• Publications
  • Influence
An Encoding Strategy Based Word-Character LSTM for Chinese NER
TLDR
We propose a novel word-character LSTM(WC-LSTM) model to add word information into the start or the end character of the word, alleviating the influence of word segmentation errors. Expand
An Evaluation of Uncle Block Mechanism Effect on Ethereum Selfish and Stubborn Mining Combined With an Eclipse Attack
TLDR
We show that the Ethereum selfish and stubborn mining strategies not only increase the reward of an attacker but also decrease the security threshold.Ethereum accelerates the transaction process through a quicker block creation design. Expand
DDoS Attack Detection Using Flow Entropy and Clustering Technique
TLDR
We propose a novel entropy-based DDoS attack detection approach by constructing entropy vectors of different features from traffic flows, modeling normal patterns using clustering analysis algorithm, and then detecting deviations from the created models. Expand
Network Traffic Classification with Improved Random Forest
TLDR
We improve the standard Random Forest by setting the variable selection probability according to the importance of the corresponding variable to classify network traffic. Expand
A secure and efficient three-factor multi-gateway authentication protocol for wireless sensor networks
TLDR
This paper proposes a new secure and efficient authentication protocol for multi-gateway wireless sensor networks in Ad Hoc Networks. Expand
Air Traffic Surveillance Using IP-Based Space Information Network
TLDR
The commercial aviation industry mainly relies on ground-based radar system for air traffic surveillance. Expand
The Parallel CMAC Authenticated Encryption Algorithm for Satellite Communication
TLDR
The evolution in digital communication technology has provoked the need for providing efficient security services for communication. Expand
The Parallel CMAC Authentication Algorithm
TLDR
The increasing demand for providing online financial transactions and personal data collection on digital systems has made it imperative to use data security algorithms for securing personal/financial data. Expand
Disaster Management Using IP-Based Space-Air-Ground Information Network
TLDR
Proposed IP based Space Air Ground Information Network (SAGIN) provides a protocol for real-time rescue operation in case of a disaster. Expand
...
1
2
3
4
5
...