学术论文
2018年:
- Guoquan Li, Zheng Yan, Yulong Fu*, Hanlu Chen, "Data Fusion for Network Intrusion Detection," Security and Communication Networks, accepted
- Guoquan Li, Zheng Yan, Yulong Fu*, "A Study and Simulation Research of Blackhole Attack on Mobile AdHoc Network," IEEE CNS 2018 - 1st International Workshop on System Security and Vulnerability (SSV), accepted
- Xiaolong Xin, Yulong Fu, Yanyan Lai, Juntao Wang, "Monadic pseudo BCI-algebras and corresponding logics," Soft Computing, 12 April 2018
2017年:
- Yulong Fu, Zheng Yan, Hui Li, Xiaolong Xin, Jin Cao, "A secure SDN based multi-RANs architecture for future 5g networks," Computer & Security, Vol. 70, Pages 648-662, WOS:000413127000038, SCI (CCF B)
- Jin Cao,Maode Ma, Hui Li, Yulong Fu, Ben Niu, Fenghua Li, Trajectory Prediction-based Handover Authentication Mechanism for Mobile Relays in LTE-A High-Speed Rail Networks, Proceedings of IEEE ICC 2017, Paris, France, 2017, (CCF C)
- Hanlu Chen, Yulong Fu and Zheng Yan, "Survey on Big Data Analysis Algorithms for Network Security Measurement," NSS 2017:: 128-142
- Yulong Fu, Zheng Yan, Jin Cao, Ousmane Koné, Xuefei Cao, "An Automata Based Intrusion Detection Method for Internet of Things," Mobile Information Systems, 2017: 1750637:1-1750637:13 (2017), WOS:000400514200001, SCI
- Xiao Long Xin, Yi Jun Li, Yu Long Fu, “States on pseudo-BCI algebras”, EUROPEAN JOURNAL OF PURE AND APPLIED MATHEMATICS, 2017
- Yulong Fu and Xiao long Xin, “Lattices and block codes,” University Politehnica of Bucharest Scientific Bulletin-Series A-Applied Mathematics and Physics, Vol. 79, Iss.3, 2017, page 11-18, SCI
2016年及以前:
- Xiaolong Xin, Pengfei He, Yulong Fu, "States on hyper MV-algebras," Journal of Intelligent and Fuzzy Systems 31(3): 1299-1309 (2016), SCI
- Xuefei Cao, Bo Chen, Hui Li, Yulong Fu, "Packet Header Anomaly Detection Using Bayesian Topic Models. IACR Cryptology," ePrint Archive 2016: 40 (2016)
- 李 晖,付玉龙(*), 5G 网络安全问题分析与展望[J],无线电通信技术,2015, 41(4):01-07
- Yulong Fu(*),Ousmane Kone,"Model based security verification of protocol implementation," Journal of Information Security and Applications, 2015, 22: 17-27。EI
- Yulong Fu(*),Ousmane Koné,"Security and Robustness by Protocol Testing," IEEE System Journal,2014,8(3):699-707, SCI
- Yulong Fu(*),Ousmane Koné, "Validation of security protocol implementations from security objectives," Computer & Security,2013,36(1):27-39, 1,SCI
- Yulong Fu(*), Xiaolong Xin, A Model based Security Testing Method for Protocol Implementation, "The Scientific World Journal," 2014, 2014 (632154), SCI
- Xiaolong Xin, Yulong Fu, Some results of convex fuzzy sublattices, "Journal of Intelligent and Fuzzy Systems, " 2014, 27(1):287-298. SCI
- Yulong Fu(*), Ousmane Koné, Using transition systems to model and verify the implementation of security protocol, "The 6th International Conference on Security of Information and Networks," Aksaray,2013.11.26-2013.11.28. EI
- Yulong Fu(*),Ousmane Koné,A finite transition model for security protocol verification,The 6th International Conference on Security of Information and Networks,Aksaray,2013.11.26-2013.11.28. EI
- Yulong Fu(*),Ousmane Kone,Network Securing Against Threatening Requests,Data Privacy Management and Autonomous Spontaneus Security - 6th International Workshop,Leuven,2011.9.15-2011.9.16. EI
- Yulong Fu(*),Ousmane Kone,A Robustness Testing for Network Security,7th International and 4th e-Democracy, Joint Conferences, ICGS3/e-Democracy 2011,Thessaloniki,2011.8.24-2011.8.26. EI 会议
发明专利
- Zheng Yan, Huaqing Lin, Yulong Fu, Adaptive Security-Related Data Collection and Composition, Patent Application No. PCT/CN2017/084921, Filed Date 18-May-2017.
- 付玉龙,闫峥,李晖,一种基于有限自动机的物联网入侵检测方法及检测系统,申请号201710158735.0,申请日期:2017年03月17日.
- 付玉龙,李晖,陈寒露,闫峥,基于SDN-5G网络架构的SDN组件间安全保护方法,申请号201710566565.X,申请日期:2017年07月12日.
- 付玉龙,李国权,闫峥,李晖,一种基于SDN的多信道传输的5G网络架构, 申请号201710593817.8,申请日期:2017年07月20日.
- 陈寒露,闫峥,付玉龙,基于串并行结构网络安全数据处理方法及系统、社交网络, 申请号201710740993.X, 申请日期:2017年08月25日
- 曹进,龚宇翔,魏澎琛,李晖,付玉龙,孙韵清,一种基于移动中继的群到路径移动切换认证方法,申请号:201710189800.6