Search Results - "Zhu, Hengye"

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    Detection-Performance Tradeoff for Watermarking in Industrial Control Systems by Zhu, Hengye, Liu, Mengxiang, Fang, Chongrong, Deng, Ruilong, Cheng, Peng

    “…The watermarking method, which adds unique watermarks to data, has been widely used for integrity attack detection in industrial control systems (ICSs)…”
    Get full text
    Journal Article
  2. 2

    Physics-Aware Watermarking Embedded in Unknown Input Observers for False Data Injection Attack Detection in Cyber-Physical Microgrids by Liu, Mengxiang, Zhang, Xin, Zhu, Hengye, Zhang, Zhenyong, Deng, Ruilong

    “…The physics-aware watermarking-based detection method has shown great potential in detecting stealthy False Data Injection Attacks (FDIAs) by adding…”
    Get full text
    Journal Article
  3. 3

    A UML profile for HLA-based simulation system modeling by Hengye Zhu, Guangyao Li, Liping Zheng

    “…Modeling is among the most important steps in building a simulation system. Applying UML (unified modeling language) to HLA (high level architecture)-based…”
    Get full text
    Conference Proceeding
  4. 4

    HoneyJudge: A PLC Honeypot Identification Framework Based on Device Memory Testing by Zhu, Hengye, Liu, Mengxiang, Chen, Binbin, Che, Xin, Cheng, Peng, Deng, Ruilong

    “…The widespread use of programmable logic controllers (PLCs) in critical infrastructures has given rise to escalating cybersecurity concerns regarding PLC…”
    Get full text
    Journal Article
  5. 5

    Toward a Trust Evaluation Framework Against Malicious Behaviors of Industrial IoT by Wang, Jingpei, Wang, Mufeng, Zhang, Zhenyong, Zhu, Hengye

    Published in IEEE internet of things journal (01-11-2022)
    “…With the development of the Industrial Internet of Things (IIoT) technology, edge computing is a promising area to release the sensing and computing burdens…”
    Get full text
    Journal Article
  6. 6

    Reverse Engineering Industrial Protocols Driven By Control Fields by Qin, Zhen, Yang, Zeyu, Geng, Yangyang, Che, Xin, Wang, Tianyi, Zhu, Hengye, Cheng, Peng, Chen, Jiming

    “…Industrial protocols are widely used in Industrial Control Systems (ICSs) to network physical devices, thus playing a crucial role in securing ICSs. However,…”
    Get full text
    Conference Proceeding
  7. 7

    The Generation Algorithm of Tissue Contour Lines in Medical Image by Zheng, Liping, Li, Guangyao, Zhu, Hengye

    “…Medical image segmentation is the basis of medical image three-dimensional reconstruction. The accuracy of image segmentation directly affects the results of…”
    Get full text
    Conference Proceeding Journal Article
  8. 8

    Introducing Web Services in HLA-based simulation application by Hengye Zhu, Guangyao Li, Liping Zheng

    “…High Level Architecture (HLA) conduces to the integration of different models to form a complicated distributed simulation system. However, there exist some…”
    Get full text
    Conference Proceeding
  9. 9

    Research on parallel algorithms for high-power microwave devices based on GPU by Shi, BinRong, Zhu, Hengye, Liu, DaGang

    “…In this paper, on the CHIPIC-3D software platform independently developed by the University of Electronic Science and Technology of China, the original…”
    Get full text
    Conference Proceeding