Подписаться
Zhida Li
Zhida Li
Подтвержден адрес электронной почты в домене nyit.edu - Главная страница
Название
Процитировано
Процитировано
Год
Machine learning techniques for classifying network anomalies and intrusions
Z Li, ALG Rios, G Xu, L Trajković
2019 IEEE international symposium on circuits and systems (ISCAS), 1-5, 2019
732019
Detecting BGP anomalies using machine learning techniques
Q Ding, Z Li, P Batta, L Trajković
2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2016
452016
Machine learning for detecting anomalies and intrusions in communication networks
Z Li, ALG Rios, L Trajković
IEEE Journal on Selected Areas in Communications 39 (7), 2254-2264, 2021
332021
Detection of denial of service attacks in communication networks
ALG Rios, Z Li, K Bekshentayeva, L Trajković
2020 IEEE international symposium on circuits and systems (ISCAS), 1-5, 2020
322020
Comparison of machine learning algorithms for detection of network intrusions
Z Li, P Batta, L Trajkovic
2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2018
292018
Application of machine learning techniques to detecting anomalies in communication networks: Datasets and feature selection algorithms
Q Ding, Z Li, S Haeri, L Trajković
Cyber threat intelligence, 47-70, 2018
282018
Evaluation of support vector machine kernels for detecting network anomalies
P Batta, M Singh, Z Li, Q Ding, L Trajković
2018 IEEE International Symposium on Circuits and Systems (ISCAS), 1-4, 2018
232018
Detecting internet worms, ransomware, and blackouts using recurrent neural networks
Z Li, ALG Rios, L Trajković
2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2020
182020
Global resource capacity algorithm with path splitting for virtual network embedding
S Haeri, Q Ding, Z Li, L Trajković
2016 IEEE International Symposium on Circuits and Systems (ISCAS), 666-669, 2016
182016
Detecting network anomalies and intrusions in communication networks
ALG Rios, Z Li, G Xu, AD Alonso, L Trajković
2019 IEEE 23rd International Conference on Intelligent Engineering Systems …, 2019
172019
Application of machine learning techniques to detecting anomalies in communication networks: Classification algorithms
Z Li, Q Ding, S Haeri, L Trajković
Cyber Threat Intelligence, 71-92, 2018
162018
The noise and spur delusion in fractional-N frequency synthesizer design
MP Kennedy, H Mo, Z Li, G Hu, P Scognamiglio, E Napoli
2015 IEEE International Symposium on Circuits and Systems (ISCAS), 2577-2580, 2015
112015
Comparison of virtualization algorithms and topologies for data center networks
HB Yedder, Q Ding, U Zakia, Z Li, S Haeri, L Trajkovic
2017 26th International Conference on Computer Communication and Networks …, 2017
102017
Comparative spur performance of a fractional-N frequency synthesizer with a nested MASH-SQ3 divider controller in the presence of memoryless piecewise-linear and polynomial …
Z Li, H Mo, MP Kennedy
25th IET Irish Signals & Systems Conference 2014 and 2014 China-Ireland …, 2014
72014
Machine learning for detecting the WestRock ransomware attack using BGP routing records
Z Li, ALG Rios, L Trajković
IEEE Communications Magazine 61 (3), 20-26, 2022
62022
Classifying denial of service attacks using fast machine learning algorithms
Z Li, ALG Rios, L Trajković
2021 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2021
52021
Programmable analog frequency divider based on ρ-switching
MP Kennedy, Z Li, Z Huang
Nonlinear Theory and Its Applications, IEICE 4 (4), 389-399, 2013
52013
Deep Echo State Networks for Detecting Internet Worm and Ransomware Attacks
T Sharma, K Patni, Z Li, L Trajković
2023 IEEE International Symposium on Circuits and Systems (ISCAS), 1-5, 2023
22023
The switched injection-locked oscillator (SILO) concept
Z Li, MP Kennedy
IEICE Proceedings Series 1 (868), 868-871, 2012
12012
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–19