default search action
Xiaohong Yuan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i3]Ebuka Okpala, Nishant Vishwamitra, Keyan Guo, Song Liao, Long Cheng, Hongxin Hu, Yongkai Wu, Xiaohong Yuan, Jeannette Wade, Sajad Khorsandroo:
AI-Cybersecurity Education Through Designing AI-based Cyberharassment Detection Lab. CoRR abs/2405.08125 (2024) - 2023
- [j22]Zhipeng Liu, Junyi Hu, Yang Liu, Kaushik Roy, Xiaohong Yuan, Jinsheng Xu:
Anomaly-Based Intrusion on IoT Networks Using AIGAN-a Generative Adversarial Network. IEEE Access 11: 91116-91132 (2023) - [j21]Xueyun Li, Yiping Wang, Chuqi Su, Xinle Gong, Jin Huang, Xun Liu, Xiaohong Yuan, Shixuan Wang:
Driver and automation cooperation approach for share steering control system. J. Frankl. Inst. 360(11): 7269-7293 (2023) - [j20]Zhifeng Yu, Jun Zhang, Zheyu Chen, Yuekai Hu, C. K. Shum, Chaofei Ma, Qingjun Song, Xiaohong Yuan, Ben Wang, Bin Zhou:
Spatiotemporal Evolutions of the Suspended Particulate Matter in the Yellow River Estuary, Bohai Sea and Characterized by Gaofen Imagery. Remote. Sens. 15(19): 4769 (2023) - [c86]Daniel Machooka, Xiaohong Yuan, Albert C. Esterline:
A Survey of Attacks and Defenses for Deep Neural Networks. CSR 2023: 254-261 - [c85]Jairen Gilmore, Uriah Vendell Moore, Xiaohong Yuan, Taylor Headen, Mounika Vanamala:
Visualization Dashboard for Recommending Attack Patterns Using Topic Modeling. ICSIE 2023: 46-51 - [c84]Jeffrey J. Hernandez V., Rodney Dejournett, Justin Bowser, Xiaohong Yuan, Kaushik Roy:
A Comparison of Deep Learning Models for Periocular Region-Based Authentication. IntelliSys (2) 2023: 461-476 - [c83]David Johnson, Xiaohong Yuan, Kaushik Roy:
Using Ensemble Convolutional Neural Network to Detect Deepfakes Using Periocular Data. IntelliSys (2) 2023: 546-563 - [c82]Bassey Ude, Olusola Tolulope Odeyomi, Kaushik Roy, Xiaohong Yuan:
A Survey on Bias Mitigation in Federated Learning. SSCI 2023: 1170-1175 - [i2]Prosenjit Chatterjee, Alex Yalchin, Joseph Shelton, Kaushik Roy, Xiaohong Yuan, Kossi D. Edoh:
Presentation Attack detection using Wavelet Transform and Deep Residual Neural Net. CoRR abs/2312.00040 (2023) - 2022
- [j19]Imano Williams, Xiaohong Yuan, Mohd Anwar, Jeffrey Todd McDonald:
An Automated Security Concerns Recommender Based on Use Case Specification Ontology. Autom. Softw. Eng. 29(2): 42 (2022) - [j18]Alex Sumner, Xiaohong Yuan, Mohd Anwar, Maranda E. McBride:
Examining Factors Impacting the Effectiveness of Anti-Phishing Trainings. J. Comput. Inf. Syst. 62(5): 975-997 (2022) - [j17]Zhifeng Yu, Qiyu Huang, Xiaoxue Peng, Haijian Liu, Qin Ai, Bin Zhou, Xiaohong Yuan, Meihong Fang, Ben Wang:
Comparative Study on Recognition Models of Black-Odorous Water in Hangzhou Based on GF-2 Satellite Data. Sensors 22(12): 4593 (2022) - [c81]Jinsheng Xu, Xiaohong Yuan, Swathi Nallela, Kevin Hillard, Jinghua Zhang:
Learn ARP Spoofing Attack in a Game. FIE 2022: 1-5 - [c80]Richard Farrell, Xiaohong Yuan, Kaushik Roy:
IoT to Structured Data (IoT2SD): A Big Data Information Extraction Framework. ICAIC 2022: 1-6 - [c79]Sandeep Shah, Xiaohong Yuan, Zanetta Tyler:
An Analysis of COVID-19 related Twitter Data for Asian Hate Speech Using Machine Learning Algorithms. ICAIC 2022: 1-6 - [c78]Alex Sumner, Jinsheng Xu, Xiaohong Yuan:
