ping yi
ping yi
Associate Professor of computer science, Shanghai Jiao Tong University
Потвърден имейл адрес: sjtu.edu.cn
A new intrusion detection system based on KNN classification algorithm in wireless sensor network
W Li, P Yi, Y Wu, L Pan, J Li
Journal of Electrical and Computer Engineering 2014 (1), 240217, 2014
Security framework for wireless communications in smart distribution grid
X Wang, P Yi
IEEE Transactions on Smart Grid 2 (4), 809-818, 2011
Resisting flooding attacks in ad hoc networks
P Yi, Z Dai, Y Zhong, S Zhang
International Conference on Information Technology: Coding and Computing …, 2005
A new routing attack in mobile ad hoc networks
P Yi, Z Dai, S Zhang, Y Zhong
International Journal of Information Technology 11 (2), 83-94, 2005
An adaptive approach to detecting black and gray hole attacks in ad hoc network
J Cai, P Yi, J Chen, Z Wang, N Liu
2010 24th IEEE international conference on advanced information networking …, 2010
Web phishing detection using a deep learning framework
P Yi, Y Guan, F Zou, Y Yao, W Wang, T Zhu
Wireless Communications and Mobile Computing 2018 (1), 4678746, 2018
Deploying energy routers in an energy internet based on electric vehicles
P Yi, T Zhu, B Jiang, R Jin, B Wang
IEEE Transactions on Vehicular Technology 65 (6), 4714-4725, 2016
Distributed intrusion detection for mobile ad hoc networks
Y Ping, J Xinghao, W Yue, L Ning
Journal of systems engineering and electronics 19 (4), 851-859, 2008
A denial of service attack in advanced metering infrastructure network
P Yi, T Zhu, Q Zhang, Y Wu, J Li
2014 IEEE International Conference on Communications (ICC), 1029-1034, 2014
A secure energy routing mechanism for sharing renewable energy in smart microgrid
T Zhu, S Xiao, Y Ping, D Towsley, W Gong
2011 IEEE international conference on smart grid communications …, 2011
Survey of security for mobile ad hoc networks.
P Yi, YC Jiang, SY Zhang, YP Zhong
Dianzi Xuebao(Acta Electronica Sinica) 33 (5), 893-899, 2005
DEOS: Dynamic energy-oriented scheduling for sustainable wireless sensor networks
T Zhu, A Mohaisen, Y Ping, D Towsley
2012 Proceedings IEEE INFOCOM, 2363-2371, 2012
Security and trust management in opportunistic networks: a survey
Y Wu, Y Zhao, M Riguidel, G Wang, P Yi
Security and Communication Networks 8 (9), 1812-1827, 2015
A survey on security in wireless mesh networks
P Yi, Y Wu, F Zou, N Liu
IETE Technical Review 27 (1), 6-14, 2010
Flooding attack and defence in ad hoc networks
P Yi, Y fei Hou, Y Zhong, S Zhang, Z Dai
Journal of Systems Engineering and Electronics 17 (2), 410-416, 2006
Puppet attack: A denial of service attack in advanced metering infrastructure network
P Yi, T Zhu, Q Zhang, Y Wu, L Pan
Journal of Network and Computer Applications 59, 325-332, 2016
An energy transmission and distribution network using electric vehicles
P Yi, T Zhu, B Jiang, B Wang, D Towsley
2012 IEEE International Conference on Communications (ICC), 3335-3339, 2012
GENPass: A general deep learning model for password guessing with PCFG rules and adversarial generation
Y Liu, Z Xia, P Yi, Y Yao, T Xie, W Wang, T Zhu
2018 IEEE International Conference on Communications (ICC), 1-6, 2018
Emergent technologies in big data sensing: a survey
T Zhu, S Xiao, Q Zhang, Y Gu, P Yi, Y Li
International Journal of Distributed Sensor Networks 11 (10), 902982, 2015
Routing renewable energy using electric vehicles in mobile electrical grid
P Yi, T Zhu, G Lin, Q Zhang
2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems …, 2013
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–20