Sign in
Zhida Li
ORCID
Publication Activity (10 Years)
Years Active: 2015-2023
Publications (10 Years): 16
Top Topics
Detecting Anomalies
Network Intrusions
Denial Of Service Attacks
Machine Learning
Top Venues
ISCAS
SMC
IEEE J. Sel. Areas Commun.
J. Robotics
</>
Publications
</>
Zhida Li
,
Ana Laura Gonzalez Rios
,
Ljiljana Trajkovic
Machine Learning for Detecting the WestRock Ransomware Attack Using BGP Routing Records.
IEEE Commun. Mag.
61 (3) (2023)
Liyan Xiong
,
Zhida Li
,
Xiaohui Huang
,
Yijuan Zeng
,
Peng Huang
TFA-CNN: an efficient method for dealing with crowding and noise problems in crowd counting.
Multim. Syst.
29 (6) (2023)
Tarun Sharma
,
Khushi Patni
,
Zhida Li
,
Ljiljana Trajkovic
Deep Echo State Networks for Detecting Internet Worm and Ransomware Attacks.
ISCAS
(2023)
Zhizhong Liu
,
Weishen Yan
,
Jianguo Kou
,
Zhida Li
Collaboration and Management of Heterogeneous Robotic Systems for Road Network Construction, Management, and Maintenance under the Vision of "BIM + GIS" Technology.
J. Robotics
2023 (2023)
Zhida Li
,
Ljiljana Trajkovic
Enhancing Cyber Defense: Using Machine Learning Algorithms for Detection of Network Anomalies.
SMC
(2023)
Zhida Li
,
Ana Laura Gonzalez Rios
,
Ljiljana Trajkovic
Machine Learning for Detecting Anomalies and Intrusions in Communication Networks.
IEEE J. Sel. Areas Commun.
39 (7) (2021)
Zhida Li
,
Ana Laura Gonzalez Rios
,
Ljiljana Trajkovic
Classifying Denial of Service Attacks Using Fast Machine Learning Algorithms.
SMC
(2021)
Ana Laura Gonzalez Rios
,
Zhida Li
,
Kamila Bekshentayeva
,
Ljiljana Trajkovic
Detection of Denial of Service Attacks in Communication Networks.
ISCAS
(2020)
Zhida Li
,
Ana Laura Gonzalez Rios
,
Ljiljana Trajkovic
Detecting Internet Worms, Ransomware, and Blackouts Using Recurrent Neural Networks.
SMC
(2020)
Zhida Li
,
Ana Laura Gonzalez Rios
,
Guangyu Xu
,
Ljiljana Trajkovic
Machine Learning Techniques for Classifying Network Anomalies and Intrusions.
ISCAS
(2019)
Prerna Batta
,
Maninder Singh
,
Zhida Li
,
Qingye Ding
,
Ljiljana Trajkovic
Evaluation of Support Vector Machine Kernels for Detecting Network Anomalies.
ISCAS
(2018)
Zhida Li
,
Prerna Batta
,
Ljiljana Trajkovic
Comparison of Machine Learning Algorithms for Detection of Network Intrusions.
SMC
(2018)
Hanene Ben Yedder
,
Qingye Ding
,
Umme Zakia
,
Zhida Li
,
Soroush Haeri
,
Ljiljana Trajkovic
Comparison of Virtualization Algorithms and Topologies for Data Center Networks.
ICCCN
(2017)
Qingye Ding
,
Zhida Li
,
Prerna Batta
,
Ljiljana Trajkovic
Detecting BGP anomalies using machine learning techniques.
SMC
(2016)
Soroush Haeri
,
Qingye Ding
,
Zhida Li
,
Ljiljana Trajkovic
Global resource capacity algorithm with path splitting for virtual network embedding.
ISCAS
(2016)
Michael Peter Kennedy
,
Hongjia Mo
,
Zhida Li
,
Guosheng Hu
,
Paolo Scognamiglio
,
Ettore Napoli
The noise and spur delusion in fractional-N frequency synthesizer design.
ISCAS
(2015)