学术信息网 西电导航 关于 使用说明 搜索 系统首页 登录 控制面板 收藏 付玉龙的留言板
学术论文

2018年:

  1. Guoquan Li, Zheng Yan, Yulong Fu*, Hanlu Chen, "Data Fusion for Network Intrusion Detection," Security and Communication Networks, accepted
  2. Guoquan Li, Zheng Yan, Yulong Fu*, "A Study and Simulation Research of Blackhole Attack on Mobile AdHoc Network," IEEE CNS 2018 - 1st International Workshop on System Security and Vulnerability (SSV), accepted
  3. Xiaolong Xin, Yulong Fu, Yanyan Lai, Juntao Wang, "Monadic pseudo BCI-algebras and corresponding logics," Soft Computing, 12 April 2018

2017年:

  1. Yulong Fu, Zheng Yan, Hui Li, Xiaolong Xin, Jin Cao, "A secure SDN based multi-RANs architecture for future 5g networks," Computer & Security, Vol. 70, Pages 648-662, WOS:000413127000038SCI (CCF B) 
  2. Jin Cao,Maode Ma, Hui Li, Yulong Fu, Ben Niu, Fenghua Li, Trajectory Prediction-based Handover Authentication Mechanism for Mobile Relays in LTE-A High-Speed Rail Networks, Proceedings of IEEE ICC 2017, Paris, France, 2017, (CCF C)
  3. Hanlu Chen, Yulong Fu and Zheng Yan, "Survey on Big Data Analysis Algorithms for Network Security Measurement," NSS 2017:: 128-142
  4. Yulong Fu, Zheng Yan, Jin Cao, Ousmane Koné, Xuefei Cao, "An Automata Based Intrusion Detection Method for Internet of Things," Mobile Information Systems, 2017: 1750637:1-1750637:13 (2017), WOS:000400514200001SCI
  5. Xiao Long Xin, Yi Jun Li, Yu Long Fu, “States on pseudo-BCI algebras”, EUROPEAN JOURNAL OF PURE AND APPLIED MATHEMATICS, 2017
  6. Yulong Fu and Xiao long Xin, “Lattices and block codes,” University Politehnica of Bucharest Scientific Bulletin-Series A-Applied Mathematics and Physics, Vol. 79, Iss.3, 2017, page 11-18, SCI

2016年及以前:

  1. Xiaolong Xin, Pengfei He, Yulong Fu, "States on hyper MV-algebras," Journal of Intelligent and Fuzzy Systems 31(3): 1299-1309 (2016), SCI
  2. Xuefei Cao, Bo Chen, Hui Li, Yulong Fu, "Packet Header Anomaly Detection Using Bayesian Topic Models. IACR Cryptology," ePrint Archive 2016: 40 (2016)
  3. 李 晖,付玉龙(*), 5G 网络安全问题分析与展望[J],无线电通信技术,2015, 41(4):01-07
  4. Yulong Fu(*),Ousmane Kone,"Model based security verification of protocol implementation," Journal of Information Security and Applications, 2015, 22: 17-27。EI
  5. Yulong Fu(*),Ousmane Koné,"Security and Robustness by Protocol Testing," IEEE System Journal,2014,8(3):699-707, SCI
  6. Yulong Fu(*),Ousmane Koné, "Validation of security protocol implementations from security objectives," Computer & Security,2013,36(1):27-39, 1,SCI
  7. Yulong Fu(*), Xiaolong Xin, A Model based Security Testing Method for Protocol Implementation, "The Scientific World Journal," 2014, 2014 (632154), SCI
  8. Xiaolong Xin, Yulong Fu, Some results of convex fuzzy sublattices, "Journal of Intelligent and Fuzzy Systems, " 2014, 27(1):287-298. SCI
  9. Yulong Fu(*), Ousmane Koné, Using transition systems to model and verify the implementation of security protocol, "The 6th International Conference on Security of Information and Networks," Aksaray,2013.11.26-2013.11.28. EI 
  10. Yulong Fu(*),Ousmane Koné,A finite transition model for security protocol verification,The 6th International Conference on Security of Information and Networks,Aksaray,2013.11.26-2013.11.28. EI 
  11. Yulong Fu(*),Ousmane Kone,Network Securing Against Threatening Requests,Data Privacy Management and Autonomous Spontaneus Security - 6th International Workshop,Leuven,2011.9.15-2011.9.16. EI 
  12. Yulong Fu(*),Ousmane Kone,A Robustness Testing for Network Security,7th International and 4th e-Democracy, Joint Conferences, ICGS3/e-Democracy 2011,Thessaloniki,2011.8.24-2011.8.26. EI 会议
发明专利
  1. Zheng Yan, Huaqing Lin, Yulong Fu, Adaptive Security-Related Data Collection and Composition, Patent Application No. PCT/CN2017/084921, Filed Date 18-May-2017.
  2. 付玉龙,闫峥,李晖,一种基于有限自动机的物联网入侵检测方法及检测系统,申请号201710158735.0,申请日期:2017年03月17日.
  3. 付玉龙,李晖,陈寒露,闫峥,基于SDN-5G网络架构的SDN组件间安全保护方法,申请号201710566565.X,申请日期:2017年07月12日.
  4. 付玉龙,李国权,闫峥,李晖,一种基于SDN的多信道传输的5G网络架构, 申请号201710593817.8,申请日期:2017年07月20日.
  5. 陈寒露,闫峥,付玉龙,基于串并行结构网络安全数据处理方法及系统、社交网络, 申请号201710740993.X, 申请日期:2017年08月25日
  6. 曹进,龚宇翔,魏澎琛,李晖,付玉龙,孙韵清,一种基于移动中继的群到路径移动切换认证方法,申请号:201710189800.6