Follow
Beibei Li
Beibei Li
Professor (Doctoral Advisor), Sichuan University, China
Verified email at scu.edu.cn - Homepage
Title
Cited by
Cited by
Year
DeepFed: Federated Deep Learning for Intrusion Detection in Industrial Cyber-Physical Systems
B Li, Y Wu, J Song, R Lu, T Li, L Zhao
IEEE Transactions on Industrial Informatics 17 (8), 5615 - 5624, 2020
4702020
On Feasibility and Limitations of Detecting False Data Injection Attacks on Power Grid State Estimation Using D-FACTS Devices
B Li, G Xiao, R Lu, R Deng, H Bao
IEEE Transactions on Industrial Informatics 15 (2), 854 - 864, 2019
1732019
Distributed Host-Based Collaborative Detection for False Data Injection Attacks in Smart Grid Cyber-Physical System
B Li, R Lu, W Wang, KKR Choo
Journal of Parallel and Distributed Computing 103, 32-41, 2017
1562017
Adaptive Consensus for Heterogeneous Multi-agent Systems under Sensor and Actuator Attacks
M Meng, G Xiao, B Li
Automatica, 2020
1092020
DDOA: A Dirichlet-Based Detection Scheme for Opportunistic Attacks in Smart Grid Cyber-Physical System
B Li, R Lu, W Wang, KKR Choo
IEEE Transactions on Information Forensics and Security 11 (11), 2415-2425, 2016
952016
Privacy-Preserving Aggregation for Federated Learning-Based Navigation in Vehicular Fog
Q Kong, F Yin*, R Lu, B Li*, X Wang, S Cui, P Zhang
IEEE Transactions on Industrial Informatics, 2021
862021
BLITHE: Behavior Rule-Based Insider Threat Detection for Smart Grid
H Bao, R Lu, B Li, R Deng
IEEE Internet of Things Journal 3 (2), 190-205, 2015
612015
DeepDetectNet vs RLAttackNet: An Adversarial Method to Improve Deep Learning-based Static Malware Detection Model
Y Fang, Y Zeng, B Li, L Liu, L Zhang
Plos one 15 (4), e0231626, 2020
422020
JSContana: Malicious JavaScript Detection Using Adaptable Context Analysis and Key Feature Extraction
Y Huang, T Li, L Zhang, B Li, X Liu
Computers & Security, 102218, 2021
352021
Efficient Privacy-Preserving Data Merging and Skyline Computation over Multi-Source Encrypted Data
Y Zheng, R Lu, B Li, J Shao, H Yang, KKR Choo
Information Sciences 498, 91-105, 2019
352019
Detection of False Data Injection Attacks on Smart Grids: A Resilience-Enhanced Scheme
B Li, R Lu, G Xiao, T Li, KKR Choo
IEEE Transactions on Power Systems 37 (4), 2679 - 2692, 2021
332021
SP-SMOTE: A Novel Space Partitioning based Synthetic Minority Oversampling Technique
Y Li, Y Wang, T Li, B Li, X Lan
Knowledge-Based Systems 228, 107269, 2021
322021
Federated Anomaly Detection on System Logs for the Internet of Things: A Customizable and Communication-Efficient Approach
B Li, S Ma, R Deng, KKR Choo, J Yang
IEEE Transactions on Network and Service Management 19 (2), 1705-1716, 2022
262022
On Reliability Analysis of Smart Grids under Topology Attacks: A Stochastic Petri Net Approach
B Li, R Lu, KKR Choo, W Wang, S Luo
ACM Transactions On Cyber-Physical Systems 3 (1), 10, 2019
262019
Resource Provisioning for Mitigating Edge DDoS Attacks In MEC-Enabled SDVN
Y Deng, H Jiang, P Cai, T Wu, P Zhou, B Li, H Lu, J Wu, X Chen, K Wang
IEEE Internet of Things Journal 9 (23), 24264-24280, 2022
242022
FEEL: Federated End-to-End Learning with Non-IID data for Vehicular Ad Hoc Networks
B Li, Y Jiang, Q Pei, T Li, L Liu, R Lu
IEEE Transactions on Intelligent Transportation Systems 23 (9), 16728-16740, 2022
232022
A Deep‐Learning‐and Reinforcement‐Learning‐based System for Encrypted Network Malicious Traffic Detection
J Yang, G Liang, B Li, G Wen, T Gao
Electronics Letters 57 (9), 363-365, 2021
222021
State Estimation Based Energy Theft Detection Scheme with Privacy Preservation in Smart Grid
M Wen, D Yao, B Li, R Lu
IEEE ICC 2018 - International Conference on Communications, 2018
222018
Towards Insider Threats Detection in Smart Grid Communication Systems
B Li, R Lu, G Xiao, H Bao, AA Ghorbani
IET Communications, 2019
202019
$\bm {P}^{\bm {3}} $: Privacy-Preserving Prediction of Real-Time Energy Demands in EV Charging Networks
B Li, Y Guo, Q Du, Z Zhu, X Li, R Lu
IEEE Transactions on Industrial Informatics 19 (3), 3029-3038, 2022
192022
The system can't perform the operation now. Try again later.
Articles 1–20