


default search action
Yunchuan Guo
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j24]Yunchuan Guo, Xiao Wang, Mingjie Yu, Fenghua Li, Zhen Pang, Liang Fang:
An on-the-fly framework for usable access control policy mining. Comput. Secur. 150: 104211 (2025) - [j23]Duo Zhang
, Fenghua Li
, Yunchuan Guo
, Ming Mao, Zifu Li
:
HT-ASAF: Automatic Sample Augmentation Framework for Hardware Trojan. IEEE Internet Things J. 12(3): 2609-2622 (2025) - 2024
- [j22]Qiuyun Lyu
, Yilong Zhou
, Yizhi Ren
, Zhen Wang
, Yunchuan Guo
:
Toward Personal Data Sharing Autonomy: A Task-Driven Data Capsule Sharing System. IEEE Trans. Inf. Forensics Secur. 19: 9760-9774 (2024) - [c45]Siyuan Leng, Yunchuan Guo, Lin Zhang, Fanfan Hao, Xiaogang Cao, Fenghua Li, Wenlong Kou:
Online and Collaboratively Mitigating Multi-Vector DDoS Attacks for Cloud-Edge Computing. ICC 2024: 1394-1399 - [c44]Lin Zhang, Yunchuan Guo, Siyuan Leng, Xiaogang Cao, Fenghua Li, Liang Fang:
Cost-Effective Defense Timing Selection for Moving Target Defense in Satellite Computing Systems. ICCS (1) 2024: 224-239 - [c43]Ming Mao, Duo Zhang, Chao Xia, Yunchuan Guo, Dunmin Zhang, Xiaolin Li:
GD-PTCF: Prompt-Tuning Based Classification Framework for Government Data. ICIC (LNAI 2) 2024: 211-224 - [i2]Qiuyun Lyu, Yilong Zhou, Yizhi Ren, Zheng Wang, Yunchuan Guo:
Towards Personal Data Sharing Autonomy:A Task-driven Data Capsule Sharing System. CoRR abs/2409.18449 (2024) - [i1]Junhai Yang, Fenghua Li, Yixuan Zhang, Junhao Zhang, Liang Fang, Yunchuan Guo:
Automatic State Machine Inference for Binary Protocol Reverse Engineering. CoRR abs/2412.02540 (2024) - 2023
- [j21]Lili Chen
, Zhen Wang, Jintao Wu, Yunchuan Guo, Fenghua Li, Zifu Li:
Dynamic threshold strategy optimization for security protection in Internet of Things: An adversarial deep learning-based game-theoretical approach. Concurr. Comput. Pract. Exp. 35(20) (2023) - [c42]Lin Zhang, Yunchuan Guo, Siyuan Leng, Zifu Li, Fenghua Li, Liang Fang:
A Moving Target Defense Approach for the Distributed Dynamic Network. ISPA/BDCloud/SocialCom/SustainCom 2023: 336-343 - [c41]Siyuan Leng, Fenghua Li, Lin Zhang, Yitong Wen, Yunchuan Guo, Liang Fang:
ProMD: A Proactive Intrusion Response System for Enterprise Network with Multi-Domain. ISPA/BDCloud/SocialCom/SustainCom 2023: 402-409 - [c40]Shijie Luan
, Xiang Lu, Zhuangzhuang Zhang, Guangsheng Chang, Yunchuan Guo:
Efficient and Privacy-Preserving Byzantine-Robust Federated Learning. GLOBECOM 2023: 2202-2208 - 2022
- [j20]Mingjie Yu, Fenghua Li, Nenghai Yu, Xiao Wang, Yunchuan Guo:
Detecting conflict of heterogeneous access control policies. Digit. Commun. Networks 8(5): 664-679 (2022) - [c39]Chaoyang Li, Fenghua Li, Mingjie Yu, Yunchuan Guo, Yitong Wen, Zifu Li:
Insider Threat Detection Using Generative Adversarial Graph Attention Networks. GLOBECOM 2022: 2680-2685 - [c38]Siyuan Leng, Yingke Xie, Yifan Zhang, Yunchuan Guo, Liang Fang, Fenghua Li:
DICOF: A Distributed and Collaborative Framework for Hybrid DDoS Attack Detection. ISCC 2022: 1-7 - [c37]Chunlei Yang, Yunchuan Guo, Mingjie Yu, Lingcui Zhang:
