Lin Yang

Orcid: 0000-0002-6956-8177

According to our database1, Lin Yang authored at least 26 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Intrusion Detection for Internet of Things: An Anchor Graph Clustering Approach.
IEEE Trans. Inf. Forensics Secur., 2025

2024
Intrusion Detection for Unmanned Aerial Vehicles Security: A Tiny Machine Learning Model.
IEEE Internet Things J., June, 2024

Incremental Update Intrusion Detection for Industry 5.0 Security: A Graph Attention Network-Enabled Approach.
IEEE Trans. Consumer Electron., February, 2024

MRC-VulLoc: Software source code vulnerability localization based on multi-choice reading comprehension.
Comput. Secur., 2024

VulCausal: Robust Vulnerability Detection Using Neural Network Models from a Causal Perspective.
Proceedings of the Knowledge Science, Engineering and Management, 2024

2023
An attention-based automatic vulnerability detection approach with GGNN.
Int. J. Mach. Learn. Cybern., September, 2023

Leveraging User-Defined Identifiers for Counterfactual Data Generation in Source Code Vulnerability Detection.
Proceedings of the 23rd IEEE International Working Conference on Source Code Analysis and Manipulation, 2023

2022
An Anti-Disturbance Resilience Enhanced Algorithm for UAV 3D Route Planning.
Sensors, 2022

A Survey of GNSS Spoofing and Anti-Spoofing Technology.
Remote. Sens., 2022

Automated Reliability Analysis of Redundancy Architectures Using Statistical Model Checking.
Proceedings of the Knowledge Science, Engineering and Management, 2022

2021
An Approach of Linear Regression-Based UAV GPS Spoofing Detection.
Wirel. Commun. Mob. Comput., 2021

A Systematic Approach to Formal Analysis of QUIC Handshake Protocol Using Symbolic Model Checking.
Secur. Commun. Networks, 2021

An Automatic Source Code Vulnerability Detection Approach Based on KELM.
Secur. Commun. Networks, 2021

A comparative study of neural network techniques for automatic software vulnerability detection.
CoRR, 2021

Formal Analysis of QUIC Handshake Protocol Using Symbolic Model Checking.
IEEE Access, 2021

Interpretation of Learning-Based Automatic Source Code Vulnerability Detection Model Using LIME.
Proceedings of the Knowledge Science, Engineering and Management, 2021

PEBIID: Privacy-preserving and Efficient Biometric Identification for IoV DApp.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

A 3D Flight Route Planning Algorithm for UAV Based on the Idea of Resilience.
Proceedings of the ICCPR '21: 10th International Conference on Computing and Pattern Recognition, Shanghai, China, October 15, 2021

2020
Formal Analysis of 5G EAP-TLS Authentication Protocol Using Proverif.
IEEE Access, 2020

A Comparative Study of Neural Network Techniques for Automatic Software Vulnerability Detection.
Proceedings of the International Symposium on Theoretical Aspects of Software Engineering, 2020

An Optimization of Deep Sensor Fusion Based on Generalized Intersection over Union.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Formal analysis of QUIC handshake protocol using ProVerif.
Proceedings of the 7th IEEE International Conference on Cyber Security and Cloud Computing, 2020

2019
Uncertainty measurement with belief entropy on the interference effect in the quantum-like Bayesian Networks.
Appl. Math. Comput., 2019

Formal Verification of 5G-EAP-TLS Authentication Protocol.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

2018
An improvement to generalized regret based decision making method considering unreasonable alternatives.
Int. J. Intell. Syst., 2018

2017
A Time-Space Domain Information Fusion Method for Specific Emitter Identification Based on Dempster-Shafer Evidence Theory.
Sensors, 2017


  Loading...