Li Yang

Affiliations:
  • University of Tennessee, Department of Computer Science, Chattanooga, TN, USA
  • Florida International University, Miami, FL, USA (former)


According to our database1, Li Yang authored at least 63 papers between 2004 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Shifting Trends of COVID-19 Tweet Sentiment with Respect to Voting Preferences in the 2020 Election Year of the United States.
CoRR, 2022

A Comparison of YOLO and Mask-RCNN for Detecting Cells from Microfluidic Images.
Proceedings of the 2022 International Conference on Artificial Intelligence in Information and Communication, 2022

2021
Cognitive GPR for Subsurface Object Detection Based on Deep Reinforcement Learning.
IEEE Internet Things J., 2021

2020
Network Intrusion Detection System as a Service in OpenStack Cloud.
Proceedings of the International Conference on Computing, Networking and Communications, 2020

2019
Autonomous Cognitive GPR Based on Edge Computing and Reinforcement Learning.
Proceedings of the IEEE International Conference on Industrial Internet, 2019

Isoflat: Flat Provider Network Multiplexing and Firewalling in OpenStack Cloud.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

A Fog Computing Framework for Cognitive Portable Ground Penetrating Radars.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Teaching Cybersecurity Using Guided Inquiry Collaborative Learning.
Proceedings of the IEEE Frontiers in Education Conference, 2019

2018
Social History of Computing and Online Social Communities.
Proceedings of the Encyclopedia of Social Network Analysis and Mining, 2nd Edition, 2018

2017
Faculty Workshops for Teaching Information Assurance through Hands-On Exercises and Case Studies.
J. Inf. Syst. Educ., 2017

Enhancing Cybersecurity Education Using POGIL (Abstract Only).
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

2016
Teaching Security Management for Mobile Devices.
Proceedings of the 17th Annual Conference on Information Technology Education and the 5th Annual Conference on Research in Information Technology, 2016

2015
A course module on web tracking and privacy.
Proceedings of the 2015 Information Security Curriculum Development Conference, 2015

2014
Social History of Computing and Online Social Communities.
Encyclopedia of Social Network Analysis and Mining, 2014

Learning Mobile Security with Labware.
IEEE Secur. Priv., 2014

New hands-on labs on browser security (abstract only).
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014

A course module on mobile malware.
Proceedings of the 2014 Information Security Curriculum Development Conference, 2014

Developing Faculty Expertise in Information Assurance through Case Studies and Hands-On Experiences.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

2013
Supporting Case-Based Learning in Information Security with Web-Based Technology.
J. Inf. Syst. Educ., 2013

Enhance computer networks learning with hands-on mobile device based labware (abstract only).
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013

Learning mobile security with android security labware.
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013

Android-Based Mobile Sensory System Labware for Embedded System Education.
Proceedings of the IEEE 13th International Conference on Advanced Learning Technologies, 2013

Teaching business analytics.
Proceedings of the IEEE Frontiers in Education Conference, 2013

Authentic learning of mobile security with case studies.
Proceedings of the IEEE Frontiers in Education Conference, 2013

Entity authentication in a mobile-cloud environment.
Proceedings of the Cyber Security and Information Intelligence, 2013

2012
Teaching cryptography using hands-on labs (abstract only).
Proceedings of the 43rd ACM technical symposium on Computer science education, 2012

Work in progress: Real world relevant security labware for mobile threat analysis and protection experience.
Proceedings of the IEEE Frontiers in Education Conference, 2012

2011
Visual Mining Intrusion Behaviors by Using Swarm Technology.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

Usable protection to healthcare application.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

Attacker behavior analysis in multi-stage attack detection system.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

Network covert channels on the Android platform.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2010
A Dirichlet reputation system in reliable routing of wireless <i>ad hoc</i> network.
Secur. Commun. Networks, 2010

A Host-Based Intrusion Detection System Using Architectural Features to Improve Sophisticated Denial-of-Service Attack Detections.
Int. J. Inf. Secur. Priv., 2010

Inquiry-based active learning in introductory programming courses.
Proceedings of the 15th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2010

Innovative CS capstone projects on green energy applications with WSN in a box.
Proceedings of the 15th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2010

2009
Fair Electronic Exchange Based on Fingerprint Biometrics.
Int. J. Inf. Secur. Priv., 2009

Teaching database security and auditing.
Proceedings of the 40th SIGCSE Technical Symposium on Computer Science Education, 2009

Extracting Value from P2P Content Delivery.
Proceedings of the Fourth International Conference on Systems, 2009

Integrating Dirichlet reputation into usage control.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

Fair electronic exchange using biometrics.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

Discovering topics from dark websites.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009

A case study: Using architectural features to improve sophisticated denial-of-service attack detections.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009

2008
SecCMP: Enhancing Critical Secrets Protection in Chip-Multiprocessors.
Int. J. Inf. Secur. Priv., 2008

Trust-Based Usage Control in Collaborative Environment.
Int. J. Inf. Secur. Priv., 2008

Integrating Trust Management into Usage Control in P2P Multimedia Delivery.
Proceedings of the Twentieth International Conference on Software Engineering & Knowledge Engineering (SEKE'2008), 2008

Network Intrusion Detection Based on Bayesian Networks.
Proceedings of the Twentieth International Conference on Software Engineering & Knowledge Engineering (SEKE'2008), 2008

Detection of Changes in Transitive Associations by Shortest-path Analysis of Protein Interaction Networks Integrated with Gene Expression Profiles.
Proceedings of the 2008 International Conference on BioMedical Engineering and Informatics, 2008

Biometrics education with hands-on labs.
Proceedings of the 46th Annual Southeast Regional Conference, 2008

2007
Fine-Grained Reputation-based Routing in Wireless Ad Hoc Networks.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

2006
A Relationship-based Flexible Authorization Framework for Mediation Systems.
Proceedings of the Eighteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2006), 2006

A Flexible Context-Aware Authorization Framework for Mediation Systems.
Proceedings of the Intelligence and Security Informatics, 2006

TMAS A Capstone Project.
Proceedings of the 2006 International Conference on Frontiers in Education: Computer Science & Computer Engineering, 2006

SecCMP: a secure chip-multiprocessor architecture.
Proceedings of the 1st Workshop on Architectural and System Support for Improving Software Dependability, 2006

2005
Formal Aspect-Oriented Modeling and Analysis by Aspect.
Proceedings of the 17th International Conference on Software Engineering and Knowledge Engineering (SEKE'2005), 2005

Dynamic Integration Strategy for Mediation Framework.
Proceedings of the 17th International Conference on Software Engineering and Knowledge Engineering (SEKE'2005), 2005

Mediation framework modeling and verification by SAM.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

Mediation security specification and enforcement for heterogeneous databases.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

Secure Software Architectures Design by Aspect Orientation.
Proceedings of the 10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005), 2005

Mediation Systems Modeling and Verification.
Proceedings of the 10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005), 2005

2004
Enhancing Mediation Security by Aspect-Oriented Approach.
Proceedings of the Sixteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2004), 2004

A mediation framework for multimedia delivery.
Proceedings of the 3rd International Conference on Mobile and Ubiquitous Multimedia, 2004

Three-Layered Mediator Architecture Based on DHT.
Proceedings of the 7th International Symposium on Parallel Architectures, 2004

A Role-Based Access Control Model for Information Mediation.
Proceedings of the 2004 IEEE International Conference on Information Reuse and Integration, 2004


  Loading...