default search action
Chao Yang 0016
Person information
- affiliation (PhD 2008): Xidian University, School of Cyber Engineering, Xi'an, China
Other persons with the same name
- Chao Yang — disambiguation page
- Chao Yang 0001 — Lawrence Berkeley National Laboratory, Computational Research Division, CA, USA
- Chao Yang 0002 — Peking University, Beijing, China (and 1 more)
- Chao Yang 0003 — Sun Yat-Sen University, School of Mathematics, Guangzhou, China (and 1 more)
- Chao Yang 0004 — Chinese Academy of Sciences, Institute of Process Engineering, Beijing, China
- Chao Yang 0005 — Guangdong University of Technology, School of Automation, Guangzhou, China (and 2 more)
- Chao Yang 0006 — Yanshan University, Institute of Electric Engineering, Qinhuangdao, China (and 1 more)
- Chao Yang 0007 — China University of Geosciences, National Engineering Research Center of Geographic Information System, Wuhan, China
- Chao Yang 0008 — Hunan University, College of Mathematics and Econometrics, Changsha, China
- Chao Yang 0009 — East China University of Science and Technology, Key Laboratory of Advanced Control and Optimization for Chemical Processes, Shanghai, China (and 1 more)
- Chao Yang 0010 — Shenzhen University, College of Information Engineering / Key Laboratory of Spatial Smart Sensing and Services, China
- Chao Yang 0011 — University of Southern California, Department of Computer Science, Los Angeles, CA, USA
- Chao Yang 0012 — National Digital Switching System Engineering and Technological Research Center, Zhengzhou, China
- Chao Yang 0013 — Tsinghua University, School of Public Policy and Management, Beijing, China (and 1 more)
- Chao Yang 0014 — Guilin University of Electronic Technology, MOE Key Laboratory of Cognitive Radio and Signal Processing, China
- Chao Yang 0015 — Hunan University, College of Computer Science and Electronic Engineering, Changsha, China (and 2 more)
- Chao Yang 0017 — Central South University, School of Information Science and Engineering, Changsha, China
- Chao Yang 0018 — National University of Defense Technology, College of Computer, Changsha, China
- Chao Yang 0019 — Northeastern University, Shenyang, China (and 1 more)
- Chao Yang 0020 — University of Newcastle Upon Tyne, UK
- Chao Yang 0021 — Shanghai University, School of Communication and Information Engineering, Shanghai Institute for Advanced Communication and Data Science, China (and 2 more)
- Chao Yang 0022 — Texas A&M University, Department of Computer Science and Engineering, College Station, TX, USA
- Chao Yang 0023 — University of Electronic Science and Technology of China, School of Life Science and Technology, Center of Bioinformatics, Chengdu, China
- Chao Yang 0024 — University of Technology Sydney, Australia (and 1 more)
- Chao Yang 0025 — Auburn University, Department of Electrical and Computer Engineering, USA
- Chao Yang 0026 — Tsinghua University, Beijing National Research Center for Information Science and Technology, Institute for Artificial Intelligence, Beijing, China
- Chao Yang 0027 — Southeast University, LEADS, National Mobile Communications Research Laboratory, Nanjing, China
