BibTeX records: Yulu Qi

download as .bib file

@article{DBLP:journals/cee/QiGLZSML23,
  author       = {Yulu Qi and
                  Zhaoquan Gu and
                  Aiping Li and
                  Xiaojuan Zhang and
                  Muhammad Shafiq and
                  Yangyang Mei and
                  Kaihan Lin},
  title        = {Cybersecurity knowledge graph enabled attack chain detection for cyber-physical
                  systems},
  journal      = {Comput. Electr. Eng.},
  volume       = {108},
  pages        = {108660},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.compeleceng.2023.108660},
  doi          = {10.1016/J.COMPELECENG.2023.108660},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/QiGLZSML23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/SunQYHL23,
  author       = {Liqun Sun and
                  Yulu Qi and
                  Shuqiang Yang and
                  Weihong Han and
                  Xiaoxia Li},
  title        = {Analyzing Security Attacks Against Platoon of Intelligent and Connected
                  Vehicles},
  booktitle    = {8th International Conference on Data Science in Cyberspace, {DSC}
                  2023, Hefei, China, August 18-20, 2023},
  pages        = {76--81},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/DSC59305.2023.00021},
  doi          = {10.1109/DSC59305.2023.00021},
  timestamp    = {Fri, 09 Feb 2024 20:38:47 +0100},
  biburl       = {https://dblp.org/rec/conf/dsc/SunQYHL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/besc/QiGMLL22,
  author       = {Yulu Qi and
                  Zhaoquan Gu and
                  Yangyang Mei and
                  Kaihan Lin and
                  Aiping Li},
  title        = {A General Construction Method of Cyber Security Knowledge Graph},
  booktitle    = {9th International Conference on Behavioural and Social Computing,
                  {BESC} 2022, Matsuyama, Japan, October 29-31, 2022},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/BESC57393.2022.9995070},
  doi          = {10.1109/BESC57393.2022.9995070},
  timestamp    = {Mon, 09 Jan 2023 17:07:16 +0100},
  biburl       = {https://dblp.org/rec/conf/besc/QiGMLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/MeiHLWLQ22,
  author       = {Yangyang Mei and
                  Weihong Han and
                  Shudong Li and
                  Xiaobo Wu and
                  Kaihan Lin and
                  Yulu Qi},
  title        = {A Review of Attribution Technical for {APT} Attacks},
  booktitle    = {7th {IEEE} International Conference on Data Science in Cyberspace,
                  {DSC} 2022, Guilin, China, July 11-13, 2022},
  pages        = {512--518},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/DSC55868.2022.00077},
  doi          = {10.1109/DSC55868.2022.00077},
  timestamp    = {Tue, 11 Oct 2022 16:48:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dsc/MeiHLWLQ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/QiJLG021,
  author       = {Yulu Qi and
                  Rong Jiang and
                  Aiping Li and
                  Zhaoquan Gu and
                  Yan Jia},
  editor       = {Yan Jia and
                  Zhaoquan Gu and
                  Aiping Li},
  title        = {A Distributed Framework for {APT} Attack Analysis},
  booktitle    = {{MDATA:} {A} New Knowledge Representation Model - Theory, Methods
                  and Applications},
  series       = {Lecture Notes in Computer Science},
  volume       = {12647},
  pages        = {199--219},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-71590-8\_12},
  doi          = {10.1007/978-3-030-71590-8\_12},
  timestamp    = {Wed, 25 Jan 2023 17:51:20 +0100},
  biburl       = {https://dblp.org/rec/series/lncs/QiJLG021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/QiJ0L20,
  author       = {Yulu Qi and
                  Rong Jiang and
                  Yan Jia and
                  Aiping Li},
  title        = {An {APT} Attack Analysis Framework Based on Self-define Rules and
                  Mapreduce},
  booktitle    = {5th {IEEE} International Conference on Data Science in Cyberspace,
                  {DSC} 2020, Hong Kong, July 27-30, 2020},
  pages        = {61--66},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/DSC50466.2020.00017},
  doi          = {10.1109/DSC50466.2020.00017},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dsc/QiJ0L20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/ZhongZLJJQH19,
  author       = {Haocheng Zhong and
                  Chenxi Zeng and
                  Aiping Li and
                  Yan Jia and
                  Rong Jiang and
                  Yulu Qi and
                  Weihong Han},
  title        = {Research of Trojan Attack Effect Evaluation Based on {FAHP}},
  booktitle    = {Fourth {IEEE} International Conference on Data Science in Cyberspace,
                  {DSC} 2019, Hangzhou, China, June 23-25, 2019},
  pages        = {31--37},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/DSC.2019.00014},
  doi          = {10.1109/DSC.2019.00014},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dsc/ZhongZLJJQH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/QiZJJLHH19,
  author       = {Yulu Qi and
                  Jincheng Zhong and
                  Rong Jiang and
                  Yan Jia and
                  Aiping Li and
                  Li Huang and
                  Weihong Han},
  title        = {FSM-Based Cyber Security Status Analysis Method},
  booktitle    = {Fourth {IEEE} International Conference on Data Science in Cyberspace,
                  {DSC} 2019, Hangzhou, China, June 23-25, 2019},
  pages        = {510--515},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/DSC.2019.00083},
  doi          = {10.1109/DSC.2019.00083},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dsc/QiZJJLHH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/QiJ0L18,
  author       = {Yulu Qi and
                  Rong Jiang and
                  Yan Jia and
                  Aiping Li},
  title        = {Analysis on the Related Evaluation Technique of Composite Attack in
                  Network Confrontation},
  booktitle    = {Third {IEEE} International Conference on Data Science in Cyberspace,
                  {DSC} 2018, Guangzhou, China, June 18-21, 2018},
  pages        = {956--962},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/DSC.2018.00152},
  doi          = {10.1109/DSC.2018.00152},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsc/QiJ0L18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kais/ChaiklaQ99,
  author       = {Nidapan Chaikla and
                  Yulu Qi},
  title        = {Feature Selection Using the Domain Relationship with Genetic Algorithms},
  journal      = {Knowl. Inf. Syst.},
  volume       = {1},
  number       = {3},
  pages        = {257--268},
  year         = {1999},
  url          = {https://doi.org/10.1007/BF03325105},
  doi          = {10.1007/BF03325105},
  timestamp    = {Sat, 10 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kais/ChaiklaQ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdpta/QiB99,
  author       = {Yulu Qi and
                  Jesbin Baidya},
  editor       = {Hamid R. Arabnia},
  title        = {Layered Communications in Load-Balancing Models},
  booktitle    = {Proceedings of the International Conference on Parallel and Distributed
                  Processing Techniques and Applications, {PDPTA} 1999, June 28 - Junlly
                  1, 1999, Las Vegas, Nevada, {USA}},
  pages        = {2494--2500},
  publisher    = {{CSREA} Press},
  year         = {1999},
  timestamp    = {Tue, 20 Apr 2004 14:47:51 +0200},
  biburl       = {https://dblp.org/rec/conf/pdpta/QiB99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdpta/QiB99a,
  author       = {Yulu Qi and
                  Jesbin Baidya},
  editor       = {Hamid R. Arabnia},
  title        = {Layered Communications in Load-Balancing Models},
  booktitle    = {Proceedings of the International Conference on Parallel and Distributed
                  Processing Techniques and Applications, {PDPTA} 1999, June 28 - Junlly
                  1, 1999, Las Vegas, Nevada, {USA}},
  pages        = {2615--2621},
  publisher    = {{CSREA} Press},
  year         = {1999},
  timestamp    = {Tue, 20 Apr 2004 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pdpta/QiB99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics