDAR:A Cost-effectiveCrowdsensing System for Detecting and Localizing Drones[J].IEEE Transactions on Mobile Computing,2019(9):2028-2043. [7]KOTARU M,KATTI S.Position Tracking for Virtual Reality Using Commodity WiFi[C]//IEEE Conference onComputer Vision and Pattern Recognition.IEEE,2017:2671-2681. [8]YOUSSEF M,MAH M,AGRAWALA A.Challenges:Device-free passive localization for wireless environments[C]//ACM International Conference on Mobile Computing and Networking.Montreal:ACM,2007:222-229. [9]YANG Z,LIU Y H.Wi-Fi Radar:From RSSI To CSI[J].Communication of China computer Society,2014,11(10):55-60. [10]DESHMUKH-BHOSALE S,SONAVANE S S.A Real-TimeIntrusion Detection System for Wormhole Attack in the RPL Based Internet of Things[J].Procedia Manufacturing,2019,32:840-847. [11]JIN Y,TIAN Z,ZHOU M,et al.An Adaptive and Robust Device-Free Intrusion Detection Using Ubiquitous WiFi Signals[C]//International Conference on Digital Signal Processing.2018:1-5. [12]DING Y S,GUO B,XIN T,et al.WiCount:A Crowd Counting Method Based on WiFi Channel State Information[J].Computer Science,2019,46(11):297-303. [13]SHAH S I,SHAH S Y,SHAH S A.Intrusion Detectionthrough Leaky Wave Cable in Conjunction with Channel State Information[C]//2019 UK/China Emerging Technologies(UCET).2019:1-4. [14]WANG T,YANG D,ZHANG S,et al.Wi-Alarm:Low-CostPassive Intrusion Detection Using WiFi[J].Sensors,2019,19(10):2335. [15]HAN K,SHI L J,DENG Z L,et al.Indoor NLOS Positioning System Based on Enhanced CSI Feature with IntrusionAdaptabi-lity[J].Sensors,2020,20(4):1211. [16]LYU J,MAN D,YANG W,et al.Robust Device-Free Intrusion Detection Using Physical Layer Information of WiFi Signals[J].Applied Sciences,2019,9(1):175. [17]BAO Y,DONG L,ZHENG Y,et al.WiSafe:a real-time system for intrusion detection based on wifi signals[C]//Proceedings of the ACM Turing Celebration Conference-China.ACM,2019:1-5. [18]TIAN Z,SHAO L,ZHOU M,et al.A highly-accurate device-free passive motion detection system using cellular network[C]//2016 IEEE Wireless Communications and Networking Conference.IEEE,2016:1-6. [19]XIN T,GUO B,WANG Z,et al.FreeSense:behavior under-standing using Wi-Fi signals[J].Ambient Intelligence,2018,9(5):1611-1622. |
[1] | WANG Xin-tong, WANG Xuan, SUN Zhi-xin. Network Traffic Anomaly Detection Method Based on Multi-scale Memory Residual Network [J]. Computer Science, 2022, 49(8): 314-322. |
[2] | ZHOU Zhi-hao, CHEN Lei, WU Xiang, QIU Dong-liang, LIANG Guang-sheng, ZENG Fan-qiao. SMOTE-SDSAE-SVM Based Vehicle CAN Bus Intrusion Detection Algorithm [J]. Computer Science, 2022, 49(6A): 562-570. |
[3] | CAO Yang-chen, ZHU Guo-sheng, SUN Wen-he, WU Shan-chao. Study on Key Technologies of Unknown Network Attack Identification [J]. Computer Science, 2022, 49(6A): 581-587. |
[4] | QING Chao-jin, DU Yan-hong, YE Qing, YANG Na, ZHANG Min-tao. Enhanced ELM-based Superimposed CSI Feedback Method with CSI Estimation Errors [J]. Computer Science, 2022, 49(6A): 632-638. |
[5] | WEI Hui, CHEN Ze-mao, ZHANG Li-qiang. Anomaly Detection Framework of System Call Trace Based on Sequence and Frequency Patterns [J]. Computer Science, 2022, 49(6): 350-355. |
[6] | ZHANG Shi-peng, LI Yong-zhong. Intrusion Detection Method Based on Denoising Autoencoder and Three-way Decisions [J]. Computer Science, 2021, 48(9): 345-351. |
[7] | WANG Chi, CHANG Jun. CSI Cross-domain Gesture Recognition Method Based on 3D Convolutional Neural Network [J]. Computer Science, 2021, 48(8): 322-327. |
[8] | LI Bei-bei, SONG Jia-rui, DU Qing-yun, HE Jun-jiang. DRL-IDS:Deep Reinforcement Learning Based Intrusion Detection System for Industrial Internet of Things [J]. Computer Science, 2021, 48(7): 47-54. |
[9] | CHENG Xi, CAO Xiao-mei. SQL Injection Attack Detection Method Based on Information Carrying [J]. Computer Science, 2021, 48(7): 70-76. |
[10] | YU Jian-ye, QI Yong, WANG Bao-zhuo. Distributed Combination Deep Learning Intrusion Detection Method for Internet of Vehicles Based on Spark [J]. Computer Science, 2021, 48(6A): 518-523. |
[11] | YOU Ling, GUAN Zhang-jun. Low-complexity Subcarrier Allocation Algorithm for Underwater OFDM Acoustic CommunicationSystems [J]. Computer Science, 2021, 48(6A): 387-391. |
[12] | CAO Yang-chen, ZHU Guo-sheng, QI Xiao-yun, ZOU Jie. Research on Intrusion Detection Classification Based on Random Forest [J]. Computer Science, 2021, 48(6A): 459-463. |
[13] | JIA Lin, YANG Chao, SONG Ling-ling, CHENG Zhenand LI Bei-jun. Improved Negative Selection Algorithm and Its Application in Intrusion Detection [J]. Computer Science, 2021, 48(6): 324-331. |
[14] | LIU Quan-ming, LI Yin-nan, GUO Ting, LI Yan-wei. Intrusion Detection Method Based on Borderline-SMOTE and Double Attention [J]. Computer Science, 2021, 48(3): 327-332. |
[15] | HUAN Wen-ming, LIN Hai-tao. Design of Intrusion Detection System Based on Sampling Ensemble Algorithm [J]. Computer Science, 2021, 48(11A): 705-712. |
|