Determining Phishing Emails using URL Domain Features. ICAIC 2022: 1-5 - [c77]Caitlin Richardson, Sandeep Shah, Xiaohong Yuan:
Semi-Supervised Machine Learning for Analyzing COVID-19 Related Twitter Data for Asian Hate Speech. ICMLA 2022: 1643-1648 - [c76]Binhai Zhu, Jordan Sturtz, Xiaowen Liu, Letu Qingge, Xiaohong Yuan, Xingang Fu:
Deep Learning Approaches for the Protein Scaffold Filling Problem. ICTAI 2022: 1055-1061 - [c75]Jeffrey J. Hernandez V., Rodney Dejournett, Udayasri Nannuri, Tony Gwyn, Xiaohong Yuan, Kaushik Roy:
Face Authentication from Masked Face Images Using Deep Learning on Periocular Biometrics. IEA/AIE 2022: 452-459 - 2021
- [j16]Norah Alshareef, Xiaohong Yuan, Kaushik Roy, Mustafa Atay:
A Study of Gender Bias in Face Presentation Attack and Its Mitigation. Future Internet 13(9): 234 (2021) - [j15]Xiaolan Wang, Fan Yang, Wenjuan Chen, Xiaohong Yuan:
Ultrasonic Diagnosis and Analysis of the Effect of Labor Analgesia on Early Pelvic Floor Function and Pelvic Floor Dysfunction. J. Medical Imaging Health Informatics 11(7): 1903-1910 (2021) - [j14]Zhipeng Liu, Niraj Thapa, Addison Shaver, Kaushik Roy, Madhuri Siddula, Xiaohong Yuan, Anna Yu:
Using Embedded Feature Selection and CNN for Classification on CCD-INID-V1 - A New IoT Dataset. Sensors 21(14): 4834 (2021) - [c74]Sandeep Shah, Pramita Sree Muhuri, Xiaohong Yuan, Kaushik Roy, Prosenjit Chatterjee:
Implementing a network intrusion detection system using semi-supervised support vector machine and random forest. ACM Southeast Conference 2021: 180-184 - [c73]Patrickson Weanquoi, Jinghua Zhang, Xiaohong Yuan, Jinsheng Xu, Elva J. Jones:
Learn Access Control Concepts in a Game. FIE 2021: 1-6 - [c72]Mesafint Fanuel, Xiaohong Yuan, Hyung Nam Kim, Letu Qingge, Kaushik Roy:
A Survey on Skeleton-Based Activity Recognition using Graph Convolutional Networks (GCN). ISPA 2021: 177-182 - [c71]Leyu Gao, Sandeep Shah, Nasser Assery, Xiaohong Yuan, Xiuli Qu, Kaushik Roy:
Semi-Supervised Self Training to Assess the Credibility of Tweets. ISPA/BDCloud/SocialCom/SustainCom 2021: 1532-1537 - 2020
- [j13]Pramita Sree Muhuri, Prosenjit Chatterjee, Xiaohong Yuan, Kaushik Roy, Albert C. Esterline:
Using a Long Short-Term Memory Recurrent Neural Network (LSTM-RNN) to Classify Network Attacks. Inf. 11(5): 243 (2020) - [c70]Addison Shaver, Zhipeng Liu, Niraj Thapa, Kaushik Roy, Balakrishna Gokaraju, Xiaohong Yuan:
Anomaly Based Intrusion Detection for IoT with Machine Learning. AIPR 2020: 1-6 - [c69]Qinrui Yu, Jinsheng Xu, Huiming Yu, Xiaohong Yuan:
The Design and Implementation of Secure Program Design Education Tool. CSEDU (1) 2020: 319-324 - [c68]Jinghua Zhang, Xiaohong Yuan, Jaris Johnson, Jinsheng Xu, Mounika Vanamala:
Developing and Assessing a Web-Based Interactive Visualization Tool to Teach Buffer Overflow Concepts. FIE 2020: 1-7 - [c67]Patrickson Boan Weanquoi, Jinghua Zhang, Jinsheng Xu, Xiaohong Yuan, Elva J. Jones:
Developing and Assessing an Educational Game for Teaching Access Control. ICER 2020: 312 - [c66]W. Shannon Brown, Kaushik Roy, Xiaohong Yuan:
US Traffic Sign Recognition Using CNNs. IntelliSys (3) 2020: 657-661 - [c65]Nasser Assery, Xiaohong Yuan, Xiuli Qu, Sultan Almalki, Kaushik Roy:
Identifying Panic Triggers from Disaster-Related Tweets. ISPA/BDCloud/SocialCom/SustainCom 2020: 827-836 - [c64]Imano Williams, Xiaohong Yuan:
Identifying Security Concerns Based on a Use Case Ontology Framework. SEKE 2020: 83-88 - [c63]Hanan Alshaher, Xiaohong Yuan, Sajad Khorsandroo:
Teaching Flooding Attack to the SDN Data Plane with POGIL. SIGITE 2020: 194-199
2010 – 2019
- 2019
- [j12]Dylan J. Gunn, Zhipeng Liu, Rushit Dave, Xiaohong Yuan, Kaushik Roy:
Touch-Based Active Cloud Authentication Using Traditional Machine Learning and LSTM on a Distributed Tensorflow Framework. Int. J. Comput. Intell. Appl. 18(4): 1950022:1-1950022:16 (2019) - [j11]Ling Li, Wu He, Li Xu, Ivan K. Ash, Mohd Anwar, Xiaohong Yuan:
Investigating the impact of cybersecurity policy awareness on employees' cybersecurity behavior. Int. J. Inf. Manag. 45: 13-24 (2019) - [c62]Alex Sumner, Xiaohong Yuan:
Mitigating Phishing Attacks: An Overview. ACM Southeast Regional Conference 2019: 72-77 - [c61]Wu He, Mohd Anwar, Ivan K. Ash, Ling Li, Xiaohong Yuan, Li Xu, Xin Tian:
Effects of Evidence-Based Malware Cybersecurity Training on Employees. AMCIS 2019 - [c60]Jinghua Zhang, Xiaohong Yuan, Jinsheng Xu, Elva J. Jones:
Developing and Assessing Educational Games to Enhance Cyber Security Learning in Computer Science. CompEd 2019: 241 - [c59]Xiaohong Yuan, Tian Zhang, Ali Albu Shama, Jinsheng Xu, Li Yang, Jennifer T. Ellis, Wu He, Cynthia Waters:
Teaching Cybersecurity Using Guided Inquiry Collaborative Learning. FIE 2019: 1-6 - [c58]Emmanuel Borkor Nuakoh, Kaushik Roy, Xiaohong Yuan, Albert C. Esterline:
Deep Learning Approach for U.S. Traffic Sign Recognition. ICDLT 2019: 47-50 - [c57]Nasser Assery, Xiaohong Yuan, Sultan Almalki, Kaushik Roy, Xiuli Qu:
Comparing Learning-Based Methods for Identifying Disaster-Related Tweets. ICMLA 2019: 1829-1836 - [c56]Younghee Park, Hongxin Hu, Xiaohong Yuan:
Security Labs for Software Defined Networks in CloudLab. SIGCSE 2019: 1235 - [c55]Prosenjit Chatterjee, Alex Yalchin, Joseph Shelton, Kaushik Roy, Xiaohong Yuan, Kossi D. Edoh:
Presentation Attack Detection Using Wavelet Transform and Deep Residual Neural Net. SpaCCS Workshops 2019: 86-94 - 2018
- [c54]Daniel Hooks, Xiaohong Yuan, Kaushik Roy, Albert C. Esterline, Joaquin Hernandez:
Applying Artificial Immune System for Intrusion Detection. BigDataService 2018: 287-292 - [c53]Imano Williams, Xiaohong Yuan:
A User Study: Abuse Cases Derived from Use Case Description and CAPEC Attack Patterns. ICISA 2018: 239-249 - [c52]Anthony Dobson, Kaushik Roy, Xiaohong Yuan, Jinsheng Xu:
Performance Evaluation of Machine Learning Algorithms in Apache Spark for Intrusion Detection. ITNAC 2018: 1-6 - [c51]Younghee Park, Hongxin Hu, Xiaohong Yuan, Hongda Li:
Enhancing Security Education Through Designing SDN Security Labs in CloudLab. SIGCSE 2018: 185-190 - 2017
- [j10]Mohd Anwar, Wu He, Ivan K. Ash, Xiaohong Yuan, Ling Li, Li Xu:
Gender difference and employees' cybersecurity behaviors. Comput. Hum. Behav. 69: 437-443 (2017) - [j9]Xiaohong Yuan, Kenneth Williams, Huiming Yu, Audrey Rorrer, Bei-Tseng Chu, Li Yang, Kathy Winters, Joseph M. Kizza:
Faculty Workshops for Teaching Information Assurance through Hands-On Exercises and Case Studies. J. Inf. Syst. Educ. 28(1): 11-20 (2017) - [c50]Shilpa Kumari, Xiaohong Yuan, Joshua Patterson, Huiming Yu:
Demystifying ad fraud. FIE 2017: 1-5 - [c49]Brandon Scott, Jinsheng Xu, Jinghua Zhang, Ariana Brown, Erica Clark, Xiaohong Yuan, Anna Yu, Kenneth Williams:
An interactive visualization tool for teaching ARP spoofing attack. FIE 2017: 1-5 - [c48]Ningxin Shi, Xiaohong Yuan, William Nick:
Semi-supervised Random Forest for Intrusion Detection Network. MAICS 2017: 181-185 - [c47]Imano Williams, Xiaohong Yuan:
Creating Abuse Cases Based on Attack Patterns: A User Study. SecDev 2017: 85-86 - [c46]Xiaohong Yuan, Li Yang, Wu He, Jennifer T. Ellis, Jinsheng Xu, Cynthia K. Waters:
Enhancing Cybersecurity Education Using POGIL (Abstract Only). SIGCSE 2017: 719 - 2016
- [j8]Imano Williams, Xiaohong Yuan, Jeffrey Todd McDonald, Mohd Anwar:
A Method for Developing Abuse Cases and Its Evaluation. J. Softw. 11(5): 520-527 (2016) - [c45]Mohd Anwar, Wu He, Xiaohong Yuan:
Employment status and cybersecurity behaviors. BESC 2016: 1-2 - [c44]Jinsheng Xu, Xiaohong Yuan, Anna Yu, Jung Hee Kim, Taehee Kim, Jinghua Zhang:
Developing and evaluating a hands-on lab for teaching local area network vulnerabilities. FIE 2016: 1-4 - [c43]Xiaohong Yuan, Kenneth Williams, D. Scott McCrickard, Charles Hardnett, Litany H. Lineberry, Kelvin S. Bryant, Jinsheng Xu, Albert C. Esterline, Anyi Liu, Selvarajah Mohanarajah, Rachel Rutledge:
Teaching mobile computing and mobile security. FIE 2016: 1-6 - [c42]Jinsheng Xu, Xiaohong Yuan, Ashrith Velma:
Design and Evaluation of a Course Module on Android Cipher Programming (Abstract Only). SIGCSE 2016: 689-690 - [c41]Xiaohong Yuan, Jinsheng Xu, Huiming Yu, Junghee Kim, Taehee Kim:
Assessing the Effectiveness of Experiential-Learning-Based Teaching Tools in Cybersecurity Courses (Abstract Only). SIGCSE 2016: 693 - [c40]Xiaohong Yuan, Wu He, Li Yang, Lindsay Simpkins:
Teaching Security Management for Mobile Devices. SIGITE 2016: 14-19 - 2015
- [j7]Xiaohong Yuan, Emmanuel Borkor Nuakoh, Imano Williams, Huiming Yu:
Developing Abuse Cases Based on Threat Modeling and Attack Patterns. J. Softw. 10(4): 491-498 (2015) - [c39]Mohd Anwar, Ivan K. Ash, Wu He, Ling Li, Li Xu, Xiaohong Yuan:
A Security Behavior Model of Employees in Cyberspace. AMCIS 2015 - [c38]Lindsay Simpkins, Xiaohong Yuan, Huiming Yu, Kenneth Williams:
Using a case study to teach students about finding and fixing logic flaws in software. FIE 2015: 1-7 - [c37]Jinsheng Xu, Xiaohong Yuan:
Developing a course module for teaching cryptography programming on Android. FIE 2015: 1-4 - [c36]Huiming Yu, Kenneth Williams, Xiaohong Yuan:
Cloud Computing Threats and Provider Security Assessment. ICA3PP (Workshops and Symposiums) 2015: 238-250 - [c35]Imano Williams, Xiaohong Yuan:
Evaluating the effectiveness of Microsoft threat modeling tool. InfoSecCD 2015: 9:1-9:6 - [c34]Lindsay Simpkins, Xiaohong Yuan, Jwalit Modi, Justin Zhan, Li Yang:
A course module on web tracking and privacy. InfoSecCD 2015: 10:1-10:7 - [c33]Xiaohong Yuan, Kelvin S. Bryant, Kenneth Williams, Jinsheng Xu:
Integrating Mobile Computing and Security into a Computer Science Curriculum (Abstract Only). SIGCSE 2015: 686 - 2014
