Wenbin Zhai's homepage
Wenbin Zhai's homepage
Home
News
Publications
Research
Honors and Awards
Collaborator
Resume
Light
Dark
Automatic
Cybersecurity
Federated Semi-Supervised and Semi-Asynchronous Learning for Anomaly Detection in IoT Networks
Existing FL-based approaches are based on the unrealistic assumption that the data on the client-side is fully annotated with ground …
Wenbin Zhai
,
Feng Wang
,
Liang Liu
,
Youwei Ding
,
Wanying Lu
PDF
Cite
Arxiv
Research on Routing Protocol for Multi-hop Unmanned Aerial Vehicle Ad-hoc Networks (in Chinese)
With the development of technologies such as sensors and wireless communications, Unmanned Aerial Vehicle (UAV) ad-hoc networks have …
Wenbin Zhai
PDF
Slides
ETD: An Efficient Time Delay Attack Detection Framework for UAV Networks
An Efficient Time Delay Attack Detection Framework to detect time delay attack in UAV networks, which is a less explored attack surface.
Wenbin Zhai
,
Liang Liu
,
Youwei Ding
,
Shanshan Sun
,
Ying Gu
PDF
Cite
DOI
Efficient time-delay attack detection based on node pruning and model fusion
IoT devices are vulnerable to various attacks because they are resource-limited. This paper introduces a novel type of attack called …
Wenjie Zhao
,
Yu Wang
,
Wenbin Zhai
,
Liang Liu
,
Yulei Liu
PDF
Cite
DOI
HOTD: A holistic cross-layer time-delay attack detection framework for unmanned aerial vehicle networks
Recently, unmanned aerial vehicle (UAV) networks have been widely used in military and civilian scenarios; however, they suffer various …
Wenbin Zhai
,
Shanshan Sun
,
Liang Liu
,
Youwei Ding
,
Wanying Lu
PDF
Cite
DOI
FedS3A
A federated semi-supervised and semi-asynchronous learning (FedS3A) for anomaly detection in IoT networks
PDF
ETD
An efficient time delay attack detection scheme (ETD) to detect time delay attack in UAV networks
PDF
Detection of packet dropping attack based on evidence fusion in IoT networks
Internet of Things (IoT) is widely used in environmental monitoring, smart healthcare, and other fields. Due to its distributed nature, …
Weichen Ding
,
Wenbin Zhai
,
Liang Liu
,
Ying Gu
,
Hang Gao
PDF
Cite
DOI
HOTD
A holistic cross-layer time delay attack detection framework (HOTD) to detect time delay attack in UAV networks
PDF
Design and Implementation of a Method for the Safe Storage of Chinese Medicine Data based on Homomorphic Encryption (in Chinese)
With the explosive growth of traditional Chinese medicine data and the widespread use of cloud computing, medical institutions have …
Wenbin Zhai
PDF
Slides
Cite
×