代表性论文: 1.Lin K, Han W, Li S, et al. Detecting deepfake videos using spatiotemporal trident network[J]. ACM Transactions on Multimedia Computing, Communications and Applications, 2024, 20(11): 1-20.(SCI Q1, CCF-B) 2.Lin K, Han W, Li S, et al. IR-capsule: two-stream network for face forgery detection[J]. Cognitive Computation, 2023, 15(1): 13-22.(SCI Q1) 3.Lin K, Lv J, Zhao H, et al. Dual-branch Pre-activation Bottleneck Transformer for Face Forgery Detection[J]. Cognitive Computation, 2025.(accept, SCI Q1) 4.Lin K, Zhao H, Lv J, et al. Face detection and segmentation based on improved mask R-CNN[J]. Discrete dynamics in nature and society, 2020, 2020: 1-11.(SCI Q3) 5.Lv J J, Chen H Y, Li J W, Lin K*(通讯), et al. Contour extraction of medical images using an attention-based network[J]. Biomedical Signal Processing and Control, 2023, 84: 104828.(SCI Q2) 6.Lin K, Han W, Gu Z, et al. A Survey of DeepFakes Generation and Detection[C]//2021 IEEE Sixth International Conference on Data Science in Cyberspace (DSC). IEEE, 2021: 474-478.(EI) 7.Lin K, Zhao H, Lv J, et al. Face detection and segmentation with generalized intersection over union based on mask R-CNN[C]//Advances in Brain Inspired Cognitive Systems: 10th International Conference, BICS 2019, Guangzhou, China, July 13–14, Proceedings 10. Springer International Publishing, 2020: 106-116.(EI) 8.Huang Z, Lin K*(通讯), Mei Y. The Intelligent Information Search System IISI and Its Key Technologies for Internet Big Data[C]//2023 8th International Conference on Data Science in Cyberspace (DSC). IEEE, 2023: 114-119.(EI) 9.林凯瀚,赵慧民,吕巨建,等.基于Mask R-CNN的人脸检测与分割方法[J].计算机工程, 2020, 46(6)(中文核心) 10.Mei Y, Han W, Lin K. Intrusion detection for intelligent connected vehicles based on bidirectional temporal convolutional network[J]. IEEE Network, 2024.(SCI Q1) 11.Mei Y, Han W, Li S, Lin K, et al. A Novel Network Forensic Framework for Advanced Persistent Threat Attack Attribution Through Deep Learning[J]. IEEE Transactions on Intelligent Transportation Systems, 2024. (SCI Q1) 12.Mei Y, Han W, Li S, Lin K, et al. A hybrid intelligent approach to attribute Advanced Persistent Threat Organization using PSO-MSVM Algorithm[J]. IEEE Transactions on Network and Service Management, 2022, 19(4): 4262-4272.(SCI Q2) 13.Qi Y, Gu Z, Li A, Zhang X, Shafiq M, Mei Y, Lin K. Cybersecurity knowledge graph enabled attack chain detection for cyber-physical systems[J]. Computers and Electrical Engineering, 2023, 108: 108660. (SCI Q1) 14.Qi Y, Gu Z, Mei Y, Lin K, et al. A General Construction Method of Cyber Security Knowledge Graph[C]//2022 9th International Conference on Behavioural and Social Computing (BESC). IEEE, 2022: 1-7.(EI) 15.Mei Y, Han W, Li S, Wu X, Lin K,et al. A review of attribution technical for APT attacks[C]//2022 7th IEEE International Conference on Data Science in Cyberspace (DSC). IEEE, 2022: 512-518.(EI) |