Lu-Xing Yang

Orcid: 0000-0002-9229-5787

Affiliations:
  • Delft University of Technology, Delft, GA, The Netherlands
  • Chongqing University, Chongqing, China (PhD 2015)


According to our database1, Lu-Xing Yang authored at least 52 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Framework for Detecting False Data Injection Attacks in Large-Scale Wireless Sensor Networks.
Sensors, March, 2024

Game-theoretic modeling and analysis of cyberbullying spreading on OSNs.
Inf. Sci., February, 2024

Mitigating the Impact of a False Message Through Sequential Release of Clarifying Messages.
IEEE Trans. Netw. Sci. Eng., 2024

Detecting Change Intervals with Isolation Distributional Kernel.
J. Artif. Intell. Res., 2024

Optimal Control of Malware Propagation in IoT Networks.
CoRR, 2024

2023
Blockchain-based reliable image copyright protection.
IET Blockchain, December, 2023

A Novel Diagnosis Scheme against Collusive False Data Injection Attack.
Sensors, July, 2023

Impulsive Artificial Defense Against Advanced Persistent Threat.
IEEE Trans. Inf. Forensics Secur., 2023

2022
Effective Multiplatform Advertising Policy.
IEEE Trans. Syst. Man Cybern. Syst., 2022

MGC-GAN: Multi-Graph Convolutional Generative Adversarial Networks for Accurate Citywide Traffic Flow Prediction.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2022

2021
Effective Quarantine and Recovery Scheme Against Advanced Persistent Threat.
IEEE Trans. Syst. Man Cybern. Syst., 2021

Defense Against Advanced Persistent Threat Through Data Backup and Recovery.
IEEE Trans. Netw. Sci. Eng., 2021

Developing Cost-Effective Rumor-Refuting Strategy Through Game-Theoretic Approach.
IEEE Syst. J., 2021

2020
Secure and Efficient Outsourcing of PCA-Based Face Recognition.
IEEE Trans. Inf. Forensics Secur., 2020

A Risk Management Approach to Defending Against the Advanced Persistent Threat.
IEEE Trans. Dependable Secur. Comput., 2020

Simultaneous Benefit Maximization of Conflicting Opinions: Modeling and Analysis.
IEEE Syst. J., 2020

Evaluating the Performance of a Static Patching Strategy against Computer Viruses.
Complex., 2020

Dynamic Maintenance Strategy for Word-of-Mouth Marketing.
IEEE Access, 2020

A Low-Cost Distributed Denial-of-Service Attack Architecture.
IEEE Access, 2020

2019
Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach.
IEEE Trans. Inf. Forensics Secur., 2019

Energy-Efficient Patching Strategy for Wireless Sensor Networks.
Sensors, 2019

Mathematical Models for Malware Propagation.
Secur. Commun. Networks, 2019

Seeking Best-Balanced Patch-Injecting Strategies through Optimal Control Approach.
Secur. Commun. Networks, 2019

Serious Challenges and Potential Solutions for the Industrial Internet of Things with Edge Intelligence.
IEEE Netw., 2019

Efficiently and securely outsourcing compressed sensing reconstruction to a cloud.
Inf. Sci., 2019

Enhanced Smart Meter Privacy Protection Using Rechargeable Batteries.
IEEE Internet Things J., 2019

A discount strategy in word-of-mouth marketing.
Commun. Nonlinear Sci. Numer. Simul., 2019

Dynamic Discount Pricing in Competitive Marketing.
IEEE Access, 2019

Maximum Profit of Viral Marketing: An Optimal Control Approach.
Proceedings of the 4th International Conference on Mathematics and Artificial Intelligence, 2019

2018
A Bi-Virus Competing Spreading Model with Generic Infection Rates.
IEEE Trans. Netw. Sci. Eng., 2018

Effectiveness analysis of a mixed rumor-quelling strategy.
J. Frankl. Inst., 2018

A Differential Game Approach to Patch Injection.
IEEE Access, 2018

Defending Against Advanced Persistent Threat: A Risk Management Perspective.
Proceedings of the Science of Cyber Security - First International Conference, 2018

2017
The effect of network topology on the spread of computer viruses: a modelling study.
Int. J. Comput. Math., 2017

Defend against advanced persistent threats: An optimal control approach.
CoRR, 2017

A cost-effective rumor-containing strategy.
CoRR, 2017

A discount strategy in word-of-mouth marketing and its assessment.
CoRR, 2017

Maximizing the effectiveness of an advanced persistent threat.
CoRR, 2017

On the effectiveness of the truth-spreading/rumor-blocking strategy for restraining rumors.
CoRR, 2017

Security evaluation of cyber networks under advanced persistent threats.
CoRR, 2017

Analysis of the effectiveness of the truth-spreading strategy for inhibiting rumors.
CoRR, 2017

Distributed interaction between computer virus and patch: A modeling study.
CoRR, 2017

Maximizing the overall profit of a word-of-mouth marketing campaign: A modeling study.
CoRR, 2017

The damage inflicted by a computer virus: A new estimation method.
CoRR, 2017

Security Evaluation of the Cyber Networks Under Advanced Persistent Threats.
IEEE Access, 2017

2014
A new epidemic model of computer viruses.
Commun. Nonlinear Sci. Numer. Simul., 2014

2013
Epidemics of computer viruses: A complex-network approach.
Appl. Math. Comput., 2013

2012
Routing and wavelength assignment for 3-ary n-cube in array-based optical network.
Inf. Process. Lett., 2012

Optimal broadcasting for locally twisted cubes.
Inf. Process. Lett., 2012

A novel computer virus propagation model and its dynamics.
Int. J. Comput. Math., 2012

Optimal control of computer virus under a delayed model.
Appl. Math. Comput., 2012

The spread of computer viruses under the influence of removable storage devices.
Appl. Math. Comput., 2012


  Loading...