Truthfully Negotiating Usage Policy for Data Sovereignty. TrustCom 2022: 20-27 - [c36]Fenghua Li, Cao Chen, Yunchuan Guo, Liang Fang, Chao Guo, Zifu Li:
Efficiently Constructing Topology of Dynamic Networks. TrustCom 2022: 44-51 - [c35]Fayao Wang, Yuanyuan He, Yunchuan Guo, Peizhi Li, Xinyu Wei:
Privacy-Preserving Robust Federated Learning with Distributed Differential Privacy. TrustCom 2022: 598-605 - 2021
- [j19]Rongna Xie
, Hui Li, Guozhen Shi, Yunchuan Guo, Ben Niu, Mang Su:
Provenance-based data flow control mechanism for Internet of things. Trans. Emerg. Telecommun. Technol. 32(5) (2021) - [c34]Wei Jin, Kui Geng, Mingjie Yu, Yunchuan Guo, Fenghua Li:
Efficiently Managing Large-Scale Keys in HDFS. HPCC/DSS/SmartCity/DependSys 2021: 353-360 - [c33]Yunchuan Guo, Xiyang Sun, Mingjie Yu, Fenghua Li, Kui Geng, Zifu Li:
Resolving Policy Conflicts for Cross-Domain Access Control: A Double Auction Approach. ICCS (1) 2021: 525-539 - 2020
- [j18]Huibing Zhang
, Longfei Qin
, Jun Li
, Yunchuan Guo
, Ya Zhou
, Jingwei Zhang
, Zhi Xu
:
Real-Time Detection Method for Small Traffic Signs Based on Yolov3. IEEE Access 8: 64145-64156 (2020) - [j17]Fenghua Li, Yongjun Li, Siyuan Leng, Yunchuan Guo, Kui Geng, Zhen Wang
, Liang Fang:
Dynamic countermeasures selection for multi-path attacks. Comput. Secur. 97: 101927 (2020) - [j16]Rongna Xie
, Guozhen Shi, Yunchuan Guo, Fenghua Li:
A topic-centric access control model for the publish/subscribe paradigm. Concurr. Comput. Pract. Exp. 32(9) (2020) - [j15]Lihua Yin, Binxing Fang, Yunchuan Guo, Zhe Sun
, Zhihong Tian
:
Hierarchically defining Internet of Things security: From CIA to CACA. Int. J. Distributed Sens. Networks 16(1) (2020) - [j14]Liang Fang, Guozhen Shi, Lianhai Wang, Yongjun Li, Shujiang Xu
, Yunchuan Guo:
Incentive mechanism for cooperative authentication: An evolutionary game approach. Inf. Sci. 527: 369-381 (2020) - [j13]Fenghua Li, Zifu Li, Liang Fang, Yongjun Li, Yaobing Xu, Yunchuan Guo:
Securing instruction interaction for hierarchical management. J. Parallel Distributed Comput. 137: 91-103 (2020) - [j12]Lili Chen
, Zhen Wang
, Fenghua Li, Yunchuan Guo, Kui Geng:
A Stackelberg Security Game for Adversarial Outbreak Detection in the Internet of Things. Sensors 20(3): 804 (2020) - [c32]Junchao Dong, Feijuan He, Yunchuan Guo, Huibing Zhang:
A Commodity Review Sentiment Analysis Based on BERT-CNN Model. ICCCS 2020: 143-147 - [c31]Tianzhu Chen, Fenghua Li, Fuzhen Zhuang, Yunchuan Guo, Liang Fang:
The Linear Geometry Structure of Label Matrix for Multi-label Learning. DEXA (2) 2020: 229-244 - [c30]Yunchuan Guo, Han Zhang, Zifu Li, Fenghua Li, Liang Fang, Lihua Yin, Jin Cao:
Decision-Making for Intrusion Response: Which, Where, in What Order, and How Long? ICC 2020: 1-6
2010 – 2019
- 2019
- [j11]Fangfang Shan, Hui Li, Fenghua Li, Yunchuan Guo, Jinbo Xiong:
An Attribute-Based Assured Deletion Scheme in Cloud Computing. Int. J. Inf. Technol. Web Eng. 14(2): 74-91 (2019) - [j10]Fenghua Li, Zifu Li
, Weili Han
, Ting Wu, Lihua Chen, Yunchuan Guo
, Jinjun Chen:
