Ping Yi

According to our database1, Ping Yi authored at least 75 papers between 2001 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
GENPass: A Multi-Source Deep Learning Model for Password Guessing.
IEEE Trans. Multimedia, 2020

Mobile terminal identity authentication system based on behavioral characteristics.
IJDSN, 2020

2019
CCID: Cross-Correlation Identity Distinction Method for Detecting Shrew DDoS.
Wireless Communications and Mobile Computing, 2019

Dynamic Enhanced Field Division: An Advanced Localizing and Tracking Middleware.
ACM Trans. Sens. Networks, 2019

Generating Adversarial Samples With Constrained Wasserstein Distance.
IEEE Access, 2019

Energy Transport Station Deployment in Electric Vehicles Energy Internet.
IEEE Access, 2019

Detecting Adversarial Examples in Deep Neural Networks using Normalizing Filters.
Proceedings of the 11th International Conference on Agents and Artificial Intelligence, 2019

Energy Distribution in EV Energy Network under Energy Shortage.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

An Encrypted Malicious Traffic Detection System Based on Neural Network.
Proceedings of the 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2019

Chatbot Application on Cryptocurrency.
Proceedings of the IEEE Conference on Computational Intelligence for Financial Engineering & Economics, 2019

2018
Web Phishing Detection Using a Deep Learning Framework.
Wireless Communications and Mobile Computing, 2018

GENPass: A General Deep Learning Model for Password Guessing with PCFG Rules and Adversarial Generation.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

2017
Regularization feature selection projection twin support vector machine via exterior penalty.
Neural Computing and Applications, 2017

Computational efficiency of accelerated particle swarm optimization combined with different chaotic maps for global optimization.
Neural Computing and Applications, 2017

Egocentric-Vision based Hand Posture Control System for Reconnaissance Robots.
J. Intell. Robotic Syst., 2017

A power storage station placement algorithm for power distribution based on electric vehicle.
IJDSN, 2017

Edge computing in the Internet of Things.
IJDSN, 2017

Poster: Smart Object-Oriented Dynamic Energy Management for Base Stations in Smart Cities.
Proceedings of the 3rd Workshop on Experiences with the Design and Implementation of Smart Objects, 2017

Charge station placement in electric vehicle energy distribution network.
Proceedings of the IEEE International Conference on Communications, 2017

Optimization for charge station placement in electric vehicles energy network.
Proceedings of the Workshop on Smart Internet of Things, SmartIoT@SEC 2017, 2017

2016
Deploying Energy Routers in an Energy Internet Based on Electric Vehicles.
IEEE Trans. Vehicular Technology, 2016

Puppet attack: A denial of service attack in advanced metering infrastructure network.
J. Netw. Comput. Appl., 2016

Energy scheduling and allocation in electric vehicles energy internet.
Proceedings of the 2016 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2016

A New Block-Based Data Distribution Mechanism in Cloud Computing.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

Enhanced Wearable Medical Systems for Effective Blood Glucose Control.
Proceedings of the First IEEE International Conference on Connected Health: Applications, 2016

2015
Security and trust management in opportunistic networks: a survey.
Security and Communication Networks, 2015

Detecting Malware Based on DNS Graph Mining.
IJDSN, 2015

Big Data in Future Sensing.
IJDSN, 2015

Emergent Technologies in Big Data Sensing: A Survey.
IJDSN, 2015

Impact Study of Vehicle Platooning and Gap Management on Traffic Operation Through Automated Vehicles.
Proceedings of the Information Technology and Intelligent Transportation Systems, 2015

Optimal renewable energy transfer via electrical vehicles.
Proceedings of the 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2015

Fingerprint-free tracking with dynamic enhanced field division.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Context-Centric Target Localization with Optimal Anchor Deployments.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015

2014
A truthful auction mechanism for channel allocation in multi-radio, multi-channel non-cooperative wireless networks.
Personal and Ubiquitous Computing, 2014

A Three-Dimensional Wireless Indoor Localization System.
J. Electr. Comput. Eng., 2014

A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network.
J. Electr. Comput. Eng., 2014

A Performance Perspective on Choosing between Single Aggregate and Multiple Aggregates for GENI Experime nts.
EAI Endorsed Trans. Indust. Netw. & Intellig. Syst., 2014

Feature selection for least squares projection twin support vector machine.
Neurocomputing, 2014

The Tradeoff Between Single Aggregate and Multiple Aggregates in Designing GENI Experiments.
Proceedings of the Testbeds and Research Infrastructure: Development of Networks and Communities, 2014

Renewable energy transmission through multiple routes in a mobile electrical grid.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2014

A 3-hop message relay algorithm for connected dominating sets in wireless ad-hoc sensor networks.
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014

A denial of service attack in advanced metering infrastructure network.
Proceedings of the IEEE International Conference on Communications, 2014

EEP2P: An energy-efficient and economy-efficient P2P network protocol.
Proceedings of the International Green Computing Conference, 2014

iDES: Incentive-driven distributed energy sharing in sustainable microgrids.
Proceedings of the International Green Computing Conference, 2014

Characterizing the GENI Networks.
Proceedings of the 2014 Third GENI Research and Educational Experiment Workshop, 2014

An Asynchronous Distributed Algorithm for Constructing a Connected Dominating Set Optimized by Minimum-Weight Spanning Tree.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

Constructing Minimum Connected Dominating Sets with Constant Update Time in Wireless Ad-Hoc Sensor Networks.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

Distributed Construction of Connected Dominating Sets Optimized by Minimum-Weight Spanning Tree in Wireless Ad-Hoc Sensor Networks.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

2013
Intrusion Detection for Black Hole and Gray Hole in MANETs.
TIIS, 2013

An Intrusion Prevention Mechanism in Mobile Ad Hoc Networks.
Ad Hoc Sens. Wirel. Networks, 2013

Mobile Anchor Assisted Error Bounded Sensing in Sensor Networks: An Implementation Perspective.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

Routing Renewable Energy Using Electric Vehicles in Mobile Electrical Grid.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

Energy scheduling and allocation in electric vehicle energy distribution networks.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2013

2012
An energy transmission and distribution network using electric vehicles.
Proceedings of IEEE International Conference on Communications, 2012

Green firewall: An energy-efficient intrusion prevention mechanism in wireless sensor network.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Security Framework for Wireless Communications in Smart Distribution Grid.
IEEE Trans. Smart Grid, 2011

2010
Securing Wireless Mesh Network with Mobile Firewall.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2010

An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
Investigating the Effect of Detector Spacing on Midpoint-Based Travel Time Estimation.
J. Intell. Transp. Syst., 2009

Efficient implementation of FIR type time domain equalizers for MIMO wireless channels via M-LESQ.
Proceedings of the IEEE 20th International Symposium on Personal, 2009

Security in Wireless Mesh Networks: Challenges and Solutions.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Outage Behavior of Multi-Antenna Multi-Relay Non-Regenerative Cooperative Networks.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Alert correlation by a retrospective method.
Proceedings of the 2009 International Conference on Information Networking, 2009

2008
A Group Key Management Scheme with Revocation and Loss-tolerance Capability for Wireless Sensor Networks.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

The Effect of Opportunistic Scheduling on TCP Performance over Shared Wireless Downlink.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Group-Based Trust Model in P2P System Based on Trusted Computing.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2006
Improved Signal Control for Oversaturated Intersection.
Proceedings of the IEEE Intelligent Transportation Systems Conference, 2006

2005
Distributed Intrusion Detection for Mobile Ad Hoc Networks.
Proceedings of the 2005 IEEE/IPSJ International Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops), 31 January, 2005

Resisting Flooding Attacks in Ad Hoc Networks.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

An Architecture for Intrusion Detection and Active Response Using Autonomous Agents in Mobile Ad Hoc Networks.
Proceedings of the ICEIS 2005, 2005

Optimizing Path Expression Queries of XML Data.
Proceedings of the 2005 IEEE International Conference on e-Business Engineering (ICEBE 2005), 2005

Applying Mobile Agent to Intrusion Response for Ad Hoc Networks.
Proceedings of the Computational Science, 2005

A Novel Intrusion Detection Method for Mobile Ad Hoc Networks.
Proceedings of the Advances in Grid Computing, 2005

2001
Relocatable detector Concept for Dilemma Zone Protection at High-Speed Intersections.
J. Intell. Transp. Syst., 2001

Teaching highway safety analysis through networking and visualization.
Comp. Applic. in Engineering Education, 2001


  Loading...