Bailing Wang
YOU?
Author Swipe
View article: Exploring the mechanism of Inula japonica Thunb. against non-small cell lung cancer using a computer-aided drug design approach
Exploring the mechanism of Inula japonica Thunb. against non-small cell lung cancer using a computer-aided drug design approach Open
In China, Inula japonica Thunb. (IJT) is extensively used for the treatment of non-small cell lung cancer (NSCLC). However, further research is required to understand the pharmacological mechanisms of IJT owing to the complicated of the ch…
View article: Anomaly detection in industrial control systems: Leveraging adaptive multi-granularity anomaly correction for robust performance in noisy environments
Anomaly detection in industrial control systems: Leveraging adaptive multi-granularity anomaly correction for robust performance in noisy environments Open
Anomaly detection in industrial control systems (ICS) is critical for ensuring process reliability and protecting human life and property. Prediction-deviation-based models have attracted significant attention because they require minimal …
View article: Transfer Entropy-Based Causal Inference for Industrial Alarm Overload Mitigation
Transfer Entropy-Based Causal Inference for Industrial Alarm Overload Mitigation Open
In tightly coupled Industrial Control Systems (ICS), abnormal disturbances often propagate throughout the process, triggering a large number of time-correlated alarms that exceed the handling capacity of the operator. Consequently, a key c…
View article: XLNet-CRF: Efficient Named Entity Recognition for Cyber Threat Intelligence with Permutation Language Modeling
XLNet-CRF: Efficient Named Entity Recognition for Cyber Threat Intelligence with Permutation Language Modeling Open
As cyberattacks continue to rise in frequency and sophistication, extracting actionable Cyber Threat Intelligence (CTI) from diverse online sources has become critical for proactive threat detection and defense. However, accurately identif…
View article: Long-Short Chain-of-Thought Mixture Supervised Fine-Tuning Eliciting Efficient Reasoning in Large Language Models
Long-Short Chain-of-Thought Mixture Supervised Fine-Tuning Eliciting Efficient Reasoning in Large Language Models Open
Recent advances in large language models have demonstrated that Supervised Fine-Tuning (SFT) with Chain-of-Thought (CoT) reasoning data distilled from large reasoning models (e.g., DeepSeek R1) can effectively transfer reasoning capabiliti…
View article: Edge Exemplars Enhanced Incremental Learning Model for Tor-Obfuscated Traffic Identification
Edge Exemplars Enhanced Incremental Learning Model for Tor-Obfuscated Traffic Identification Open
Tor is the most widely used anonymous communication network. Tor has developed a series of pluggable transports (PTs) to obfuscate traffic and avoid censorship. These PTs use different traffic obfuscation techniques, and many of them have …
View article: Deep Sparse Latent Feature Models for Knowledge Graph Completion
Deep Sparse Latent Feature Models for Knowledge Graph Completion Open
Recent advances in knowledge graph completion (KGC) have emphasized text-based approaches to navigate the inherent complexities of large-scale knowledge graphs (KGs). While these methods have achieved notable progress, they frequently stru…
View article: Software-Defined Wide Area Networks (SD-WANs): A Survey
Software-Defined Wide Area Networks (SD-WANs): A Survey Open
SD-WANs are an innovative software-defined network (SDN) technology used to reinvent networks, services, and applications in wide area network (WANs). The development of SD-WANs ranges from network optimization in the past to service provi…
View article: Software-Defined Virtual Private Network for SD-WAN
Software-Defined Virtual Private Network for SD-WAN Open
Software-Defined Wide Area Networks (SD-WANs) are an emerging Software-Defined Network (SDN) technology to reinvent Wide Area Networks (WANs) for ubiquitous network interconnections in cloud computing, edge computing, and the Internet of E…
View article: A Generic High-Performance Architecture for VPN Gateways
A Generic High-Performance Architecture for VPN Gateways Open
Virtual private network (VPN) gateways are widely applied to provide secure end-to-end remote access and to relay reliable interconnected communication in cloud computing. As network convergence nodes, the performance of VPN gateways is li…
View article: LiPar: A Lightweight Parallel Learning Model for Practical In-Vehicle Network Intrusion Detection
LiPar: A Lightweight Parallel Learning Model for Practical In-Vehicle Network Intrusion Detection Open
With the development of intelligent transportation systems, vehicles are exposed to a complex network environment. As the main network of in-vehicle networks, the controller area network (CAN) has many potential security hazards, resulting…
View article: STATGRAPH: Effective In-vehicle Intrusion Detection via Multi-view Statistical Graph Learning
STATGRAPH: Effective In-vehicle Intrusion Detection via Multi-view Statistical Graph Learning Open
In-vehicle network (IVN) is facing complex external cyber-attacks, especially the emerging masquerade attacks with extremely high difficulty of detection while serious damaging effects. In this paper, we propose the STATGRAPH, which is an …
