Qiao Yan

Orcid: 0000-0003-0888-2047

According to our database1, Qiao Yan authored at least 52 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Detect malicious websites by building a neural network to capture global and local features of websites.
Comput. Secur., February, 2024

2023
Android malware adversarial attacks based on feature importance prediction.
Int. J. Mach. Learn. Cybern., June, 2023

A Survey of Adversarial CAPTCHAs on its History, Classification and Generation.
CoRR, 2023

Redemption from Range-view for Accurate 3D Object Detection.
CoRR, 2023

LB-L2L-Calib 2.0: A Novel Online Extrinsic Calibration Method for Multiple Long Baseline 3D LiDARs Using Objects.
IROS, 2023

MVFAN: Multi-view Feature Assisted Network for 4D Radar Object Detection.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

RPF3D: Range-Pillar Feature Deep Fusion 3D Detector for Autonomous Driving.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

2022
Gradient Feature-Oriented 3-D Domain Adaptation for Hyperspectral Image Classification.
IEEE Trans. Geosci. Remote. Sens., 2022

ECC-based lightweight authentication and access control scheme for IoT E-healthcare.
Soft Comput., 2022

HDP-CNN: Highway deep pyramid convolution neural network combining word-level and character-level representations for phishing website detection.
Comput. Secur., 2022

LB-L2L-Calib: Accurate and Robust Extrinsic Calibration for Multiple 3D LiDARs with Long Baseline and Large Viewpoint Difference.
Proceedings of the 2022 International Conference on Robotics and Automation, 2022

Adversarial Attack and Defense for Webshell Detection on Machine Learning Models.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2022

2021
The impact of propagation delay to different selfish miners in proof-of-work blockchains.
Peer-to-Peer Netw. Appl., 2021

Online Experiments Based on the CTF Model for Information Security MOOC Courses.
Proceedings of the 16th International Conference on Computer Science & Education, 2021

The Study of the User Preferences of the Request Channel on Taking Over During Level-3 Automated Vehicles' Driving Process.
Proceedings of the Cross-Cultural Design. Applications in Cultural Heritage, Tourism, Autonomous Vehicles, and Intelligent Agents, 2021

2020
Optimal Energy Consumption Tasks Scheduling Strategy for Multi-Radio WSNs.
Sensors, 2020

An actor-critic reinforcement learning-based resource management in mobile edge computing systems.
Int. J. Mach. Learn. Cybern., 2020

Markov Chain Monte Carlo Based Energy Use Behaviors Prediction of Office Occupants.
Algorithms, 2020

Design of Automated Demand Response Management System on User Side for Office Buildings.
Proceedings of the CSAE 2020: The 4th International Conference on Computer Science and Application Engineering, 2020

2019
QoS Aware Transcoding for Live Streaming in Edge-Clouds Aided HetNets: An Enhanced Actor-Critic Approach.
IEEE Trans. Veh. Technol., 2019

Automatically synthesizing DoS attack traces using generative adversarial networks.
Int. J. Mach. Learn. Cybern., 2019

An Improved MCB Localization Algorithm Based on Received Signal Strength Indicator.
Proceedings of the 20th International Conference on Parallel and Distributed Computing, 2019

QoE Aware Transcoding for Live Streaming in SDN-Based Cloud-Aided HetNets: An Actor-Critic Approach.
Proceedings of the 17th IEEE International Conference on Communications Workshops, 2019

Evasion Attacks Based on Wasserstein Generative Adversarial Network.
Proceedings of the Computing, Communications and IoT Applications, ComComAp 2019, Shenzhen, 2019

Using MTD and SDN-based Honeypots to Defend DDoS Attacks in IoT.
Proceedings of the Computing, Communications and IoT Applications, ComComAp 2019, Shenzhen, 2019

Proof-of-Play: A Novel Consensus Model for Blockchain-based Peer-to-Peer Gaming System.
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2019

2018
DDSE: A novel evolutionary algorithm based on degree-descending search strategy for influence maximization in social networks.
J. Netw. Comput. Appl., 2018

A novel context-aware recommendation algorithm with two-level SVD in social networks.
Future Gener. Comput. Syst., 2018

A Multi-Level DDoS Mitigation Framework for the Industrial Internet of Things.
IEEE Commun. Mag., 2018

Joint Offloading and Resource Allocation in Mobile Edge Computing Systems: An Actor-Critic Approach.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Industrial Internet: A Survey on the Enabling Technologies, Applications, and Challenges.
IEEE Commun. Surv. Tutorials, 2017

Securing Outsourced Data in the Multi-Authority Cloud with Fine-Grained Access Control and Efficient Attribute Revocation.
Comput. J., 2017

A Multi-Authority Key-Policy ABE Scheme from Lattices in Mobile Ad Hoc Networks.
Ad Hoc Sens. Wirel. Networks, 2017

A Multi-Objective Evolutionary Cloud Leasing Algorithm for Cloud and Peer Assisted VoD Systems.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
A Hybrid Path Planning Method in Unmanned Air/Ground Vehicle (UAV/UGV) Cooperative Systems.
IEEE Trans. Veh. Technol., 2016

Software-Defined Device-to-Device (D2D) Communications in Virtual Wireless Networks With Imperfect Network State Information (NSI).
IEEE Trans. Veh. Technol., 2016

When big data meets software-defined networking: SDN for big data and big data for SDN.
IEEE Netw., 2016

Adaptive composite operator selection and parameter control for multiobjective evolutionary algorithm.
Inf. Sci., 2016

Security Schemes in Vehicular Ad hoc Networks with Cognitive Radios.
CoRR, 2016

Interference Alignment and Its Applications: A Survey, Research Issues, and Challenges.
IEEE Commun. Surv. Tutorials, 2016

Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges.
IEEE Commun. Surv. Tutorials, 2016

Physical layer security issues in interference- alignment-based wireless networks.
IEEE Commun. Mag., 2016

Detection of DDoS Attacks Against Wireless SDN Controllers Based on the Fuzzy Synthetic Evaluation Decision-making Model.
Ad Hoc Sens. Wirel. Networks, 2016

A DDoS Detection and Mitigation System Framework Based on Spark and SDN.
Proceedings of the Smart Computing and Communication, 2016

Securing cognitive radio vehicular Ad hoc networks with trusted lightweight cloud computing.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
Distributed denial of service attacks in software-defined networking with cloud computing.
IEEE Commun. Mag., 2015

Toward an Understanding of the Impact of Organizational Climate and Organizational Justice on the Implementation of Enterprise Resource Planning Systems.
Proceedings of the 19th Pacific Asia Conference on Information Systems, 2015

2014
IP Traceback Algorithm Based on Deterministic Linear Network Coding.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2011
A probe prediction approach to overlay network monitoring.
Proceedings of the 7th International Conference on Network and Service Management, 2011

2008
'Technology foresight towards 2020 in China': the practice and its impacts.
Technol. Anal. Strateg. Manag., 2008

An interactive co-evolutionary CAD system for garment pattern design.
Comput. Aided Des., 2008

2006
AINIDS: an immune-based network intrusion detection system.
Proceedings of the Data Mining, 2006


  Loading...