Bin Yuan

Orcid: 0000-0002-5365-904X

According to our database1, Bin Yuan authored at least 80 papers between 1994 and 2024.

Collaborative distances:



In proceedings 
PhD thesis 




A Broadband Cascode Low-Noise Amplifier Using Transformer Feedback and Darlington Techniques.
IEEE Trans. Circuits Syst. II Express Briefs, January, 2024

Leakage of Authorization-Data in IoT Device Sharing: New Attacks and Countermeasure.
IEEE Trans. Dependable Secur. Comput., 2024

Identification of important nodes in the information propagation network based on the artificial intelligence method.
CoRR, 2024

Automated Scoring of Clinical Patient Notes using Advanced NLP and Pseudo Labeling.
CoRR, 2024

Curriculum Recommendations Using Transformer Base Model with InfoNCE Loss And Language Switching Method.
CoRR, 2024

DG-ALETSK: A High-Dimensional Fuzzy Approach With Simultaneous Feature Selection and Rule Extraction.
IEEE Trans. Fuzzy Syst., November, 2023

Analysis and Design of a Gain-Enhanced 1-20-GHz LNA With Output-Stage Transformer Feedback.
IEEE Trans. Circuits Syst. II Express Briefs, September, 2023

On the Security of Smart Home Systems: A Survey.
J. Comput. Sci. Technol., April, 2023

SmartPatch: Verifying the Authenticity of the Trigger-Event in the IoT Platform.
IEEE Trans. Dependable Secur. Comput., 2023

Double groups of gates based Takagi-Sugeno-Kang (DG-TSK) fuzzy system for simultaneous feature selection and rule extraction.
Fuzzy Sets Syst., 2023

Low-illumination image enhancement with logarithmic tone mapping.
Open Comput. Sci., 2023

Research on Defect Detection of the Outer Side of Bottle Cap Based on High Angle and Multi-View Vision System.
IEEE Access, 2023

Fine-Grained Code Clone Detection with Block-Based Splitting of Abstract Syntax Tree.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Enhancing Deep Learning-based Vulnerability Detection by Building Behavior Graph Model.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

Prior-Enhanced Network for Image-Based PM2.5 Estimation from Imbalanced Data Distribution.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

Adaptive Neural Network Sliding Mode Control Method Based on Udwadia-Kalaba Theory.
Proceedings of the International Conference on Advanced Robotics and Mechatronics, 2023

Structural Resilience and Connectivity of the IPv6 Internet: An AS-level Topology Examination.
Proceedings of the 4th International Conference on Artificial Intelligence and Computer Engineering, 2023

IoT Anomaly Detection Via Device Interaction Graph.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

Lost along the Way: Understanding and Mitigating Path-Misresolution Threats to Container Isolation.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

A Fuzzing-Based Method for Testing Rules in Intrusion Detection Systems in 6G Networks.
IEEE Netw., 2022

Effective network intrusion detection via representation learning: A Denoising AutoEncoder approach.
Comput. Commun., 2022

Three-Way Image Classification with Evidential Deep Convolutional Neural Networks.
Cogn. Comput., 2022

SAND: semi-automated adaptive network defense via programmable rule generation and deployment.
Sci. China Inf. Sci., 2022

Q-Band Radial Waveguide Power Divider Based on a Specific Cycloidal-Like Transition Implementation.
IEEE Access, 2022

Research on Surface Defect Detection Technology Based on the Zonal and Time-Sharing Computational Imaging.
IEEE Access, 2022

P-Verifier: Understanding and Mitigating Security Risks in Cloud-based IoT Access Policies.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

StateDiver: Testing Deep Packet Inspection Systems with State-Discrepancy Guidance.
Proceedings of the Annual Computer Security Applications Conference, 2022

Application of Motion Sensor Based on Neural Network in Basketball Technology and Physical Fitness Evaluation System.
Wirel. Commun. Mob. Comput., 2021

Research on Intelligent Algorithm of Identity Authentication Based on Facial Features.
Wirel. Commun. Mob. Comput., 2021

Detecting Malicious Switches for a Secure Software-defined Tactile Internet.
ACM Trans. Internet Techn., 2021

Deployment of Robust Security Scheme in SDN Based 5G Network over NFV Enabled Cloud Environment.
IEEE Trans. Emerg. Top. Comput., 2021

DSEOM: A Framework for Dynamic Security Evaluation and Optimization of MTD in Container-Based Cloud.
IEEE Trans. Dependable Secur. Comput., 2021

Introduction to special issue on advances in multi-phase fluid and multi-scale particulate reactive flow modeling and simulation for petroleum engineering applications.
Simul., 2021

Automatically derived stateful network functions including non-field attributes.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Who's In Control? On Security Risks of Disjointed IoT Device Management Channels.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Adaptive PI Controller for Dredged Pipeline Transportation.
Proceedings of the 6th International Conference on Automation, 2021

Clustering Based on Supervised Learning of Exemplar Discriminative Information.
IEEE Trans. Syst. Man Cybern. Syst., 2020

Exploring New Opportunities to Defeat Low-Rate DDoS Attack in Container-Based Cloud Environment.
IEEE Trans. Parallel Distributed Syst., 2020

Minimizing Financial Cost of DDoS Attack Defense in Clouds With Fine-Grained Resource Management.
IEEE Trans. Netw. Sci. Eng., 2020

Differential Evolution Analysis of Clinical Characteristics of Severe Viral Pneumonia in Children.
J. Medical Imaging Health Informatics, 2020

Secure Data Transportation With Software-Defined Networking and k-n Secret Sharing for High-Confidence IoT Services.
IEEE Internet Things J., 2020

