Search Results - "Wu, Qiuhan"
-
1
A multiscale approach for network intrusion detection based on variance–covariance subspace distance and EQL v2
Published in Computers & security (01-01-2025)“…As an important network defense approach, network intrusion detection is mainly used to identify anomaly traffic behavior. However, dominant network intrusion…”
Get full text
Journal Article -
2
Research on collision avoidance algorithm of unmanned surface vehicle based on deep reinforcement learning
Published in IEEE sensors journal (01-06-2023)“…To solve the problem of active collision avoidance for unmanned surface vehicle (USV) in complex maritime environment, a method of deep reinforcement learning…”
Get full text
Journal Article -
3
A Secure Communication Protocol Based on Blockchain and MQTT for IOT
Published in 2024 IEEE 7th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC) (15-03-2024)“…Data in the Internet of Things are confronted with security threats such as leakage, tampering, and malicious deletion. Blockchain has the advantages of…”
Get full text
Conference Proceeding -
4
Design of identity authentication agreement in mobile terminal based on SM2 algorithm and blockchain
Published in 网络与信息安全学报 (01-09-2018)“…To solve the privacy leakage problem in the process of identification by second generation residents’ ID card,the SM2 algorithm and the blockchain technology…”
Get full text
Journal Article -
5
Design of identity authentication agreement in mobile terminal based on SM2 algorithm and blockchain
Published in 网络与信息安全学报 (01-09-2018)“…To solve the privacy leakage problem in the process of identification by second generation residents’ ID card,the SM2 algorithm and the blockchain technology…”
Get full text
Journal Article -
6
Modified research on RFID-oriented ECC point multiplication over GF(2m) field
Published in 2016 IEEE International Conference on RFID Technology and Applications (RFID-TA) (01-09-2016)“…In elliptic curve algorithm, point multiplication is the most core part. Its efficiency determines the execution efficiency of the algorithm. RFID label…”
Get full text
Conference Proceeding