Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Yulu Qi
@article{DBLP:journals/cee/QiGLZSML23, author = {Yulu Qi and Zhaoquan Gu and Aiping Li and Xiaojuan Zhang and Muhammad Shafiq and Yangyang Mei and Kaihan Lin}, title = {Cybersecurity knowledge graph enabled attack chain detection for cyber-physical systems}, journal = {Comput. Electr. Eng.}, volume = {108}, pages = {108660}, year = {2023}, url = {https://doi.org/10.1016/j.compeleceng.2023.108660}, doi = {10.1016/J.COMPELECENG.2023.108660}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/QiGLZSML23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/SunQYHL23, author = {Liqun Sun and Yulu Qi and Shuqiang Yang and Weihong Han and Xiaoxia Li}, title = {Analyzing Security Attacks Against Platoon of Intelligent and Connected Vehicles}, booktitle = {8th International Conference on Data Science in Cyberspace, {DSC} 2023, Hefei, China, August 18-20, 2023}, pages = {76--81}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSC59305.2023.00021}, doi = {10.1109/DSC59305.2023.00021}, timestamp = {Fri, 09 Feb 2024 20:38:47 +0100}, biburl = {https://dblp.org/rec/conf/dsc/SunQYHL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/besc/QiGMLL22, author = {Yulu Qi and Zhaoquan Gu and Yangyang Mei and Kaihan Lin and Aiping Li}, title = {A General Construction Method of Cyber Security Knowledge Graph}, booktitle = {9th International Conference on Behavioural and Social Computing, {BESC} 2022, Matsuyama, Japan, October 29-31, 2022}, pages = {1--7}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/BESC57393.2022.9995070}, doi = {10.1109/BESC57393.2022.9995070}, timestamp = {Mon, 09 Jan 2023 17:07:16 +0100}, biburl = {https://dblp.org/rec/conf/besc/QiGMLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/MeiHLWLQ22, author = {Yangyang Mei and Weihong Han and Shudong Li and Xiaobo Wu and Kaihan Lin and Yulu Qi}, title = {A Review of Attribution Technical for {APT} Attacks}, booktitle = {7th {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2022, Guilin, China, July 11-13, 2022}, pages = {512--518}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC55868.2022.00077}, doi = {10.1109/DSC55868.2022.00077}, timestamp = {Tue, 11 Oct 2022 16:48:00 +0200}, biburl = {https://dblp.org/rec/conf/dsc/MeiHLWLQ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/QiJLG021, author = {Yulu Qi and Rong Jiang and Aiping Li and Zhaoquan Gu and Yan Jia}, editor = {Yan Jia and Zhaoquan Gu and Aiping Li}, title = {A Distributed Framework for {APT} Attack Analysis}, booktitle = {{MDATA:} {A} New Knowledge Representation Model - Theory, Methods and Applications}, series = {Lecture Notes in Computer Science}, volume = {12647}, pages = {199--219}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-71590-8\_12}, doi = {10.1007/978-3-030-71590-8\_12}, timestamp = {Wed, 25 Jan 2023 17:51:20 +0100}, biburl = {https://dblp.org/rec/series/lncs/QiJLG021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/QiJ0L20, author = {Yulu Qi and Rong Jiang and Yan Jia and Aiping Li}, title = {An {APT} Attack Analysis Framework Based on Self-define Rules and Mapreduce}, booktitle = {5th {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2020, Hong Kong, July 27-30, 2020}, pages = {61--66}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/DSC50466.2020.00017}, doi = {10.1109/DSC50466.2020.00017}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dsc/QiJ0L20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/ZhongZLJJQH19, author = {Haocheng Zhong and Chenxi Zeng and Aiping Li and Yan Jia and Rong Jiang and Yulu Qi and Weihong Han}, title = {Research of Trojan Attack Effect Evaluation Based on {FAHP}}, booktitle = {Fourth {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2019, Hangzhou, China, June 23-25, 2019}, pages = {31--37}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC.2019.00014}, doi = {10.1109/DSC.2019.00014}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dsc/ZhongZLJJQH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/QiZJJLHH19, author = {Yulu Qi and Jincheng Zhong and Rong Jiang and Yan Jia and Aiping Li and Li Huang and Weihong Han}, title = {FSM-Based Cyber Security Status Analysis Method}, booktitle = {Fourth {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2019, Hangzhou, China, June 23-25, 2019}, pages = {510--515}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC.2019.00083}, doi = {10.1109/DSC.2019.00083}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dsc/QiZJJLHH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/QiJ0L18, author = {Yulu Qi and Rong Jiang and Yan Jia and Aiping Li}, title = {Analysis on the Related Evaluation Technique of Composite Attack in Network Confrontation}, booktitle = {Third {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2018, Guangzhou, China, June 18-21, 2018}, pages = {956--962}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DSC.2018.00152}, doi = {10.1109/DSC.2018.00152}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsc/QiJ0L18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kais/ChaiklaQ99, author = {Nidapan Chaikla and Yulu Qi}, title = {Feature Selection Using the Domain Relationship with Genetic Algorithms}, journal = {Knowl. Inf. Syst.}, volume = {1}, number = {3}, pages = {257--268}, year = {1999}, url = {https://doi.org/10.1007/BF03325105}, doi = {10.1007/BF03325105}, timestamp = {Sat, 10 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kais/ChaiklaQ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdpta/QiB99, author = {Yulu Qi and Jesbin Baidya}, editor = {Hamid R. Arabnia}, title = {Layered Communications in Load-Balancing Models}, booktitle = {Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, {PDPTA} 1999, June 28 - Junlly 1, 1999, Las Vegas, Nevada, {USA}}, pages = {2494--2500}, publisher = {{CSREA} Press}, year = {1999}, timestamp = {Tue, 20 Apr 2004 14:47:51 +0200}, biburl = {https://dblp.org/rec/conf/pdpta/QiB99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdpta/QiB99a, author = {Yulu Qi and Jesbin Baidya}, editor = {Hamid R. Arabnia}, title = {Layered Communications in Load-Balancing Models}, booktitle = {Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, {PDPTA} 1999, June 28 - Junlly 1, 1999, Las Vegas, Nevada, {USA}}, pages = {2615--2621}, publisher = {{CSREA} Press}, year = {1999}, timestamp = {Tue, 20 Apr 2004 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pdpta/QiB99a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.