View article: KERMIT: Knowledge Graph Completion of Enhanced Relation Modeling with Inverse Transformation
KERMIT: Knowledge Graph Completion of Enhanced Relation Modeling with Inverse Transformation Open
Knowledge graph completion (KGC) revolves around populating missing triples in a knowledge graph using available information. Text-based methods, which depend on textual descriptions of triples, often encounter difficulties when these desc…
View article: Exploring the Mechanism of Inula japonica Thunb. against Non-small Cell Lung Cancer using a computer-aided drug design approach
Exploring the Mechanism of Inula japonica Thunb. against Non-small Cell Lung Cancer using a computer-aided drug design approach Open
Context: Inula japonica Thunb. (IJT) is widespread to treat non-small cell lung cancer (NSCLC) in China with antiasthma, antitussive, and expectorant effect. However, due to the complexity of compounds and targets, the pharmacological mech…
View article: Process-Oriented heterogeneous graph learning in GNN-Based ICS anomalous pattern recognition
Process-Oriented heterogeneous graph learning in GNN-Based ICS anomalous pattern recognition Open
Over the past few years, massive penetrations targeting an Industrial Control System (ICS) network intend to compromise its core industrial processes. So far, numerous advanced methods have been proposed to detect anomalous patterns in the…
View article: Robust Intrusion Detection for Industrial Control Systems Using Improved Autoencoder and Bayesian Gaussian Mixture Model
Robust Intrusion Detection for Industrial Control Systems Using Improved Autoencoder and Bayesian Gaussian Mixture Model Open
Machine learning-based intrusion detection systems are an effective way to cope with the increasing security threats faced by industrial control systems. Considering that it is hard and expensive to obtain attack data, it is more reasonabl…
View article: A Survey on Programmable Logic Controller Vulnerabilities, Attacks, Detections, and Forensics
A Survey on Programmable Logic Controller Vulnerabilities, Attacks, Detections, and Forensics Open
Programmable Logic Controllers (PLCs), as specialized task-oriented embedded field devices, play a vital role in current industrial control systems (ICSs), which are composed of critical infrastructure. In order to meet increasing demands …
View article: Hybrid Intrusion Detection System Based on Combination of Random Forest and Autoencoder
Hybrid Intrusion Detection System Based on Combination of Random Forest and Autoencoder Open
To cope with the rising threats posed by network attacks, machine learning-based intrusion detection systems (IDSs) have been intensively researched. However, there are several issues that need to be addressed. It is difficult to deal with…
View article: Intrusion Detection System Based on One-Class Support Vector Machine and Gaussian Mixture Model
Intrusion Detection System Based on One-Class Support Vector Machine and Gaussian Mixture Model Open
Intrusion detection systems (IDSs) play a significant role in the field of network security, dealing with the ever-increasing number of network threats. Machine learning-based IDSs have attracted a lot of interest owing to their powerful d…
View article: Critical Relation Path Aggregation-Based Industrial Control Component Exploitable Vulnerability Reasoning
Critical Relation Path Aggregation-Based Industrial Control Component Exploitable Vulnerability Reasoning Open
With the growing discovery of exposed vulnerabilities in the Industrial Control Components (ICCs), identification of the exploitable ones is urgent for Industrial Control System (ICS) administrators to proactively forecast potential threat…
View article: The Advance on Frontotemporal Dementia (FTD)’s Neuropathology and Molecular Genetics
The Advance on Frontotemporal Dementia (FTD)’s Neuropathology and Molecular Genetics Open
The morbidity of frontotemporal dementia (FTD), one of the most prevalent dementias praccox, is second to Alzheimer disease (AD). It is different with AD that FTD has a rapider course and a higher mortality. FTD has not yet been fully unde…
View article: Persistent Facial Flushing in a Patient with Telangiectasia Macularis Eruptiva Perstans: An Unusual but Should Emphasized Clinical Finding
Persistent Facial Flushing in a Patient with Telangiectasia Macularis Eruptiva Perstans: An Unusual but Should Emphasized Clinical Finding Open
Facial flushing is one of the common conditions in dermatology, which affects the aesthetic of patients to a great extent, and even leads to psychological and economic burdens. The most common causes of facial flushing are often inflammato…
View article: Dimension Reduction Technique Based on Supervised Autoencoder for Intrusion Detection of Industrial Control Systems
Dimension Reduction Technique Based on Supervised Autoencoder for Intrusion Detection of Industrial Control Systems Open
Industrial control systems (ICSs) are closely related to human life. In recent years, many ICSs have been connected to the Internet rather than being physically isolated, which has improved business efficiency while also increasing the ris…