Lihua Yin

Orcid: 0000-0001-8829-4442

According to our database1, Lihua Yin authored at least 100 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An Autoencoder-Based Hybrid Detection Model for Intrusion Detection With Small-Sample Problem.
IEEE Trans. Netw. Serv. Manag., April, 2024

PriMonitor: An adaptive tuning privacy-preserving approach for multimodal emotion detection.
World Wide Web (WWW), January, 2024

2023
Local differentially private frequency estimation based on learned sketches.
Inf. Sci., November, 2023

A feature enhancement-based model for the malicious traffic detection with small-scale imbalanced dataset.
Inf. Sci., November, 2023

A privacy-preserving botnet detection approach in largescale cooperative IoT environment.
Neural Comput. Appl., July, 2023

CDAML: a cluster-based domain adaptive meta-learning model for cross domain recommendation.
World Wide Web (WWW), May, 2023

Dynamic Prototype Network Based on Sample Adaptation for Few-Shot Malware Detection.
IEEE Trans. Knowl. Data Eng., May, 2023

<i>WaterPurifier</i>: A scalable system to prevent the DNS water torture attack in 5G-enabled SIoT network.
Comput. Commun., February, 2023

ASNN-FRR: A traffic-aware neural network for fastest route recommendation.
GeoInformatica, 2023

Partition-based differentially private synthetic data generation.
CoRR, 2023

Sensitivity estimation for differentially private query processing.
CoRR, 2023

2022
From Data and Model Levels: Improve the Performance of Few-Shot Malware Classification.
IEEE Trans. Netw. Serv. Manag., December, 2022

EmoMix+: An Approach of Depression Detection Based on Emotion Lexicon for Mobile Application.
Secur. Commun. Networks, 2022

TPRPF: a preserving framework of privacy relations based on adversarial training for texts in big data.
Frontiers Comput. Sci., 2022

A blockchain-based audit approach for encrypted data in federated learning.
Digit. Commun. Networks, 2022

FPMBot: Discovering the frequent pattern of IoT-botnet domain queries in large-scale network.
Comput. Commun., 2022

A Quantifying Approach for Evaluating Differential Privacy in Deep Learning.
Proceedings of the IEEE Smartworld, 2022

2021
A Privacy-Preserving Federated Learning for Multiparty Data Sharing in Social IoTs.
IEEE Trans. Netw. Sci. Eng., 2021

Gradient Shielding: Towards Understanding Vulnerability of Deep Neural Networks.
IEEE Trans. Netw. Sci. Eng., 2021

A Blockchain-Based IoT Cross-Domain Delegation Access Control Method.
Secur. Commun. Networks, 2021

Building Agile and Resilient UAV Networks Based on SDN and Blockchain.
IEEE Netw., 2021

IoT root union: A decentralized name resolving system for IoT based on blockchain.
Inf. Process. Manag., 2021

CISK: An interactive framework for conceptual inference based spatial keyword query.
Neurocomputing, 2021

LSVP: A visual based deep neural direction learning model for point-of-interest recommendation on sparse check-in data.
Neurocomputing, 2021

Rinegan: A Scalable Image Processing Architecture for Large Scale Surveillance Applications.
Frontiers Neurorobotics, 2021

A blockchain-based collaborative training method for multi-party data sharing.
Comput. Commun., 2021

A scalable rule engine system for trigger-action application in large-scale IoT environment.
Comput. Commun., 2021

2020
Achieving Privacy-Preserving Group Recommendation with Local Differential Privacy and Random Transmission.
Wirel. Commun. Mob. Comput., 2020

ConnSpoiler: Disrupting C&C Communication of IoT-Based Botnet Through Fast Detection of Anomalous Domain Queries.
IEEE Trans. Ind. Informatics, 2020

Hierarchically defining Internet of Things security: From CIA to CACA.
Int. J. Distributed Sens. Networks, 2020

Multi-objective spatial keyword query with semantics: a distance-owner based approach.
Distributed Parallel Databases, 2020

The QoS and privacy trade-off of adversarial deep learning: An evolutionary game approach.
Comput. Secur., 2020

Security of Mobile Multimedia Data: The Adversarial Examples for Spatio-temporal Data.
Comput. Networks, 2020

A Lightweight Privacy-Preserving Communication Protocol for Heterogeneous IoT Environment.
IEEE Access, 2020

A Secure Authentication Scheme for Remote Diagnosis and Maintenance in Internet of Vehicles.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

LGMal: A Joint Framework Based on Local and Global Features for Malware Detection.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

An IoT data sharing privacy preserving scheme.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Decision-Making for Intrusion Response: Which, Where, in What Order, and How Long?
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Adversarial Examples for Chinese Text Classification.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

Automatic Classification of Matching Rules in Pattern Matching.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

A Unified Information Diffusion Model for Social Networks.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

Resume Extraction and Validation from Public Information.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

2019
A Novel KGP Algorithm for Improving INS/GPS Integrated Navigation Positioning Accuracy.
Sensors, 2019

Searching Activity Trajectories with Semantics.
J. Comput. Sci. Technol., 2019

Trust architecture and reputation evaluation for internet of things.
J. Ambient Intell. Humaniz. Comput., 2019

Mining Frequent Items Over the Distributed Hierarchical Continuous Weighted Data Streams in Internet of Things.
IEEE Access, 2019

Centralized Fusion Based on Interacting Multiple Model and Adaptive Kalman Filter for Target Tracking in Underwater Acoustic Sensor Networks.
IEEE Access, 2019

A General Framework for Adjustable Neighbor Discovery in Wireless Sensor Networks.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

A Genetic-Algorithm Based Method for Storage Location Assignments in Mobile Rack Warehouses.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Construction of Situation Assessment Indicator System Based on Latitude and Longitude Lines of Information Security.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Data Storage Method for Fast Retrieval in IoT.
Proceedings of the Communications, Signal Processing, and Systems, 2019

2018
A game-theoretic approach to advertisement dissemination in ephemeral networks.
World Wide Web, 2018

Security Measurement for Unknown Threats Based on Attack Preferences.
Secur. Commun. Networks, 2018

A Real-Time Correlation of Host-Level Events in Cyber Range Service for Smart Campus.
IEEE Access, 2018

Resolving Access Conflicts: An Auction-Based Incentive Approach.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Process Calculus for Modeling and Quantifying Location Privacy.
Proceedings of the 2018 International Conference on Identification, 2018

Selecting Combined Countermeasures for Multi-Attack Paths in Intrusion Response System.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Identifying the Propagation Sources of Stealth Worms.
Proceedings of the Computational Science - ICCS 2018, 2018

Real-Time Data Incentives for IoT Searches.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

How to Control Target Nodes in Dynamic Networks.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
Research on Similarity Record Detection of Device Status Information Based on Multiple Encoding Field.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

A Novel Threat-Driven Data Collection Method for Resource-Constrained Networks.
Proceedings of the Network and System Security - 11th International Conference, 2017

Optimally Selecting the Timing of Zero-Day Attack via Spatial Evolutionary Game.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2017

Who Is Visible: Resolving Access Policy Conflicts in Online Social Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

SRAM: A State-Aware Risk Assessment Model for Intrusion Response.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

2016
Hunting abnormal configurations for permission-sensitive role mining.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

2015
Botnet spoofing: fighting botnet with itself.
Secur. Commun. Networks, 2015

Enhancing the Trajectory Privacy with Laplace Mechanism.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Assessing the Disclosure of User Profile in Mobile-Aware Services.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

Ad Dissemination Game in Ephemeral Networks.
Proceedings of the Web Technologies and Applications - 17th Asia-PacificWeb Conference, 2015

2014
Toward inference attacks for k-anonymity.
Pers. Ubiquitous Comput., 2014

Bargaining-Based Dynamic Decision for Cooperative Authentication in MANETs.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Defending sybil attacks in mobile social networks.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

Analyzing asking/bidding price in dynamic game for cooperative authentication.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

Utility-based cooperative decision in cooperative authentication.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Automatically verifying STRAC policy.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

EAC: A Framework of Authentication Property for the IOTs.
Proceedings of the 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2014

Attribute-Role-Based Hybrid Access Control in the Internet of Things.
Proceedings of the Web Technologies and Applications, 2014

A Security Routing Mechanism against Sybil Attacks in Mobile Social Networks.
Proceedings of the Web Technologies and Applications, 2014

A Modified-k-Anonymity Towards Spatial-Temporal Historical Data in Location-Based Social Network Service.
Proceedings of the Web Technologies and Applications, 2014

2013
A bottom-up algorithm of vertical assembling concept lattices.
Int. J. Data Min. Bioinform., 2013

A Framework of Evaluation Location Privacy in Mobile Network.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

Privacy Vulnerability Analysis on Routing in Mobile Social Networks.
Proceedings of the 19th IEEE International Conference on Parallel and Distributed Systems, 2013

Towards a Trusted Mobile RFID Network Framework.
Proceedings of the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2013

Balancing authentication and location privacy in cooperative authentication.
Proceedings of the Symposium on Architecture for Networking and Communications Systems, 2013

2012
Optimal mining on security labels for decentralized information flow control.
Comput. Secur., 2012

A novel logic-based automatic approach to constructing compliant security policies.
Sci. China Inf. Sci., 2012

Network Security Analysis Method Taking into Account the Usage Information (Poster Abstract).
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

A Novel Dynamic Self-adaptive Framework for Network Security Evaluation.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

A Cluster-Based Multilevel Security Model for Wireless Sensor Networks.
Proceedings of the Intelligent Information Processing VI, 2012

Cyber Attacks Prediction Model Based on Bayesian Network.
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012

2011
Andbot: Towards Advanced Mobile Botnets.
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011

Towards Efficient Anonymous Communications in Sensor Networks.
Proceedings of the Global Communications Conference, 2011

Poster: towards formal verification of DIFC policies.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Formalization and Quantitative Analysis of Controllability on Internet Information Security.
Int. J. Web Appl., 2010

A General Distributed Object Locating Architecture in the Internet of Things.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

Quantifying Information Leakage for Fully Probabilistic Systems.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Simulation Analysis of Probabilistic Timing Covert Channels.
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009

Research on Quantitative Evaluation for Integrity.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2006
Distributed Group Membership Algorithm in Intrusion-Tolerant System.
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006


  Loading...