当前位置: 实验室首页 > 研究成果 > 论文 > 正文
论文汇总
来源: 时间:2021-06-02 浏览:

1. 期刊论文

[1] C. Zhou, B. Hu, Y. Shi, Y. Tian, X. Li and Y. Zhao, A Unified Architectural Approach for Cyberattack-Resilient Industrial Control Systems, Proceedings of the IEEE, 2021, 109(4): 517-541.

[2] J. Yang, C. Zhou, Y. Tian and C. An, A Zoning-based Secure Control Approach against Actuator Attacks in Industrial Cyber-Physical Systems, IEEE Transactions on Industrial Electronics. 2021, 68(3): 2637-2647. (SCIEI)

[3] K. Huang, C. Zhou, Y. Qin and W. Tu, A Game-Theoretic Approach to Cross-Layer Security Decision-Making in Industrial Cyber-Physical Systems, IEEE Transactions on Industrial Electronics, 2020, 67(3): 2371-2379. (SCIEI)

[4] J. Yang, C. Zhou, S. Yang, H. Xu and B. Hu, Anomaly Detection Based on Zone Partition for Security Protection of Industrial Cyber-Physical Systems, IEEE Transactions on Industrial Electronics, 2018, 65(5): 4257-4267. (SCIEI)

[5] K. Huang, C. Zhou, Y. C. Tian, S. H. Yang and Y. Qin, Assessing the Physical Impact of Cyber-Attacks on Industrial Cyber-Physical Systems, IEEE Transactions on Industrial Electronics, 2018, 65(10): 8153-8162. (SCIEI)

[6] C. Zhou, X. Li, S. Yang and Y. Tian, Risk-based Scheduling of Security Tasks in Industrial Control Systems with Consideration of Safety, IEEE Transactions on Industrial Informatics. 2020, 16(5): 3112-3123.

[7] X. Li, C. Zhou, Y. Tian and Y. Qin, A Dynamic Decision-Making Approach for Intrusion Response in Industrial Control Systems, IEEE Transactions on Industrial Informatics, 2019, 15(5): 2544-2554. (SCIEI)

[8] X. Li, C. Zhou, Y. C. Tian, N. Xiong and Y. Qin, Asset-Based Dynamic Impact Assessment of Cyberattacks for Risk Analysis in Industrial Control Systems, IEEE Transactions on Industrial Informatics, 2018, 14(2): 608-618. (SCIEI)

[9] Q. Zhang, C. Zhou, Y. C. Tian, N. Xiong, Y. Qin and B. Hu, A Fuzzy Probability Bayesian Network Approach for Dynamic Cybersecurity Risk Assessment in Industrial Control Systems, IEEE Transactions on Industrial Informatics, 2018, 14(6): 2497-2506. (SCIEI)

[10] W. Xiong, X. Hu and T. Jiang, "Measurement and Characterization of Link Quality for IEEE 802.15.4-Compliant Wireless Sensor Networks in Vehicular Communications," in IEEE Transactions on Industrial Informatics, vol. 12, no. 5, pp. 1702-1713, Oct. 2016.

[11] X. Li, X. Hu, R. Zhang and L. Yang, Routing Protocol Design for Underwater Optical Wireless Sensor Networks: A Multiagent Reinforcement Learning Approach, IEEE Internet of Things Journal, 2020, 7(10): 9805-9818.

[12] M. Wu, X. Hu, R. Zhang and L. Yang, Collision Recognition in Multihop IEEE 802.15.4-Compliant Wireless Sensor Networks, IEEE Internet of Things Journal, 2019, 6(5): 8542-8552, Oct. 2019.

[13] W. Li, X. Hu and T. Jiang, "Path Loss Models for IEEE 802.15.4 Vehicle-to-Infrastructure Communications in Rural Areas," in IEEE Internet of Things Journal, vol. 5, no. 5, pp. 3865-3875, Oct. 2018.

[14] B. Hu, C. Zhou, Y. Tian, X. Hu and X. Junping, Decentralized Consensus Decision-Making for Cybersecurity Protection in Multimicrogrid Systems, IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2021, 51(4): 2187-2198.