- [c32]Xiaohong Yuan, Emmanuel Borkor Nuakoh, Jodria S. Beal, Huiming Yu:
Retrieving relevant CAPEC attack patterns for secure software development. CISR 2014: 33-36 - [c31]Wu He, Xiaohong Yuan, Xin Tian:
The Self-Efficacy Variable in Behavioral Information Security Research. ES 2014: 28-32 - [c30]Ling Li, Wu He, Li Xu, Ivan K. Ash, Mohd Anwar, Xiaohong Yuan:
Does Explicit Information Security Policy Affect Employees' Cyber Security Behavior? A Pilot Study. ES 2014: 169-173 - [c29]Xiaohong Yuan, Kenneth Williams, Huiming Yu, Bei-tseng Chu, Audrey Rorrer, Li Yang, Kathy Winters, Joseph M. Kizza:
Developing Faculty Expertise in Information Assurance through Case Studies and Hands-On Experiences. HICSS 2014: 4938-4945 - [c28]Lindsay Simpkins, Xiaohong Yuan, Jung Hee Kim:
A course module on clickjacking. InfoSecCD 2014: 2:1 - [c27]Perron Johnson, Philip Harris, Keheira Henderson, Xiaohong Yuan, Li Yang:
A course module on mobile malware. InfoSecCD 2014: 10:1 - [c26]Shearon Brown, Xiaohong Yuan:
Techniques for retaining low performing students: high-need student mentoring program (abstract only). SIGCSE 2014: 708 - [c25]Wenliang Du, Li Yang, Joseph Migga Kizza, Xiaohong Yuan:
New hands-on labs on browser security (abstract only). SIGCSE 2014: 717 - 2013
- [j6]Francis Akowuah, Xiaohong Yuan, Jinsheng Xu, Hong Wang:
A Survey of Security Standards Applicable to Health Information Systems. Int. J. Inf. Secur. Priv. 7(4): 22-36 (2013) - [j5]Wu He, Xiaohong Yuan, Li Yang:
Supporting Case-Based Learning in Information Security with Web-Based Technology. J. Inf. Syst. Educ. 24(1): 31-40 (2013) - [c24]Xiaohong Yuan, Jinsheng Xu, Hong Wang, Kossi D. Edoh:
Developing an interdisciplinary Health Informatics Security and privacy program. FIE 2013: 1618-1622 - 2012
- [j4]Francis Akowuah, Xiaohong Yuan, Jinsheng Xu, Hong Wang:
A Survey of U.S. Laws for Health Information Security & Privacy. Int. J. Inf. Secur. Priv. 6(4): 40-54 (2012) - [c23]Huiming Yu, Nakia Powell, Dexter Stembridge, Xiaohong Yuan:
Cloud computing and security challenges. ACM Southeast Regional Conference 2012: 298-302 - [c22]Xiaohong Yuan, Jinsheng Xu, Kossi D. Edoh, Hong Wang:
Developing an interdisciplinary health informatics security and privacy program (abstract only). SIGCSE 2012: 666 - 2011
- [c21]Nathaniel Evans, Xiaohong Yuan:
Observation of recent Microsoft Zero-Day vulnerabilities. ACM Southeast Regional Conference 2011: 328-329 - [c20]Abdrah Abuzaid, Xiaohong Yuan, Huiming Yu, Bill Chu:
The Design and Implementation of a Cryptographic Education Tool. CSEDU (1) 2011: 193-198 - [c19]Tom Terry Jr., Huiming Yu, Kenneth Williams, Xiaohong Yuan, Bill Chu:
A Visualization based Simulator for SYN Flood Attacks. IMAGAPP/IVAPP 2011: 251-255 - [i1]Xiaohong Yuan, Eduardo B. Fernández:
Patterns for Business-to-consumer E-Commerce Applications. CoRR abs/1108.3342 (2011) - 2010
- [j3]Xiaohong Yuan, Percy Vega, Yaseen Qadah, Ricky Archer, Huiming Yu, Jinsheng Xu:
Visualization Tools for Teaching Computer Security. ACM Trans. Comput. Educ. 9(4): 20:1-20:28 (2010) - [c18]Xiaohong Yuan, Sahana Murthy, Jinsheng Xu, Huiming Yu:
Case studies for teaching physical security and security policy. InfoSecCD 2010: 21-26 - [c17]Tamirat Abegaz, Xiaohong Yuan:
Designing an SOA-Based Earthquake Forewarning System using BPMN. Software Engineering Research and Practice 2010: 593-598
2000 – 2009
- 2009
- [c16]David Matthews, Xiaohong Yuan, Edmundson Effort, Huiming Yu:
Laboratory Design For Demonstrating Phishing. FECS 2009: 399-404 - [c15]Huiming Yu, Bill Chu, Xiaohong Yuan, Janelle C. Mason, Monica Barnette:
Using a Practice Oriented Approach to Teach Web Security Course. FECS 2009: 405-409 - 2008
- [p1]Xiaohong Yuan, Barbara Pioro, Ricky Archer, Yaohang Li:
Teaching Operating Systems Using Visualization: A Comparative Study. Innovative Techniques in Instruction Technology, E-learning, E-assessment, and Education 2008: 576-580 - 2007
- [j2]Otman Basir, Xiaohong Yuan:
Engine fault diagnosis based on multi-sensor information fusion using Dempster-Shafer evidence theory. Inf. Fusion 8(4): 379-386 (2007) - [j1]Yaohang Li, Daniel Chen, Xiaohong Yuan:
Trustworthy remote compiling services for grid-based scientific applications. J. Supercomput. 41(2): 119-131 (2007) - [c14]Huiming Yu, Xiaohong Yuan, Jinsheng Xu, Stephen Providence, Bill Chu, Dechang Gu:
Bridge Information Assurance Education Gap between the Majority and Minority Universities through Collaboration. ACIS-ICIS 2007: 1030-1035 - [c13]Xiaohong Yuan, Percy Vega, Jinsheng Xu, Huiming Yu, Yaohang Li:
Using packet sniffer simulator in the class: experience and evaluation. ACM Southeast Regional Conference 2007: 116-121 - [c12]Eduardo B. Fernández, Xiaohong Yuan:
Securing analysis patterns. ACM Southeast Regional Conference 2007: 288-293 - [c11]Barry L. Kurtz, James B. Fenwick Jr., Christopher C. Ellsworth, Xiaohong Yuan, Adam Steele, Xiaoping Jia:
Inter-University software engineering using web services. SIGCSE 2007: 464-468 - 2006
- [c10]Yaohang Li, Tao Dong, Xinyu Zhang, Yong-Duan Song, Xiaohong Yuan:
Large-scale software unit testing on the grid. GrC 2006: 596-599 - [c9]Thomas Baxley, Jinsheng Xu, Huiming Yu, Jinghua Zhang, Xiaohong Yuan, Joseph Brickhouse:
LAN attacker: a visual education tool. InfoSecCD 2006: 118-123 - [c8]Huiming Yu, W. Liao, Xiaohong Yuan, Jinsheng Xu:
Teaching a web security course to practice information assurance. SIGCSE 2006: 12-16 - 2005
- [c7]Yaohang Li, Daniel Tsu-Tang Chen, Xiaohong Yuan, Huiming Yu, Albert C. Esterline:
Secure Remote Compiling Services on the Grid. PDPTA 2005: 373-378 - [c6]Xiaohong Yuan, Percy Vega, Huiming Yu, Yaohang Li:
A Personal Software Process Tool for Eclipse Environment. Software Engineering Research and Practice 2005: 717-723 - 2003
- [c5]Xiaohong Yuan, Eduardo B. Fernández:
An Analysis Pattern for Course Management. EuroPLoP 2003: 899-912 - [c4]Xiaohong Yuan:
An Experience Report on Teaching the Personal Software Process. Software Engineering Research and Practice 2003: 810-815 - 2001
- [c3]Xiaohong Yuan, Mohammad Ilyas:
Threshold-Based Connection Admission Control Scheme in ATM Networks: A Simulation Study. ICN (2) 2001: 677-686 - 2000
- [c2]Eduardo B. Fernández, Xiaohong Yuan:
Semantic Analysis Patterns. ER 2000: 183-195
1990 – 1999
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-25 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint