付玉龙
个人信息:Personal Information
副教授 博士生导师 研究生导师
主要任职:教学科研
性别:男
学历:博士研究生毕业
学位:工学博士学位
在职信息:在岗
所在单位:网络与信息安全学院
入职时间:2014-12-08
学科:网络空间安全
办公地点:西安电子科技大学南校区 网络大楼 B0306
联系方式:ylfu@xidian.edu.cn
电子邮箱:
扫描关注
- [1]高淑娟.5G-NSSSP: A Simulation Platform for Enhanced 5G Network Slice Security Mechanism.NSE 2023
- [2]彭凯峰.PAVR: A Pre-training Approach with Attention Enhancement for Vulnerability Repair.NSE 2023
- [3]王嘉卉.Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft Biometrics.LNCS,volume 14341
- [4]张成磊.6G网络安全场景分析及安全模型研究.网络与信息安全学报,2021 (7(1)):28-45
- [5]刘梦如.基于区块链的天地一体化信息网络非交互式密钥交换方法.天地一体化信息网络,2(03) (2021):48-56
- [6]付玉龙.An Adaptive Security Data Collection and Composition Recognition Method for Security Measurement over LTE/LTE-A Networks.Journal of Network and Computer Applications.2020,2020 (155)
- [7]付玉龙.A secure SDN based multi-RANs architecture for future 5g networks.Computers & Security.2017,2017 (70):648-662
- [8]付玉龙.An Automata Based Intrusion Detection Method for Internet of Things.Mobile Information Systems.2017,2017 (1750637):1-13
- [9]付玉龙.A Study and Enhancement to the Security of MANET AODV Protocol Against Blackhole Attacks.ATC2019.2019
- [10]付玉龙.Lattices and block codes.UNIVERSITY POLITEHNICA OF BUCHAREST SCIENTIFIC BULLETIN-SERIES A-APPLIED MATHEMATICS AND PHYSICS.2017 (79):11-18
- [11]付玉龙.A Security Formal Model for Multiple Channels Communication.ATC2019
- [12]李国权.Quantifiable Network Security Measurement: a Study based on an Index System.ML4CS
- [13]李国权.Data Fusion for Network Intrusion Detection: A Review.Security and Communication Networks (2018)
- [14]李国权.A Study and Simulation Research of Blackhole Attack on Mobile AdHoc Network.CNS 2018
- [15]辛小龙.Monadic pseudo BCI-algebras and corresponding logics.Soft Computing,23 (5):1499-1510
- [16]周栋浩.A survey on network data collection,2018 (116):9-23
- [17]蔺华庆.Adaptive security-related data collection with context awareness.Journal Network and Computer Applications,126 :88-103
- [18]李国权.Data Fusion for Network Intrusion Detection.Security and Communication Networks.2018 (2018)
- [19]曹进.EGHR: Efficient group-based handover authentication protocols for mMTC in 5G wireless networks.J. Network and Computer Applications,2018 (102):1-16
- [20]付玉龙.Validation of security protocol implementations from security objectives.Computers & Security.2013,36 (1):27-39