Follow
Tian Zhihong(田志宏)
Tian Zhihong(田志宏)
Professor; Guangzhou University
Verified email at gzhu.edu.cn
Title
Cited by
Cited by
Year
Block-DEF: A secure digital evidence framework using blockchain
Z Tian, M Li, M Qiu, Y Sun, S Su
Information Sciences 491, 151-165, 2019
2052019
A distributed deep learning system for web attack detection on edge devices
Z Tian, C Luo, J Qiu, X Du, M Guizani
IEEE Transactions on Industrial Informatics 16 (3), 1963-1971, 2019
1872019
Deep learning based multi-channel intelligent attack detection for data security
F Jiang, Y Fu, BB Gupta, Y Liang, S Rho, F Lou, F Meng, Z Tian
IEEE transactions on Sustainable Computing 5 (2), 204-212, 2018
1842018
A survey on access control in the age of internet of things
J Qiu, Z Tian, C Du, Q Zuo, S Su, B Fang
IEEE Internet of Things Journal 7 (6), 4682-4696, 2020
1722020
CorrAUC: a malicious bot-IoT traffic detection method in IoT network using machine-learning techniques
M Shafiq, Z Tian, AK Bashir, X Du, M Guizani
IEEE Internet of Things Journal 8 (5), 3242-3254, 2020
1692020
Real-time lateral movement detection based on evidence reasoning network for edge computing environment
Z Tian, W Shi, Y Wang, C Zhu, X Du, S Su, Y Sun, N Guizani
IEEE Transactions on Industrial Informatics 15 (7), 4285-4294, 2019
1632019
Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city
M Shafiq, Z Tian, Y Sun, X Du, M Guizani
Future Generation Computer Systems 107, 433-442, 2020
1572020
Evaluating reputation management schemes of internet of vehicles based on evolutionary game theory
Z Tian, X Gao, S Su, J Qiu, X Du, M Guizani
IEEE Transactions on Vehicular Technology 68 (6), 5971-5980, 2019
1302019
A data-driven method for future Internet route decision modeling
Z Tian, S Su, W Shi, X Du, M Guizani, X Yu
Future Generation Computer Systems 95, 212-220, 2019
1292019
Toward a comprehensive insight into the eclipse attacks of tor hidden services
Q Tan, Y Gao, J Shi, X Wang, B Fang, Z Tian
IEEE Internet of Things Journal 6 (2), 1584-1593, 2018
1202018
基于攻防博弈模型的网络安全测评和最优主动防御
姜伟, 方滨兴, 田志宏, 张宏莉
计算机学报 32 (4), 817-827, 2009
1152009
Building lightweight intrusion detection system using wrapper-based feature selection mechanisms
Y Li, JL Wang, ZH Tian, TB Lu, C Young
Computers & Security 28 (6), 466-475, 2009
1102009
Nei-TTE: intelligent traffic time estimation based on fine-grained time derivation of road segments for smart city
J Qiu, L Du, D Zhang, S Su, Z Tian
IEEE Transactions on Industrial Informatics 16 (4), 2659-2666, 2019
1012019
Vcash: a novel reputation framework for identifying denial of traffic service in internet of connected vehicles
Z Tian, X Gao, S Su, J Qiu
IEEE Internet of Things Journal 7 (5), 3901-3909, 2019
932019
IoT malicious traffic identification using wrapper-based feature selection mechanisms
M Shafiq, Z Tian, AK Bashir, X Du, M Guizani
Computers & Security 94, 101863, 2020
922020
Deep reinforcement learning for partially observable data poisoning attack in crowdsensing systems
M Li, Y Sun, H Lu, S Maharjan, Z Tian
IEEE Internet of Things Journal 7 (7), 6266-6278, 2019
912019
Data mining and machine learning methods for sustainable smart cities traffic classification: A survey
M Shafiq, Z Tian, AK Bashir, A Jolfaei, X Yu
Sustainable Cities and Society 60, 102177, 2020
902020
Trust architecture and reputation evaluation for internet of things
J Chen, Z Tian, X Cui, L Yin, X Wang
Journal of Ambient Intelligence and Humanized Computing 10 (8), 3099-3107, 2019
902019
A real-time correlation of host-level events in cyber range service for smart campus
Z Tian, Y Cui, L An, S Su, X Yin, L Yin, X Cui
IEEE Access 6, 35355-35364, 2018
902018
Medical image semantic segmentation based on deep learning
F Jiang, A Grigorev, S Rho, Z Tian, YS Fu, W Jifara, K Adil, S Liu
Neural Computing and Applications 29 (5), 1257-1265, 2018
842018
The system can't perform the operation now. Try again later.
Articles 1–20