Xiaofan Yang

Orcid: 0000-0002-3273-1233

Affiliations:
  • Chongqing University, School of Big Data and Software Engineering, China


According to our database1, Xiaofan Yang authored at least 110 papers between 1999 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Mitigating Social Engineering Attacks Through Cost-Effective Security Awareness Training Policy.
IEEE Trans. Netw. Sci. Eng., 2025

2024
Cost-Effective Company Response Policy for Product Co-Creation in Company-Sponsored Online Community.
IEEE Trans. Syst. Man Cybern. Syst., July, 2024

A Framework for Detecting False Data Injection Attacks in Large-Scale Wireless Sensor Networks.
Sensors, March, 2024

Game-theoretic modeling and analysis of cyberbullying spreading on OSNs.
Inf. Sci., February, 2024

Mitigating the Impact of a False Message Through Sequential Release of Clarifying Messages.
IEEE Trans. Netw. Sci. Eng., 2024

Cost-Effective Hybrid Control Strategies for Dynamical Propaganda War Game.
IEEE Trans. Inf. Forensics Secur., 2024

The evolution of the flip-it game in cybersecurity: Insights from the past to the future.
J. King Saud Univ. Comput. Inf. Sci., 2024

Optimal Control of Malware Propagation in IoT Networks.
CoRR, 2024

Modeling and study of defense outsourcing against advanced persistent threat through impulsive differential game approach.
Comput. Secur., 2024

Malware containment with immediate response in IoT networks: An optimal control approach.
Comput. Commun., 2024

2023
A Novel Diagnosis Scheme against Collusive False Data Injection Attack.
Sensors, July, 2023

Impact Assessment and Defense for Smart Grids With FDIA Against AMI.
IEEE Trans. Netw. Sci. Eng., 2023

Impulsive Artificial Defense Against Advanced Persistent Threat.
IEEE Trans. Inf. Forensics Secur., 2023

2022
Effective Multiplatform Advertising Policy.
IEEE Trans. Syst. Man Cybern. Syst., 2022

Containing Misinformation Spread: A Collaborative Resource Allocation Strategy for Knowledge Popularization and Expert Education.
Secur. Commun. Networks, 2022

2021
Effective Quarantine and Recovery Scheme Against Advanced Persistent Threat.
IEEE Trans. Syst. Man Cybern. Syst., 2021

Defense Against Advanced Persistent Threat Through Data Backup and Recovery.
IEEE Trans. Netw. Sci. Eng., 2021

Developing Cost-Effective Rumor-Refuting Strategy Through Game-Theoretic Approach.
IEEE Syst. J., 2021

2020
A Risk Management Approach to Defending Against the Advanced Persistent Threat.
IEEE Trans. Dependable Secur. Comput., 2020

Simultaneous Benefit Maximization of Conflicting Opinions: Modeling and Analysis.
IEEE Syst. J., 2020

User-item matching for recommendation fairness: a view from item-providers.
CoRR, 2020

Evaluating the Performance of a Static Patching Strategy against Computer Viruses.
Complex., 2020

Dynamic Maintenance Strategy for Word-of-Mouth Marketing.
IEEE Access, 2020

A Low-Cost Distributed Denial-of-Service Attack Architecture.
IEEE Access, 2020

A Cost-Effective Algorithm for Selecting Optimal Bandwidth to Clear Malicious Codes.
IEEE Access, 2020

2019
Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach.
IEEE Trans. Inf. Forensics Secur., 2019

Energy-Efficient Patching Strategy for Wireless Sensor Networks.
Sensors, 2019

Seeking Best-Balanced Patch-Injecting Strategies through Optimal Control Approach.
Secur. Commun. Networks, 2019

A discount strategy in word-of-mouth marketing.
Commun. Nonlinear Sci. Numer. Simul., 2019

On Dynamic Recovery of Cloud Storage System Under Advanced Persistent Threats.
IEEE Access, 2019

Dynamic Discount Pricing in Competitive Marketing.
IEEE Access, 2019

Maximum Profit of Viral Marketing: An Optimal Control Approach.
Proceedings of the 4th International Conference on Mathematics and Artificial Intelligence, 2019

2018
A Bi-Virus Competing Spreading Model with Generic Infection Rates.
IEEE Trans. Netw. Sci. Eng., 2018

Defending against the Advanced Persistent Threat: An Optimal Control Approach.
Secur. Commun. Networks, 2018

Effectiveness analysis of a mixed rumor-quelling strategy.
J. Frankl. Inst., 2018

A Differential Game Approach to Patch Injection.
IEEE Access, 2018

Defending Against Advanced Persistent Threat: A Risk Management Perspective.
Proceedings of the Science of Cyber Security - First International Conference, 2018

2017
The effect of network topology on the spread of computer viruses: a modelling study.
Int. J. Comput. Math., 2017

Defend against advanced persistent threats: An optimal control approach.
CoRR, 2017

A cost-effective rumor-containing strategy.
CoRR, 2017

A discount strategy in word-of-mouth marketing and its assessment.
CoRR, 2017

Maximizing the effectiveness of an advanced persistent threat.
CoRR, 2017

On the effectiveness of the truth-spreading/rumor-blocking strategy for restraining rumors.
CoRR, 2017

Security evaluation of cyber networks under advanced persistent threats.
CoRR, 2017

Analysis of the effectiveness of the truth-spreading strategy for inhibiting rumors.
CoRR, 2017

Distributed interaction between computer virus and patch: A modeling study.
CoRR, 2017

Maximizing the overall profit of a word-of-mouth marketing campaign: A modeling study.
CoRR, 2017

The damage inflicted by a computer virus: A new estimation method.
CoRR, 2017

Security Evaluation of the Cyber Networks Under Advanced Persistent Threats.
IEEE Access, 2017

2015
Theoretical and experimental analysis of the impacts of removable storage media and antivirus software on viral spread.
Commun. Nonlinear Sci. Numer. Simul., 2015

2014
Exact formulas for fixation probabilities on a complete oriented star.
Inf. Sci., 2014

The combined impact of external computers and network topology on the spread of computer viruses.
Int. J. Comput. Math., 2014

A new epidemic model of computer viruses.
Commun. Nonlinear Sci. Numer. Simul., 2014

Propagation of computer virus both across the Internet and external computers: A complex-network approach.
Commun. Nonlinear Sci. Numer. Simul., 2014

A propagation model of computer virus with nonlinear vaccination probability.
Commun. Nonlinear Sci. Numer. Simul., 2014

Part-metric and its applications in discrete systems.
Appl. Math. Comput., 2014

2013
Epidemics of computer viruses: A complex-network approach.
Appl. Math. Comput., 2013

Dynamics of a family of two-dimensional difference systems.
Appl. Math. Comput., 2013

An epidemic model of computer viruses with vaccination and generalized nonlinear incidence rate.
Appl. Math. Comput., 2013

2012
Routing and wavelength assignment for 3-ary n-cube in array-based optical network.
Inf. Process. Lett., 2012

Optimal broadcasting for locally twisted cubes.
Inf. Process. Lett., 2012

A novel computer virus propagation model and its dynamics.
Int. J. Comput. Math., 2012

Optimal control of computer virus under a delayed model.
Appl. Math. Comput., 2012

The spread of computer viruses under the influence of removable storage devices.
Appl. Math. Comput., 2012

2010
Embedding meshes/tori in faulty crossed cubes.
Inf. Process. Lett., 2010

2009
Fault Hamiltonicity and fault Hamiltonian-connectivity of generalised matching networks.
Int. J. Parallel Emergent Distributed Syst., 2009

Embedding a fault-free hamiltonian cycle in a class of faulty generalized honeycomb tori.
Comput. Electr. Eng., 2009

2008
Embedding a family of disjoint 3D meshes into a crossed cube.
Inf. Sci., 2008

Embedding a family of disjoint multi-dimensional meshes into a crossed cube.
Inf. Process. Lett., 2008

Embedding even-length cycles in a hexagonal honeycomb mesh.
Int. J. Comput. Math., 2008

Largest connected component of a star graph with faulty vertices.
Int. J. Comput. Math., 2008

Embedding torus in hexagonal honeycomb torus.
IET Comput. Digit. Tech., 2008

Global asymptotic stability of a family of difference equations.
Comput. Math. Appl., 2008