Cyberspace-Oriented Access Control: A Cyberspace Characteristics-Based Model and its Policies. IEEE Internet Things J. 6(2): 1471-1483 (2019) - [j9]Yunchuan Guo, Han Zhang, Lingcui Zhang, Liang Fang, Fenghua Li:
A game theoretic approach to cooperative intrusion detection. J. Comput. Sci. 30: 118-126 (2019) - [j8]Xiuze Dong, Yunchuan Guo, Fenghua Li, Liju Dong, Arshad Khan:
Combination Model of Heterogeneous Data for Security Measurement. J. Univers. Comput. Sci. 25(3): 270-281 (2019) - [c29]Yanwei Sun, Li Chen, Lihua Yin, Yunchuan Guo, Xiangjie Meng, Peng Zhang:
Construction of Situation Assessment Indicator System Based on Latitude and Longitude Lines of Information Security. DSC 2019: 100-105 - [c28]Yunchuan Guo, Xiao Wang, Liang Fang, Yongjun Li, Fenghua Li, Kui Geng:
Incentive Mechanism for Cooperative Intrusion Response: A Dynamic Game Approach. ICCS (1) 2019: 590-603 - 2018
- [j7]Fangfang Shan
, Hui Li, Fenghua Li, Yunchuan Guo
, Ben Niu:
HAC: Hybrid Access Control for Online Social Networks. Secur. Commun. Networks 2018: 7384194:1-7384194:11 (2018) - [j6]Lihua Yin, Yanwei Sun
, Zhen Wang, Yunchuan Guo
, Fenghua Li, Binxing Fang:
Security Measurement for Unknown Threats Based on Attack Preferences. Secur. Commun. Networks 2018: 7412627:1-7412627:13 (2018) - [j5]Lihua Yin, Yunchuan Guo, Fenghua Li, Yanwei Sun, Junyan Qian, Athanasios V. Vasilakos
:
A game-theoretic approach to advertisement dissemination in ephemeral networks. World Wide Web 21(2): 241-260 (2018) - [c27]Yunchuan Guo, Liang Fang, Kui Geng, Lihua Yin, Fenghua Li, Lihua Chen:
Real-Time Data Incentives for IoT Searches. ICC 2018: 1-6 - [c26]Yunchuan Guo, Han Zhang, Lingcui Zhang, Liang Fang, Fenghua Li:
Incentive Mechanism for Cooperative Intrusion Detection: An Evolutionary Game Approach. ICCS (1) 2018: 83-97 - [c25]Yanwei Sun, Lihua Yin, Zhen Wang, Yunchuan Guo, Binxing Fang:
Identifying the Propagation Sources of Stealth Worms. ICCS (3) 2018: 811-817 - [c24]Fenghua Li, Yongjun Li, Zhengkun Yang, Yunchuan Guo, Lihua Yin, Zhen Wang:
Selecting Combined Countermeasures for Multi-Attack Paths in Intrusion Response System. ICCCN 2018: 1-9 - [c23]Jingquan Ding, Xiao Li, Yunchuan Guo, Lihua Yin, Huibing Zhang:
Process Calculus for Modeling and Quantifying Location Privacy. IIKI 2018: 407-415 - [c22]Liang Fang, Lihua Yin, Yunchuan Guo, Zhen Wang, Fenghua Li:
Resolving Access Conflicts: An Auction-Based Incentive Approach. MILCOM 2018: 1-6 - 2017
- [j4]Lei Wang, Tiedi Zhang, Oupeng Li, Manfei Yang, Qing Chen, Mingzhou Zan, Yunchuan Guo:
A D-band divide-by-6 injection-locked frequency divider with Lange-coupler feedback architecture in 0.13 µm SiGe HBT. IEICE Electron. Express 14(17): 20170328 (2017) - [j3]Yunchuan Guo, Chengwei Shang, Kun Liu, Lei Wang, Xiansuo Liu, Yuehang Xu, Tiedi Zhang:
A true-time-delay transmit/receive module for X-band subarray phased arrays. IEICE Electron. Express 14(22): 20171039 (2017) - [c21]Fenghua Li, Zifu Li, Weili Han, Ting Wu, Lihua Chen, Yunchuan Guo:
Cyberspace-Oriented Access Control: Model and Policies. DSC 2017: 261-266 - [c20]Yanwei Sun, Lihua Yin, Yunchuan Guo, Fenghua Li, Binxing Fang:
