Seguir
Yang Xiang
Título
Citado por
Citado por
Año
A survey on security control and attack detection for industrial cyber-physical systems
D Ding, QL Han, Y Xiang, X Ge, XM Zhang
Neurocomputing 275, 1674-1683, 2018
9722018
Mobile phone sensing systems: A survey
WZ Khan, Y Xiang, MY Aalsalem, Q Arshad
IEEE Communications Surveys & Tutorials 15 (1), 402-427, 2013
7682013
Fog computing: Focusing on mobile users at the edge
TH Luan, L Gao, Z Li, Y Xiang, G Wei, L Sun
arXiv preprint arXiv:1502.01815, 2015
7502015
CrowdBC: A blockchain-based decentralized framework for crowdsourcing
M Li, J Weng, A Yang, W Lu, Y Zhang, L Hou, JN Liu, Y Xiang, RH Deng
IEEE Transactions on Parallel and Distributed Systems 30 (6), 1251-1266, 2018
5522018
Secure attribute-based data sharing for resource-limited users in cloud computing
J Li, Y Zhang, X Chen, Y Xiang
Computers & Security 72, 1-12, 2018
5232018
Securely outsourcing attribute-based encryption with checkability
J Li, X Huang, J Li, X Chen, Y Xiang
IEEE Transactions on Parallel and Distributed Systems 25 (8), 2201-2210, 2013
5012013
Low-rate DDoS attacks detection and traceback by using new information metrics
Y Xiang, K Li, W Zhou
IEEE transactions on information forensics and security 6 (2), 426-437, 2011
4682011
Software Vulnerability Detection Using Deep Neural Networks: A Survey
G Lin, S Wen, QL Han, J Zhang, Y Xiang
Proceedings of the IEEE, 2020
4392020
Robust network traffic classification
J Zhang, X Chen, Y Xiang, W Zhou, J Wu
IEEE/ACM Transactions on Networking (TON) 23 (4), 1257-1270, 2015
4382015
Network traffic classification using correlation information
J Zhang, Y Xiang, Y Wang, W Zhou, Y Xiang, Y Guan
IEEE Transactions on Parallel and Distributed systems 24 (1), 104-117, 2013
4342013
Detecting and preventing cyber insider threats: A survey
L Liu, O De Vel, QL Han, J Zhang, Y Xiang
IEEE Communications Surveys & Tutorials 20 (2), 1397-1417, 2018
4182018
Data-driven cybersecurity incident prediction: A survey
N Sun, J Zhang, P Rimba, S Gao, Y Xiang, LY Zhang
IEEE Communications Surveys & Tutorials, 2018
3432018
Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
A Chonka, Y Xiang, W Zhou, A Bonti
Journal of Network and Computer Applications 34 (4), 1097-1107, 2011
3382011
Block design-based key agreement for group data sharing in cloud computing
J Shen, T Zhou, D He, Y Zhang, X Sun, Y Xiang
IEEE Transactions on Dependable and Secure Computing, 2017
3292017
A secure cloud computing based framework for big data information management of smart grid
J Baek, QH Vu, JK Liu, X Huang, Y Xiang
IEEE transactions on cloud computing 3 (2), 233-244, 2015
3172015
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection
X Chen, C Li, D Wang, S Wen, J Zhang, S Nepal, Y Xiang, K Ren
IEEE Transactions on Information Forensics and Security, 2019
3072019
A generic framework for three-factor authentication: Preserving security and privacy in distributed systems
X Huang, Y Xiang, A Chonka, J Zhou, RH Deng
IEEE Transactions on Parallel and Distributed Systems 22 (8), 1390-1397, 2010
3042010
Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey
J Zhang, L Pan, QL Han, C Chen, S Wen, Y Xiang
IEEE/CAA Journal of Automatica Sinica, 2021
3012021
A survey of Android malware detection with deep neural models
J Qiu, J Zhang, W Luo, L Pan, S Nepal, Y Xiang
ACM Computing Surveys (CSUR) 53 (6), 1-36, 2020
2912020
Identifying propagation sources in networks: State-of-the-art and comparative studies
J Jiang, S Wen, S Yu, Y Xiang, W Zhou
IEEE Communications Surveys & Tutorials 19 (1), 465-481, 2017
2532017
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20