[15] B. Hu, C. Zhou, Y. Tian, Y. Qin and X. Junping, A Collaborative Intrusion Detection Approach Using Blockchain for Multimicrogrid Systems, IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2019, 49(8): 1720-1730. (SCIEI)

[16] Y. Qin, Q. Zhang, C. Zhou and N. Xiong, A Risk-Based Dynamic Decision-Making Approach for Cybersecurity Protection in Industrial Control Systems, IEEE Transactions on Systems, Man, and Cybernetics: Systems. 2020, 50(10): 3863-3870. (SCIEI)

[17] K. Huang, Q. Zhang, C. Zhou, N. Xiong and Y. Qin, An Efficient Intrusion Detection Approach for Visual Sensor Networks Based on Traffic Pattern Learning, IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2017, 47(10): 2704-2713. (SCIEI)

[18] S. Huang, C. Zhou, N. Xiong, S.-H. Yang, Y. Qin, and Q. Zhang. A general real-time control approach of intrusion response for industrial automation systems. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2016, 46(8): 1021-1035. (SCIEI)

[19] Q. Zhang, C. Zhou, N. Xiong, Y. Qin, X. Li, and S. Huang. Multimodel-Based Incident Prediction and Risk Assessment in Dynamic Cybersecurity Protection for Industrial Control Systems. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2016, 46(10): 1429 - 1444. (SCIEI)

[20] C. Zhou, S. Huang, N. Xiong, S. H. Yang, H. Li, Y. Qin, and X. Li. Design and analysis of multimodel-based anomaly intrusion detection systems in industrial process automation. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2015, 45(10): 1345-1360. (SCIEI)

[21] C. Zhou, X. Huang, X. Naixue, Y. Qin and S. Huang, A class of general transient faults propagation analysis for networked control systems, IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2015, 45(4): 647-661.

[22] C. Zhou, Y. Shi, S. Yang, Q. Yin and Y. Qin, Characteristic Model-Based Adaptive Discrete-Time Sliding Mode Control for the Swing Arm in a Fourier Transform Spectrometer, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 2012, 42(6): 1633-1643.

[23] C. Zhou, H. Chen, N. Xiong, X. Huang and A. V. Vasilakos, Model-Driven Development of Reconfigurable Protocol Stack for Networked Control Systems, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 2012, 42(6): 1439-1453.

[24] Q. Zhu, Y. Qin, C. Zhou and L. Fei, Hierarchical Flow Model-Based Impact Assessment of Cyberattacks for Critical Infrastructures, IEEE Systems Journal, vol. 13, no. 4, pp. 3944-3955, Dec. 2019.

[25] Y. Qin, Y. Peng, K. Huang, C. Zhou and Y. Tian, Association Analysis-Based Cybersecurity Risk Assessment for Industrial Control Systems, IEEE Systems Journal, vol. 15, no. 1, pp. 1423-1432, March 2021.

[26] C. Zhou and D. Quach and N. Xiong and S. Huang and Q. Zhang and Q. Yin and A. V. Vasilakos, An Improved Direct Adaptive Fuzzy Controller of an Uncertain PMSM for Web-Based E-Service Systems, IEEE Transactions on Fuzzy Systems, 2015, 23(1): 58-71.

[27] Q. Zhu, Y. Qin, Y. Zhao and C. Zhou. A hierarchical colored Petri net–based cyberattacks response strategy making approach for critical infrastructures. International Journal of Distributed Sensor Networks, 2020, 16(1). (SCIEI)

[28] J. Yang, C. Zhou, Y. Tian and S. Yang, A Software-Defined Security Approach for Securing Field Zones in Industrial Control Systems, IEEE Access, vol. 7, pp. 87002-87016, 2019. (SCIEI)

[29] Q. Zhu, Y. Qin, C. Zhou and W. Gao. Extended multilevel flow model-based dynamic risk assessment for cybersecurity protection in industrial production systems. International Journal of Distributed Sensor Networks, 2018, 14(6). (SCIEI)

[30] S. Huang, C. Zhou, L. Yang, Y. Qin, X. Huang and B. Hu. Transient fault tolerant control for vehicle brake-by-wire systems. Reliability Engineering & System Safety, 2016, 149: 148-163. (SCIEI)

[31] S. Huang, C. Zhou, S. Yang and Y. Qin. Cyber-physical system security for networked industrial processes. International Journal of Automation and Computing, 2015, 12(6): 567-578. (EI)

[32] Y. Qin, Y. Zhao, K. Huang, Y. Tian and C. Zhou, Dynamic model predictive control for constrained cyber-physical systems subject to actuator attacks, International Journal of Systems Science, 52(4):821-831.

[33] 应欢, 杨军, 刘帆, et al. 一种面向攻击的配电网区域业务恢复方法[J]. 华北电力大学学报(自然科学版), 2019, 46(02):49-55. (北大中文核心期刊. 第二作者,通讯作者)

[34] 韩丽芳, 胡博文, 杨军, et al. 基于攻击预测的电力CPS安全风险评估[J]. 中国电力, 2019, 52(01):54-62. (北大中文核心期刊. 第二作者,通讯作者)

[35] 杨军,周纯杰,应欢,李梦涛,杨军. 电力系统信息安全验证平台中广域网仿真方法[J]. 自动化与仪表, 2018, 33(6). (北大中文核心期刊,第二作者,通讯作者)

[36] 安超, 周纯杰. 基于控制行为模型的工控系统异常检测方法[J]. 信息安全研究, 2020, 6(06):543-548.