An improved EAAP scheme for vehicular ad hoc networks.
Int. J. Commun. Syst., 2020

HostWatcher: Protecting hosts in cloud data centers through software-defined networking.
Future Gener. Comput. Syst., 2020

Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation.
Proceedings of the 29th USENIX Security Symposium, 2020

Evidential Deep Neural Networks for Uncertain Data Classification.
Proceedings of the Knowledge Science, Engineering and Management, 2020

Performance of Existing Predictor of SubCellular Localization of Long Non-Coding RNA on the New Database.
Proceedings of the ICCPR 2020: 9th International Conference on Computing and Pattern Recognition, Xiamen, China, October 30, 2020

Defending Against Flow Table Overloading Attack in Software-Defined Networks.
IEEE Trans. Serv. Comput., 2019

A domain-divided configurable security model for cloud computing-based telecommunication services.
J. Supercomput., 2019

Tristate Resistive Switching in Heterogenous Van Der Waals Dielectric Structures.
Proceedings of the IEEE International Reliability Physics Symposium, 2019

Self-Normalizing Generative Adversarial Network for Super-Resolution Reconstruction of SAR Images.
Proceedings of the 2019 IEEE International Geoscience and Remote Sensing Symposium, 2019

An Optronic Processor for Ultra-Wideband Spectrum Awareness.
Proceedings of the 2019 IEEE International Geoscience and Remote Sensing Symposium, 2019

A Robust Multiscale Dictionary Learning Algorithm for Sar Object Recognition.
Proceedings of the 2019 IEEE International Geoscience and Remote Sensing Symposium, 2019

Automatic Sub-Images Extraction from Entire Urban SAR Scenes Based on the Clustering-Based Algorithm and Graph Traversal Methods.
Proceedings of the 2019 IEEE International Geoscience and Remote Sensing Symposium, 2019

A New Approach to Automatic Clothing Matting from Mannequins.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019

A Practical Byzantine-Based Approach for Faulty Switch Tolerance in Software-Defined Networks.
IEEE Trans. Netw. Serv. Manag., 2018

Validating User Flows to Protect Software Defined Network Environments.
Secur. Commun. Networks, 2018

A Fine-Grained Multi-Tenant Permission Management Framework for SDN and NFV.
IEEE Access, 2018

Solving Anomalies in NFV-SDN Based Service Function Chaining Composition for IoT Network.
IEEE Access, 2018

SecSDN-Cloud: Defeating Vulnerable Attacks Through Secure Software-Defined Networks.
IEEE Access, 2018

Enhanced reliability of hexagonal boron nitride dielectric stacks due to high thermal conductivity.
Proceedings of the IEEE International Reliability Physics Symposium, 2018

The Influence Simulation Analysis of the Sensitive Area of the Instrument Landing System's Localizer On The Position Of The Aircraft Take-off Waiting Line.
Proceedings of the 4th International Conference on Robotics and Artificial Intelligence, 2018

Enhanced Attack Aware Security Provisioning Scheme in SDN/NFV Enabled over 5G Network.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

基于B样条的Level-Set GPU演化算法 (Level-Set GPU Evolution Algorithm Based on B-spline).
计算机科学, 2017

Mechanism study on gear tooth surface texture in power honing process.
Int. J. Manuf. Res., 2017

DIM: A novel decentralized interference mitigation scheme in WBAN.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015

Throughput optimization with fairness consideration for coexisting WBANs.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Joint Semantic Relevance Learning with Text Data and Graph Knowledge.
Proceedings of the 3rd Workshop on Continuous Vector Space Models and their Compositionality, 2015

Short Text Sentiment Entropy Optimization Based on the Fuzzy Sets.
Proceedings of the 12th Web Information System and Application Conference, 2015

Micro-Doppler Analysis and Separation Based on Complex Local Mean Decomposition for Aircraft With Fast-Rotating Parts in ISAR Imaging.
IEEE Trans. Geosci. Remote. Sens., 2014

MTRC compensation in high-resolution ISAR imaging via improved polar format algorithm based on ICPF.
EURASIP J. Adv. Signal Process., 2014

QS-PS: A New Approach for Emergency Packet Delivery in WBAN.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

Radar staring imaging scheme and target change detection based on range pulse compression and azimuth wavefront modulation.
Proceedings of the 2014 IEEE Geoscience and Remote Sensing Symposium, 2014

Relation between the Yin-cold or Yang-heat syndrome type of TCM and the EGFR gene status in patients with NSCLC.
Proceedings of the 2014 IEEE International Conference on Bioinformatics and Biomedicine, 2014

Biostable ssDNA Aptamers Specific for Hodgkin Lymphoma.
Sensors, 2013

Physical Modeling and Configuration Simulation for Constrained Cables of Electromechanical Products.
Proceedings of the 2013 International Conference on Computer-Aided Design and Computer Graphics, 2013

Automatic Generation of Canonical Views for CAD Models.
Proceedings of the 12th International Conference on Computer-Aided Design and Computer Graphics, 2011

A New Intelligent Technology of Steering-by-Wire System by Variable Structure Control with Sliding Mode.
Proceedings of the First IITA International Joint Conference on Artificial Intelligence, 2009

STEP-Based Research and Realization on CAD Data Transformation for Virtual Assembly.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

Improving Chinese Internet's Resilience through Degree Rank Based Overlay Relays Placement.
Proceedings of IEEE International Conference on Communications, 2008

Automatic classification of wooden cabinet doors.
Proceedings of Second IEEE Workshop on Applications of Computer Vision, 1994