default search action
Yang Xiang 0001
Person information
- affiliation: Swinburne University of Technology, School of Software and Electrical Engineering, Hawthorn, VIC, Australia
- affiliation: Deakin University, School of Information Technology, Geelong, VIC, Australia
- affiliation (former): Xidian University, State Key Laboratory of Integrated Service Networks, Xi'an, China
- affiliation (former): Central Queensland University, School of Management and Information Systems, Rockhampton, Australia
- affiliation (PhD): Deakin University, Geelong, VIC, Australia
Other persons with the same name
- Yang Xiang — disambiguation page
- Yang Xiang 0002 — Hong Kong University of Science and Technology, Department of Mathematics, Hong Kong
- Yang Xiang 0003 — Pengcheng Laboratory, Shenzhen, China (and 1 more)
- Yang Xiang 0004 — University of Guelph, School of Computer Science, Canada (and 5 more)
- Yang Xiang 0005 — Tongji University, State Key Laboratory of Marine Geology, Shanghai, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j317]Lihong Tang, Tingmin Wu, Xiao Chen, Sheng Wen, Wei Zhou, Xiaogang Zhu, Yang Xiang:
How COVID-19 impacts telehealth: an empirical study of telehealth services, users and the use of metaverse. Connect. Sci. 36(1) (2024) - [j316]Yanmei Cao, Jianghong Wei, Yang Xiang, Willy Susilo, Xiaofeng Chen:
Abuse-resistant deniable encryption. Comput. Stand. Interfaces 87: 103761 (2024) - [j315]Tengyun Jiao, Zhiyu Xu, Minfeng Qi, Sheng Wen, Yang Xiang, Gary Nan:
A Survey of Ethereum Smart Contract Security: Attacks and Detection. Distributed Ledger Technol. Res. Pract. 3(3): 23:1-23:28 (2024) - [j314]Minfeng Qi, Ziyuan Wang, Qing-Long Han, Jun Zhang, Shiping Chen, Yang Xiang:
Privacy Protection for Blockchain-Based Healthcare IoT Systems: A Survey. IEEE CAA J. Autom. Sinica 11(8): 1757-1776 (2024) - [j313]Jun Shen, Xiaofeng Chen, Xinyi Huang, Yang Xiang:
Public Proofs of Data Replication and Retrievability With User-Friendly Replication. IEEE Trans. Dependable Secur. Comput. 21(4): 2057-2067 (2024) - [j312]Lihong Tang, Xiao Chen, Sheng Wen, Li Li, Marthie Grobler, Yang Xiang:
Demystifying the Evolution of Android Malware Variants. IEEE Trans. Dependable Secur. Comput. 21(4): 3324-3341 (2024) - [j311]Wanlun Ma, Yiliao Song, Minhui Xue, Sheng Wen, Yang Xiang:
The "Code" of Ethics: A Holistic Audit of AI Code Generators. IEEE Trans. Dependable Secur. Comput. 21(5): 4997-5013 (2024) - [j310]Chuer Yu, Xuhong Zhang, Yuxuan Duan, Senbo Yan, Zonghui Wang, Yang Xiang, Shouling Ji, Wenzhi Chen:
Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection. IEEE Trans. Dependable Secur. Comput. 21(5): 5029-5045 (2024) - [j309]Gaolei Fei, Yang Liu, Guangmin Hu, Sheng Wen, Yang Xiang:
Online Social Network User Home Location Inference Based on Heterogeneous Networks. IEEE Trans. Dependable Secur. Comput. 21(6): 5509-5525 (2024) - [j308]Wanlun Ma, Derui Wang, Chao Chen, Sheng Wen, Gaolei Fei, Yang Xiang:
LocGuard: A Location Privacy Defender for Image Sharing. IEEE Trans. Dependable Secur. Comput. 21(6): 5526-5537 (2024) - [j307]Xiaogang Zhu, Siyu Zhang, Chaoran Li, Sheng Wen, Yang Xiang:
Fuzzing Android Native System Libraries via Dynamic Data Dependency Graph. IEEE Trans. Inf. Forensics Secur. 19: 3733-3744 (2024) - [j306]Cong Wu, Jing Chen, Qianru Fang, Kun He, Ziming Zhao, Hao Ren, Guowen Xu, Yang Liu, Yang Xiang:
Rethinking Membership Inference Attacks Against Transfer Learning. IEEE Trans. Inf. Forensics Secur. 19: 6441-6454 (2024) - [c148]Zhi Zhang, Decheng Chen, Jiahao Qi, Yueqiang Cheng, Shijie Jiang, Yiyang Lin, Yansong Gao, Surya Nepal, Yi Zou, Jiliang Zhang, Yang Xiang:
SoK: Rowhammer on Commodity Operating Systems. AsiaCCS 2024 - [c147]Cong Wu, Jing Chen, Ziming Zhao, Kun He, Guowen Xu, Yueming Wu, Haijun Wang, Hongwei Li, Yang Liu, Yang Xiang:
TokenScout: Early Detection of Ethereum Scam Tokens via Temporal Graph Learning. CCS 2024: 956-970 - [c146]Xiaoxing Mo, Yechao Zhang, Leo Yu Zhang, Wei Luo, Nan Sun, Shengshan Hu, Shang Gao, Yang Xiang:
Robust Backdoor Detection for Deep Learning via Topological Evolution Dynamics. SP 2024: 2048-2066 - [c145]Shigang Liu, Di Cao, Junae Kim, Tamas Abraham, Paul Montague, Seyit Camtepe, Jun Zhang, Yang Xiang:
EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection. USENIX Security Symposium 2024 - [i45]Zehang Deng, Ruoxi Sun, Minhui Xue, Sheng Wen, Seyit Camtepe, Surya Nepal, Yang Xiang:
Leakage-Resilient and Carbon-Neutral Aggregation Featuring the Federated AI-enabled Critical Infrastructure. CoRR abs/2405.15258 (2024) - [i44]Jiaheng Wei, Yanjun Zhang, Leo Yu Zhang, Ming Ding, Chao Chen, Kok-Leong Ong, Jun Zhang, Yang Xiang:
Memorization in deep learning: A survey. CoRR abs/2406.03880 (2024) - [i43]Shigang Liu, Di Cao, Junae Kim, Tamas Abraham, Paul Montague, Seyit Camtepe, Jun Zhang, Yang Xiang:
EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection. CoRR abs/2407.19216 (2024) - 2023
- [j305]Lin Li, Chao Chen, Lei Pan, Leo Yu Zhang, Zhifeng Wang, Jun Zhang, Yang Xiang:
A Survey of PPG's Application in Authentication. Comput. Secur. 135: 103488 (2023) - [j304]Xiaoyu Zhang, Chao Chen, Yi Xie, Xiaofeng Chen, Jun Zhang, Yang Xiang:
A survey on privacy inference attacks and defenses in cloud-based Deep Neural Network. Comput. Stand. Interfaces 83: 103672 (2023) - [j303]Huacheng Li, Chunhe Xia, Tianbo Wang, Sheng Wen, Chao Chen, Yang Xiang:
Capturing Dynamics of Information Diffusion in SNS: A Survey of Methodology and Techniques. ACM Comput. Surv. 55(2): 22:1-22:51 (2023) - [j302]Qin Wang, Jiangshan Yu, Shiping Chen, Yang Xiang:
SoK: DAG-based Blockchain Systems. ACM Comput. Surv. 55(12): 261:1-261:38 (2023) - [j301]Qin Wang, Rujia Li, Shiping Chen, Yang Xiang:
Formal Security Analysis on dBFT Protocol of NEO. Distributed Ledger Technol. Res. Pract. 2(1): 2:1-2:19 (2023) - [j300]Qin Wang, Rujia Li, Qi Wang, David Galindo, Shiping Chen, Yang Xiang:
Transparent Registration-Based Encryption through Blockchain. Distributed Ledger Technol. Res. Pract. 2(1): 3:1-3:14 (2023) - [j299]Xiaotao Feng, Xiaogang Zhu, Qing-Long Han, Wei Zhou, Sheng Wen, Yang Xiang:
Detecting Vulnerability on IoT Device Firmware: A Survey. IEEE CAA J. Autom. Sinica 10(1): 25-41 (2023) - [j298]Jun Feng, Hu Xiong, Jinhao Chen, Yang Xiang, Kuo-Hui Yeh:
Scalable and Revocable Attribute-Based Data Sharing With Short Revocation List for IIoT. IEEE Internet Things J. 10(6, March 15): 4815-4829 (2023) - [j297]Yulei Wu, Ning Zhang, Zheng Yan, Mohammed Atiquzzaman, Yang Xiang:
Guest Editorial Special Issue on AI and Blockchain-Powered IoT Sustainable Computing. IEEE Internet Things J. 10(8, April 15): 6531-6534 (2023) - [j296]Yuming Feng, Weizhe Zhang, Shujun Yin, Hao Tang, Yang Xiang, Yu Zhang:
A Collaborative Stealthy DDoS Detection Method Based on Reinforcement Learning at the Edge of Internet of Things. IEEE Internet Things J. 10(20): 17934-17948 (2023) - [j295]Hao Zhou, Geng Yang, Yang Xiang, Yunlu Bai, Weiya Wang:
A Lightweight Matrix Factorization for Recommendation With Local Differential Privacy in Big Data. IEEE Trans. Big Data 9(1): 160-173 (2023) - [j294]Jianghua Liu, Jian Yang, Wei Wu, Xinyi Huang, Yang Xiang:
Lightweight Authentication Scheme for Data Dissemination in Cloud-Assisted Healthcare IoT. IEEE Trans. Computers 72(5): 1384-1395 (2023) - [j293]Shi-Cho Cha, Chun-Lin Chang, Yang Xiang, Tzu-Jia Huang, Kuo-Hui Yeh:
Enhancing OAuth With Blockchain Technologies for Data Portability. IEEE Trans. Cloud Comput. 11(1): 349-366 (2023) - [j292]Xiaoqin Feng, Jianfeng Ma, Huaxiong Wang, Sheng Wen, Yang Xiang, Yinbin Miao:
Space-Efficient Storage Structure of Blockchain Transactions Supporting Secure Verification. IEEE Trans. Cloud Comput. 11(3): 2631-2645 (2023) - [j291]Junyang Qiu, Qing-Long Han, Wei Luo, Lei Pan, Surya Nepal, Jun Zhang, Yang Xiang:
Cyber Code Intelligence for Android Malware Detection. IEEE Trans. Cybern. 53(1): 617-627 (2023) - [j290]Nan Sun, Jun Zhang, Shang Gao, Leo Yu Zhang, Seyit Camtepe, Yang Xiang:
Cyber Information Retrieval Through Pragmatics Understanding and Visualization. IEEE Trans. Dependable Secur. Comput. 20(2): 1186-1199 (2023) - [j289]Lihong Tang, Tingmin Wu, Xiao Chen, Sheng Wen, Li Li, Xin Xia, Marthie Grobler, Yang Xiang:
How Does Visualisation Help App Practitioners Analyse Android Apps? IEEE Trans. Dependable Secur. Comput. 20(3): 2238-2255 (2023) - [j288]Hao Zhou, Geng Yang, Yuxian Huang, Hua Dai, Yang Xiang:
Privacy-Preserving and Verifiable Federated Learning Framework for Edge Computing. IEEE Trans. Inf. Forensics Secur. 18: 565-580 (2023) - [j287]Rongjunchen Zhang, Tingmin Wu, Sheng Wen, Surya Nepal, Cécile Paris, Yang Xiang:
SAM: Multi-turn Response Selection Based on Semantic Awareness Matching. ACM Trans. Internet Techn. 23(1): 3:1-3:18 (2023) - [j286]Guangming Cui, Qiang He, Feifei Chen, Hai Jin, Yang Xiang, Yun Yang:
Location Privacy Protection via Delocalization in 5G Mobile Edge Computing Environment. IEEE Trans. Serv. Comput. 16(1): 412-423 (2023) - [j285]Chenkai Guo, Weijie Zhang, Naipeng Dong, Zheli Liu, Yang Xiang:
QoS-Aware Diversified Service Selection. IEEE Trans. Serv. Comput. 16(3): 2085-2099 (2023) - [c144]Lin Li, Chao Chen, Lei Pan, Yonghang Tai, Jun Zhang, Yang Xiang:
Hiding Your Signals: A Security Analysis of PPG-Based Biometric Authentication. ESORICS (3) 2023: 183-202 - [c143]Lin Li, Chao Chen, Lei Pan, Jun Zhang, Yang Xiang:
SigD: A Cross-Session Dataset for PPG-based User Authentication in Different Demographic Groups. IJCNN 2023: 1-8 - [c142]Wanlun Ma, Derui Wang, Ruoxi Sun, Minhui Xue, Sheng Wen, Yang Xiang:
The "Beatrix" Resurrections: Robust Backdoor Detection via Gram Matrices. NDSS 2023 - [c141]Lin Li, Chao Chen, Lei Pan, Leo Yu Zhang, Jun Zhang, Yang Xiang:
SigA: rPPG-based Authentication for Virtual Reality Head-mounted Display. RAID 2023: 686-699 - [c140]Rongjunchen Zhang, Tingmin Wu, Xiao Chen, Sheng Wen, Surya Nepal, Cécile Paris, Yang Xiang:
Dynalogue: A Transformer-Based Dialogue System with Dynamic Attention. WWW 2023: 1604-1615 - [e17]Joseph K. Liu, Yang Xiang, Surya Nepal, Gene Tsudik:
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, ASIA CCS 2023, Melbourne, VIC, Australia, July 10-14, 2023. ACM 2023 [contents] - [i42]Chuer Yu, Xuhong Zhang, Yuxuan Duan, Senbo Yan, Zonghui Wang, Yang Xiang, Shouling Ji, Wenzhi Chen:
Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection. CoRR abs/2303.18174 (2023) - [i41]Wanlun Ma, Yiliao Song, Minhui Xue, Sheng Wen, Yang Xiang:
The "code" of Ethics: A Holistic Audit of AI Code Generators. CoRR abs/2305.12747 (2023) - [i40]Zian Liu, Zhi Zhang, Siqi Ma, Dongxi Liu, Jun Zhang, Chao Chen, Shigang Liu, Muhammad Ejaz Ahmed, Yang Xiang:
SemDiff: Binary Similarity Detection by Diffing Key-Semantics Graphs. CoRR abs/2308.01463 (2023) - [i39]Jiaheng Wei, Yanjun Zhang, Leo Yu Zhang, Chao Chen, Shirui Pan, Kok-Leong Ong, Jun Zhang, Yang Xiang:
Client-side Gradient Inversion Against Federated Learning from Poisoning. CoRR abs/2309.07415 (2023) - [i38]Xiaoxing Mo, Yechao Zhang, Leo Yu Zhang, Wei Luo, Nan Sun, Shengshan Hu, Shang Gao, Yang Xiang:
Robust Backdoor Detection for Deep Learning via Topological Evolution Dynamics. CoRR abs/2312.02673 (2023) - 2022
- [j284]Rory Coulter, Jun Zhang, Lei Pan, Yang Xiang:
Domain adaptation for Windows advanced persistent threat detection. Comput. Secur. 112: 102496 (2022) - [j283]Yueqiang Cheng, Zhi Zhang, Yansong Gao, Zhaofeng Chen, Shengjian Guo, Qifei Zhang, Rui Mei, Surya Nepal, Yang Xiang:
Meltdown-type attacks are still feasible in the wall of kernel page-Table isolation. Comput. Secur. 113: 102556 (2022) - [j282]Wenjuan Li, Fei Tian, Jin Li, Yang Xiang:
Evaluating intrusion sensitivity allocation with supervised learning in collaborative intrusion detection. Concurr. Comput. Pract. Exp. 34(16) (2022) - [j281]Yanmei Cao, Jianghong Wei, Fangguo Zhang, Yang Xiang, Xiaofeng Chen:
Efficient public-key authenticated deniable encryption schemes. Comput. Stand. Interfaces 82: 103620 (2022) - [j280]Xiangyu Hu, Wanlun Ma, Chao Chen, Sheng Wen, Jun Zhang, Yang Xiang, Gaolei Fei:
Event detection in online social network: Methodologies, state-of-art, and evolution. Comput. Sci. Rev. 46: 100500 (2022) - [j279]Yuantian Miao, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, Yang Xiang:
Machine Learning-based Cyber Attacks Targeting on Controlled Information: A Survey. ACM Comput. Surv. 54(7): 139:1-139:36 (2022) - [j278]Xiaogang Zhu, Sheng Wen, Seyit Camtepe, Yang Xiang:
Fuzzing: A Survey for Roadmap. ACM Comput. Surv. 54(11s): 230:1-230:36 (2022) - [j277]Minfeng Qi, Ziyuan Wang, Shiping Chen, Yang Xiang:
A Hybrid Incentive Mechanism for Decentralized Federated Learning. Distributed Ledger Technol. Res. Pract. 1(1): 1-15 (2022) - [j276]Jun Zhang, Lei Pan, Qing-Long Han, Chao Chen, Sheng Wen, Yang Xiang:
Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey. IEEE CAA J. Autom. Sinica 9(3): 377-391 (2022) - [j275]Feixue Yan, Sheng Wen, Surya Nepal, Cécile Paris, Yang Xiang:
Explainable machine learning in cybersecurity: A survey. Int. J. Intell. Syst. 37(12): 12305-12334 (2022) - [j274]Hong Zhao, Yuexin Zhang, Xinyi Huang, Yang Xiang, Chunhua Su:
A Physical-Layer Key Generation Approach Based on Received Signal Strength in Smart Homes. IEEE Internet Things J. 9(7): 4917-4927 (2022) - [j273]Qin Wang, Longxia Huang, Shiping Chen, Yang Xiang:
Blockchain Enables Your Bill Safer. IEEE Internet Things J. 9(16): 14162-14171 (2022) - [j272]Bo Li, Qiang He, Feifei Chen, Hai Jin, Yang Xiang, Yun Yang:
Inspecting Edge Data Integrity With Aggregate Signature in Distributed Edge Computing Environment. IEEE Trans. Cloud Comput. 10(4): 2691-2703 (2022) - [j271]Derui Wang, Chaoran Li, Sheng Wen, Qing-Long Han, Surya Nepal, Xiangyu Zhang, Yang Xiang:
Daedalus: Breaking Nonmaximum Suppression in Object Detection via Adversarial Examples. IEEE Trans. Cybern. 52(8): 7427-7440 (2022) - [j270]Shigang Liu, Guanjun Lin, Lizhen Qu, Jun Zhang, Olivier Y. de Vel, Paul Montague, Yang Xiang:
CD-VulD: Cross-Domain Vulnerability Discovery Based on Deep Domain Adaptation. IEEE Trans. Dependable Secur. Comput. 19(1): 438-451 (2022) - [j269]Xiaogang Zhu, Xiaotao Feng, Xiaozhu Meng, Sheng Wen, Seyit Camtepe, Yang Xiang, Kui Ren:
CSI-Fuzz: Full-Speed Edge Tracing Using Coverage Sensitive Instrumentation. IEEE Trans. Dependable Secur. Comput. 19(2): 912-923 (2022) - [j268]Derui Wang, Chaoran Li, Sheng Wen, Surya Nepal, Yang Xiang:
Defending Against Adversarial Attack Towards Deep Neural Networks Via Collaborative Multi-Task Training. IEEE Trans. Dependable Secur. Comput. 19(2): 953-965 (2022) - [j267]Jian Shen, Ziyuan Gui, Xiaofeng Chen, Jun Zhang, Yang Xiang:
Lightweight and Certificateless Multi-Receiver Secure Data Transmission Protocol for Wireless Body Area Networks. IEEE Trans. Dependable Secur. Comput. 19(3): 1464-1475 (2022) - [j266]Qiang He, Cheng Wang, Guangming Cui, Bo Li, Rui Zhou, Qingguo Zhou, Yang Xiang, Hai Jin, Yun Yang:
A Game-Theoretical Approach for Mitigating Edge DDoS Attack. IEEE Trans. Dependable Secur. Comput. 19(4): 2333-2348 (2022) - [j265]Jing Chen, Xin Chen, Kun He, Ruiying Du, Weihang Chen, Yang Xiang:
DELIA: Distributed Efficient Log Integrity Audit Based on Hierarchal Multi-Party State Channel. IEEE Trans. Dependable Secur. Comput. 19(5): 3286-3300 (2022) - [j264]Chaoran Li, Xiao Chen, Derui Wang, Sheng Wen, Muhammad Ejaz Ahmed, Seyit Camtepe, Yang Xiang:
Backdoor Attack on Machine Learning Based Android Malware Detectors. IEEE Trans. Dependable Secur. Comput. 19(5): 3357-3370 (2022) - [j263]Tianbo Wang, Chunhe Xia, Xiaojian Li, Yang Xiang:
Epidemic Heterogeneity and Hierarchy: A Study of Wireless Hybrid Worm Propagation. IEEE Trans. Mob. Comput. 21(5): 1639-1656 (2022) - [j262]Wanlun Ma, Xiangyu Hu, Chao Chen, Sheng Wen, Kim-Kwang Raymond Choo, Yang Xiang:
Social Media Event Prediction using DNN with Feedback Mechanism. ACM Trans. Manag. Inf. Syst. 13(3): 33:1-33:24 (2022) - [j261]Xiaogang Zhu, Sheng Wen, Alireza Jolfaei, Mohammad Sayad Haghighi, Seyit Camtepe, Yang Xiang:
Vulnerability Detection in SIoT Applications: A Fuzzing Method on their Binaries. IEEE Trans. Netw. Sci. Eng. 9(3): 970-979 (2022) - [j260]Derui Wang, Sheng Wen, Alireza Jolfaei, Mohammad Sayad Haghighi, Surya Nepal, Yang Xiang:
On the Neural Backdoor of Federated Generative Models in Edge Computing. ACM Trans. Internet Techn. 22(2): 43:1-43:21 (2022) - [j259]Tingmin Wu, Wanlun Ma, Sheng Wen, Xin Xia, Cécile Paris, Surya Nepal, Yang Xiang:
Analysis of Trending Topics and Text-based Channels of Information Delivery in Cybersecurity. ACM Trans. Internet Techn. 22(2): 52:1-52:27 (2022) - [j258]Liang Yuan, Qiang He, Feifei Chen, Jun Zhang, Lianyong Qi, Xiaolong Xu, Yang Xiang, Yun Yang:
CSEdge: Enabling Collaborative Edge Storage for Multi-Access Edge Computing Based on Blockchain. IEEE Trans. Parallel Distributed Syst. 33(8): 1873-1887 (2022) - [j257]Guoxiu Liu, Geng Yang, Shuangjie Bai, Huaqun Wang, Yang Xiang:
FASE: A Fast and Accurate Privacy-Preserving Multi-Keyword Top-k Retrieval Scheme Over Encrypted Cloud Data. IEEE Trans. Serv. Comput. 15(4): 1855-1867 (2022) - [j256]Guangming Cui, Qiang He, Bo Li, Xiaoyu Xia, Feifei Chen, Hai Jin, Yang Xiang, Yun Yang:
Efficient Verification of Edge Data Integrity in Edge Computing Environment. IEEE Trans. Serv. Comput. 15(6): 3233-3244 (2022) - [j255]Hua Dai, Maohu Yang, T. G. Yang, Yang Xiang, Zheng Hu, Huaqun Wang:
A Keyword-Grouping Inverted Index Based Multi-Keyword Ranked Search Scheme Over Encrypted Cloud Data. IEEE Trans. Sustain. Comput. 7(3): 561-578 (2022) - [c139]Qin Wang, Rujia Li, Qi Wang, Shiping Chen, Yang Xiang:
Exploring Unfairness on Proof of Authority: Order Manipulation Attacks and Remedies. AsiaCCS 2022: 123-137 - [c138]Minfeng Qi, Zhiyu Xu, Ziyuan Wang, Shiping Chen, Yang Xiang:
DeDa: A DeFi-enabled Data Sharing and Trading System. BSCI 2022: 47-57 - [c137]Lin Li, Chao Chen, Lei Pan, Jun Zhang, Yang Xiang:
Video is All You Need: Attacking PPG-based Biometric Authentication. AISec@CCS 2022: 57-66 - [c136]Yuantian Miao, Chao Chen, Lei Pan, Shigang Liu, Seyit Camtepe, Jun Zhang, Yang Xiang:
No-Label User-Level Membership Inference for ASR Model Auditing. ESORICS (2) 2022: 610-628 - [c135]Minfeng Qi, Zhiyu Xu, Ziyuan Wang, Shiping Chen, Yang Xiang:
Databox-based Delivery Service via Blockchain. ICWS 2022: 79-84 - [c134]Lei Shi, Shanti Krishnan, Sheng Wen, Yang Xiang:
Supporting Cyber-Attacks and System Anomaly Detection Research with an Industry 4.0 Dataset. NSS 2022: 335-353 - [c133]Chaoran Li, Xiao Chen, Ruoxi Sun, Minhui Xue, Sheng Wen, Muhammad Ejaz Ahmed, Seyit Camtepe, Yang Xiang:
Cross-language Android permission specification. ESEC/SIGSOFT FSE 2022: 772-783 - [c132]Minfeng Qi, Zhiyu Xu, Tengyun Jiao, Sheng Wen, Yang Xiang, Gary Nan:
A Comparative Study on the Security of Cryptocurrency Wallets in Android System. TrustCom 2022: 399-406 - [i37]Lin Li, Chao Chen, Lei Pan, Jun Zhang, Yang Xiang:
SoK: An Overview of PPG's Application in Authentication. CoRR abs/2201.11291 (2022) - [i36]Yuantian Miao, Chao Chen, Lei Pan, Jun Zhang, Yang Xiang:
FAAG: Fast Adversarial Audio Generation through Interactive Attack Optimisation. CoRR abs/2202.05416 (2022) - [i35]Lin Li, Chao Chen, Lei Pan, Jun Zhang, Yang Xiang:
Video is All You Need: Attacking PPG-based Biometric Authentication. CoRR abs/2203.00928 (2022) - [i34]Qin Wang, Rujia Li, Qi Wang, Shiping Chen, Yang Xiang:
Exploring Unfairness on Proof of Authority: Order Manipulation Attacks and Remedies. CoRR abs/2203.03008 (2022) - [i33]Yang Xiang, Zhihua Wu, Weibao Gong, Siyu Ding, Xianjie Mo, Yuang Liu, Shuohuan Wang, Peng Liu, Yongshuai Hou, Long Li, Bin Wang, Shaohuai Shi, Yaqian Han, Yue Yu, Ge Li, Yu Sun, Yanjun Ma, Dianhai Yu:
Nebula-I: A General Framework for Collaboratively Training Deep Learning Models on Low-Bandwidth Cloud Clusters. CoRR abs/2205.09470 (2022) - [i32]Lin Li, Chao Chen, Lei Pan, Yonghang Tai, Jun Zhang, Yang Xiang:
Hiding Your Signals: A Security Analysis of PPG-based Biometric Authentication. CoRR abs/2207.04434 (2022) - [i31]Wanlun Ma, Derui Wang, Ruoxi Sun, Minhui Xue, Sheng Wen, Yang Xiang:
The "Beatrix" Resurrections: Robust Backdoor Detection via Gram Matrices. CoRR abs/2209.11715 (2022) - [i30]Shaohuai Shi, Qing Yang, Yang Xiang, Shuhan Qi, Xuan Wang:
An Efficient Split Fine-tuning Framework for Edge and Cloud Collaborative Learning. CoRR abs/2211.16703 (2022) - 2021
- [j254]Junyang Qiu, Jun Zhang, Wei Luo, Lei Pan, Surya Nepal, Yang Xiang:
A Survey of Android Malware Detection with Deep Neural Models. ACM Comput. Surv. 53(6): 126:1-126:36 (2021) - [j253]Wenjuan Li, Yu Wang, Zhiping Jin, Keping Yu, Jin Li, Yang Xiang:
Challenge-based collaborative intrusion detection in software-defined networking: an evaluation. Digit. Commun. Networks 7(2): 257-263 (2021) - [j252]Xiaoyu Zhang, Xiaofeng Chen, Hongyang Yan, Yang Xiang:
Privacy-preserving and verifiable online crowdsourcing with worker updates. Inf. Sci. 548: 212-232 (2021) - [j251]Liang Qin, Yang Xiang, Hong Liu:
Vortex-shock and vortex-vortex interactions in the compressible starting jet from two beveled nozzle configurations. J. Vis. 24(2): 225-236 (2021) - [j250]Yuantian Miao, Minhui Xue, Chao Chen, Lei Pan, Jun Zhang, Benjamin Zi Hao Zhao, Dali Kaafar, Yang Xiang:
The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services. Proc. Priv. Enhancing Technol. 2021(1): 209-228 (2021) - [j249]Jianghua Liu, Jingyu Hou, Wenjie Yang, Yang Xiang, Wanlei Zhou, Wei Wu, Xinyi Huang:
Leakage-Free Dissemination of Authenticated Tree-Structured Data With Multi-Party Control. IEEE Trans. Computers 70(7): 1120-1131 (2021) - [j248]Guoxi Li, Wenzhi Chen, Yang Xiang:
Zweilous: A Decoupled and Flexible Memory Management Framework. IEEE Trans. Computers 70(9): 1350-1362 (2021) - [j247]Jianghua Liu, Jinhua Ma, Yang Xiang, Wanlei Zhou, Xinyi Huang:
Authenticated Medical Documents Releasing with Privacy Protection and Release Control. IEEE Trans. Dependable Secur. Comput. 18(1): 448-459 (2021) - [j246]Yue Zhang, Jian Weng, Jiasi Weng, Lin Hou, Anjia Yang, Ming Li, Yang Xiang, Robert H. Deng:
Looking Back! Using Early Versions of Android Apps as Attack Vectors. IEEE Trans. Dependable Secur. Comput. 18(2): 652-666 (2021) - [j245]Xinghua Li, Mengyao Zhu, Laurence T. Yang, Mengfan Xu, Zhuo Ma, Cheng Zhong, Hui Li, Yang Xiang:
Sustainable Ensemble Learning Driving Intrusion Detection Model. IEEE Trans. Dependable Secur. Comput. 18(4): 1591-1604 (2021) - [j244]Derui Wang, Chaoran Li, Sheng Wen, Surya Nepal, Yang Xiang:
Man-in-the-Middle Attacks Against Machine Learning Classifiers Via Malicious Generative Models. IEEE Trans. Dependable Secur. Comput. 18(5): 2074-2087 (2021) - [j243]Guanjun Lin, Jun Zhang, Wei Luo, Lei Pan, Olivier Y. de Vel, Paul Montague, Yang Xiang:
Software Vulnerability Discovery via Learning Multi-Domain Knowledge Bases. IEEE Trans. Dependable Secur. Comput. 18(5): 2469-2485 (2021) - [j242]Lingling Xu, Xiaofeng Chen, Fangguo Zhang, Wanhua Li, Hao-Tian Wu, Shaohua Tang, Yang Xiang:
ASBKS: Towards Attribute Set Based Keyword Search Over Encrypted Personal Health Records. IEEE Trans. Dependable Secur. Comput. 18(6): 2941-2952 (2021) - [j241]Xiaogang Zhu, Sheng Wen, Alireza Jolfaei, Seyit Camtepe, Yang Xiang:
Synthesized Corpora to Evaluate Fuzzing for Green Internet of Things Programs. IEEE Trans. Green Commun. Netw. 5(3): 1041-1050 (2021) - [j240]Kun He, Jing Chen, Qinxi Zhou, Ruiying Du, Yang Xiang:
Secure Dynamic Searchable Symmetric Encryption With Constant Client Storage Cost. IEEE Trans. Inf. Forensics Secur. 16: 1538-1549 (2021) - [j239]Bo Li, Qiang He, Feifei Chen, Haipeng Dai, Hai Jin, Yang Xiang, Yun Yang:
Cooperative Assurance of Cache Data Integrity for Mobile Edge Computing. IEEE Trans. Inf. Forensics Secur. 16: 4648-4662 (2021) - [j238]Zhi Zhang, Wei He, Yueqiang Cheng, Wenhao Wang, Yansong Gao, Minghua Wang, Kang Li, Surya Nepal, Yang Xiang:
BitMine: An End-to-End Tool for Detecting Rowhammer Vulnerability. IEEE Trans. Inf. Forensics Secur. 16: 5167-5181 (2021) - [j237]Xiaofeng Chen, Hui Li, Jin Li, Qian Wang, Xinyi Huang, Willy Susilo, Yang Xiang:
Publicly Verifiable Databases With All Efficient Updating Operations. IEEE Trans. Knowl. Data Eng. 33(12): 3729-3740 (2021) - [j236]Jianhai Chen, Deshi Ye, Zhenguang Liu, Shouling Ji, Qinming He, Yang Xiang:
A Truthful and Near-Optimal Mechanism for Colocation Emergency Demand Response. IEEE Trans. Mob. Comput. 20(9): 2728-2744 (2021) - [j235]Qin Wang, Shiping Chen, Yang Xiang:
Anonymous Blockchain-based System for Consortium. ACM Trans. Manag. Inf. Syst. 12(3): 26:1-26:25 (2021) - [j234]Bo Li, Qiang He, Feifei Chen, Hai Jin, Yang Xiang, Yun Yang:
Auditing Cache Data Integrity in the Edge Computing Environment. IEEE Trans. Parallel Distributed Syst. 32(5): 1210-1223 (2021) - [j233]Xiaogang Wang, Jian Cao, Yang Xiang:
OSPN: Optimal Service Provisioning with Negotiation for Bag-of-Tasks Applications. IEEE Trans. Serv. Comput. 14(1): 193-206 (2021) - [j232]Jun Feng, Laurence T. Yang, Qing Zhu, Yang Xiang, Jinjun Chen, Zheng Yan:
Secure Outsourced Principal Eigentensor Computation for Cyber-Physical-Social Systems. IEEE Trans. Sustain. Comput. 6(1): 119-130 (2021) - [c131]Minfeng Qi, Ziyuan Wang, Fan Wu, Rob Hanson, Shiping Chen, Yang Xiang, Liming Zhu:
A Blockchain-Enabled Federated Learning Model for Privacy Preservation: System Design. ACISP 2021: 473-489 - [c130]Van Cuong Bui, Sheng Wen, Jiangshan Yu, Xin Xia, Mohammad Sayad Haghighi, Yang Xiang:
Evaluating Upgradable Smart Contract. Blockchain 2021: 252-256 - [c129]Zhiyu Xu, Minfeng Qi, Ziyuan Wang, Sheng Wen, Shiping Chen, Yang Xiang:
IB2P: An image-based privacy-preserving blockchain model for financial services. Blockchain 2021: 552-558 - [c128]Xiaotao Feng, Ruoxi Sun, Xiaogang Zhu, Minhui Xue, Sheng Wen, Dongxi Liu, Surya Nepal, Yang Xiang:
Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference. CCS 2021: 337-350 - [c127]Xinbo Ban, Ming Ding, Shigang Liu, Chao Chen, Jun Zhang, Yang Xiang:
TAESim: A Testbed for IoT Security Analysis of Trigger-Action Environment. CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 218-237 - [c126]Nan Sun, Jun Zhang, Shang Gao, Leo Yu Zhang, Seyit Camtepe, Yang Xiang:
My Security: An interactive search engine for cybersecurity. HICSS 2021: 1-10 - [c125]Rujia Li, Qin Wang, Xinrui Zhang, Qi Wang, David Galindo, Yang Xiang:
An Offline Delegatable Cryptocurrency System. IEEE ICBC 2021: 1-9 - [c124]Zhiyu Xu, Tengyun Jiao, Ziyuan Wang, Sheng Wen, Shiping Chen, Yang Xiang:
AC2M: An Automated Consent Management Model for Blockchain Financial Services Platform. SMDS 2021: 33-41 - [e16]Yang Xiang, Ziyuan Wang, Honggang Wang, Valtteri Niemi:
2021 IEEE International Conference on Blockchain, Blockchain 2021, Melbourne, Australia, December 6-8, 2021. IEEE 2021, ISBN 978-1-6654-1760-0 [contents] - [i29]Yuantian Miao, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, Yang Xiang:
Machine Learning Based Cyber Attacks Targeting on Controlled Information: A Survey. CoRR abs/2102.07969 (2021) - [i28]Rujia Li, Qin Wang, Xinrui Zhang, Qi Wang, David Galindo, Yang Xiang:
An Offline Delegatable Cryptocurrency System. CoRR abs/2103.12905 (2021) - [i27]Xiaotao Feng, Ruoxi Sun, Xiaogang Zhu, Minhui Xue, Sheng Wen, Dongxi Liu, Surya Nepal, Yang Xiang:
Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference. CoRR abs/2105.05445 (2021) - [i26]Xiaoyu Zhang, Chao Chen, Yi Xie, Xiaofeng Chen, Jun Zhang, Yang Xiang:
Privacy Inference Attacks and Defenses in Cloud-based Deep Neural Network: A Survey. CoRR abs/2105.06300 (2021) - [i25]Qin Wang, Rujia Li, Shiping Chen, Yang Xiang:
Formal Security Analysis on dBFT Protocol of NEO. CoRR abs/2105.07459 (2021) - [i24]Qin Wang, Shiping Chen, Yang Xiang:
Anonymous Blockchain-based System for Consortium. CoRR abs/2107.08279 (2021) - [i23]Huacheng Li, Chunhe Xia, Tianbo Wang, Sheng Wen, Chao Chen, Yang Xiang:
Capturing Dynamics of Information Diffusion in SNS: A Survey of Methodology and Techniques. CoRR abs/2110.14245 (2021) - [i22]Chaoran Li, Xiao Chen, Ruoxi Sun, Jason Xue, Sheng Wen, Muhammad Ejaz Ahmed, Seyit Camtepe, Yang Xiang:
NatiDroid: Cross-Language Android Permission Specification. CoRR abs/2111.08217 (2021) - 2020
- [j231]Jianghua Liu, Jingyu Hou, Xinyi Huang, Yang Xiang, Tianqing Zhu:
Secure and efficient sharing of authenticated energy usage data with privacy preservation. Comput. Secur. 92: 101756 (2020) - [j230]Mahdi Dibaei, Xi Zheng, Kun Jiang, Robert Abbas, Shigang Liu, Yuexin Zhang, Yang Xiang, Shui Yu:
Attacks and defences on intelligent connected vehicles: a survey. Digit. Commun. Networks 6(4): 399-421 (2020) - [j229]Yuxia Cheng, Wenzhi Chen, Zonghui Wang, Zhongxian Tang, Yang Xiang:
Smart VM co-scheduling with the precise prediction of performance characteristics. Future Gener. Comput. Syst. 105: 1016-1027 (2020) - [j228]Jian Shen, Chen Wang, Anxi Wang, Qi Liu, Yang Xiang:
Moving centroid based routing protocol for incompletely predictable cyber devices in Cyber-Physical-Social Distributed Systems. Future Gener. Comput. Syst. 108: 1129-1139 (2020) - [j227]Jian Shen, Dengzhi Liu, Xingming Sun, Fushan Wei, Yang Xiang:
Efficient cloud-aided verifiable secret sharing scheme with batch verification for smart cities. Future Gener. Comput. Syst. 109: 450-456 (2020) - [j226]Shigang Liu, Jun Zhang, Yang Xiang, Wanlei Zhou, Dongxi Xiang:
A study of data pre-processing techniques for imbalanced biomedical data classification. Int. J. Bioinform. Res. Appl. 16(3): 290-318 (2020) - [j225]Yuexin Zhang, Xinyi Huang, Xiaofeng Chen, Leo Yu Zhang, Jun Zhang, Yang Xiang:
A Hybrid Key Agreement Scheme for Smart Homes Using the Merkle Puzzle. IEEE Internet Things J. 7(2): 1061-1071 (2020) - [j224]Cong Wu, Kun He, Jing Chen, Ruiying Du, Yang Xiang:
CaIAuth: Context-Aware Implicit Authentication When the Screen Is Awake. IEEE Internet Things J. 7(12): 11420-11430 (2020) - [j223]Rory Coulter, Qing-Long Han, Lei Pan, Jun Zhang, Yang Xiang:
Code analysis for intelligent cyber systems: A data-driven approach. Inf. Sci. 524: 46-58 (2020) - [j222]Wenjuan Li, Yu Wang, Jin Li, Yang Xiang:
Toward supervised shape-based behavioral authentication on smartphones. J. Inf. Secur. Appl. 55: 102591 (2020) - [j221]Ke Ma, Geng Yang, Yang Xiang:
RCBAC: A risk-aware content-based access control model for large-scale text data. J. Netw. Comput. Appl. 167: 102733 (2020) - [j220]Guanjun Lin, Sheng Wen, Qing-Long Han, Jun Zhang, Yang Xiang:
Software Vulnerability Detection Using Deep Neural Networks: A Survey. Proc. IEEE 108(10): 1825-1848 (2020) - [j219]Rory Coulter, Qing-Long Han, Lei Pan, Jun Zhang, Yang Xiang:
Data-Driven Cyber Security in Perspective - Intelligent Traffic Analysis. IEEE Trans. Cybern. 50(7): 3081-3093 (2020) - [j218]Yonggang Huang, Jun Zhang, Lei Pan, Yang Xiang:
Privacy Protection in Interactive Content Based Image Retrieval. IEEE Trans. Dependable Secur. Comput. 17(3): 595-607 (2020) - [j217]Jinhua Ma, Jianghua Liu, Xinyi Huang, Yang Xiang, Wei Wu:
Authenticated Data Redaction with Fine-Grained Control. IEEE Trans. Emerg. Top. Comput. 8(2): 291-302 (2020) - [j216]Shigang Liu, Guanjun Lin, Qing-Long Han, Sheng Wen, Jun Zhang, Yang Xiang:
DeepBalance: Deep-Learning and Fuzzy Oversampling for Vulnerability Detection. IEEE Trans. Fuzzy Syst. 28(7): 1329-1343 (2020) - [j215]Xiao Chen, Chaoran Li, Derui Wang, Sheng Wen, Jun Zhang, Surya Nepal, Yang Xiang, Kui Ren:
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection. IEEE Trans. Inf. Forensics Secur. 15: 987-1001 (2020) - [j214]Xiaoyu Zhang, Xiaofeng Chen, Joseph K. Liu, Yang Xiang:
DeepPAR and DeepDPA: Privacy Preserving and Asynchronous Deep Learning for Industrial IoT. IEEE Trans. Ind. Informatics 16(3): 2081-2090 (2020) - [j213]Shigang Liu, Mahdi Dibaei, Yonghang Tai, Chao Chen, Jun Zhang, Yang Xiang:
Cyber Vulnerability Intelligence for Internet of Things Binary. IEEE Trans. Ind. Informatics 16(3): 2154-2163 (2020) - [j212]Zheli Liu, Bo Li, Yanyu Huang, Jin Li, Yang Xiang, Witold Pedrycz:
NewMCOS: Towards a Practical Multi-Cloud Oblivious Storage Scheme. IEEE Trans. Knowl. Data Eng. 32(4): 714-727 (2020) - [j211]Jing Chen, Kun He, Lan Deng, Quan Yuan, Ruiying Du, Yang Xiang, Jie Wu:
EliMFS: Achieving Efficient, Leakage-Resilient, and Multi-Keyword Fuzzy Search on Encrypted Cloud Data. IEEE Trans. Serv. Comput. 13(6): 1072-1085 (2020) - [j210]Jian Shen, Dengzhi Liu, Debiao He, Xinyi Huang, Yang Xiang:
Algebraic Signatures-Based Data Integrity Auditing for Efficient Data Dynamics in Cloud Computing. IEEE Trans. Sustain. Comput. 5(2): 161-173 (2020) - [c123]Bozhi Wang, Qin Wang, Shiping Chen, Yang Xiang:
Security Analysis on Tangle-Based Blockchain Through Simulation. ACISP 2020: 653-663 - [c122]Zhiyu Xu, Qin Wang, Ziyuan Wang, Donghai Liu, Yang Xiang, Sheng Wen:
PPM: A Provenance-Provided Data Sharing Model for Open Banking via Blockchain. ACSW 2020: 5:1-5:8 - [c121]Tingmin Wu, Rongjunchen Zhang, Wanlun Ma, Sheng Wen, Xin Xia, Cécile Paris, Surya Nepal, Yang Xiang:
What risk? I don't understand. An Empirical Study on Users' Understanding of the Terms Used in Security Texts. AsiaCCS 2020: 248-262 - [c120]Qin Wang, Jiangshan Yu, Zhiniang Peng, Van Cuong Bui, Shiping Chen, Yong Ding, Yang Xiang:
Security Analysis on dBFT Protocol of NEO. Financial Cryptography 2020: 20-31 - [c119]Chengzu Dong, Ziyuan Wang, Shiping Chen, Yang Xiang:
BBM: A Blockchain-Based Model for Open Banking via Self-sovereign Identity. ICBC 2020: 61-75 - [c118]Minfeng Qi, Ziyuan Wang, Donghai Liu, Yang Xiang, Butian Huang, Feng Zhou:
ACCTP: Cross Chain Transaction Platform for High-Value Assets. ICBC 2020: 154-168 - [c117]Nan Sun, Jun Zhang, Shang Gao, Leo Yu Zhang, Seyit Camtepe, Yang Xiang:
Data Analytics of Crowdsourced Resources for Cybersecurity Intelligence. NSS 2020: 3-21 - [c116]Rory Coulter, Jun Zhang, Lei Pan, Yang Xiang:
Unmasking Windows Advanced Persistent Threat Execution. TrustCom 2020: 268-276 - [c115]Liu Liu, Chao Chen, Jun Zhang, Olivier Y. de Vel, Yang Xiang:
Doc2vec-based Insider Threat Detection through Behaviour Analysis of Multi-source Security Logs. TrustCom 2020: 301-309 - [c114]Zhiyu Xu, Lin Yang, Ziyuan Wang, Sheng Wen, Rob Hanson, Shiping Chen, Yang Xiang:
BHDA - A Blockchain-Based Hierarchical Data Access Model for Financial Services. TrustCom 2020: 530-538 - [e15]Yang Xiang, Zheli Liu, Jin Li:
Security and Privacy in Social Networks and Big Data - 6th International Symposium, SocialSec 2020, Tianjin, China, September 26-27, 2020, Proceedings. Communications in Computer and Information Science 1298, Springer 2020, ISBN 978-981-15-9030-6 [contents] - [i21]Yupeng Hu, Zhe Jin, Wenjia Li, Yang Xiang, Jiliang Zhang:
SIAT: A Systematic Inter-Component Communication Analysis Technology for Detecting Threats on Android. CoRR abs/2006.12831 (2020) - [i20]Tingmin Wu, Wanlun Ma, Sheng Wen, Xin Xia, Cécile Paris, Surya Nepal, Yang Xiang:
Analysis of Trending Topics and Text-based Channels of Information Delivery in Cybersecurity. CoRR abs/2006.14765 (2020) - [i19]Bozhi Wang, Qin Wang, Shiping Chen, Yang Xiang:
Security Analysis on Tangle-based Blockchain through Simulation. CoRR abs/2008.04863 (2020) - [i18]Xiaogang Zhu, Shigang Liu, Xian Li, Sheng Wen, Jun Zhang, Seyit Ahmet Çamtepe, Yang Xiang:
DeFuzz: Deep Learning Guided Directed Fuzzing. CoRR abs/2010.12149 (2020) - [i17]Qin Wang, Jiangshan Yu, Shiping Chen, Yang Xiang:
SoK: Diving into DAG-based Blockchain Systems. CoRR abs/2012.06128 (2020)
2010 – 2019
- 2019
- [b3]Jiaojiao Jiang, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, Wanlei Zhou:
Malicious Attack Propagation and Source Identification. Advances in Information Security 73, Springer 2019, ISBN 978-3-030-02178-8, pp. 1-181 - [j209]Junyang Qiu, Wei Luo, Lei Pan, Yonghang Tai, Jun Zhang, Yang Xiang:
Predicting the Impact of Android Malicious Samples via Machine Learning. IEEE Access 7: 66304-66316 (2019) - [j208]Junyang Qiu, Jun Zhang, Wei Luo, Lei Pan, Surya Nepal, Yu Wang, Yang Xiang:
A3CM: Automatic Capability Annotation for Android Malware. IEEE Access 7: 147156-147168 (2019) - [j207]Liu Liu, Chao Chen, Jun Zhang, Olivier Y. de Vel, Yang Xiang:
Insider Threat Identification Using the Simultaneous Neural Learning of Multi-Source Logs. IEEE Access 7: 183162-183176 (2019) - [j206]Jinguang Han, Maoxuan Bei, Liqun Chen, Yang Xiang, Jie Cao, Fuchun Guo, Weizhi Meng:
Attribute-Based Information Flow Control. Comput. J. 62(8): 1214-1231 (2019) - [j205]Nan Sun, Jun Zhang, Paul Rimba, Shang Gao, Leo Yu Zhang, Yang Xiang:
Data-Driven Cybersecurity Incident Prediction: A Survey. IEEE Commun. Surv. Tutorials 21(2): 1744-1772 (2019) - [j204]Yang Xiang, Md. Zakirul Alam Bhuiyan, Aniello Castiglione, Yu Wang:
Foreword to the special issue on security, privacy, and social networks. Concurr. Comput. Pract. Exp. 31(21) (2019) - [j203]Fajiang Yu, Jing Chen, Yang Xiang, Jiacheng Zhu, Yangdi Zhao:
An efficient anonymous remote attestation scheme for trusted computing based on improved CPK. Electron. Commer. Res. 19(3): 689-718 (2019) - [j202]Tao Peng, Qin Liu, Guojun Wang, Yang Xiang, Shuhong Chen:
Multidimensional privacy preservation in location-based services. Future Gener. Comput. Syst. 93: 312-326 (2019) - [j201]Yuxia Cheng, Huijuan Yao, Yu Wang, Yang Xiang, Hongpei Li:
Protecting VNF services with smart online behavior anomaly detection method. Future Gener. Comput. Syst. 95: 265-276 (2019) - [j200]Hongyang Yan, Yu Wang, Chunfu Jia, Jin Li, Yang Xiang, Witold Pedrycz:
IoT-FBAC: Function-based access control scheme using identity-based encryption in IoT. Future Gener. Comput. Syst. 95: 344-353 (2019) - [j199]Xianjiao Zeng, Guangquan Xu, Xi Zheng, Yang Xiang, Wanlei Zhou:
E-AUA: An Efficient Anonymous User Authentication Protocol for Mobile IoT. IEEE Internet Things J. 6(2): 1506-1519 (2019) - [j198]Shi-Cho Cha, Tzu-Yang Hsu, Yang Xiang, Kuo-Hui Yeh:
Privacy Enhancing Technologies in the Internet of Things: Perspectives and Challenges. IEEE Internet Things J. 6(2): 2159-2187 (2019) - [j197]Yuexin Zhang, Hong Zhao, Yang Xiang, Xinyi Huang, Xiaofeng Chen:
A Key Agreement Scheme for Smart Homes Using the Secret Mismatch Problem. IEEE Internet Things J. 6(6): 10251-10260 (2019) - [j196]Zhengan Huang, Junzuo Lai, Wenbin Chen, Tong Li, Yang Xiang:
Data security against receiver corruptions: SOA security for receivers from simulatable DEMs. Inf. Sci. 471: 201-215 (2019) - [j195]Limei Lin, Li Xu, Yanze Huang, Yang Xiang, Xiangjian He:
On exploiting priority relation graph for reliable multi-path communication in mobile social networks. Inf. Sci. 477: 490-507 (2019) - [j194]Jin Li, Francesco Palmieri, Yang Xiang:
Special Issue on Security and Privacy in Machine Learning. Inf. Sci. 487: 208-209 (2019) - [j193]Wenjuan Li, Weizhi Meng, Zhiyuan Tan, Yang Xiang:
Design of multi-view based email classification for IoT systems via semi-supervised learning. J. Netw. Comput. Appl. 128: 56-63 (2019) - [j192]Jing Li, Xianmin Wang, Zhengan Huang, Licheng Wang, Yang Xiang:
Multi-level multi-secret sharing scheme for decentralized e-voting in cloud computing. J. Parallel Distributed Comput. 130: 91-97 (2019) - [j191]Jingcheng Du, Rachel Cunningham, Yang Xiang, Fang Li, Yuxi Jia, Julie A. Boom, Sahiti Myneni, Jiang Bian, Chongliang Luo, Yong Chen, Cui Tao:
Leveraging deep learning to understand health beliefs about the Human Papillomavirus Vaccine from social media. npj Digit. Medicine 2 (2019) - [j190]Binfeng Wang, Jun Zhang, Zili Zhang, Lei Pan, Yang Xiang, Dawen Xia:
Noise-Resistant Statistical Traffic Classification. IEEE Trans. Big Data 5(4): 454-466 (2019) - [j189]Tingmin Wu, Lihong Tang, Rongjunchen Zhang, Sheng Wen, Cécile Paris, Surya Nepal, Marthie Grobler, Yang Xiang:
Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps. ACM Trans. Cyber Phys. Syst. 3(4): 36:1-36:21 (2019) - [j188]Tianbo Wang, Chunhe Xia, Sheng Wen, Hui Xue, Yang Xiang, Shouzhong Tu:
SADI: A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks. IEEE Trans. Dependable Secur. Comput. 16(1): 142-155 (2019) - [j187]Jian Shen, Tianqi Zhou, Debiao He, Yuexin Zhang, Xingming Sun, Yang Xiang:
Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing. IEEE Trans. Dependable Secur. Comput. 16(6): 996-1010 (2019) - [j186]Weijia Jia, Geyong Min, Yang Xiang, Arun Kumar Sangaiah:
Special Issue on Intelligent Edge Computing for Cyber Physical and Cloud Systems. ACM Trans. Intell. Syst. Technol. 10(6) (2019) - [j185]Ming Li, Jian Weng, Anjia Yang, Wei Lu, Yue Zhang, Lin Hou, Jia-Nan Liu, Yang Xiang, Robert H. Deng:
CrowdBC: A Blockchain-Based Decentralized Framework for Crowdsourcing. IEEE Trans. Parallel Distributed Syst. 30(6): 1251-1266 (2019) - [j184]Derek Wang, Tingmin Wu, Sheng Wen, Xiaofeng Chen, Yang Xiang, Wanlei Zhou:
STC: Exposing Hidden Compromised Devices in Networked Sustainable Green Smart Computing Platforms by Partial Observation. IEEE Trans. Sustain. Comput. 4(2): 178-190 (2019) - [j183]Jian Shen, Chen Wang, Jin-Feng Lai, Yang Xiang, Pan Li:
CATE: Cloud-Aided Trustworthiness Evaluation Scheme for Incompletely Predictable Vehicular Ad Hoc Networks. IEEE Trans. Veh. Technol. 68(11): 11213-11226 (2019) - [c113]Lingling Lu, Jianhai Chen, Zijun Tian, Qinming He, Butian Huang, Yang Xiang, Zhenguang Liu:
EduCoin: a Secure and Efficient Payment Solution for MOOC Environment. Blockchain 2019: 490-495 - [c112]Zhiyu Xu, Tengyun Jiao, Qin Wang, Cuong Bui Van, Sheng Wen, Yang Xiang:
An Efficient Supply Chain Architecture Based on Blockchain for High-value Commodities. BSCI 2019: 81-88 - [c111]Xiaogang Zhu, Xiaotao Feng, Tengyun Jiao, Sheng Wen, Yang Xiang, Seyit Camtepe, Jingling Xue:
A Feature-Oriented Corpus for Understanding, Evaluating and Improving Fuzz Testing. AsiaCCS 2019: 658-663 - [c110]Lei Shi, Xiao Chen, Sheng Wen, Yang Xiang:
Main Enabling Technologies in Industry 4.0 and Cybersecurity Threats. CSS (2) 2019: 588-597 - [c109]Zhiyu Xu, Tengyun Jiao, Lin Yang, Donghai Liu, Sheng Wen, Yang Xiang:
RBAC-GL: A Role-Based Access Control Gasless Architecture of Consortium Blockchain. ICA3PP (1) 2019: 439-453 - [c108]Hong Zhao, Yuexin Zhang, Xinyi Huang, Yang Xiang:
An Adaptive Secret Key Establishment Scheme in Smart Home Environments. ICC 2019: 1-6 - [c107]Shuiqiao Yang, Guangyan Huang, Xiangmin Zhou, Yang Xiang:
Dynamic Clustering of Stream Short Documents Using Evolutionary Word Relation Network. ICDS 2019: 418-428 - [c106]Guanjun Lin, Wei Xiao, Jun Zhang, Yang Xiang:
Deep Learning-Based Vulnerable Function Detection: A Benchmark. ICICS 2019: 219-232 - [c105]Jianhai Chen, Deshi Ye, Shouling Ji, Qinming He, Yang Xiang, Zhenguang Liu:
A Truthful FPTAS Mechanism for Emergency Demand Response in Colocation Data Centers. INFOCOM 2019: 2557-2565 - [c104]Junyang Qiu, Surya Nepal, Wei Luo, Lei Pan, Yonghang Tai, Jun Zhang, Yang Xiang:
Data-Driven Android Malware Intelligence: A Survey. ML4CS 2019: 183-202 - [c103]Rory Coulter, Lei Pan, Jun Zhang, Yang Xiang:
A Visualization-Based Analysis on Classifying Android Malware. ML4CS 2019: 304-319 - [c102]Liu Liu, Chao Chen, Jun Zhang, Olivier Y. de Vel, Yang Xiang:
Unsupervised Insider Detection Through Neural Feature Learning and Model Optimisation. NSS 2019: 18-36 - [c101]Hong Zhao, Yuexin Zhang, Xinyi Huang, Yang Xiang:
An Adaptive Physical Layer Key Extraction Scheme for Smart Homes. TrustCom/BigDataSE 2019: 499-506 - [p1]Jianghua Liu, Yang Xiang, Wanlei Zhou, Xinyi Huang, Jinhua Ma:
Data Authentication with Privacy Protection. Advances in Cyber Security 2019: 115-142 - [i16]Jianhai Chen, Deshi Ye, Shouling Ji, Qinming He, Yang Xiang, Zhenguang Liu:
A Truthful FPTAS Mechanism for Emergency Demand Response in Colocation Data Centers. CoRR abs/1901.02978 (2019) - [i15]Derui Wang, Chaoran Li, Sheng Wen, Surya Nepal, Yang Xiang:
Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples. CoRR abs/1902.02067 (2019) - [i14]Xiaogang Zhu, Xiaotao Feng, Tengyun Jiao, Sheng Wen, Yang Xiang, Seyit Camtepe, Jingling Xue:
A Feature-Oriented Corpus for Understanding, Evaluating and Improving Fuzz Testing. CoRR abs/1905.01405 (2019) - [i13]Yuantian Miao, Benjamin Zi Hao Zhao, Minhui Xue, Chao Chen, Lei Pan, Jun Zhang, Dali Kaafar, Yang Xiang:
The Audio Auditor: Participant-Level Membership Inference in Voice-Based IoT. CoRR abs/1905.07082 (2019) - [i12]Mahdi Dibaei, Xi Zheng, Kun Jiang, Sasa Maric, Robert Abbas, Shigang Liu, Yuexin Zhang, Yao Deng, Sheng Wen, Jun Zhang, Yang Xiang, Shui Yu:
An Overview of Attacks and Defences on Intelligent Connected Vehicles. CoRR abs/1907.07455 (2019) - [i11]Derui Wang, Chaoran Li, Sheng Wen, Surya Nepal, Yang Xiang:
Man-in-the-Middle Attacks against Machine Learning Classifiers via Malicious Generative Models. CoRR abs/1910.06838 (2019) - [i10]Shigang Liu, Jun Zhang, Yang Xiang, Wanlei Zhou, Dongxi Xiang:
A Study of Data Pre-processing Techniques for Imbalanced Biomedical Data Classification. CoRR abs/1911.00996 (2019) - 2018
- [b2]Chee Keong Ng, Lei Pan, Yang Xiang:
Honeypot Frameworks and their Applications: A New Framework. SpringerBriefs on Cyber Security Systems and Networks, Springer 2018, ISBN 978-981-10-7738-8, pp. 1-81 - [j182]Mengmeng Yang, Tianqing Zhu, Yang Xiang, Wanlei Zhou:
Density-Based Location Preservation for Mobile Crowdsensing With Differential Privacy. IEEE Access 6: 14779-14789 (2018) - [j181]Mengmeng Yang, Tianqing Zhu, Bo Liu, Yang Xiang, Wanlei Zhou:
Machine Learning Differential Privacy With Multifunctional Aggregation in a Fog Computing Architecture. IEEE Access 6: 17119-17129 (2018) - [j180]Mengmeng Yang, Tianqing Zhu, Bo Liu, Yang Xiang, Wanlei Zhou:
Differential Private POI Queries via Johnson-Lindenstrauss Transform. IEEE Access 6: 29685-29699 (2018) - [j179]Jin Li, Yinghui Zhang, Xiaofeng Chen, Yang Xiang:
Secure attribute-based data sharing for resource-limited users in cloud computing. Comput. Secur. 72: 1-12 (2018) - [j178]Weizhi Meng, Lijun Jiang, Yu Wang, Jin Li, Jun Zhang, Yang Xiang:
JFCGuard: Detecting juice filming charging attack via processor usage analysis on smartphones. Comput. Secur. 76: 252-264 (2018) - [j177]Tingmin Wu, Sheng Wen, Yang Xiang, Wanlei Zhou:
Twitter spam detection: Survey of new approaches and comparative study. Comput. Secur. 76: 265-284 (2018) - [j176]Liu Liu, Olivier Y. de Vel, Qing-Long Han, Jun Zhang, Yang Xiang:
Detecting and Preventing Cyber Insider Threats: A Survey. IEEE Commun. Surv. Tutorials 20(2): 1397-1417 (2018) - [j175]Yuantian Miao, Zichan Ruan, Lei Pan, Jun Zhang, Yang Xiang:
Comprehensive analysis of network traffic data. Concurr. Comput. Pract. Exp. 30(5) (2018) - [j174]Tianqing Zhu, Mengmeng Yang, Ping Xiong, Yang Xiang, Wanlei Zhou:
An iteration-based differentially private social network data release. Comput. Syst. Sci. Eng. 33(2) (2018) - [j173]Yuexin Zhang, Yang Xiang, Wei Wu, Abdulhameed Alelaiwi:
A variant of password authenticated key exchange protocol. Future Gener. Comput. Syst. 78: 699-711 (2018) - [j172]Yuexin Zhang, Yang Xiang, Tao Wang, Wei Wu, Jian Shen:
An over-the-air key establishment protocol using keyless cryptography. Future Gener. Comput. Syst. 79: 284-294 (2018) - [j171]Yuxia Cheng, Yang Xiang, Wenzhi Chen, Houcine Hassan, Abdulhameed Alelaiwi:
Efficient cache resource aggregation using adaptive multi-level exclusive caching policies. Future Gener. Comput. Syst. 86: 964-974 (2018) - [j170]Ping Li, Tong Li, Heng Ye, Jin Li, Xiaofeng Chen, Yang Xiang:
Privacy-preserving machine learning with multiple data providers. Future Gener. Comput. Syst. 87: 341-350 (2018) - [j169]Yulei Wu, Yang Xiang, Jingguo Ge, Peter Mueller:
High-Performance Computing for Big Data Processing. Future Gener. Comput. Syst. 88: 693-695 (2018) - [j168]Derui Ding, Qing-Long Han, Yang Xiang, Xiaohua Ge, Xian-Ming Zhang:
A survey on security control and attack detection for industrial cyber-physical systems. Neurocomputing 275: 1674-1683 (2018) - [j167]Jian Shen, Tianqi Zhou, Fushan Wei, Xingming Sun, Yang Xiang:
Privacy-Preserving and Lightweight Key Agreement Protocol for V2G in the Social Internet of Things. IEEE Internet Things J. 5(4): 2526-2536 (2018) - [j166]Yuexin Zhang, Yang Xiang, Xinyi Huang, Xiaofeng Chen, Abdulhameed Alelaiwi:
A matrix-based cross-layer key establishment protocol for smart homes. Inf. Sci. 429: 390-405 (2018) - [j165]Haoran Yuan, Xiaofeng Chen, Tao Jiang, Xiaoyu Zhang, Zheng Yan, Yang Xiang:
DedupDUM: Secure and scalable data deduplication with dynamic user management. Inf. Sci. 456: 159-173 (2018) - [j164]Masoom Alam, Naina Emmanuel, Tanveer Khan, Yang Xiang, Houcine Hassan:
Garbled role-based access control in the cloud. J. Ambient Intell. Humaniz. Comput. 9(4): 1153-1166 (2018) - [j163]Changsong Yang, Xiaofeng Chen, Yang Xiang:
Blockchain-based publicly verifiable data deletion scheme for cloud storage. J. Netw. Comput. Appl. 103: 185-193 (2018) - [j162]Weizhi Meng, Yu Wang, Duncan S. Wong, Sheng Wen, Yang Xiang:
TouchWB: Touch behavioral user authentication based on web browsing on smartphones. J. Netw. Comput. Appl. 117: 1-9 (2018) - [j161]Derek Wang, Tingmin Wu, Sheng Wen, Donghai Liu, Yang Xiang, Wanlei Zhou, Houcine Hassan, Abdulhameed Alelaiwi:
Pokémon GO in Melbourne CBD: A case study of the cyber-physical symbiotic social networks. J. Comput. Sci. 26: 456-467 (2018) - [j160]Yu Wang, Weizhi Meng, Wenjuan Li, Jin Li, Waixi Liu, Yang Xiang:
A fog-based privacy-preserving approach for distributed signature-based intrusion detection. J. Parallel Distributed Comput. 122: 26-35 (2018) - [j159]Zichan Ruan, Yuantian Miao, Lei Pan, Yang Xiang, Jun Zhang:
Big network traffic data visualization. Multim. Tools Appl. 77(9): 11459-11487 (2018) - [j158]Zheng Yan, Yuqing Zhang, Kim-Kwang Raymond Choo, Yang Xiang:
Security Measurements of Cyber Networks. Secur. Commun. Networks 2018: 6545314:1-6545314:3 (2018) - [j157]Guoxiu Liu, Geng Yang, Huaqun Wang, Yang Xiang, Hua Dai:
A Novel Secure Scheme for Supporting Complex SQL Queries over Encrypted Databases in Cloud Computing. Secur. Commun. Networks 2018: 7383514:1-7383514:15 (2018) - [j156]Jiao Jiao Jiang, Sheng Wen, Shui Yu, Yang Xiang, Wanlei Zhou:
Rumor Source Identification in Social Networks with Time-Varying Topology. IEEE Trans. Dependable Secur. Comput. 15(1): 166-179 (2018) - [j155]Meikang Qiu, Yang Xiang, Yan Zhang:
Guest Editor's Introduction to the Special Section on Social Network Security. IEEE Trans. Dependable Secur. Comput. 15(4): 549-550 (2018) - [j154]Guanjun Lin, Jun Zhang, Wei Luo, Lei Pan, Yang Xiang, Olivier Y. de Vel, Paul Montague:
Cross-Project Transfer Representation Learning for Vulnerable Function Discovery. IEEE Trans. Ind. Informatics 14(7): 3289-3297 (2018) - [j153]Jing Chen, Kun He, Quan Yuan, Min Chen, Ruiying Du, Yang Xiang:
Blind Filtering at Third Parties: An Efficient Privacy-Preserving Framework for Location-Based Services. IEEE Trans. Mob. Comput. 17(11): 2524-2535 (2018) - [j152]Lichuan Ma, Yong Xiang, Qingqi Pei, Yang Xiang, Haojin Zhu:
Robust Reputation-Based Cooperative Spectrum Sensing via Imperfect Common Control Channel. IEEE Trans. Veh. Technol. 67(5): 3950-3963 (2018) - [c100]Junyang Qiu, Wei Luo, Surya Nepal, Jun Zhang, Yang Xiang, Lei Pan:
Keep Calm and Know Where to Focus: Measuring and Predicting the Impact of Android Malware. ADMA 2018: 238-254 - [c99]Shigang Liu, Jun Zhang, Yu Wang, Wanlei Zhou, Yang Xiang, Olivier Y. de Vel:
A Data-driven Attack against Support Vectors of SVM. AsiaCCS 2018: 723-734 - [c98]Jianghua Liu, Jinhua Ma, Wanlei Zhou, Yang Xiang, Xinyi Huang:
Dissemination of Authenticated Tree-Structured Data with Privacy Protection and Fine-Grained Control in Outsourced Databases. ESORICS (2) 2018: 167-186 - [c97]Derek Wang, Wanlei Zhou, James Xi Zheng, Sheng Wen, Jun Zhang, Yang Xiang:
Who Spread to Whom? Inferring Online Social Networks with User Features. ICC 2018: 1-6 - [c96]Liu Liu, Olivier Y. de Vel, Chao Chen, Jun Zhang, Yang Xiang:
Anomaly-Based Insider Threat Detection Using Deep Autoencoders. ICDM Workshops 2018: 39-48 - [c95]Junbin Fang, Yun-Ju Huang, Frankie Li, Jing Li, Xuan Wang, Yang Xiang:
Position Paper on Recent Cybersecurity Trends: Legal Issues, AI and IoT. NSS 2018: 484-490 - [e14]Jiafu Wan, Kai Lin, Delu Zeng, Jin Li, Yang Xiang, Xiaofeng Liao, Jiwu Huang, Zheli Liu:
Cloud Computing, Security, Privacy in New Computing Environments - 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25-26, and December 15-16, 2016, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 197, Springer 2018, ISBN 978-3-319-69604-1 [contents] - [e13]Yang Xiang, Jingtao Sun, Giancarlo Fortino, Antonio Guerrieri, Jason J. Jung:
Internet and Distributed Computing Systems - 11th International Conference, IDCS 2018, Tokyo, Japan, October 11-13, 2018, Proceedings. Lecture Notes in Computer Science 11226, Springer 2018, ISBN 978-3-030-02737-7 [contents] - [i9]Derek Wang, Chaoran Li, Sheng Wen, Yang Xiang, Wanlei Zhou, Surya Nepal:
Defensive Collaborative Multi-task Training - Defending against Adversarial Attack towards Deep Neural Networks. CoRR abs/1803.05123 (2018) - [i8]Yuantian Miao, Zichan Ruan, Lei Pan, Yu Wang, Jun Zhang, Yang Xiang:
Automated Big Traffic Analytics for Cyber Security. CoRR abs/1804.09023 (2018) - [i7]Rongjunchen Zhang, Xiao Chen, Jianchao Lu, Sheng Wen, Surya Nepal, Yang Xiang:
Using AI to Hack IA: A New Stealthy Spyware Against Voice Assistance Functions in Smart Phones. CoRR abs/1805.06187 (2018) - [i6]Tingmin Wu, Lihong Tang, Zhiyu Xu, Sheng Wen, Cécile Paris, Surya Nepal, Marthie Grobler, Yang Xiang:
Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps. CoRR abs/1805.07070 (2018) - [i5]Xiao Chen, Chaoran Li, Derui Wang, Sheng Wen, Jun Zhang, Surya Nepal, Yang Xiang, Kui Ren:
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection. CoRR abs/1808.04218 (2018) - 2017
- [j151]Guanjun Lin, Nan Sun, Surya Nepal, Jun Zhang, Yang Xiang, Houcine Hassan:
Statistical Twitter Spam Detection Demystified: Performance, Stability and Scalability. IEEE Access 5: 11142-11154 (2017) - [j150]Rui Chang, Liehui Jiang, Wenzhi Chen, Yang Xiang, Yuxia Cheng, Abdulhameed Alelaiwi:
MIPE: a practical memory integrity protection method in a trusted execution environment. Clust. Comput. 20(2): 1075-1087 (2017) - [j149]Yuxia Cheng, Xinjie Yu, Wenzhi Chen, Rui Chang, Yang Xiang:
A practical cross-datacenter fault-tolerance algorithm in the cloud storage system. Clust. Comput. 20(2): 1801-1813 (2017) - [j148]Massimo Ficco, Christian Esposito, Yang Xiang, Francesco Palmieri:
Pseudo-Dynamic Testing of Realistic Edge-Fog Cloud Ecosystems. IEEE Commun. Mag. 55(11): 98-104 (2017) - [j147]Shigang Liu, Yu Wang, Jun Zhang, Chao Chen, Yang Xiang:
Addressing the class imbalance problem in Twitter spam detection using ensemble learning. Comput. Secur. 69: 35-49 (2017) - [j146]Jiaojiao Jiang, Sheng Wen, Shui Yu, Yang Xiang, Wanlei Zhou:
Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies. IEEE Commun. Surv. Tutorials 19(1): 465-481 (2017) - [j145]Yang Xiang, Elisa Bertino, Miroslaw Kutylowski:
Security and privacy in social networks. Concurr. Comput. Pract. Exp. 29(7) (2017) - [j144]Jiao Jiao Jiang, Sheng Wen, Shui Yu, Yang Xiang, Wanlei Zhou, Houcine Hassan:
The structure of communities in scale-free networks. Concurr. Comput. Pract. Exp. 29(14) (2017) - [j143]Xian Chen, Wenzhi Chen, Zhongyong Lu, Yu Zhang, Rui Chang, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi, Yang Xiang:
MBSA: a lightweight and flexible storage architecture for virtual machines. Concurr. Comput. Pract. Exp. 29(16) (2017) - [j142]Tingmin Wu, Sheng Wen, Shigang Liu, Jun Zhang, Yang Xiang, Majed A. AlRubaian, Mohammad Mehedi Hassan:
Detecting spamming activities in twitter based on deep-learning technique. Concurr. Comput. Pract. Exp. 29(19) (2017) - [j141]Mehdi Sookhak, F. Richard Yu, Muhammad Khurram Khan, Yang Xiang, Rajkumar Buyya:
Attribute-based data access control in mobile cloud computing: Taxonomy and open issues. Future Gener. Comput. Syst. 72: 273-287 (2017) - [j140]Chao Chen, Sheng Wen, Jun Zhang, Yang Xiang, Jonathan J. Oliver, Abdulhameed Alelaiwi, Mohammad Mehedi Hassan:
Investigating the deceptive information in Twitter spam. Future Gener. Comput. Syst. 72: 319-326 (2017) - [j139]Shengtao Sun, Weijing Song, Albert Y. Zomaya, Yang Xiang, Kim-Kwang Raymond Choo, Tejal Shah, Lizhe Wang:
Associative retrieval in spatial big data based on spreading activation with semantic ontology. Future Gener. Comput. Syst. 76: 499-509 (2017) - [j138]Kun He, Jing Chen, Yu Zhang, Ruiying Du, Yang Xiang, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi:
Secure independent-update concise-expression access control for video on demand in cloud. Inf. Sci. 387: 75-89 (2017) - [j137]Weijing Song, Lizhe Wang, Yang Xiang, Albert Y. Zomaya:
Geographic spatiotemporal big data correlation analysis via the Hilbert-Huang transformation. J. Comput. Syst. Sci. 89: 130-141 (2017) - [j136]Man Ho Au, Tsz Hon Yuen, Joseph K. Liu, Willy Susilo, Xinyi Huang, Yang Xiang, Zoe Lin Jiang:
A general framework for secure sharing of personal health records in cloud system. J. Comput. Syst. Sci. 90: 46-62 (2017) - [j135]Weizhi Meng, Wenjuan Li, Yang Xiang, Kim-Kwang Raymond Choo:
A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks. J. Netw. Comput. Appl. 78: 162-169 (2017) - [j134]Sheng Wen, Jiao Jiao Jiang, Bo Liu, Yang Xiang, Wanlei Zhou:
Using epidemic betweenness to measure the influence of users in complex networks. J. Netw. Comput. Appl. 78: 288-299 (2017) - [j133]Jing Zhang, Li Xu, Shuming Zhou, Geyong Min, Yang Xiang, Jia Hu:
Crossed Cube Ring: A k-connected virtual backbone for wireless sensor networks. J. Netw. Comput. Appl. 91: 75-88 (2017) - [j132]Xiaodao Chen, Xiaohui Huang, Yang Xiang, Dongmei Zhang, Rajiv Ranjan, Chen Liao:
A CPS framework based perturbation constrained buffer planning approach in VLSI design. J. Parallel Distributed Comput. 103: 3-10 (2017) - [j131]Yuxia Cheng, Wenzhi Chen, Zonghui Wang, Yang Xiang:
Precise contention-aware performance prediction on virtualized multicore system. J. Syst. Archit. 72: 42-50 (2017) - [j130]Fang Huang, Jian Tao, Yang Xiang, Peng Liu, Lei Dong, Lizhe Wang:
Parallel compressive sampling matching pursuit algorithm for compressed sensing signal reconstruction with OpenCL. J. Syst. Archit. 72: 51-60 (2017) - [j129]Jianhai Chen, Qinming He, Deshi Ye, Wenzhi Chen, Yang Xiang, Kevin Chiew, Liangwei Zhu:
Joint affinity aware grouping and virtual machine placement. Microprocess. Microsystems 52: 365-380 (2017) - [j128]Jian Shen, Haowen Tan, Yan Zhang, Xingming Sun, Yang Xiang:
A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment. Multim. Tools Appl. 76(21): 22761-22783 (2017) - [j127]Jian Shen, Haowen Tan, Yan Zhang, Xingming Sun, Yang Xiang:
Erratum to: A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment. Multim. Tools Appl. 76(21): 22785 (2017) - [j126]Jiageng Chen, Jesen Teh, Zhe Liu, Chunhua Su, Azman Samsudin, Yang Xiang:
Towards Accurate Statistical Analysis of Security Margins: New Searching Strategies for Differential Attacks. IEEE Trans. Computers 66(10): 1763-1777 (2017) - [j125]Xiaojing Ma, Laurence T. Yang, Yang Xiang, Wenjun Kevin Zeng, Deqing Zou, Hai Jin:
Fully Reversible Privacy Region Protection for Cloud Video Surveillance. IEEE Trans. Cloud Comput. 5(3): 510-522 (2017) - [j124]Wei Teng, Geng Yang, Yang Xiang, Ting Zhang, Dongyang Wang:
Attribute-Based Access Control with Constant-Size Ciphertext in Cloud Computing. IEEE Trans. Cloud Comput. 5(4): 617-627 (2017) - [j123]Kim-Kwang Raymond Choo, Yunsi Fei, Yang Xiang, Yu Yu:
Embedded Device Forensics and Security. ACM Trans. Embed. Comput. Syst. 16(2): 50:1-50:5 (2017) - [j122]Shigang Liu, Jun Zhang, Yang Xiang, Wanlei Zhou:
Fuzzy-Based Information Decomposition for Incomplete and Imbalanced Data Learning. IEEE Trans. Fuzzy Syst. 25(6): 1476-1490 (2017) - [j121]Chao Chen, Yu Wang, Jun Zhang, Yang Xiang, Wanlei Zhou, Geyong Min:
Statistical Features-Based Real-Time Detection of Drifted Twitter Spam. IEEE Trans. Inf. Forensics Secur. 12(4): 914-925 (2017) - [j120]Tianbo Wang, Chunhe Xia, Zhong Li, Xiaochen Liu, Yang Xiang:
The Spatial-Temporal Perspective: The Study of the Propagation of Modern Social Worms. IEEE Trans. Inf. Forensics Secur. 12(11): 2558-2573 (2017) - [j119]Yingjie Xia, Wenzhi Chen, Xuejiao Liu, Luming Zhang, Xuelong Li, Yang Xiang:
Adaptive Multimedia Data Forwarding for Privacy Preservation in Vehicular Ad-Hoc Networks. IEEE Trans. Intell. Transp. Syst. 18(10): 2629-2641 (2017) - [j118]Yuan Yao, Wenzhi Chen, Tulika Mitra, Yang Xiang:
TC-Release++: An Efficient Timestamp-Based Coherence Protocol for Many-Core Architectures. IEEE Trans. Parallel Distributed Syst. 28(11): 3313-3327 (2017) - [j117]Li Xu, Jing Zhang, Yang Xiang, Xinyi Huang:
Network Coding Based Converge-Cast Scheme in Wireless Sensor Networks. Wirel. Pers. Commun. 96(4): 4947-4972 (2017) - [c94]Shuiqiao Yang, Guangyan Huang, Yang Xiang, Xiangmin Zhou, Chi-Hung Chi:
Modeling User Preferences on Spatiotemporal Topics for Point-of-Interest Recommendation. SCC 2017: 204-211 - [c93]Tingmin Wu, Shigang Liu, Jun Zhang, Yang Xiang:
Twitter spam detection based on deep learning. ACSW 2017: 3:1-3:8 - [c92]Yuantian Miao, Lei Pan, Sutharshan Rajasegarar, Jun Zhang, Christopher Leckie, Yang Xiang:
Distributed Detection of Zero-Day Network Traffic Flows. AusDM 2017: 173-191 - [c91]Yuexin Zhang, Yang Xiang, Xinyi Huang:
A Cross-Layer Key Establishment Model for Wireless Devices in Cyber-Physical Systems. CPSS@AsiaCCS 2017: 43-53 - [c90]Guanjun Lin, Jun Zhang, Wei Luo, Lei Pan, Yang Xiang:
POSTER: Vulnerability Discovery with Function Representation Learning from Unlabeled Projects. CCS 2017: 2539-2541 - [c89]Mengmeng Yang, Tianqing Zhu, Yang Xiang, Wanlei Zhou:
Personalized Privacy Preserving Collaborative Filtering. GPC 2017: 371-385 - [c88]Derek Wang, Sheng Wen, Yang Xiang, Wanlei Zhou, Jun Zhang, Surya Nepal:
Catch Me If You Can: Detecting Compromised Users Through Partial Observation on Networks. ICDCS 2017: 2417-2422 - [c87]Zhiwei Zhang, Xiaofeng Chen, Jin Li, Jianfeng Ma, Yang Xiang:
A Hierarchical VDB Scheme with Scalable Verification and Tampered Record Localization. ISPA/IUCC 2017: 1212-1216 - [c86]Tingmin Wu, Derek Wang, Sheng Wen, Yang Xiang:
How Spam Features Change in Twitter and the Impact to Machine Learning Based Detection. ISPEC 2017: 898-904 - [c85]Mengmeng Yang, Tianqing Zhu, Lichuan Ma, Yang Xiang, Wanlei Zhou:
Privacy Preserving Collaborative Filtering via the Johnson-Lindenstrauss Transform. TrustCom/BigDataSE/ICESS 2017: 417-424 - [c84]Lihong Tang, Wanlun Ma, Sheng Wen, Marthie Grobler, Yang Xiang, Wanlei Zhou:
My Face is Mine: Fighting Unpermitted Tagging on Personal/Group Photos in Social Media. WISE (2) 2017: 528-539 - [e12]Song Guo, Guiyi Wei, Yang Xiang, Xiaodong Lin, Pascal Lorenz:
Testbeds and Research Infrastructures for the Development of Networks and Communities - 11th International Conference, TRIDENTCOM 2016, Hangzhou, China, June 14-15, 2016, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 177, Springer 2017, ISBN 978-3-319-49579-8 [contents] - [i4]Zheli Liu, Siyi Lv, Yu Wei, Jin Li, Joseph K. Liu, Yang Xiang:
FFSSE: Flexible Forward Secure Searchable Encryption with Efficient Performance. IACR Cryptol. ePrint Arch. 2017: 1105 (2017) - 2016
- [j116]Yang Xiang, Ivan Stojmenovic, Peter Mueller, Jun Zhang:
Security and reliability in big data. Concurr. Comput. Pract. Exp. 28(3): 581-582 (2016) - [j115]Yang Xiang, Man Ho Au, Miroslaw Kutylowsky:
Security and privacy in big data. Concurr. Comput. Pract. Exp. 28(10): 2856-2857 (2016) - [j114]Bei Wang, Yuxia Cheng, Wenzhi Chen, Qinming He, Yang Xiang, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi:
Efficient consolidation-aware VCPU scheduling on multicore virtualization platform. Future Gener. Comput. Syst. 56: 229-237 (2016) - [j113]Limei Lin, Li Xu, Shuming Zhou, Yang Xiang:
Trustworthiness-hypercube-based reliable communication in mobile social networks. Inf. Sci. 369: 34-50 (2016) - [j112]Chao Chen, Jun Zhang, Yang Xiang, Wanlei Zhou, Jonathan J. Oliver:
Spammers Are Becoming "Smarter" on Twitter. IT Prof. 18(2): 66-70 (2016) - [j111]Xuejiao Liu, Yingjie Xia, Wenzhi Chen, Yang Xiang, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi:
SEMD: Secure and efficient message dissemination with policy enforcement in VANET. J. Comput. Syst. Sci. 82(8): 1316-1328 (2016) - [j110]Qihong Yu, Jiguo Li, Yichen Zhang, Wei Wu, Xinyi Huang, Yang Xiang:
Certificate-based encryption resilient to key leakage. J. Syst. Softw. 116: 101-112 (2016) - [j109]Deqing Zou, Yang Xiang, Geyong Min:
Privacy preserving in cloud computing environment. Secur. Commun. Networks 9(15): 2752-2753 (2016) - [j108]Chenghua Tang, Yang Xiang, Yu Wang, Junyan Qian, Baohua Qiang:
Detection and classification of anomaly intrusion using hierarchy clustering and SVM. Secur. Commun. Networks 9(16): 3401-3411 (2016) - [j107]Joseph K. Liu, Kaitai Liang, Willy Susilo, Jianghua Liu, Yang Xiang:
Two-Factor Data Security Protection Mechanism for Cloud Storage System. IEEE Trans. Computers 65(6): 1992-2004 (2016) - [j106]Shaohua Tang, Xiaoyu Li, Xinyi Huang, Yang Xiang, Lingling Xu:
Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing. IEEE Trans. Computers 65(7): 2325-2331 (2016) - [j105]Chao Chen, Jun Zhang, Yi Xie, Yang Xiang, Wanlei Zhou, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi:
Comments and Corrections. IEEE Trans. Comput. Soc. Syst. 3(1): 42 (2016) - [j104]Mohammad Sayad Haghighi, Sheng Wen, Yang Xiang, Barry G. Quinn, Wanlei Zhou:
On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor Networks. IEEE Trans. Inf. Forensics Secur. 11(12): 2854-2865 (2016) - [j103]Yuexin Zhang, Yang Xiang, Xinyi Huang:
Password-Authenticated Group Key Exchange: A Cross-Layer Design. ACM Trans. Internet Techn. 16(4): 24:1-24:20 (2016) - [j102]Yi Xie, Yu Wang, Haitao He, Yang Xiang, Shunzheng Yu, Xincheng Liu:
A General Collaborative Framework for Modeling and Perceiving Distributed Network Behavior. IEEE/ACM Trans. Netw. 24(5): 3162-3176 (2016) - [c83]Yuantian Miao, Zichan Ruan, Lei Pan, Jun Zhang, Yang Xiang, Yu Wang:
Comprehensive Analysis of Network Traffic Data. CIT 2016: 423-430 - [c82]Shigang Liu, Jun Zhang, Yu Wang, Yang Xiang:
Fuzzy-Based Feature and Instance Recovery. ACIIDS (1) 2016: 605-615 - [c81]Shigang Liu, Yu Wang, Chao Chen, Yang Xiang:
An Ensemble Learning Approach for Addressing the Class Imbalance Problem in Twitter Spam Detection. ACISP (1) 2016: 215-228 - [c80]Shigang Liu, Jun Zhang, Yang Xiang:
Statistical Detection of Online Drifting Twitter Spam: Invited Paper. AsiaCCS 2016: 1-10 - [c79]Bailin Xie, Yu Wang, Chao Chen, Yang Xiang:
Gatekeeping Behavior Analysis for Information Credibility Assessment on Weibo. NSS 2016: 483-496 - [c78]Tao Peng, Qin Liu, Guojun Wang, Yang Xiang:
Privacy Preserving Scheme for Location and Content Protection in Location-Based Services. SpaCCS 2016: 26-38 - [e11]Xinyi Huang, Yang Xiang, Kuan-Ching Li:
Green, Pervasive, and Cloud Computing - 11th International Conference, GPC 2016, Xi'an, China, May 6-8, 2016. Proceedings. Lecture Notes in Computer Science 9663, Springer 2016, ISBN 978-3-319-39076-5 [contents] - 2015
- [j101]Xuanxia Yao, Hong Liu, Huansheng Ning, Laurence T. Yang, Yang Xiang:
Anonymous Credential-Based Access Control Scheme for Clouds. IEEE Cloud Comput. 2(4): 34-43 (2015) - [j100]Yang Xiang, Mukaddim Pathan, Guiyi Wei, Giancarlo Fortino:
Availability, resilience, and fault tolerance of internet and distributed computing systems. Concurr. Comput. Pract. Exp. 27(10): 2503-2505 (2015) - [j99]Yang Xiang, Ahmed Al-Dubi, Lei Liu, Xiaowen Chu:
Frontier technologies of trust computing and network security. Concurr. Comput. Pract. Exp. 27(12): 2907-2909 (2015) - [j98]Yuxia Cheng, Wenzhi Chen, Zonghui Wang, Xinjie Yu, Yang Xiang:
AMC: an adaptive multi-level cache algorithm in hybrid storage systems. Concurr. Comput. Pract. Exp. 27(16): 4230-4246 (2015) - [j97]Md. Mofijul Islam, Md. Ahasanuzzaman, Md. Abdur Razzaque, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi, Yang Xiang:
Target coverage through distributed clustering in directional sensor networks. EURASIP J. Wirel. Commun. Netw. 2015: 167 (2015) - [j96]Yang Xiang, Beniamino Di Martino, Guilin Wang, Jin Li:
Cloud Computing: Security, Privacy and Practice. Future Gener. Comput. Syst. 52: 59-60 (2015) - [j95]Muhammad Khurram Khan, Yang Xiang, Shi-Jinn Horng, Hsiao-Hwa Chen:
Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks 2014. Int. J. Distributed Sens. Networks 11: 958190:1-958190:2 (2015) - [j94]Muhammad Al-Qurishi, Mabrook Al-Rakhami, Fattoh Al-Qershi, Mohammad Mehedi Hassan, Atif Alamri, Hameed Ullah Khan, Yang Xiang:
A Framework for Cloud-Based Healthcare Services to Monitor Noncommunicable Diseases Patient. Int. J. Distributed Sens. Networks 11: 985629:1-985629:11 (2015) - [j93]Guiyi Wei, Jun Shao, Yang Xiang, Pingping Zhu, Rongxing Lu:
Obtain confidentiality or/and authenticity in Big Data by ID-based generalized signcryption. Inf. Sci. 318: 111-122 (2015) - [j92]Minghui Zheng, Yang Xiang, Hui-Hua Zhou:
A strong provably secure IBE scheme without bilinear map. J. Comput. Syst. Sci. 81(1): 125-131 (2015) - [j91]Xiaogang Wang, Jian Cao, Yang Xiang:
Dynamic cloud service selection using an adaptive learning mechanism in multi-cloud computing. J. Syst. Softw. 100: 195-210 (2015) - [j90]Kao Zhao, Hai Jin, Deqing Zou, Weiqi Dai, Yang Xiang:
A privacy-preserving location tracking system for smartphones based on cloud storage. Secur. Commun. Networks 8(3): 446-458 (2015) - [j89]Sheng Wen, Di Wu, Ping Li, Yang Xiang, Wanlei Zhou, Guiyi Wei:
Detecting stepping stones by abnormal causality probability. Secur. Commun. Networks 8(10): 1831-1844 (2015) - [j88]Mohammad Sayad Haghighi, Yang Xiang, Vijay Varadharajan, Barry G. Quinn:
A Stochastic Time-Domain Model for Burst Data Aggregation in IEEE 802.15.4 Wireless Sensor Networks. IEEE Trans. Computers 64(3): 627-639 (2015) - [j87]Sheng Wen, Mohammad Sayad Haghighi, Chao Chen, Yang Xiang, Wanlei Zhou, Weijia Jia:
A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks. IEEE Trans. Computers 64(3): 640-653 (2015) - [j86]Xinyi Huang, Joseph K. Liu, Shaohua Tang, Yang Xiang, Kaitai Liang, Li Xu, Jianying Zhou:
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security. IEEE Trans. Computers 64(4): 971-983 (2015) - [j85]Ji Wang, Weidong Bao, Xiaomin Zhu, Laurence T. Yang, Yang Xiang:
FESTAL: Fault-Tolerant Elastic Scheduling Algorithm for Real-Time Tasks in Virtualized Clouds. IEEE Trans. Computers 64(9): 2545-2558 (2015) - [j84]Wenzhi Chen, Lei Xu, Guoxi Li, Yang Xiang:
A Lightweight Virtualization Solution for Android Devices. IEEE Trans. Computers 64(10): 2741-2751 (2015) - [j83]Jianfeng Wang, Xiaofeng Chen, Xinyi Huang, Ilsun You, Yang Xiang:
Verifiable Auditing for Outsourced Database in Cloud Computing. IEEE Trans. Computers 64(11): 3293-3303 (2015) - [j82]Xiaomin Zhu, Chao Chen, Laurence T. Yang, Yang Xiang:
ANGEL: Agent-Based Scheduling for Real-Time Tasks in Virtualized Clouds. IEEE Trans. Computers 64(12): 3389-3403 (2015) - [j81]Jin Li, Xiaofeng Chen, Xinyi Huang, Shaohua Tang, Yang Xiang, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi:
Secure Distributed Deduplication Systems with Improved Reliability. IEEE Trans. Computers 64(12): 3569-3579 (2015) - [j80]Joonsang Baek, Quang Hieu Vu, Joseph K. Liu, Xinyi Huang, Yang Xiang:
A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid. IEEE Trans. Cloud Comput. 3(2): 233-244 (2015) - [j79]Chao Chen, Jun Zhang, Yi Xie, Yang Xiang, Wanlei Zhou, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi, Majed A. AlRubaian:
A Performance Evaluation of Machine Learning-Based Streaming Spam Tweets Detection. IEEE Trans. Comput. Soc. Syst. 2(3): 65-76 (2015) - [j78]Jiao Jiao Jiang, Sheng Wen, Shui Yu, Yang Xiang, Wanlei Zhou:
K-Center: An Approach on the Multi-Source Identification of Information Diffusion. IEEE Trans. Inf. Forensics Secur. 10(12): 2616-2626 (2015) - [j77]Jun Zhang, Xiao Chen, Yang Xiang, Wanlei Zhou, Jie Wu:
Robust Network Traffic Classification. IEEE/ACM Trans. Netw. 23(4): 1257-1270 (2015) - [j76]Jing Chen, Kun He, Ruiying Du, Minghui Zheng, Yang Xiang, Quan Yuan:
Dominating Set and Network Coding-Based Routing in Wireless Mesh Networks. IEEE Trans. Parallel Distributed Syst. 26(2): 423-433 (2015) - [c77]Chao Chen, Jun Zhang, Xiao Chen, Yang Xiang, Wanlei Zhou:
6 million spam tweets: A large ground truth for timely Twitter spam detection. ICC 2015: 7065-7070 - [c76]Chao Chen, Jun Zhang, Yang Xiang, Wanlei Zhou:
Asymmetric self-learning for tackling Twitter Spam Drift. INFOCOM Workshops 2015: 208-213 - [c75]Yu Wang, Chao Chen, Yang Xiang:
Unknown pattern extraction for statistical network protocol identification. LCN 2015: 506-509 - [c74]Xuejiao Liu, Yingjie Xia, Yang Xiang, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi:
A Secure and Efficient Data Sharing Framework with Delegated Capabilities in Hybrid Cloud. SocialSec 2015: 7-14 - [c73]Ang Yang, Jun Zhang, Lei Pan, Yang Xiang:
Enhanced Twitter Sentiment Analysis by Using Feature Selection and Combination. SocialSec 2015: 52-57 - [c72]Sheng Wen, Jiaojiao Jiang, Kasra Majbouri Yazdi, Yang Xiang, Wanlei Zhou:
The Relation Between Local and Global Influence of Individuals in Scale-Free Networks. SocialSec 2015: 80-84 - [c71]Jiao Jiao Jiang, Andi Zhou, Kasra Majbouri Yazdi, Sheng Wen, Shui Yu, Yang Xiang:
Identifying Diffusion Sources in Large Networks: A Community Structure Based Approach. TrustCom/BigDataSE/ISPA (1) 2015: 302-309 - [i3]Tom H. Luan, Longxiang Gao, Zhi Li, Yang Xiang, Limin Sun:
Fog Computing: Focusing on Mobile Users at the Edge. CoRR abs/1502.01815 (2015) - [i2]Qihong Yu, Jiguo Li, Yichen Zhang, Wei Wu, Xinyi Huang, Yang Xiang:
Certificate-Based Encryption Resilient to Key Leakage. IACR Cryptol. ePrint Arch. 2015: 314 (2015) - 2014
- [j75]Meikang Qiu, Zhong Ming, Jihe Wang, Laurence T. Yang, Yang Xiang:
Enabling Cloud Computing in Emergency Management Systems. IEEE Cloud Comput. 1(4): 60-67 (2014) - [j74]Guiyi Wei, Yang Xiang, Min Ji, Ping Zhu:
An analytical model for optimal spectrum leasing under constraints of quality of service in CRNs. Comput. Networks 74: 71-80 (2014) - [j73]Yini Wang, Sheng Wen, Yang Xiang, Wanlei Zhou:
Modeling the Propagation of Worms in Networks: A Survey. IEEE Commun. Surv. Tutorials 16(2): 942-960 (2014) - [j72]Robert H. Deng, Yang Xiang, Man Ho Au:
Cryptography in Cloud Computing. Future Gener. Comput. Syst. 30: 90 (2014) - [j71]Wei Zhou, Weijia Jia, Sheng Wen, Yang Xiang, Wanlei Zhou:
Detection and defense of application-layer DDoS attacks in backbone web traffic. Future Gener. Comput. Syst. 38: 36-46 (2014) - [j70]Yu Wang, Yang Xiang, Jun Zhang, Wanlei Zhou, Bailin Xie:
Internet traffic clustering with side information. J. Comput. Syst. Sci. 80(5): 1021-1036 (2014) - [j69]Yang Xiang, Ivan Stojmenovic, Peter Mueller:
Editorial: Special Issue on Theory and Applications in Parallel and Distributed Computing Systems. J. Comput. Syst. Sci. 80(8): 1491-1492 (2014) - [j68]Sheng Wen, Jiao Jiao Jiang, Yang Xiang, Shui Yu, Wanlei Zhou:
Are the popular users always important for information dissemination in online social networks? IEEE Netw. 28(5): 64-67 (2014) - [j67]Silvio Cesare, Yang Xiang, Wanlei Zhou:
Control Flow-Based Malware VariantDetection. IEEE Trans. Dependable Secur. Comput. 11(4): 307-317 (2014) - [j66]Sheng Wen, Wei Zhou, Jun Zhang, Yang Xiang, Wanlei Zhou, Weijia Jia, Cliff C. Zou:
Modeling and Analysis on the Propagation Dynamics of Modern Email Malware. IEEE Trans. Dependable Secur. Comput. 11(4): 361-374 (2014) - [j65]Zhenfu Cao, Keqiu Li, Xu Li, Patrick D. McDaniel, Radha Poovendran, Guojun Wang, Yang Xiang:
Guest Editors' Introduction: Special Issue on Trust, Security, and Privacy in Parallel and Distributed Systems. IEEE Trans. Parallel Distributed Syst. 25(2): 279-282 (2014) - [j64]Xinyi Huang, Xiaofeng Chen, Jin Li, Yang Xiang, Li Xu:
Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems. IEEE Trans. Parallel Distributed Syst. 25(7): 1767-1775 (2014) - [j63]Jin Li, Xinyi Huang, Jingwei Li, Xiaofeng Chen, Yang Xiang:
Securely Outsourcing Attribute-Based Encryption with Checkability. IEEE Trans. Parallel Distributed Syst. 25(8): 2201-2210 (2014) - [j62]Song Guo, Deze Zeng, Yang Xiang:
Chameleon Hashing for Secure and Privacy-Preserving Vehicular Communications. IEEE Trans. Parallel Distributed Syst. 25(11): 2794-2803 (2014) - [j61]Yu Wang, Yang Xiang, Jun Zhang, Wanlei Zhou, Guiyi Wei, Laurence T. Yang:
Internet Traffic Classification Using Constrained Clustering. IEEE Trans. Parallel Distributed Syst. 25(11): 2932-2943 (2014) - [j60]Xiaofeng Chen, Jin Li, Xinyi Huang, Jingwei Li, Yang Xiang, Duncan S. Wong:
Secure Outsourced Attribute-Based Signatures. IEEE Trans. Parallel Distributed Syst. 25(12): 3285-3294 (2014) - [j59]Sheng Wen, Jiao Jiao Jiang, Yang Xiang, Shui Yu, Wanlei Zhou, Weijia Jia:
To Shut Them Up or to Clarify: Restraining the Spread of Rumors in Online Social Networks. IEEE Trans. Parallel Distributed Syst. 25(12): 3306-3316 (2014) - [c70]Wazir Zada Khan, Mohamad Naufal bin Mohamad Saad, Mohammed Y. Aalsalem, Yang Xiang:
Detecting clones in wireless sensor networks using Single Stage Memory Random Walk with Network Division. APCCAS 2014: 559-562 - [c69]Yuexin Zhang, Yang Xiang, Xinyi Huang, Li Xu:
A Cross-Layer Key Establishment Scheme in Wireless Mesh Networks. ESORICS (1) 2014: 526-541 - [c68]Iynkaran Natgunanathan, Yong Xiang, Tianrui Zong, Yang Xiang:
Robustness enhancement of quantization based audio watermarking method using adaptive safe-band. ICC 2014: 890-895 - [c67]Guojun Wang, Qin Liu, Yang Xiang, Jianer Chen:
Security from the transparent computing aspect. ICNC 2014: 216-220 - [c66]Abdelouahid Derhab, Abdelghani Bouras, Fahad Bin Muhaya, Muhammad Khurram Khan, Yang Xiang:
Spam Trapping System: Novel security framework to fight against spam botnets. ICT 2014: 467-471 - [c65]Di Wu, Xiao Chen, Chao Chen, Jun Zhang, Yang Xiang, Wanlei Zhou:
On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classification. NSS 2014: 138-151 - [c64]Wenjuan Li, Weizhi Meng, Zhiyuan Tan, Yang Xiang:
Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning. TrustCom 2014: 174-181 - [c63]Yu Zhang, Jing Chen, Ruiying Du, Lan Deng, Yang Xiang, Qing Zhou:
FEACS: A Flexible and Efficient Access Control Scheme for Cloud Computing. TrustCom 2014: 310-319 - [c62]Wazir Zada Khan, Mohammed Y. Aalsalem, Mohamad Naufal bin Mohamad Saad, Yang Xiang, Tom H. Luan:
Detecting replicated nodes in Wireless Sensor Networks using random walks and network division. WCNC 2014: 2623-2628 - 2013
- [j58]Wazir Zada Khan, Yang Xiang, Mohammed Y. Aalsalem, Quratul-Ain Arshad:
Mobile Phone Sensing Systems: A Survey. IEEE Commun. Surv. Tutorials 15(1): 402-427 (2013) - [j57]Yang Xiang, Alfredo Cuzzocrea, Michael Hobbs, Laurence T. Yang:
Advances in parallel, distributed, embedded, and ubiquitous systems. Concurr. Comput. Pract. Exp. 25(14): 1985-1986 (2013) - [j56]Kefeng Deng, Kaijun Ren, Junqiang Song, Dong Yuan, Yang Xiang, Jinjun Chen:
A clustering based coscheduling strategy for efficient scientific workflow execution in cloud computing. Concurr. Comput. Pract. Exp. 25(18): 2523-2539 (2013) - [j55]Jun Zhang, Lei Ye, Yang Xiang, Wanlei Zhou:
Robust image retrieval with hidden classes. Comput. Vis. Image Underst. 117(6): 670-679 (2013) - [j54]Wazir Zada Khan, Mohammed Y. Aalsalem, Mohammed Naufal Bin Mohammed Saad, Yang Xiang:
Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey. Int. J. Distributed Sens. Networks 9 (2013) - [j53]Muhammad Khurram Khan, Yang Xiang, Shi-Jinn Horng, Hsiao-Hwa Chen:
Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j52]Jun Zhang, Yang Xiang, Wanlei Zhou, Yu Wang:
Unsupervised traffic classification using flow statistical properties and IP packet payload. J. Comput. Syst. Sci. 79(5): 573-585 (2013) - [j51]Wei Wu, Jianying Zhou, Yang Xiang, Li Xu:
How to achieve non-repudiation of origin with privacy protection in cloud computing. J. Comput. Syst. Sci. 79(8): 1200-1213 (2013) - [j50]Silvio Cesare, Yang Xiang, Wanlei Zhou:
Malwise - An Effective and Efficient Classification System for Packed and Polymorphic Malware. IEEE Trans. Computers 62(6): 1193-1206 (2013) - [j49]Yuexin Zhang, Li Xu, Yang Xiang, Xinyi Huang:
A Matrix-Based Pairwise Key Establishment Scheme for Wireless Mesh Networks Using Pre Deployment Knowledge. IEEE Trans. Emerg. Top. Comput. 1(2): 331-340 (2013) - [j48]Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou, Yong Xiang:
Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions. IEEE Trans. Inf. Forensics Secur. 8(1): 5-15 (2013) - [j47]Yizhi Ren, Mingchu Li, Yang Xiang, Yongrui Cui, Kouichi Sakurai:
Evolution of cooperation in reputation system by group-based scheme. J. Supercomput. 63(1): 171-190 (2013) - [j46]Yong Xiang, Dezhong Peng, Yang Xiang, Song Guo:
Novel Z-Domain Precoding Method for Blind Separation of Spatially Correlated Signals. IEEE Trans. Neural Networks Learn. Syst. 24(1): 94-105 (2013) - [j45]Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou, Athanasios V. Vasilakos:
An Effective Network Traffic Classification Method with Unknown Flow Detection. IEEE Trans. Netw. Serv. Manag. 10(2): 133-147 (2013) - [j44]Jun Zhang, Yang Xiang, Yu Wang, Wanlei Zhou, Yong Xiang, Yong Guan:
Network Traffic Classification Using Correlation Information. IEEE Trans. Parallel Distributed Syst. 24(1): 104-117 (2013) - [j43]Yi Xie, Shensheng Tang, Yang Xiang, Jiankun Hu:
Resisting Web Proxy-Based HTTP Attacks by Temporal and Spatial Locality Behavior. IEEE Trans. Parallel Distributed Syst. 24(7): 1401-1410 (2013) - [j42]Sheng Wen, Wei Zhou, Jun Zhang, Yang Xiang, Wanlei Zhou, Weijia Jia:
Modeling Propagation Dynamics of Social Network Worms. IEEE Trans. Parallel Distributed Syst. 24(8): 1633-1643 (2013) - [j41]Yi Xie, Jiankun Hu, Yang Xiang, Shui Yu, Shensheng Tang, Yu Wang:
Modeling Oscillation Behavior of Network Traffic by Nested Hidden Markov Model with Variable State-Duration. IEEE Trans. Parallel Distributed Syst. 24(9): 1807-1817 (2013) - [c61]Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou:
Robust network traffic identification with unknown applications. AsiaCCS 2013: 405-414 - [c60]Xiao Chen, Jun Zhang, Yang Xiang, Wanlei Zhou:
Traffic Identification in Semi-known Network Environment. CSE 2013: 572-579 - [c59]Jun Zhang, Xiao Chen, Yang Xiang, Wanlei Zhou:
Zero-Day Traffic Identification. CSS 2013: 213-227 - [c58]Sheng Wen, Ping Li, Di Wu, Yang Xiang, Wanlei Zhou:
Detecting Stepping Stones by Abnormal Causality Probability. CSS 2013: 308-322 - [c57]Yuexin Zhang, Li Xu, Yang Xiang, Xinyi Huang:
Matrix-based pairwise key establishment in wireless mesh networks using deployment knowledge. ICC 2013: 1604-1608 - [c56]Yu Wang, Yang Xiang, Jun Zhang:
Network traffic clustering using Random Forest proximities. ICC 2013: 2058-2062 - [c55]Yuxin Meng, Wenjuan Li, Lam-for Kwok, Yang Xiang:
Towards Designing Privacy-Preserving Signature-Based IDS as a Service: A Study and Practice. INCoS 2013: 181-188 - [c54]Jing Chen, Ruiying Du, Li Zhao, Chiheng Wang, Minghui Zheng, Yang Xiang:
Fault-Tolerant Topology Control Based on Artificial Immune Theory in WMNs. NSS 2013: 590-598 - [c53]Sheng Wen, Yang Xiang, Wanlei Zhou:
Modeling and Analysis for Thwarting Worm Propagation in Email Networks. NSS 2013: 763-769 - [c52]Silvio Cesare, Yang Xiang, Jun Zhang:
Clonewise - Detecting Package-Level Clones Using Machine Learning. SecureComm 2013: 197-215 - [c51]Tianqing Zhu, Ping Xiong, Yang Xiang, Wanlei Zhou:
An Effective Deferentially Private Data Releasing Algorithm for Decision Tree. TrustCom/ISPA/IUCC 2013: 388-395 - [c50]Niloofar Toorchi, Mahmoud Ahmadian-Attari, Mohammad Sayad Haghighi, Yang Xiang:
A Markov model of safety message broadcasting for vehicular networks. WCNC 2013: 1657-1662 - 2012
- [b1]Silvio Cesare, Yang Xiang:
Software Similarity and Classification. Springer Briefs in Computer Science, Springer 2012, ISBN 978-1-4471-2908-0, pp. I-XIV, 1-88 - [j40]Jiankun Hu, Yang Xiang, Wanlei Zhou:
Advances in Network and System Security: Editorial Statement. Comput. J. 55(4): 382-383 (2012) - [j39]Yang Xiang, Jiankun Hu, Wanlei Zhou:
Advances in network and system security. Concurr. Comput. Pract. Exp. 24(10): 1035-1036 (2012) - [j38]Sheng Wen, Wei Zhou, Yang Xiang, Wanlei Zhou:
CAFS: a novel lightweight cache-based scheme for large-scale intrusion alert fusion. Concurr. Comput. Pract. Exp. 24(10): 1137-1153 (2012) - [j37]Yongrui Cui, Mingchu Li, Yang Xiang, Yizhi Ren, Silvio Cesare:
A QoS-based fine-grained reputation system in the grid environment. Concurr. Comput. Pract. Exp. 24(17): 1990-2006 (2012) - [j36]Sheng Wen, Wei Zhou, Yini Wang, Wanlei Zhou, Yang Xiang:
Locating Defense Positions for Thwarting the Propagation of Topological Worms. IEEE Commun. Lett. 16(4): 560-563 (2012) - [j35]Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou:
Semi-supervised and compound classification of network traffic. Int. J. Secur. Networks 7(4): 252-261 (2012) - [j34]Yu Wang, Yang Xiang, Wanlei Zhou, Shunzheng Yu:
Generating regular expression signatures for network traffic classification in trusted network management. J. Netw. Comput. Appl. 35(3): 992-1000 (2012) - [j33]Wenyu Qu, Yang Xiang, Yong Zhang:
Special issue on security in ubiquitous computing. Secur. Commun. Networks 5(11): 1221-1222 (2012) - [c49]Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou:
Semi-supervised and Compound Classification of Network Traffic. ICDCS Workshops 2012: 617-621 - [c48]Yu Wang, Yang Xiang, Jun Zhang, Shunzheng Yu:
Internet traffic clustering with constraints. IWCMC 2012: 619-624 - [c47]Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou:
Classification of Correlated Internet Traffic Flows. TrustCom 2012: 490-496 - [c46]Silvio Cesare, Yang Xiang:
Wire - A Formal Intermediate Language for Binary Analysis. TrustCom 2012: 515-524 - [c45]Wei Zhou, Sheng Wen, Yini Wang, Yang Xiang, Wanlei Zhou:
An Analytical Model on the Propagation of Modern Email Worms. TrustCom 2012: 533-540 - [e10]Yang Xiang, Javier López, C.-C. Jay Kuo, Wanlei Zhou:
Cyberspace Safety and Security - 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012. Proceedings. Lecture Notes in Computer Science 7672, Springer 2012, ISBN 978-3-642-35361-1 [contents] - [e9]Yang Xiang, Ivan Stojmenovic, Bernady O. Apduhan, Guojun Wang, Koji Nakano, Albert Y. Zomaya:
Algorithms and Architectures for Parallel Processing - 12th International Conference, ICA3PP 2012, Fukuoka, Japan, September 4-7, 2012, Proceedings, Part I. Lecture Notes in Computer Science 7439, Springer 2012, ISBN 978-3-642-33077-3 [contents] - [e8]Yang Xiang, Ivan Stojmenovic, Bernady O. Apduhan, Guojun Wang, Koji Nakano, Albert Y. Zomaya:
Algorithms and Architectures for Parallel Processing - 12th International Conference, ICA3PP 2012, Fukuoka, Japan, September 4-7, 2012, Proceedings, Part II. Lecture Notes in Computer Science 7440, Springer 2012, ISBN 978-3-642-33064-3 [contents] - [e7]Yang Xiang, Mukaddim Pathan, Xiaohui Tao, Hua Wang:
Data and Knowledge Engineering - Third International Conference, ICDKE 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings. Lecture Notes in Computer Science 7696, Springer 2012, ISBN 978-3-642-34678-1 [contents] - [e6]Yang Xiang, Mukaddim Pathan, Xiaohui Tao, Hua Wang:
Internet and Distributed Computing Systems - 5th International Conference, IDCS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings. Lecture Notes in Computer Science 7646, Springer 2012, ISBN 978-3-642-34882-2 [contents] - 2011
- [j32]Jun Zhang, Yang Xiang, Wanlei Zhou, Lei Ye, Yi Mu:
Secure Image Retrieval Based on Visual Content and Watermarking Protocol. Comput. J. 54(10): 1661-1674 (2011) - [j31]Yini Wang, Sheng Wen, Silvio Cesare, Wanlei Zhou, Yang Xiang:
The Microcosmic Model of Worm Propagation. Comput. J. 54(10): 1700-1720 (2011) - [j30]Yang Xiang, Wanlei Zhou:
Special issue: Building secure parallel and distributed networks and systems. Comput. Commun. 34(4): 525 (2011) - [j29]Yang Xiang, Jiankun Hu, Wanlei Zhou:
Editorial: Advances in network and system security. Comput. Secur. 30(5): 295-296 (2011) - [j28]Yang Xiang, Javier López, Haining Wang, Wanlei Zhou:
Special Issue: Securing Distributed Networks and Systems. Concurr. Comput. Pract. Exp. 23(12): 1311-1312 (2011) - [j27]Wen Tao Zhu, Fei Gao, Yang Xiang:
A secure and efficient data aggregation scheme for wireless sensor networks. Concurr. Comput. Pract. Exp. 23(12): 1414-1430 (2011) - [j26]Yang Xiang, Wanlei Zhou:
Special Section: Trusted computing. Future Gener. Comput. Syst. 27(5): 527-528 (2011) - [j25]Yini Wang, Sheng Wen, Silvio Cesare, Wanlei Zhou, Yang Xiang:
Eliminating Errors in Worm Propagation Models. IEEE Commun. Lett. 15(9): 1022-1024 (2011) - [j24]Wen Tao Zhu, Yang Xiang, Jianying Zhou, Robert H. Deng, Feng Bao:
Secure localization with attack detection in wireless sensor networks. Int. J. Inf. Sec. 10(3): 155-171 (2011) - [j23]Ashley Chonka, Yang Xiang, Wanlei Zhou, Alessio Bonti:
Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks. J. Netw. Comput. Appl. 34(4): 1097-1107 (2011) - [j22]Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, Yang Xiang:
Optimistic Fair Exchange with Strong Resolution-Ambiguity. IEEE J. Sel. Areas Commun. 29(7): 1491-1502 (2011) - [j21]Yang Xiang, Ke Li, Wanlei Zhou:
Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics. IEEE Trans. Inf. Forensics Secur. 6(2): 426-437 (2011) - [j20]Xinyi Huang, Yang Xiang, Ashley Chonka, Jianying Zhou, Robert H. Deng:
A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems. IEEE Trans. Parallel Distributed Syst. 22(8): 1390-1397 (2011) - [c44]Yu Wang, Yang Xiang, Shunzheng Yu:
Internet Traffic Classification Using Machine Learning: A Token-based Approach. CSE 2011: 285-289 - [c43]Fahad Bin Muhaya, Muhammad Khurram Khan, Yang Xiang:
Polymorphic Malware Detection Using Hierarchical Hidden Markov Model. DASC 2011: 151-155 - [c42]Wazir Zada Khan, Yang Xiang, Mohammed Y. Aalsalem, Quratul-Ain Arshad:
A Hybrid Graphical Password Based System. ICA3PP (2) 2011: 153-164 - [c41]Yini Wang, Sheng Wen, Wei Zhou, Wanlei Zhou, Yang Xiang:
The Probability Model of Peer-to-Peer Botnet Propagation. ICA3PP (1) 2011: 470-480 - [c40]Yini Wang, Sheng Wen, Yang Xiang:
Modeling worms propagation on probability. NSS 2011: 49-56 - [c39]Yu Wang, Yang Xiang, Jun Zhang, Shun-Zheng Yu:
A novel semi-supervised approach for network traffic clustering. NSS 2011: 169-175 - [c38]Yang Xiang:
Defending against Large-Scale and Coordinated Attacks in the Ubiquitous Environments. TrustCom 2011: 7-8 - [c37]Mahbub Ahmed, Yang Xiang:
Trust Ticket Deployment: A Notion of a Data Owner's Trust in Cloud Computing. TrustCom 2011: 111-117 - [c36]Silvio Cesare, Yang Xiang:
Malware Variant Detection Using Similarity Search over Sets of Control Flow Graphs. TrustCom 2011: 181-189 - [e5]Yang Xiang, Alfredo Cuzzocrea, Michael Hobbs, Wanlei Zhou:
Algorithms and Architectures for Parallel Processing - 11th International Conference, ICA3PP, Melbourne, Australia, October 24-26, 2011, Proceedings, Part I. Lecture Notes in Computer Science 7016, Springer 2011, ISBN 978-3-642-24649-4 [contents] - [e4]Yang Xiang, Alfredo Cuzzocrea, Michael Hobbs, Wanlei Zhou:
Algorithms and Architectures for Parallel Processing - 11th International Conference, ICA3PP, Melbourne, Australia, October 24-26, 2011, Proceedings, Part II. Lecture Notes in Computer Science 7017, Springer 2011, ISBN 978-3-642-24668-5 [contents] - [i1]Wazir Zada Khan, Mohammed Y. Aalsalem, Yang Xiang:
A Graphical Password Based System for Small Mobile Devices. CoRR abs/1110.3844 (2011) - 2010
- [j19]Yang Xiang, Daxin Tian, Wanlei Zhou:
A microscopic competition model and its dynamics analysis on network attacks. Concurr. Comput. Pract. Exp. 22(4): 503-517 (2010) - [j18]Yu Wang, Yang Xiang, Shun-Zheng Yu:
An automatic application signature construction system for unknown traffic. Concurr. Comput. Pract. Exp. 22(13): 1927-1944 (2010) - [j17]Xiang Fan, Yang Xiang:
Modeling the propagation of Peer-to-Peer worms. Future Gener. Comput. Syst. 26(8): 1433-1443 (2010) - [j16]Yang Xiang, Wanlei Zhou, Haining Wang:
Security in next generation wireless networks. Secur. Commun. Networks 3(1): 1-3 (2010) - [j15]Xiang Fan, Yang Xiang:
Defending against the propagation of active worms. J. Supercomput. 51(2): 167-200 (2010) - [c35]Silvio Cesare, Yang Xiang:
A Fast Flowgraph Based Classification System for Packed and Polymorphic Malware on the Endhost. AINA 2010: 721-728 - [c34]Yu Wang, Yang Xiang, Shun-Zheng Yu:
Automatic Application Signature Construction from Unknown Traffic. AINA 2010: 1115-1120 - [c33]Xiang Fan, Yang Xiang:
Propagation Modeling of Peer-to-Peer Worms. AINA 2010: 1128-1135 - [c32]Mahbub Ahmed, Yang Xiang, A. B. M. Shawkat Ali:
Above the Trust and Security in Cloud Computing: A Notion Towards Innovation. EUC 2010: 723-730 - [c31]Laiping Zhao, Yizhi Ren, Yang Xiang, Kouichi Sakurai:
Fault tolerant scheduling with dynamic number of replicas in heterogeneous system. HPCC 2010: 434-441 - [c30]Sheng Wen, Yang Xiang, Wanlei Zhou:
A Lightweight Intrusion Alert Fusion System. HPCC 2010: 695-700 - [c29]Xiang Fan, Yang Xiang:
Modeling the propagation of Peer-to-Peer worms under quarantine. NOMS 2010: 942-945 - [c28]Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, Yang Xiang:
Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting. Public Key Cryptography 2010: 124-141 - [e3]Yang Xiang, Pierangela Samarati, Jiankun Hu, Wanlei Zhou, Ahmad-Reza Sadeghi:
Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010. IEEE Computer Society 2010, ISBN 978-1-4244-8484-3 [contents]
2000 – 2009
- 2009
- [j14]Yang Xiang, Wanlei Zhou:
Special Issue: Multi-core Supported Network and System Security. Concurr. Comput. Pract. Exp. 21(10): 1251-1253 (2009) - [j13]Md. Rafiqul Islam, Wanlei Zhou, Yang Xiang, Abdun Naser Mahmood:
Spam filtering for network traffic security on a multi-core environment. Concurr. Comput. Pract. Exp. 21(10): 1307-1320 (2009) - [j12]Yang Xiang, Xiang Fan, Wen Tao Zhu:
Propagation of active worms: A survey. Comput. Syst. Sci. Eng. 24(3) (2009) - [j11]Daxin Tian, Yanheng Liu, Yang Xiang:
Large-scale network intrusion detection based on distributed learning algorithm. Int. J. Inf. Sec. 8(1): 25-35 (2009) - [j10]Wanlei Zhou, Yang Xiang:
Network and system security. J. Netw. Comput. Appl. 32(2): 345-346 (2009) - [j9]Md. Rafiqul Islam, Wanlei Zhou, Minyi Guo, Yang Xiang:
An innovative analyser for multi-classifier e-mail classification based on grey list analysis. J. Netw. Comput. Appl. 32(2): 357-366 (2009) - [j8]Yang Xiang:
Managing email overload with an automatic nonparametric clustering system. J. Supercomput. 48(3): 227-242 (2009) - [j7]Yang Xiang, Wanlei Zhou, Minyi Guo:
Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of Attacks. IEEE Trans. Parallel Distributed Syst. 20(4): 567-580 (2009) - [c27]Wen Tao Zhu, Yang Xiang:
Argus: A Light-Weighted Secure Localization Scheme for Sensor Networks. ATC 2009: 164-178 - [c26]Xiang Fan, Yang Xiang:
Modeling the Propagation Process of Topology-Aware Worms: An Innovative Logic Matrix Formulation. NPC 2009: 182-189 - [c25]Ashley Chonka, Wanlei Zhou, Yang Xiang:
Defending Grid Web Services from XDoS Attacks by SOTA. PerCom Workshops 2009: 1-6 - [e2]Yang Xiang, Javier López, Haining Wang, Wanlei Zhou:
Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3838-9 [contents] - 2008
- [j6]Zhongwen Li, Yang Xiang:
Checkpointing schemes for Grid workflow systems. Concurr. Comput. Pract. Exp. 20(15): 1773-1790 (2008) - [j5]Zhongwen Li, Qiong Chen, Yang Xiang:
A cross-authentication model and implementation. Comput. Syst. Sci. Eng. 23(3) (2008) - [j4]Wanlei Zhou, Yang Xiang, Minyi Guo:
Special Issue: Network Attacks and Defense Systems. Comput. Syst. Sci. Eng. 23(3) (2008) - [c24]Ashley Chonka, Wanlei Zhou, Yang Xiang:
Protecting web services with Service Oriented Traceback Architecture. CIT 2008: 706-711 - [c23]Xiang Fan, Yang Xiang:
Defending against the Propagation of Active Worms. EUC (2) 2008: 350-355 - [c22]Yang Xiang, Wanlei Zhou:
Using Multi-Core Processors to Support Network Security Applications. FTDCS 2008: 213-218 - [c21]Wanlei Zhou, Yang Xiang:
Using Multi-core to Support Security-Related Applications. ICA3PP 2008: 316-317 - [c20]Daxin Tian, Yang Xiang:
A Multi-core Supported Intrusion Detection System. NPC Workshops 2008: 50-55 - [c19]Xiang Fan, Yang Xiang:
Accelerating the Propagation of Active Worms by Employing Multiple Target Discovery Techniques. NPC 2008: 150-161 - [c18]Ashley Chonka, Soon Keow Chong, Wanlei Zhou, Yang Xiang:
Multi-Core Defense System (MSDS) for Protecting Computer Infrastructure against DDoS Attacks. PDCAT 2008: 503-508 - [c17]Ashley Chonka, Wanlei Zhou, Jaipal Singh, Yang Xiang:
Detecting and Tracing DDoS Attacks by Intelligent Decision Prototype. PerCom 2008: 578-583 - [e1]Jian Cao, Minglu Li, Chuliang Weng, Yang Xiang, Xin Wang, Hong Tang, Feng Hong, Hong Liu, Yinglin Wang:
IFIP International Conference on Network and Parallel Computing, NPC 2008, Shanghai, China, October 18-21, 2008, Workshop Proceedings. IEEE Computer Society 2008, ISBN 978-0-7695-3354-4 [contents] - 2007
- [j3]Yang Xiang, Wanlei Zhou:
Pervasive computing at tableside: a wireless web-based ordering system. Int. J. Pervasive Comput. Commun. 3(1): 82-101 (2007) - [c16]A. B. M. Shawkat Ali, Yang Xiang:
Spam Classification Using Adaptive Boosting Algorithm. ACIS-ICIS 2007: 972-976 - [c15]Yang Xiang, Wanlei Zhou, Jinjun Chen:
Managing Email Overload with an Automatic Nonparametric Clustering Approach. NPC 2007: 81-90 - [r1]Yang Xiang, Wanlei Zhou:
Defending against Distributed Denial of Service. Encyclopedia of Information Ethics and Security 2007: 121-129 - 2006
- [j2]Yang Xiang, Wanlei Zhou:
Protecting information infrastructure from DDoS attacks by MADF. Int. J. High Perform. Comput. Netw. 4(5/6): 357-367 (2006) - [j1]Yang Xiang, Wanlei Zhou:
Protecting web applications from DDoS attacks by an active distributed defense system. Int. J. Web Inf. Syst. 2(1): 37-44 (2006) - [c14]Zhongwen Li, Yang Xiang, Dongsheng He:
Simulation and Analysis of DDoS in Active Defense Environment. CIS 2006: 878-886 - [c13]Yang Xiang, Zhongwen Li, Hong Chen:
Optimizing Adaptive Checkpointing Schemes for Grid Workflow Systems. GCC Workshops 2006: 181-188 - [c12]Zhongwen Li, Yang Xiang, Hong Chen:
Performance Optimization of Checkpointing Schemes with Task Duplication. IMSCCS (2) 2006: 671-677 - 2005
- [c11]Yang Xiang, Wanlei Zhou:
Safeguard Information Infrastructure Against DDoS Attacks: Experiments and Modeling. CANS 2005: 320-333 - [c10]Yang Xiang, Wanlei Zhou:
Mark-aided distributed filtering by using neural network for DDoS defense. GLOBECOM 2005: 5 - [c9]Wei Shi, Yang Xiang, Wanlei Zhou:
Distributed Defense Against Distributed Denial-of-Service Attacks. ICA3PP 2005: 357-362 - [c8]Yang Xiang, Wanlei Zhou:
A Defense System against DDoS Attacks by Large-Scale IP Traceback. ICITA (2) 2005: 431-436 - [c7]Yang Xiang, Wanlei Zhou:
Intelligent DDoS Packet Filtering in High-Speed Networks. ISPA 2005: 395-406 - 2004
- [c6]Yang Xiang, Wanlei Zhou:
Protect Grids from DDoS Attacks. GCC 2004: 309-316 - [c5]Gulisong Nasierding, Yang Xiang, Honghua Dai:
Towards Extended Machine Translation Model for Next Generation World Wide Web. GCC 2004: 1017-1020 - [c4]Yang Xiang, Wanlei Zhou, Morshed U. Chowdhury:
Toward Pervasive Computing in Restaurant. ICETE (1) 2004: 312- - [c3]Yang Xiang, Wanlei Zhou:
An Active Distributed Defense System to Protect Web Applications from DDOS Attacks. iiWAS 2004 - [c2]Wanlei Zhou, Yang Xiang:
Combating DDoS Attacks in Web-based Services. iiWAS 2004 - 2003
- [c1]Yang Xiang, Wanlei Zhou, Morshed U. Chowdhury:
GHIRS: Integration of Hotel Management Systems by Web Services. GCC (2) 2003: 1002-1009
Coauthor Index
aka: Seyit Camtepe
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-17 21:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint