Ming Yang

Orcid: 0000-0002-8209-1000

Affiliations:
  • Southeast University, School of Computer Science and Engineering, Nanjing, China


According to our database1, Ming Yang authored at least 88 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
RF-TESI: Radio Frequency Fingerprint-based Smartphone Identification under Temperature Variation.
ACM Trans. Sens. Networks, March, 2024

TEA-RFFI: Temperature adjusted radio frequency fingerprint-based smartphone identification.
Comput. Networks, January, 2024

2023
A practical multi-tab website fingerprinting attack.
J. Inf. Secur. Appl., December, 2023

Mobile applications identification using autoencoder based electromagnetic side channel analysis.
J. Inf. Secur. Appl., June, 2023

Wi-Fi device identification based on multi-domain physical layer fingerprint.
Comput. Commun., April, 2023

Sensor-based implicit authentication through learning user physiological and behavioral characteristics.
Comput. Commun., 2023

TorDNS: A Novel Correlated Onion Address Generation Approach and Application.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Lightweight Gesture Based Trigger-Action Programming for Home Internet-of-Things.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Evaluating the Distinguishability of Tor Traffic over Censorship Circumvention Tools.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
Energy-Constrained UAV Flight Scheduling for IoT Data Collection With 60 GHz Communication.
IEEE Trans. Veh. Technol., 2022

Correlation Aware Scheduling for Edge-Enabled Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2022

Small object detection in remote sensing images based on super-resolution.
Pattern Recognit. Lett., 2022

MUTAA: An online trajectory optimization and task scheduling for UAV-aided edge computing.
Comput. Networks, 2022

Learning-aided client association control for high-density WLANs.
Comput. Networks, 2022

TeRFF: Temperature-aware Radio Frequency Fingerprinting for Smartphones.
Proceedings of the 19th Annual IEEE International Conference on Sensing, 2022

Large-scale Evaluation of Malicious Tor Hidden Service Directory Discovery.
Proceedings of the IEEE INFOCOM 2022, 2022

Towards an Efficient Defense against Deep Learning based Website Fingerprinting.
Proceedings of the IEEE INFOCOM 2022, 2022

BBS: A Blockchain Big-Data Sharing System.
Proceedings of the IEEE International Conference on Communications, 2022

On Security of Proof-of-Policy (PoP) in the Execute-Order-Validate Blockchain Paradigm.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

A Staging Prediction Model for COVID-19 Pandemic Under Strong Public Health Interventions.
Proceedings of the Tenth International Conference on Advanced Cloud and Big Data, 2022

2021
On Manually Reverse Engineering Communication Protocols of Linux-Based IoT Systems.
IEEE Internet Things J., 2021

BOSS: A Blockchain Off-State Sharing System.
CoRR, 2021

On Private Data Collection of Hyperledger Fabric.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

802.11ac Device Identification based on MAC Frame Analysis.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

Preserving Privacy for Discrete Location Information.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

2020
Probe Request Based Device Identification Attack and Defense.
Sensors, 2020

A Novel IM Sync Message-Based Cross-Device Tracking.
Secur. Commun. Networks, 2020

FingerAuth: 3D magnetic finger motion pattern based implicit authentication for mobile devices.
Future Gener. Comput. Syst., 2020

Energy-efficient Link Scheduling in Time-variant Dual-Hop 60GHz Wireless Networks.
Concurr. Comput. Pract. Exp., 2020

Offspeeding: Optimal energy-efficient flight speed scheduling for UAV-assisted edge computing.
Comput. Networks, 2020

Energy-efficient Trajectory Planning and Speed Scheduling for UAV-assisted Data Collection.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

2019
Your clicks reveal your secrets: a novel user-device linking method through network and visual data.
Multim. Tools Appl., 2019

Locally differentially private item-based collaborative filtering.
Inf. Sci., 2019

ACAC: An Airtime-Aware Centralized Association Control System in 802.11ac WLANs.
Proceedings of the 15th International Conference on Mobile Ad-Hoc and Sensor Networks, 2019

Novel and Practical SDN-based Traceback Technique for Malicious Traffic over Anonymous Networks.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Data Anonymization Based on Natural Equivalent Class.
Proceedings of the 23rd IEEE International Conference on Computer Supported Cooperative Work in Design, 2019

Energy-Efficient Link Scheduling with Load Constraints in Dual-Hop 60GHz Wireless Networks.
Proceedings of the Seventh International Conference on Advanced Cloud and Big Data, 2019

2018
Energy-Efficient User Association with Congestion Avoidance and Migration Constraint in Green WLANs.
Wirel. Commun. Mob. Comput., 2018

Security Cost Aware Data Communication in Low-Power IoT Sensors with Energy Harvesting.
Sensors, 2018

Fingerprinting Network Entities Based on Traffic Analysis in High-Speed Network Environment.
Secur. Commun. Networks, 2018

Differentially private graph-link analysis based social recommendation.
Inf. Sci., 2018

PRAPD: A novel received signal strength-based approach for practical rogue access point detection.
Int. J. Distributed Sens. Networks, 2018

SecTap: Secure Back of Device Input System for Mobile Devices.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Estimating the Number of Posts in Microblogging Services.
Proceedings of the 22nd IEEE International Conference on Computer Supported Cooperative Work in Design, 2018

2017
Dealing with Insufficient Location Fingerprints in Wi-Fi Based Indoor Location Fingerprinting.
Wirel. Commun. Mob. Comput., 2017

Canoe: An Autonomous Infrastructure-Free Indoor Navigation System.
Sensors, 2017

Anonymizing 1: M microdata with high utility.
Knowl. Based Syst., 2017

Energy-efficient activation of nodes and radios in multi-radio WLAN mesh networks.
Int. J. Sens. Networks, 2017

Detection of malicious behavior in android apps through API calls and permission uses analysis.
Concurr. Comput. Pract. Exp., 2017

A novel attack to track users based on the behavior patterns.
Concurr. Comput. Pract. Exp., 2017

A framework for utility enhanced incomplete microdata anonymization.
Clust. Comput., 2017

Implicit authentication for mobile device based on 3D magnetic finger motion pattern.
Proceedings of the 21st IEEE International Conference on Computer Supported Cooperative Work in Design, 2017

Joint AP coverage adjustment and user association optimization for load balancing in multi-rate WLANs.
Proceedings of the 21st IEEE International Conference on Computer Supported Cooperative Work in Design, 2017

2016
Efficient Fingerprinting-Based Android Device Identification With Zero-Permission Identifiers.
IEEE Access, 2016

A fine-grained permission control mechanism for external storage of Android.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016

Secure fingertip mouse for mobile devices.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Utility enhanced anonymization for incomplete microdata.
Proceedings of the 20th IEEE International Conference on Computer Supported Cooperative Work in Design, 2016

Real-Time Detection of Malicious Behavior in Android Apps.
Proceedings of the International Conference on Advanced Cloud and Big Data, 2016

2015
Tor Bridge Discovery: Extensive Analysis and Large-scale Empirical Evaluation.
IEEE Trans. Parallel Distributed Syst., 2015

A novel application classification attack against Tor.
Concurr. Comput. Pract. Exp., 2015

De-anonymizing and countermeasures in anonymous communication networks.
IEEE Commun. Mag., 2015

Energy Efficient Channel Assignment with Switching Optimization in Multi-radio Wireless Networks.
Proceedings of the 2015 IEEE International Conference on Systems, 2015

Joint Node Scheduling and Radio Switching for Energy Efficiency in Multi-radio WLAN Mesh Networks.
Proceedings of the 11th International Conference on Mobile Ad-hoc and Sensor Networks, 2015

A novel Website Fingerprinting attack against multi-tab browsing behavior.
Proceedings of the 19th IEEE International Conference on Computer Supported Cooperative Work in Design, 2015

A Novel Behavior-Based Tracking Attack for User Identification.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015

2014
Maximum Capacity Overlapping Channel Assignment Based on Max-Cut in 802.11 Wireless Mesh Networks.
J. Univers. Comput. Sci., 2014

A novel active website fingerprinting attack against Tor anonymous system.
Proceedings of the IEEE 18th International Conference on Computer Supported Cooperative Work in Design, 2014

Inferring Application Type Information from Tor Encrypted Traffic.
Proceedings of the Second International Conference on Advanced Cloud and Big Data, 2014

2013
How to block Tor's hidden bridges: detecting methods and countermeasures.
J. Supercomput., 2013

A novel sequential watermark detection model for efficient traceback of secret network attack flows.
J. Netw. Comput. Appl., 2013

Max-Cut based overlapping channel assignment for 802.11 multi-radio wireless mesh networks.
Proceedings of the 2013 IEEE 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD), 2013

2012
An interval centroid based spread spectrum watermarking scheme for multi-flow traceback.
J. Netw. Comput. Appl., 2012

Joint Interface Placement and Channel Assignment in Multi-channel Wireless Mesh Networks.
Proceedings of the 10th IEEE International Symposium on Parallel and Distributed Processing with Applications, 2012

A novel network delay based side-channel attack: Modeling and defense.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Extensive analysis and large-scale empirical evaluation of tor bridge discovery.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

AIM: A New Privacy Preservation Algorithm for Incomplete Microdata Based on Anatomy.
Proceedings of the Pervasive Computing and the Networked World, 2012

An efficient sequential watermark detection model for tracing network attack flows.
Proceedings of the IEEE 16th International Conference on Computer Supported Cooperative Work in Design, 2012

2011
Optimization of Gateway Deployment with Load Balancing and Interference Minimization in Wireless Mesh Networks.
J. Univers. Comput. Sci., 2011

A potential HTTP-based application-level attack against Tor.
Future Gener. Comput. Syst., 2011

2010
Interference-aware gateway placement for wireless mesh networks with fault tolerance assurance.
Proceedings of the IEEE International Conference on Systems, 2010

MT3-DA: Multicast Optimization Mechanism Based on Transmission Time and Interference Minimization in WMNs.
Proceedings of the GCC 2010, 2010

A Double Interval Centroid-Based Watermark for network flow traceback.
Proceedings of the 2010 14th International Conference on Computer Supported Cooperative Work in Design, 2010

2009
A Resilient P2P Anonymous Routing Approach Employing Collaboration Scheme.
J. Univers. Comput. Sci., 2009

An Interval Centroid Based Spread Spectrum Watermark for Tracing Multiple Network Flows.
Proceedings of the IEEE International Conference on Systems, 2009

Gateway placement optimization for load balancing in wireless mesh networks.
Proceedings of the 13th International Conference on Computers Supported Cooperative Work in Design, 2009

A novel flow multiplication attack against Tor.
Proceedings of the 13th International Conference on Computers Supported Cooperative Work in Design, 2009

2008
An HMM Approach to Anonymity Analysis of Continuous Mixes.
Proceedings of the Advanced Web and NetworkTechnologies, and Applications, 2008

2007
Analysis of security protocols based on challenge-response.
Sci. China Ser. F Inf. Sci., 2007


  Loading...