Qigui, Yao
38  results:
Search for persons X
?
1

A fast and accurate method for identifying the equipment fi..:

, In: 2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech),
Qigui, Yao ; Xiaojian, Zhang ; Qi, Wang - p. 1-6 , 2022
 
?
2

A Bidirectional Remote Attestation Method for Electricity 5..:

, In: 2022 7th International Conference on Signal and Image Processing (ICSIP),
Xiaojian, Zhang ; Qi, Wang ; Xin, Lu.. - p. 713-718 , 2022
 
?
3

Design and development of smart terminal self-sensing modul:

, In: 2022 IEEE 5th International Electrical and Energy Conference (CIEEC),
Qigui, Yao ; Xiangqun, Wang ; Xiaojian, Zhang... - p. 70-75 , 2022
 
?
4

Control Technology of Kernel Resource Isolation for Power I..:

, In: 2021 IEEE 4th International Conference on Renewable Energy and Power Engineering (REPE),
Jiaxuan, Fei ; Xiangqun, Wang ; Qigui, Yao.. - p. 127-131 , 2021
 
?
5

An instruction level attack detection method for new power ..:

Yao, Qigui ; Zhang, Xiaojian ; Fei, Jiaxuan..
Journal of Physics: Conference Series.  2781 (2024)  1 - p. 012031 , 2024
 
?
6

NFA Regular Expression Matching based Electriuec Power Sens..:

, In: Proceedings of the 2023 International Conference on Communication Network and Machine Learning,
Yao, Qigui ; Zhang, Xiaojian ; Fei, Jiaxuan.. - p. 303-307 , 2023
 
?
7

Construction of knowledge graph for security threat tracing..:

, In: 2022 9th International Forum on Electrical Engineering and Automation (IFEEA),
Yao, Qigui ; Wang, Qi ; Fei, Jiaxuan - p. 610-613 , 2022
 
?
8

A Method of Firmware Vulnerability Mining and Verification ..:

, In: Advances in Artificial Intelligence and Security; Communications in Computer and Information Science,
Xiao, Na ; Zeng, Jing ; Yao, Qigui. - p. 543-556 , 2022
 
?
9

A Binary Code Vulnerability Mining Method Based on Generati..:

, In: Lecture Notes in Computer Science; Artificial Intelligence and Security,
Lai, Ji ; Li, Shuo ; Yao, Qigui - p. 639-650 , 2022
 
?
10

Risk Assessment of Power Monitoring System Based on Fuzzy A..:

Li, Huifeng ; Li, Tiecheng ; Yao, Qigui...
Journal of Physics: Conference Series.  2137 (2021)  1 - p. 012023 , 2021
 
?
11

An efficient vulnerability scanning scheme of smart power g..:

Wang, Qi ; Zhang, Xiaojian ; Yao, Qigui
IOP Conference Series: Earth and Environmental Science.  645 (2021)  1 - p. 012087 , 2021
 
?
12

Research on the Security Defense Architecture of the Closed..:

, In: 2021 IEEE Sustainable Power and Energy Conference (iSPEC),
Fei, Jiaxuan ; Zhou, Jieying ; Yao, Qigui.. - p. 4272-4277 , 2021
 
?
13

Security Vulnerability Assessment of Power IoT based on Bus..:

, In: Proceedings of the 2020 1st International Conference on Control, Robotics and Intelligent System,
Fei, Jiaxuan ; Chen, Kai ; Yao, Qigui.. - p. 128-135 , 2020
 
?
14

Trusted Identity Cross-Domain Dynamic Authorization Mechani..:

, In: Advances in Intelligent Systems and Computing; The 10th International Conference on Computer Engineering and Networks,
Huang, Xiuli ; Guo, Qian ; Yao, Qigui. - p. 876-882 , 2020
 
1-15