Search Results - "Lin, Kaihan"

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    Face Detection and Segmentation Based on Improved Mask R-CNN by Zhao, Ruoyan, Fu, Hui, Li, Canyao, Lv, Jujian, Zhao, Huimin, Lin, Kaihan, Chen, Rongjun

    “…Deep convolutional neural networks have been successfully applied to face detection recently. Despite making remarkable progress, most of the existing…”
    Get full text
    Journal Article
  2. 2

    Variational Quantum Simulation of Lindblad Dynamics via Quantum State Diffusion by Luo, Jianming, Lin, Kaihan, Gao, Xing

    Published in The journal of physical chemistry letters (04-04-2024)
    “…Quantum simulation of dynamics in open quantum systems is crucial but poses a significant challenge due to the non-Hermitian nature leading to nonunitary…”
    Get full text
    Journal Article
  3. 3

    Intrusion Detection for Intelligent Connected Vehicles based on Bidirectional Temporal Convolutional Network by Mei, Yangyang, Han, Weihong, Lin, Kaihan

    Published in IEEE network (17-04-2024)
    “…Intelligent Connected Vehicles (ICVs) are increasingly prevalent, with various applications and systems operating in complex network environments…”
    Get full text
    Journal Article
  4. 4

    A Novel Network Forensic Framework for Advanced Persistent Threat Attack Attribution Through Deep Learning by Mei, Yangyang, Han, Weihong, Li, Shudong, Lin, Kaihan, Tian, Zhihong, Li, Shumei

    “…The Internet now plays a pivotal role in the social and economic landspace, providing individuals and businesses with access to essential daily services and…”
    Get full text
    Journal Article
  5. 5

    Cybersecurity knowledge graph enabled attack chain detection for cyber-physical systems by Qi, Yulu, Gu, Zhaoquan, Li, Aiping, Zhang, Xiaojuan, Shafiq, Muhammad, Mei, Yangyang, Lin, Kaihan

    Published in Computers & electrical engineering (01-05-2023)
    “…The Cyber-Physical System covers a wide range of applications, many of which are involved in critical infrastructure, and the cybersecurity attacks on them…”
    Get full text
    Journal Article
  6. 6

    IR-Capsule: Two-Stream Network for Face Forgery Detection by Lin, Kaihan, Han, Weihong, Li, Shudong, Gu, Zhaoquan, Zhao, Huimin, Ren, Jinchang, Zhu, Li, Lv, Jujian

    Published in Cognitive computation (2023)
    “…With the emergence of deep learning, generating forged images or videos has become much easier in recent years. Face forgery detection, as a way to detect…”
    Get full text
    Journal Article
  7. 7

    A Hybrid Intelligent Approach to Attribute Advanced Persistent Threat Organization Using PSO-MSVM Algorithm by Mei, Yangyang, Han, Weihong, Li, Shudong, Lin, Kaihan, Luo, Cui

    “…In recent years, extensive research has been conducted in Advanced Persistent Threat (APT) attack defence. However, most existing defence solutions can only…”
    Get full text
    Journal Article
  8. 8

    A General Construction Method of Cyber Security Knowledge Graph by Qi, Yulu, Gu, Zhaoquan, Mei, Yangyang, Lin, Kaihan, Li, Aiping

    “…The corpora in cybersecurity knowledge base is characterized by multi-entity and weak relation. In order to solve the problem that entity extraction, entity…”
    Get full text
    Conference Proceeding
  9. 9

    A Survey of DeepFakes Generation and Detection by Lin, Kaihan, Han, Weihong, Gu, Zhaoquan, Li, Shudong

    “…The abuse of DeepFakes poses a potential threat to individuals and society. In order to eliminate the negative effects of DeepFakes techniques, researchers…”
    Get full text
    Conference Proceeding
  10. 10

    A Review of Attribution Technical for APT Attacks by Mei, Yangyang, Han, Weihong, Li, Shudong, Wu, Xiaobo, Lin, KaiHan, Qi, Yulu

    “…Traditional Advanced Persistent Threat (APT) detection methods for "low-and-slow" attack patterns and frequent use of zero-day exploits are difficult to detect…”
    Get full text
    Conference Proceeding