Author pages are created from data sourced from our academic publisher partnerships and public sources.
Share This Author
A Novel Intrusion Detection Model for a Massive Network Using Convolutional Neural Networks
This paper proposes a novel network intrusion detection model utilizing convolutional neural networks (CNNs), which uses CNN to select traffic features from raw data set automatically, and sets the cost function weight coefficient of each class based on its numbers to solve the imbalanced data set problem.
Optimal coordinate operation control for wind–photovoltaic–battery storage power-generation units
Design and Implementation of an SM2-Based Security Authentication Scheme With the Key Agreement for Smart Grid Communications
- Wei Li, Ruiping Li, Kehe Wu, Rui Cheng, Linping Su, Wenchao Cui
- Engineering, Computer ScienceIEEE Access
A novel authentication scheme is proposed that addresses cyber-attacks using a minimal number of computations and is implemented based on mutual authentication as well as an improved SM2-based key agreement and validates the security of the approach based on the lowest possible communication and computational costs.
Research of Integrity and Authentication in OPC UA Communication Using Whirlpool Hash Function
A new security communication model to provide integrity and authentication in OPC UA is proposed, which uses the Whirlpool hash function to check integrity and generates digital signature along with RSA in message transmission.
A flexible policy-based access control model for Workflow Management Systems
- Gang Ma, Kehe Wu, Tong Zhang, Wei Li
- Computer ScienceIEEE International Conference on Computer Science…
- 10 June 2011
A novel dynamic access control model which incorporates authorization policies to meet the particular requirement of WFMSs, named PBFW is proposed, which enforces separation of duty (SoD) policies during runtime and supplies access control of appropriate granularity for WfMSs.
An Efficient ECC-Based CP-ABE Scheme for Power IoT
A novel CP-ABE scheme based on elliptic curve cryptography (ECC) is proposed, which replaces the bilinear pairing operation with simple scalar multiplication and outsources most of the decryption work to edge devices and solves the performance bottleneck of having a single authority.
Open System Interconnection for Energy: A Reference Model of Energy Internet
- Yayun Zhu, Jiye Wang, Kehe Wu
- Computer Science, EngineeringIEEE International Conference on Energy Internet…
- 1 April 2017
A five-layer reference model for Energy Internet on the basis of Open System Interconnection is proposed, what are Access Layer, Distribution and Control Layer, Transmission Layer, Strategy Layer and Application Layer, and the functions and services of each layer were defined accordingly.
The Research and Realization about Question Answer System based on Natural Language Processing
- Qing-lin Guo, Kehe Wu, Wei Li
- Computer ScienceSecond International Conference on Innovative…
- 5 September 2007
This thesis dissertated mainly the denotation of knowledge-information based on semantic network in QAS, the stochastic syntax-parse model named LSF ofknowledge-information in Qas, the structure and constitution of QAS and the LSF model parameters were exercised.
A Timing Analysis Model for Ontology Evolutions Based on Distributed Environments
A timing analysis model for ontology evolution management with more expressive time constraints in a distributed environment is proposed and a prototype system called TEAM is developed that can perform the timing analysis task of distributed ontology evolutions.
The Technique of Network Diode
- Kehe Wu, Fei Chen, Wenchao Cui
- Computer ScienceFirst International Conference on Information…
- 1 December 2009
A type of data transmission technique based on the signal feedback mechanism and physical one-way link is put forward, its model is details, and its realization principles are analyzed.