Search Results - "Lin, Kaihan"
-
1
Face Detection and Segmentation Based on Improved Mask R-CNN
Published in Discrete dynamics in nature and society (2020)“…Deep convolutional neural networks have been successfully applied to face detection recently. Despite making remarkable progress, most of the existing…”
Get full text
Journal Article -
2
Variational Quantum Simulation of Lindblad Dynamics via Quantum State Diffusion
Published in The journal of physical chemistry letters (04-04-2024)“…Quantum simulation of dynamics in open quantum systems is crucial but poses a significant challenge due to the non-Hermitian nature leading to nonunitary…”
Get full text
Journal Article -
3
Intrusion Detection for Intelligent Connected Vehicles based on Bidirectional Temporal Convolutional Network
Published in IEEE network (17-04-2024)“…Intelligent Connected Vehicles (ICVs) are increasingly prevalent, with various applications and systems operating in complex network environments…”
Get full text
Journal Article -
4
A Novel Network Forensic Framework for Advanced Persistent Threat Attack Attribution Through Deep Learning
Published in IEEE transactions on intelligent transportation systems (01-09-2024)“…The Internet now plays a pivotal role in the social and economic landspace, providing individuals and businesses with access to essential daily services and…”
Get full text
Journal Article -
5
Cybersecurity knowledge graph enabled attack chain detection for cyber-physical systems
Published in Computers & electrical engineering (01-05-2023)“…The Cyber-Physical System covers a wide range of applications, many of which are involved in critical infrastructure, and the cybersecurity attacks on them…”
Get full text
Journal Article -
6
IR-Capsule: Two-Stream Network for Face Forgery Detection
Published in Cognitive computation (2023)“…With the emergence of deep learning, generating forged images or videos has become much easier in recent years. Face forgery detection, as a way to detect…”
Get full text
Journal Article -
7
A Hybrid Intelligent Approach to Attribute Advanced Persistent Threat Organization Using PSO-MSVM Algorithm
Published in IEEE eTransactions on network and service management (01-12-2022)“…In recent years, extensive research has been conducted in Advanced Persistent Threat (APT) attack defence. However, most existing defence solutions can only…”
Get full text
Journal Article -
8
A General Construction Method of Cyber Security Knowledge Graph
Published in 2022 9th International Conference on Behavioural and Social Computing (BESC) (29-10-2022)“…The corpora in cybersecurity knowledge base is characterized by multi-entity and weak relation. In order to solve the problem that entity extraction, entity…”
Get full text
Conference Proceeding -
9
A Survey of DeepFakes Generation and Detection
Published in 2021 IEEE Sixth International Conference on Data Science in Cyberspace (DSC) (01-10-2021)“…The abuse of DeepFakes poses a potential threat to individuals and society. In order to eliminate the negative effects of DeepFakes techniques, researchers…”
Get full text
Conference Proceeding -
10
A Review of Attribution Technical for APT Attacks
Published in 2022 7th IEEE International Conference on Data Science in Cyberspace (DSC) (01-07-2022)“…Traditional Advanced Persistent Threat (APT) detection methods for "low-and-slow" attack patterns and frequent use of zero-day exploits are difficult to detect…”
Get full text
Conference Proceeding