Chao Yang

Orcid: 0000-0002-9021-3573

Affiliations:
  • Xidian University, School of Cyber Engineering, Xi'an, China (PhD 2008)


According to our database1, Chao Yang authored at least 38 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Design and implementation of an efficient container tag dynamic taint analysis.
Comput. Secur., December, 2023

FCEVAL: An effective and quantitative platform for evaluating fuzzer combinations fairly and easily.
Comput. Secur., September, 2023

IAFDroid: Demystifying Collusion Attacks in Android Ecosystem via Precise Inter-App Analysis.
IEEE Trans. Inf. Forensics Secur., 2023

SEBD: Sensor Emulation Based Backdoor for Autopilot.
Proceedings of the 13th International Conference on the Internet of Things, 2023

A Semi-Supervised Anomaly Network Traffic Detection Framework via Multimodal Traffic Information Fusion.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

2022
SSAPPIDENTIFY: A robust system identifies application over Shadowsocks's traffic.
Comput. Networks, 2022

Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

2021
Smart home: Keeping privacy based on Air-Padding.
IET Inf. Secur., 2021

App identification based on encrypted multi-smartphone sources traffic fingerprints.
Comput. Networks, 2021

GramMatch: An automatic protocol feature extraction and identification system.
Comput. Networks, 2021

ShadowDGA: Toward Evading DGA Detectors with GANs.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

2020
TROVE: A Context-Awareness Trust Model for VANETs Using Reinforcement Learning.
IEEE Internet Things J., 2020

Achieving secure and convenient WLAN sharing in personal.
IET Inf. Secur., 2020

Multi-Label ECG Signal Classification Based on Ensemble Classifier.
IEEE Access, 2020

IMShell-Dec: Pay More Attention to External Links in PowerShell.
Proceedings of the ICT Systems Security and Privacy Protection, 2020

A Preliminary Analysis of Password Guessing Algorithm.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

2019
Fingerprint Protected Password Authentication Protocol.
Secur. Commun. Networks, 2019

Blockchain-based secure and fair crowdsourcing scheme.
Int. J. Distributed Sens. Networks, 2019

Universally composable secure geographic area verification without pre-shared secret.
Sci. China Inf. Sci., 2019

LBOA: Location-Based Secure Outsourced Aggregation in IoT.
IEEE Access, 2019

Continuous Authentication for the Internet of Things Using Channel State Information.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
LIP-PA: A Logistics Information Privacy Protection Scheme with Position and Attribute-Based Access Control on Mobile Devices.
Wirel. Commun. Mob. Comput., 2018

BMPLS: Blockchain-Based Multi-level Privacy-Preserving Location Sharing Scheme for Telecare Medical Information Systems.
J. Medical Syst., 2018

Updatable Block-Level Deduplication with Dynamic Ownership Management on Encrypted Data.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Inference Attack in Android Activity based on Program Fingerprint.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Zero knowledge based client side deduplication for encrypted files of secure cloud storage in smart cities.
Pervasive Mob. Comput., 2017

Efficient end-to-end authentication protocol for wearable health monitoring systems.
Comput. Electr. Eng., 2017

A client-based secure deduplication of multimedia data.
Proceedings of the IEEE International Conference on Communications, 2017

2016
A new method to deduce counterexamples in secure routing protocols based on strand space model.
Secur. Commun. Networks, 2016

A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth.
J. Medical Syst., 2016

Position based key exchange: defnitions and implementations.
J. Commun. Inf. Networks, 2016

2015
Protocol Derivation System for the Needham-Schroeder family.
Secur. Commun. Networks, 2015

Provable ownership of files in deduplication cloud storage.
Secur. Commun. Networks, 2015

Universally composable secure positioning in the bounded retrieval model.
Sci. China Inf. Sci., 2015

Provable Ownership of Encrypted Files in De-duplication Cloud Storage.
Ad Hoc Sens. Wirel. Networks, 2015

2013
Provable ownership of file in de-duplication cloud storage.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2011
A New Evaluation Model for Security Protocols.
J. Commun., 2011

2008
Constructing UC Secure and Constant-Round Group Key Exchange Protocols via Secret Sharing.
EURASIP J. Wirel. Commun. Netw., 2008


  Loading...