[37] 陈召坤, 周纯杰. 面向任务的舰船系统信息安全脆弱性评估方法[J]. 信息安全研究, 2019, 5(05):56-61.

[38] 高巍伟. 未知工控协议语义逆向研究方法[J]. 信息通信, 2019(05):44-47.

[39] 韩宜轩, 秦元庆. 基于因果关联的电力工控系统攻击场景还原[J]. 信息技术, 201943(08):41-44+48.

[40] 徐海洲, 周纯杰. 基于SDN的工控信息安全防护系统设计及实现[J]. 制造业自动化, 201941(04):164-168.

[41] 印炜, 秦元庆. 配电站信息安全仿真平台设计与实现[J]. 信息技术, 201943(8):13-16.

[42] 常昊,秦元庆,周纯杰.基于贝叶斯攻击图的工控系统动态风险评估[J].信息技术,2018,42(10):62-67+72.

[43] 田博,杨军,应欢.一种面向攻击的广域测量系统数据自恢复方法[J].电力信息与通信技术,2018,16(07):1-7.

[44] 张婷,黄开兴,胡博文,周纯杰.可视化技术及其在配电网信息安全防护中的应用[J].电力信息与通信技术,2018,16(06):1-7.

[45] 刘蕴韬,秦元庆,周纯杰.联合仿真中OPNET统计量的实时导出方法[J].信息技术,2018(05):13-17.

[46] 储忠涛, 周纯杰, 秦元庆, 田博, 基于工作流的舰艇系统脆弱性定量评估方法研究[J]. 信息安全研究, 2017, 3(3): 270-276.

[47] 章清亮, 秦元庆, 基于DDS通信的舰载网络安全评估指标及应用研究[J]. 信息网络安全, 2017(2): 73-78.

[48] 周纯杰、张琦、秦元庆. 工业控制系统信息安全防护中的风险评估方法及技术. 中国自动化学会通讯, 2016,08:51-56.

[49] 刘松, 朱钱祥, 陈开放. 关键基础设施信息安全分析及防护[J]. 智慧工厂, 2016 (3): 45-49.

[50] 陈开放, 李汇云, 刘松. 基于 DDS 舰载通信系统的信息安全分析研究[J]. 信息网络安全, 2016 (3): 47-52.

[51] 李汇云, 李璇, 张琦. 全生命周期工业控制系统信息安全防护分析及主要对策[J]. 自动化博览, 2016 (6): 74-77.


2. 会议论文

[1] K. Huang, C. Zhou, Y. Tian, W. Tu and Y. Peng, Application of Bayesian Network to Data-Driven Cyber-Security Risk Assessment in SCADA Networks. 27th International Telecommunication Networks and Applications Conference 2017, Australia. EI

[2] J. Yang, C. Zhou and Y. Zhao, A Security Protection Approach Based on Software Defined Network for Inter-Area Communication in Industrial Control Systems. 12th IET System Safety and Cyber Security Conference 2017, UK. EI

[3] C. Zhou, X. Li, Q. Zhang and S. Yang. Risk-based task scheduling approach for integrated control of system safety and cyber security in industrial control systems. IET Conference Proceedings. The Institution of Engineering & Technology, 2015, UK EI

[4] H. Xing, C. Zhou, X. Ye and M. Zhu, An Edge-Cloud Synergy Integrated Security Decision-Making Method for Industrial Cyber-Physical Systems, 2020 IEEE 9th Data Driven Control and Learning Systems Conference (DDCLS), Liuzhou, 2020, pp. 989-995.

[5] Y. Peng, K. Huang, W. Tu and C. Zhou, A Model-Data Integrated Cyber Security Risk Assessment Method for Industrial Control Systems, 2018 IEEE 7th Data Driven Control and Learning Systems Conference (DDCLS), Enshi, 2018, pp. 344-349.

[6] 杨军, 周纯杰. 一种基于区域划分和隔离的工业过程控制系统信息安全防护方法[C], 28届中国过程控制会议, 重庆, 中国, 2017.

[7] X. Hu, S. Ge and J. Xiao, Channel allocation based on genetic algorithm for multiple IEEE 802.15.4-compliant wireless sensor networks, 2017 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), Xiamen, 2017, pp. 1-5.