Baijian Yang

According to our database1, Baijian Yang
  • authored at least 37 papers between 2002 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Box-Cox Transformation in Big Data.
Technometrics, 2017

NetFlowMatrix: a visual approach for analysing large NetFlow data.
IJSN, 2017

Internet of Things: Survey on Security and Privacy.
CoRR, 2017

A countermeasure against relay attack in NFC payment.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

Multichannel key exchange.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

Finding the Best Box-Cox Transformation in Big Data with Meta-Model Learning: A Case Study on QCT Developer Cloud.
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017

Vulnerabilities in hub architecture IoT devices.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

Finding the best box-cox transformation from massive datasets on spark.
Proceedings of the 2017 IEEE International Conference on Big Data, BigData 2017, 2017

2016
Big Data Dimension Reduction Using PCA.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016

A Scalable Feature Selection and Model Updating Approach for Big Data Machine Learning.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016

Predicting network attack patterns in SDN using machine learning approach.
Proceedings of the 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), 2016

A Black-Box Self-Learning Scheduler for Cloud Block Storage Systems.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
A Study on Botnets Utilizing DNS.
Proceedings of the 4th Annual ACM Conference on Research in Information Technology, 2015

A Man-in-the-Middle attack against OpenDayLight SDN controller.
Proceedings of the 4th Annual ACM Conference on Research in Information Technology, 2015

A visual analytics approach to detecting server redirections and data exfiltration.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015

Forensically Sound Retrieval and Recovery of Images from GPU Memory.
Proceedings of the Digital Forensics and Cyber Crime - 7th International Conference, 2015

2014
A D-S evidence theory based fuzzy trust model in file-sharing P2P networks.
Peer-to-Peer Networking and Applications, 2014

Securing Virtualized Datacenters.
CoRR, 2014

Trust-based incentive mechanism to motivate cooperation in hybrid P2P networks.
Computer Networks, 2014

Detecting subtle port scans through characteristics based on interactive visualization.
Proceedings of the 3rd annual conference on Research in information technology, 2014

A taxonomy of privacy-protecting tools to browse the world wide web.
Proceedings of the 3rd annual conference on Research in information technology, 2014

2012
Cable-Based Moving Reachability with Mobile Sensors.
Ad Hoc & Sensor Wireless Networks, 2012

2011
R2 Trust, a reputation and risk based trust management framework for large-scale, fully decentralized overlay networks.
Future Generation Comp. Syst., 2011

2009
On the reliability of large-scale distributed systems - A topological view.
Computer Networks, 2009

LORP: a load-balancing based optimal routing protocol for sensor networks with bottlenecks.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

tk-coverage: Time-Based K-Coverage for Energy Efficient Monitoring.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

2008
PAS: Prediction-based Adaptive Sleeping for Diffusion Stimulus Monitoring Sensor Networks.
Ad Hoc & Sensor Wireless Networks, 2008

On the Reliability of Large-Scale Distributed Systems A Topological View.
Proceedings of the 2008 International Conference on Parallel Processing, 2008

2007
Design a Building Intelligence Management System with SOA and RFID Technology.
Proceedings of the 2007 International Conference on Software Engineering Research & Practice, 2007

2006
A Survey on Topology issues in Wireless Sensor Network.
Proceedings of the 2006 International Conference on Wireless Networks, 2006

A Framework to Provide Trust and Incentive in CROWN Grid for Dynamic Resource Management.
Proceedings of the 15th International Conference On Computer Communications and Networks, 2006

2004
DiffServ-Aware Multicasting.
J. High Speed Networks, 2004

Multicasting in MPLS domains.
Computer Communications, 2004

Efficient Gnutella-like P2P Overlay Construction.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2004

2003
A Tree Building Technique for Overlay Multicasting in DiffServ Domains.
Proceedings of the International Conference on Internet Computing, 2003

2002
Edge router multicasting with MPLS traffic engineering.
Proceedings of the Proceedings 10th IEEE International Conference on Networks: Towards Network Superiority, 2002

Multicasting in differentiated service domains.
Proceedings of the Global Telecommunications Conference, 2002


  Loading...