Search Results - "Wu, Qiuhan"

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    A multiscale approach for network intrusion detection based on variance–covariance subspace distance and EQL v2 by Liu, Taotao, Fu, Yu, Wang, Kun, Duan, Xueyuan, Wu, Qiuhan

    Published in Computers & security (01-01-2025)
    “…As an important network defense approach, network intrusion detection is mainly used to identify anomaly traffic behavior. However, dominant network intrusion…”
    Get full text
    Journal Article
  2. 2

    Research on collision avoidance algorithm of unmanned surface vehicle based on deep reinforcement learning by Xia, Jiawei, Zhu, Xufang, Liu, Zhikun, Luo, Yasong, Wu, Zhaodong, Wu, Qiuhan

    Published in IEEE sensors journal (01-06-2023)
    “…To solve the problem of active collision avoidance for unmanned surface vehicle (USV) in complex maritime environment, a method of deep reinforcement learning…”
    Get full text
    Journal Article
  3. 3

    A Secure Communication Protocol Based on Blockchain and MQTT for IOT by Wu, Qiuhan, Zhang, Tanling, Yang, Zhichao

    “…Data in the Internet of Things are confronted with security threats such as leakage, tampering, and malicious deletion. Blockchain has the advantages of…”
    Get full text
    Conference Proceeding
  4. 4

    Design of identity authentication agreement in mobile terminal based on SM2 algorithm and blockchain by Qiuhan WU,Wei HU

    Published in 网络与信息安全学报 (01-09-2018)
    “…To solve the privacy leakage problem in the process of identification by second generation residents’ ID card,the SM2 algorithm and the blockchain technology…”
    Get full text
    Journal Article
  5. 5

    Design of identity authentication agreement in mobile terminal based on SM2 algorithm and blockchain by Qiuhan WU, Wei HU

    Published in 网络与信息安全学报 (01-09-2018)
    “…To solve the privacy leakage problem in the process of identification by second generation residents’ ID card,the SM2 algorithm and the blockchain technology…”
    Get full text
    Journal Article
  6. 6

    Modified research on RFID-oriented ECC point multiplication over GF(2m) field by Wei, Guoheng, Wang, Ya, Wu, Qiuhan

    “…In elliptic curve algorithm, point multiplication is the most core part. Its efficiency determines the execution efficiency of the algorithm. RFID label…”
    Get full text
    Conference Proceeding