Optimally Selecting the Timing of Zero-Day Attack via Spatial Evolutionary Game. ICA3PP 2017: 313-327 - [c19]Jing Li, Lihua Yin, Yunchuan Guo, Chao Li, Fenghua Li, Lihua Chen:
A Novel Threat-Driven Data Collection Method for Resource-Constrained Networks. NSS 2017: 486-496 - [c18]Ziwen Liu, Liang Fang, Lihua Yin, Yunchuan Guo, Fenghua Li:
Research on Similarity Record Detection of Device Status Information Based on Multiple Encoding Field. SpaCCS Workshops 2017: 54-63 - 2016
- [c17]Chao Lee, Wei Wang, Yunchuan Guo:
A Fine-Grained Multiparty Access Control Model for Photo Sharing in OSNs. DSC 2016: 440-445 - 2015
- [c16]Lihua Yin, Yunchuan Guo, Yanwei Sun, Junyan Qian
, Athanasios V. Vasilakos
:
Ad Dissemination Game in Ephemeral Networks. APWeb 2015: 610-622 - [c15]Daiyong Quan, Lihua Yin, Yunchuan Guo:
Assessing the Disclosure of User Profile in Mobile-Aware Services. Inscrypt 2015: 451-467 - [c14]Daiyong Quan, Lihua Yin, Yunchuan Guo:
Enhancing the Trajectory Privacy with Laplace Mechanism. TrustCom/BigDataSE/ISPA (1) 2015: 1218-1223 - 2014
- [c13]Liang Fang, Yunchuan Guo:
A Survey of Role Mining Methods in Role-Based Access Control System. APWeb Workshophs 2014: 291-300 - [c12]Licai Liu, Lihua Yin, Yunchuan Guo, Bingxing Fang:
EAC: A Framework of Authentication Property for the IOTs. CyberC 2014: 102-105 - [c11]Yunchuan Guo, Lihua Yin, Li Chao:
Automatically verifying STRAC policy. INFOCOM Workshops 2014: 141-142 - [c10]Licai Liu, Yunchuan Guo, Lihua Yin:
Analyzing asking/bidding price in dynamic game for cooperative authentication. INFOCOM Workshops 2014: 165-166 - [c9]Yunchuan Guo, Lihua Yin, Licai Liu, Binxing Fang:
Utility-based cooperative decision in cooperative authentication. INFOCOM 2014: 1006-1014 - [c8]Licai Liu, Lihua Yin, Yunchuan Guo, Bingxing Fang:
Bargaining-Based Dynamic Decision for Cooperative Authentication in MANETs. TrustCom 2014: 212-220 - 2013
- [c7]Licai Liu, Yunchuan Guo, Lihua Yin, Yan Sun:
Balancing authentication and location privacy in cooperative authentication. ANCS 2013: 107-108 - [c6]Chao Lee, Yunchuan Guo, Lihua Yin:
A Framework of Evaluation Location Privacy in Mobile Network. ITQM 2013: 879-887 - 2012
- [c5]Jinyu Wu, Lihua Yin, Yunchuan Guo:
Cyber Attacks Prediction Model Based on Bayesian Network. ICPADS 2012: 730-731 - [c4]Chao Lee, Lihua Yin, Yunchuan Guo:
A Cluster-Based Multilevel Security Model for Wireless Sensor Networks. Intelligent Information Processing 2012: 320-330 - 2010
- [j2]Binxing Fang, Yunchuan Guo, Yuan Zhou:
Information content security on the Internet: the control model and its evaluation. Sci. China Inf. Sci. 53(1): 30-49 (2010) - [j1]Lihua Yin, Binxing Fang, Yunchuan Guo, Hui He:
Formalization and Quantitative Analysis of Controllability on Internet Information Security. Int. J. Web Appl. 2(2): 109-120 (2010) - [c3]Yunchuan Guo, Lihua Yin, Yuan Zhou, Binxing Fang:
Quantifying Information Leakage for Fully Probabilistic Systems. CIT 2010: 589-595
2000 – 2009
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-18 02:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint