Chonghua Wang
YOU?
Author Swipe
View article: Detecting Out-of-Distribution Samples in Complex IoT Traffic Based on Distance Loss
Detecting Out-of-Distribution Samples in Complex IoT Traffic Based on Distance Loss Open
Out-of-distribution (OOD) detection is critical for securing Internet of Things (IoT) systems, particularly in applications such as intrusion detection and device identification. However, conventional classification-based approaches strugg…
View article: Ada-LEval: Evaluating long-context LLMs with length-adaptable benchmarks
Ada-LEval: Evaluating long-context LLMs with length-adaptable benchmarks Open
Recently, the large language model (LLM) community has shown increasing interest in enhancing LLMs' capability to handle extremely long documents. As various long-text techniques and model architectures emerge, the precise and detailed eva…
View article: BotChat: Evaluating LLMs' Capabilities of Having Multi-Turn Dialogues
BotChat: Evaluating LLMs' Capabilities of Having Multi-Turn Dialogues Open
Interacting with human via high-quality multi-turn dialogues is a key feature of large language models (LLMs). However, human-based evaluation of such capability involves intensive manual labor. This report provides a preliminary evaluatio…
View article: An Anomaly Detection Approach Based on Integrated LSTM for IoT Big Data
An Anomaly Detection Approach Based on Integrated LSTM for IoT Big Data Open
Due to the expanding scope of Industry 4.0, the Internet of Things has become an important element of the information age. Cyber security relies heavily on intrusion detection systems for Internet of Things (IoT) devices. In the face of co…
View article: Network Traffic Classification Based on SD Sampling and Hierarchical Ensemble Learning
Network Traffic Classification Based on SD Sampling and Hierarchical Ensemble Learning Open
With the increase in cyber threats in recent years, there have been more forms of demand for network security protection measures. Network traffic classification technology is used to adapt to the dynamic threat environment. However, netwo…
View article: A Survey on Programmable Logic Controller Vulnerabilities, Attacks, Detections, and Forensics
A Survey on Programmable Logic Controller Vulnerabilities, Attacks, Detections, and Forensics Open
Programmable Logic Controllers (PLCs), as specialized task-oriented embedded field devices, play a vital role in current industrial control systems (ICSs), which are composed of critical infrastructure. In order to meet increasing demands …
View article: Intrusion Detection System Based on One-Class Support Vector Machine and Gaussian Mixture Model
Intrusion Detection System Based on One-Class Support Vector Machine and Gaussian Mixture Model Open
Intrusion detection systems (IDSs) play a significant role in the field of network security, dealing with the ever-increasing number of network threats. Machine learning-based IDSs have attracted a lot of interest owing to their powerful d…
View article: IoV-SDCM: An IoV Secure Data Communication Model Based on Network Encoding and Relay Collaboration
IoV-SDCM: An IoV Secure Data Communication Model Based on Network Encoding and Relay Collaboration Open
Internet of Vehicles (IoV) is a significant 5G application scenario. As it developed rapidly, more and more vehicles are connected to Internet of Vehicles. The data security and privacy are the premises to ensure its service quality in an …
View article: An IoT Crossdomain Access Decision‐Making Method Based on Federated Learning
An IoT Crossdomain Access Decision‐Making Method Based on Federated Learning Open
Crossdomain collaboration allows smart devices work together in different Internet of Things (IoT) domains. Trusted third party‐based solutions require to fully understand the access information of the collaboration participants to impleme…
View article: Paths for Improving Public Service Capability Regarding Industrial Internet Security
Paths for Improving Public Service Capability Regarding Industrial Internet Security Open
Industrial Internet security public service ensures the healthy development of the industrial Internet, as it is an important approach for outputting the industrial Internet security capability. In this article, we elaborate on the importa…
View article: A Material Identification Approach Based on Wi-Fi Signal
A Material Identification Approach Based on Wi-Fi Signal Open
Material identification is a technology that can help to identify the type of target material. Existing approaches depend on expensive instruments, complicated pre-treatments and professional users. It is difficult to find a ... | Find, re…
View article: A Lightweight Privacy-Preserving Communication Protocol for Heterogeneous IoT Environment
A Lightweight Privacy-Preserving Communication Protocol for Heterogeneous IoT Environment Open
While Internet-of-Things (IoT) significantly facilitates the convenience of people's daily life, the lack of security practice raises the risk of privacy-sensitive user data leakage. Securing data transmission among IoT devices is therefor…
View article: HProve: A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware
HProve: A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware Open
Provenance of system subjects (e.g., processes) and objects (e.g., files) are very useful for many forensics tasks. In our analysis and comparison of existing Linux provenance tracing systems, we found that most systems assume the Linux ker…
View article: A Centralized Monitoring Mechanism in Virtualized Environments
A Centralized Monitoring Mechanism in Virtualized Environments Open
Virtualization technology seals the compute and storage resources in the virtual machine to improve resource efficiency, which becomes the core support of cloud computing platform. Meanwhile, monitoring of virtual machines is also increasi…
View article: RTPMF: Leveraging User and Message Embeddings for Retweeting Behavior Prediction
RTPMF: Leveraging User and Message Embeddings for Retweeting Behavior Prediction Open
Understanding retweeting mechanism and predicting retweeting behavior is an important and valuable task in user behavior analysis. In this paper, aiming at providing a general method for improving retweeting behavior prediction performance…