Login / Signup
Hao Hu
ORCID
Publication Activity (10 Years)
Years Active: 2015-2023
Publications (10 Years): 20
Top Topics
Moving Target Defense
Evolutionary Game
Visual Cryptography
Attack Graph
Top Venues
Secur. Commun. Networks
IEEE Trans. Netw. Serv. Manag.
Multim. Tools Appl.
KSII Trans. Internet Inf. Syst.
</>
Publications
</>
Jinglei Tan
,
Hui Jin
,
Hao Hu
,
Ruiqin Hu
,
Hongqi Zhang
,
Hengwei Zhang
WF-MTD: Evolutionary Decision Method for Moving Target Defense Based on Wright-Fisher Process.
IEEE Trans. Dependable Secur. Comput.
20 (6) (2023)
Hengwei Zhang
,
Jinglei Tan
,
Xiaohu Liu
,
Shirui Huang
,
Hao Hu
,
Yuchen Zhang
Cybersecurity Threat Assessment Integrating Qualitative Differential and Evolutionary Games.
IEEE Trans. Netw. Serv. Manag.
19 (3) (2022)
Xiaoyu Xu
,
Hao Hu
,
Yuling Liu
,
Jinglei Tan
,
Hongqi Zhang
,
Haotian Song
Moving target defense of routing randomization with deep reinforcement learning against eavesdropping attack.
Digit. Commun. Networks
8 (3) (2022)
Xiaoyu Xu
,
Hao Hu
,
Yuling Liu
,
Hongqi Zhang
,
Dexian Chang
An Adaptive IP Hopping Approach for Moving Target Defense Using a Light-Weight CNN Detector.
Secur. Commun. Networks
2021 (2021)
Jinglei Tan
,
Hengwei Zhang
,
Hongqi Zhang
,
Hao Hu
,
Cheng Lei
,
Zhenxiang Qin
Optimal temporospatial strategy selection approach to moving target defense: A FlipIt differential game model.
Comput. Secur.
108 (2021)
Yan Mi
,
Hengwei Zhang
,
Hao Hu
,
Jinglei Tan
,
Jindong Wang
Optimal Network Defense Strategy Selection Method: A Stochastic Differential Game Model.
Secur. Commun. Networks
2021 (2021)
Hao Hu
,
Jing Liu
,
Yuchen Zhang
,
Yuling Liu
,
Xiaoyu Xu
,
Jinglei Tan
Attack scenario reconstruction approach using attack graph and alert data mining.
J. Inf. Secur. Appl.
54 (2020)
Jing-Lei Tan
,
Cheng Lei
,
Hongqi Zhang
,
Hao Hu
,
Hengwei Zhang
Network dynamic defense system based on holographic transformation.
Int. J. Distributed Sens. Networks
16 (5) (2020)
Yi Liu
,
Hongqi Zhang
,
Dexian Chang
,
Hao Hu
GDM: A General Distributed Method for Cross-Domain Service Function Chain Embedding.
IEEE Trans. Netw. Serv. Manag.
17 (3) (2020)
Hao Hu
,
Jing Liu
,
Jinglei Tan
,
Jiang Liu
SOCMTD: Selecting Optimal Countermeasure for Moving Target Defense Using Dynamic Game.
KSII Trans. Internet Inf. Syst.
14 (10) (2020)
Jinglei Tan
,
Hengwei Zhang
,
Hongqi Zhang
,
Cheng Lei
,
Hui Jin
,
Bo-wen Li
,
Hao Hu
Optimal Timing Selection Approach to Moving Target Defense: A FlipIt Attack-Defense Game Model.
Secur. Commun. Networks
2020 (2020)
Hao Hu
,
Yuling Liu
,
Chen Chen
,
Hongqi Zhang
,
Yi Liu
Optimal Decision Making Approach for Cyber Security Defense Using Evolutionary Game.
IEEE Trans. Netw. Serv. Manag.
17 (3) (2020)
Hao Hu
,
Gang Shen
,
Yuling Liu
,
Zhengxin Fu
,
Bin Yu
Improved schemes for visual secret sharing based on random grids.
Multim. Tools Appl.
78 (9) (2019)
Hao Hu
,
Yuling Liu
,
Hongqi Zhang
,
Yuchen Zhang
Security Metric Methods for Network Multistep Attacks Using AMC and Big Data Correlation Analysis.
Secur. Commun. Networks
2018 (2018)
Hao Hu
,
Hongqi Zhang
,
Yingjie Yang
Security risk situation quantification method based on threat prediction for multimedia communication network.
Multim. Tools Appl.
77 (16) (2018)
Qiang Leng
,
Yingjie Yang
,
Hao Hu
面向风险评估的专家权重自适应调整方法 (Self-adaption Adjustment Method for Experts in Risk Assessment).
计算机科学
45 (12) (2018)
Hao Hu
,
Gang Shen
,
Zhengxin Fu
,
Bin Yu
Improved Contrast for Threshold Random-grid-based Visual Cryptography.
KSII Trans. Internet Inf. Syst.
12 (7) (2018)
Hao Hu
,
Yuling Liu
,
Hongqi Zhang
,
Ruixuan Pan
Optimal Network Defense Strategy Selection Based on Incomplete Information Evolutionary Game.
IEEE Access
6 (2018)
Hao Hu
,
Hongqi Zhang
,
Yuling Liu
,
Yongwei Wang
Quantitative Method for Network Security Situation Based on Attack Prediction.
Secur. Commun. Networks
2017 (2017)
Hao Hu
,
Gang Shen
,
Zhengxin Fu
,
Bin Yu
,
Jingjing Wang
General construction for XOR-based visual cryptography and its extended capability.
Multim. Tools Appl.
75 (21) (2016)
Hao Hu
,
Bin Yu
,
Gang Shen
像素不扩展视觉密码的边缘增强研究 (Edge Enhancement on Size Invariant Visual Cryptography).
计算机科学
42 (2) (2015)