- Chao Yang 0028 — Southwest Jiaotong University, Faculty of Geosciences and Environmental Engineering, Chengdu, China
- Chao Yang 0029 — Northwest Institute of Nuclear Technology, Xi'an, China (and 1 more)
- Chao Yang 0030 — Marvell Semiconductor, Austin, TX, USA (and 1 more)
- Chao Yang 0031 — Mobvoi Inc., WeNet Open Source Community, Beijing, China
- Chao Yang 0032 — Shanghai University of Engineering Science, School of Mathematics, Physics and Statistics, China (and 1 more)
- Chao Yang 0033 — University of Electronic Science and Technology of China, State Key Laboratory of Electronic Thin Films and Integrated Devices, Chengdu, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Qixian Ren, Yu Zheng, Chao Yang, Yue Li, Jian-Feng Ma:
Shadow backdoor attack: Multi-intensity backdoor attack against federated learning. Comput. Secur. 139: 103740 (2024) - [j30]Yue Wang, Chao Yang, Ruidong Han, Xinghua Li, Jianfeng Ma:
Dvatar: Simulating the Binary Firmware of Drones. IEEE Internet Things J. 11(19): 30661-30675 (2024) - [j29]Taifeng Liu, Chao Yang, Xinjing Liu, Ruidong Han, Jianfeng Ma:
RPAU: Fooling the Eyes of UAVs via Physical Adversarial Patches. IEEE Trans. Intell. Transp. Syst. 25(3): 2586-2598 (2024) - [c15]Wei Tong, Xuewen Dong, Weidong Yang, Yulong Shen, Chao Yang, Zesong Dong:
Non-Subjective Trust Mechanism for Online Ride-Hailing Services. ICWS 2024: 1377-1383 - 2023
- [j28]Xiaoyun Zhao, Chao Yang, Zhizhuang Jia, Yue Wang, Jianfeng Ma:
FCEVAL: An effective and quantitative platform for evaluating fuzzer combinations fairly and easily. Comput. Secur. 132: 103354 (2023) - [j27]Zhizhuang Jia, Chao Yang, Xiaoyun Zhao, Xinghua Li, Jian Feng Ma:
Design and implementation of an efficient container tag dynamic taint analysis. Comput. Secur. 135: 103528 (2023) - [j26]Bin Wang, Chao Yang, Jianfeng Ma:
IAFDroid: Demystifying Collusion Attacks in Android Ecosystem via Precise Inter-App Analysis. IEEE Trans. Inf. Forensics Secur. 18: 2883-2898 (2023) - [c14]Yu Zheng, Xinglin Lian, Zhangxuan Dang, Chunlei Peng, Chao Yang, Jianfeng Ma:
A Semi-Supervised Anomaly Network Traffic Detection Framework via Multimodal Traffic Information Fusion. CIKM 2023: 4455-4459 - [c13]Yue Wang, Chao Yang, Ning Xi, Yulong Shen, Jianfeng Ma:
SEBD: Sensor Emulation Based Backdoor for Autopilot. IoT 2023: 265-269 - 2022
- [j25]Suixing Wang, Chao Yang, Gang Guo, Mingzhe Chen, Jian Feng Ma:
SSAPPIDENTIFY: A robust system identifies application over Shadowsocks's traffic. Comput. Networks 203: 108659 (2022) - [c12]Ruidong Han, Chao Yang, Siqi Ma, Jianfeng Ma, Cong Sun, Juanru Li, Elisa Bertino:
Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search. ICSE 2022: 462-473 - [i2]Yu Zheng, Zhangxuan Dang, Chunlei Peng, Chao Yang, Xinbo Gao:
Multi-view Multi-label Anomaly Network Traffic Classification based on MLP-Mixer Neural Network. CoRR abs/2210.16719 (2022) - 2021
- [j24]Baolin Ma, Chao Yang, Mingzhe Chen, Jianfeng Ma:
GramMatch: An automatic protocol feature extraction and identification system. Comput. Networks 201: 108528 (2021) - [j23]Qiuning Ren, Chao Yang, Jianfeng Ma:
App identification based on encrypted multi-smartphone sources traffic fingerprints. Comput. Networks 201: 108590 (2021) - [j22]Quanlong Zhu, Chao Yang, Yu Zheng, Jianfeng Ma, Hui Li, Junwei Zhang, Jiajie Shao:
Smart home: Keeping privacy based on Air-Padding. IET Inf. Secur. 15(2): 156-168 (2021) - [c11]Yu Zheng, Chao Yang, Yanzhou Yang, Qixian Ren, Yue Li, Jianfeng Ma:
ShadowDGA: Toward Evading DGA Detectors with GANs. ICCCN 2021: 1-8 - [i1]Ruidong Han, Chao Yang, Siqi Ma, Jianfeng Ma, Cong Sun, Juanru Li, Elisa Bertino:
Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search. CoRR abs/2112.03511 (2021) - 2020
- [j21]Zhanquan Sun, Chaoli Wang, Yangyang Zhao, Chao Yang:
Multi-Label ECG Signal Classification Based on Ensemble Classifier. IEEE Access 8: 117986-117996 (2020) - [j20]Zhicheng Yan, Chao Yang, Wei You, Jingjing Guo, Junwei Zhang, Yu Zheng, Jianfeng Ma:
Achieving secure and convenient WLAN sharing in personal. IET Inf. Secur. 14(6): 733-744 (2020) - [j19]Jingjing Guo, Xinghua Li, Zhiquan Liu, Jianfeng Ma, Chao Yang, Junwei Zhang, Dapeng Wu:
TROVE: A Context-Awareness Trust Model for VANETs Using Reinforcement Learning. IEEE Internet Things J. 7(7): 6647-6662 (2020) - [c10]Jing Zhang, Chao Yang, Yu Zheng, Wei You, Ruidan Su, Jianfeng Ma:
A Preliminary Analysis of Password Guessing Algorithm. ICCCN 2020: 1-9 - [c9]Ruidong Han, Chao Yang, Jianfeng Ma, Siqi Ma, Yunbo Wang, Feng Li:
IMShell-Dec: Pay More Attention to External Links in PowerShell. SEC 2020: 189-202
2010 – 2019
- 2019
- [j18]Junwei Zhang, Yue Zong, Chao Yang, Yinbin Miao, Jingjing Guo:
LBOA: Location-Based Secure Outsourced Aggregation in IoT. IEEE Access 7: 43869-43883 (2019) - [j17]Junwei Zhang, Ning Lu, Jianfeng Ma, Chao Yang:
Universally composable secure geographic area verification without pre-shared secret. Sci. China Inf. Sci. 62(3): 32113:1-32113:15 (2019) - [j16]Junwei Zhang, Wenxuan Cui, Jianfeng Ma, Chao Yang:
Blockchain-based secure and fair crowdsourcing scheme. Int. J. Distributed Sens. Networks 15(7) (2019) - [j15]Chao Yang, Junwei Zhang, Jingjing Guo, Yu Zheng, Li Yang, Jianfeng Ma:
Fingerprint Protected Password Authentication Protocol. Secur. Commun. Networks 2019: 1694702:1-1694702:12 (2019) - [c8]Boyao Yu, Chao Yang, Jianfeng Ma:
Continuous Authentication for the Internet of Things Using Channel State Information. GLOBECOM 2019: 1-6 - 2018
- [j14]Yaxian Ji, Junwei Zhang, Jianfeng Ma, Chao Yang, Xin Yao:
BMPLS: Blockchain-Based Multi-level Privacy-Preserving Location Sharing Scheme for Telecare Medical Information Systems. J. Medical Syst. 42(8): 147:1-147:13 (2018) - [j13]Qi Gao, Junwei Zhang, Jianfeng Ma, Chao Yang, Jingjing Guo, Yinbin Miao:
LIP-PA: A Logistics Information Privacy Protection Scheme with Position and Attribute-Based Access Control on Mobile Devices. Wirel. Commun. Mob. Comput. 2018: 9436120:1-9436120:14 (2018) - [c7]Li Yang, Teng Wei, Jianfeng Ma, Shui Yu, Chao Yang:
Inference Attack in Android Activity based on Program Fingerprint. CNS 2018: 1-9 - [c6]Maozhen Liu, Chao Yang, Qi Jiang, Xiaofeng Chen, Jianfeng Ma, Jian Ren:
Updatable Block-Level Deduplication with Dynamic Ownership Management on Encrypted Data. ICC 2018: 1-7 - 2017
- [j12]Qi Jiang, Jianfeng Ma, Chao Yang, XinDi Ma, Jian Shen, Shehzad Ashraf Chaudhry:
Efficient end-to-end authentication protocol for wearable health monitoring systems. Comput. Electr. Eng. 63: 182-195 (2017) - [j11]Chao Yang, Min Zhang, Qi Jiang, Junwei Zhang, Danping Li, Jianfeng Ma, Jian Ren:
Zero knowledge based client side deduplication for encrypted files of secure cloud storage in smart cities. Pervasive Mob. Comput. 41: 243-258 (2017) - [j10]Kai Fan, Panfei Song, Zhao Du, Haojin Zhu, Hui Li, Yintang Yang, Xinghua Li, Chao Yang:
NFC Secure Payment and Verification Scheme with CS E-Ticket. Secur. Commun. Networks 2017: 4796373:1-4796373:9 (2017) - [c5]Danping Li, Chao Yang, Chengzhou Li, Qi Jiang, Xiaofeng Chen, Jianfeng Ma, Jian Ren:
A client-based secure deduplication of multimedia data. ICC 2017: 1-6 - 2016
- [j9]Junwei Zhang, Fangqiong Du, Jianfeng Ma, Chao Yang:
Position based key exchange: defnitions and implementations. J. Commun. Inf. Networks 1(4): 33-43 (2016) - [j8]Qi Jiang, Xinxin Lian, Chao Yang, Jianfeng Ma, Youliang Tian, Yuanyuan Yang:
A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth. J. Medical Syst. 40(11): 231:1-231:10 (2016) - [j7]Xuewen Dong, Chao Yang, Lijie Sheng, Chao Wang, Jianfeng Ma:
A new method to deduce counterexamples in secure routing protocols based on strand space model. Secur. Commun. Networks 9(18): 5834-5848 (2016) - [c4]Kai Fan, Panfei Song, Zhao Du, Haojin Zhu, Hui Li, Yintang Yang, Xinghua Li, Chao Yang:
NFC Secure Payment and Verification Scheme for Mobile Payment. WASA 2016: 116-125 - 2015
- [j6]Chao Yang, Jianfeng Ma, Jian Ren:
Provable Ownership of Encrypted Files in De-duplication Cloud Storage. Ad Hoc Sens. Wirel. Networks 26(1-4): 43-72 (2015) - [j5]Junwei Zhang, Jianfeng Ma, Chao Yang, Li Yang:
Universally composable secure positioning in the bounded retrieval model. Sci. China Inf. Sci. 58(11): 1-15 (2015) - [j4]Chao Yang, Jian Ren, Jianfeng Ma:
Provable ownership of files in deduplication cloud storage. Secur. Commun. Networks 8(14): 2457-2468 (2015) - [j3]Junwei Zhang, Jianfeng Ma, Chao Yang:
Protocol Derivation System for the Needham-Schroeder family. Secur. Commun. Networks 8(16): 2687-2703 (2015) - 2013
- [c3]Chao Yang, Jian Ren, Jianfeng Ma:
Provable ownership of file in de-duplication cloud storage. GLOBECOM 2013: 695-700 - 2012
- [c2]Jian Li, Chao Yang, Di Tang, Tongtong Li, Jian Ren:
Characterization of linear network coding for pollution detection. GLOBECOM 2012: 1066-1071 - 2011
- [j2]Chao Yang, Jianfeng Ma, Xuewen Dong:
A New Evaluation Model for Security Protocols. J. Commun. 6(6): 485-494 (2011) - [c1]Junwei Zhang, Chao Yang, Jianfeng Ma:
Protocol Derivation System for the Needham-Schroeder family. CHINACOM 2011: 836-840
2000 – 2009
- 2008
- [j1]Chunjie Cao, Chao Yang, Jianfeng Ma, Sang-Jae Moon:
Constructing UC Secure and Constant-Round Group Key Exchange Protocols via Secret Sharing. EURASIP J. Wirel. Commun. Netw. 2008 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 01:51 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint