Search Results - "Zhu, Hengye"
-
1
Detection-Performance Tradeoff for Watermarking in Industrial Control Systems
Published in IEEE transactions on information forensics and security (01-01-2023)“…The watermarking method, which adds unique watermarks to data, has been widely used for integrity attack detection in industrial control systems (ICSs)…”
Get full text
Journal Article -
2
Physics-Aware Watermarking Embedded in Unknown Input Observers for False Data Injection Attack Detection in Cyber-Physical Microgrids
Published in IEEE transactions on information forensics and security (2024)“…The physics-aware watermarking-based detection method has shown great potential in detecting stealthy False Data Injection Attacks (FDIAs) by adding…”
Get full text
Journal Article -
3
A UML profile for HLA-based simulation system modeling
Published in 2008 6th IEEE International Conference on Industrial Informatics (01-07-2008)“…Modeling is among the most important steps in building a simulation system. Applying UML (unified modeling language) to HLA (high level architecture)-based…”
Get full text
Conference Proceeding -
4
HoneyJudge: A PLC Honeypot Identification Framework Based on Device Memory Testing
Published in IEEE transactions on information forensics and security (2024)“…The widespread use of programmable logic controllers (PLCs) in critical infrastructures has given rise to escalating cybersecurity concerns regarding PLC…”
Get full text
Journal Article -
5
Toward a Trust Evaluation Framework Against Malicious Behaviors of Industrial IoT
Published in IEEE internet of things journal (01-11-2022)“…With the development of the Industrial Internet of Things (IIoT) technology, edge computing is a promising area to release the sensing and computing burdens…”
Get full text
Journal Article -
6
Reverse Engineering Industrial Protocols Driven By Control Fields
Published in IEEE INFOCOM 2024 - IEEE Conference on Computer Communications (20-05-2024)“…Industrial protocols are widely used in Industrial Control Systems (ICSs) to network physical devices, thus playing a crucial role in securing ICSs. However,…”
Get full text
Conference Proceeding -
7
The Generation Algorithm of Tissue Contour Lines in Medical Image
Published in 2008 2nd International Conference on Bioinformatics and Biomedical Engineering (2008)“…Medical image segmentation is the basis of medical image three-dimensional reconstruction. The accuracy of image segmentation directly affects the results of…”
Get full text
Conference Proceeding Journal Article -
8
Introducing Web Services in HLA-based simulation application
Published in 2008 7th World Congress on Intelligent Control and Automation (01-06-2008)“…High Level Architecture (HLA) conduces to the integration of different models to form a complicated distributed simulation system. However, there exist some…”
Get full text
Conference Proceeding -
9
Research on parallel algorithms for high-power microwave devices based on GPU
Published in 2023 24th International Vacuum Electronics Conference (IVEC) (25-04-2023)“…In this paper, on the CHIPIC-3D software platform independently developed by the University of Electronic Science and Technology of China, the original…”
Get full text
Conference Proceeding