Biological computation of the solution to the quadratic assignment problem.
Appl. Math. Comput., 2008

2007
Efficient Fault Identification of Diagnosable Systems under the Comparison Model.
IEEE Trans. Computers, 2007

Generalized matching networks and their properties.
Int. J. Parallel Emergent Distributed Syst., 2007

A (4n-9)/3 diagnosis algorithm on n-dimensional cube network.
Inf. Sci., 2007

Robust global periodicity of interval bidirectional associative memory networks with finite distributed delays.
Int. J. Syst. Sci., 2007

On the nonlinear difference equation system x<sub>n+1</sub>=A+y<sub>n-m</sub>/x<sub>n</sub>, y<sub>n+1</sub>=A+x<sub>n-m</sub>/y<sub>n</sub>.
Comput. Math. Appl., 2007

2006
Pancyclicity of Möbius cubes with faulty nodes.
Microprocess. Microsystems, 2006

An oblivious shortest-path routing algorithm for fully connected cubic networks.
J. Parallel Distributed Comput., 2006

A Novel Radix-3/9 Algorithm for Type-III Generalized Discrete Hartley Transform.
J. Circuits Syst. Comput., 2006

Minimum neighborhood in a generalized cube.
Inf. Process. Lett., 2006

On the maximal connected component of a hypercube with faulty vertices III.
Int. J. Comput. Math., 2006

Guaranteed attractivity of Equilibrium Points in a Class of Delayed Neural Networks.
Int. J. Bifurc. Chaos, 2006

On the system of rational difference equations x<sub>n</sub>=A + 1/y<sub>n-p</sub>, y<sub>n</sub>=A+y<sub>n-1</sub>/x<sub>n-t</sub>y<sub>n-s</sub>.
Appl. Math. Comput., 2006

Optimal doublecast path in hexagonal honeycomb mesh.
Appl. Math. Comput., 2006

A lower bound on the size of k-neighborhood in generalized cubes.
Appl. Math. Comput., 2006

On a difference equation with maximum.
Appl. Math. Comput., 2006

On two rational difference equations.
Appl. Math. Comput., 2006

2005
On the Path-Connectivity Vertex-Pancyclicity and Edge-Pancyclicity of Crossed Cubes.
Neural Parallel Sci. Comput., 2005

A comparison-based diagnosis algorithm tailored for crossed cube multiprocessor systems.
Microprocess. Microsystems, 2005

Maximum induced subgraph of a recursive circulant.
Inf. Process. Lett., 2005

The locally twisted cubes.
Int. J. Comput. Math., 2005

On the recursive sequence x<sub>n</sub> = (ax<sub>n-1</sub>+bx<sub>n-2</sub>) / (c+dx<sub>n-1</sub>x<sub>n-2</sub>).
Appl. Math. Comput., 2005

Global exponential periodicity of a class of bidirectional associative memory networks with finite distributed delays.
Appl. Math. Comput., 2005

On a non-autonomous difference equation.
Appl. Math. Comput., 2005

Existence and Stability of Periodic Solution in a Class of Impulsive Neural Networks.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

2004
A solution to the three disjoint path problem on honeycomb tori.
Parallel Process. Lett., 2004

A solution to the three disjoint path problem on honeycomb meshes.
Parallel Process. Lett., 2004

On the double-vertex-cycle-connectivity of crossed cubes.
Parallel Algorithms Appl., 2004

Generalized honeycomb torus is Hamiltonian.
Inf. Process. Lett., 2004

Fault tolerance of Möbius cubes under two forbidden fault set models.
Int. J. Comput. Math., 2004

On the maximal connected component of hypercube with faulty vertices (II).
Int. J. Comput. Math., 2004

On the maximal connected component of hypercube with faulty vertices.
Int. J. Comput. Math., 2004

Locally twisted cubes are 4-pancyclic.
Appl. Math. Lett., 2004

Global asymptotic stability in a rational recursive sequence.
Appl. Math. Comput., 2004

Global attractivity in a recursive sequence.
Appl. Math. Comput., 2004

1999
Fault-Tolerant Ring Embedding in a Honeycomb Torus with Node Failures.
Parallel Process. Lett., 1999

Honeycomb tori are Hamiltonian.
Inf. Process. Lett., 1999


  Loading...