Qiben Yan

According to our database1, Qiben Yan authored at least 46 papers between 2012 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
A mobile malware detection method using behavior features in network traffic.
J. Network and Computer Applications, 2019

Special issue on advances in security and privacy in IoT.
J. Network and Computer Applications, 2019

On User Selective Eavesdropping Attacks in MU-MIMO: CSI Forgery and Countermeasure.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Detecting Vulnerable Android Inter-App Communication in Dynamically Loaded Code.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

DART: Detecting Unseen Malware Variants using Adaptation Regularization Transfer Learning.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
Significant Permission Identification for Machine-Learning-Based Android Malware Detection.
IEEE Trans. Industrial Informatics, 2018

Detecting Android Malware Leveraging Text Semantics of Network Flows.
IEEE Trans. Information Forensics and Security, 2018

Machine learning based mobile malware detection using highly imbalanced network traffic.
Inf. Sci., 2018

Internet of Things: Security and privacy in a connected world.
Future Generation Comp. Syst., 2018

Lexical Mining of Malicious URLs for Classifying Android Malware.
Proceedings of the Security and Privacy in Communication Networks, 2018

GranDroid: Graph-Based Detection of Malicious Network Behaviors in Android Applications.
Proceedings of the Security and Privacy in Communication Networks, 2018

Uplink MU-MIMO in Asynchronous Wireless LANs.
Proceedings of the Nineteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2018

Deep and Broad Learning Based Detection of Android Malware via Network Traffic.
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018

High-bandwidth ultrasonic communication using graphene-based acoustic devices.
Proceedings of the IEEE INFOCOM 2018, 2018

Tracking location privacy leakage of mobile ad networks at scale.
Proceedings of the IEEE INFOCOM 2018, 2018

Towards best secure coding practice for implementing SSL/TLS.
Proceedings of the IEEE INFOCOM 2018, 2018

MulAV: Multilevel and Explainable Detection of Android Malware with Data Fusion.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

PSCluster: Differentially Private Spatial Cluster Detection for Mobile Crowdsourcing Applications.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Efficient Signature Generation for Classifying Cross-Architecture IoT Malware.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Enabling Technologies towards 5G Mobile Networks.
Mobile Information Systems, 2017

Very Short Intermittent DDoS Attacks in an Unsaturated System.
Proceedings of the Security and Privacy in Communication Networks, 2017

Security analysis of Internet-of-Things: A case study of august smart lock.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

TextDroid: Semantics-based detection of mobile malware using network flows.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Identity management using blockchain for cognitive cellular networks.
Proceedings of the IEEE International Conference on Communications, 2017

Design and analysis of elastic handoff in cognitive cellular networks.
Proceedings of the IEEE International Conference on Communications, 2017

Black penguin: On the feasibility of detecting intrusion with homogeneous memory.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Enabling jamming-resistant communications in wireless MIMO networks.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

SPRIDE: Scalable and private continual geo-distance evaluation for precision agriculture.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
Jamming Resilient Communication Using MIMO Interference Cancellation.
IEEE Trans. Information Forensics and Security, 2016

DroidCollector: A High Performance Framework for High Quality Android Traffic Collection.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

DroidClassifier: Efficient Adaptive Mining of Application-Layer Header for Classifying Android Malware.
Proceedings of the Security and Privacy in Communication Networks, 2016

SigPID: significant permission identification for android malware detection.
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016

TrafficAV: An effective and explainable detection of mobile malware behavior using network traffic.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

Achieving 5As in Cloud Centric Cognitive Cellular Networks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
A First Look at Android Malware Traffic in First Few Minutes.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Using Map-Based Interactive Interface for Understanding and Characterizing Crime Data in Cities.
Proceedings of the Advances in Swarm and Computational Intelligence, 2015

PeerClean: Unveiling peer-to-peer botnets through dynamic group behavior analysis.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

A Real-time Android Malware Detection System Based on Network Traffic Analysis.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
SpecMonitor: Toward Efficient Passive Traffic Monitoring for Cognitive Radio Networks.
IEEE Trans. Wireless Communications, 2014

MIMO-based jamming resilient communication in wireless networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

2013
Proximity-Based Security Techniques for Mobile Users in Wireless Networks.
IEEE Trans. Information Forensics and Security, 2013

Non-parametric passive traffic monitoring in cognitive radio networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Proximity-based security using ambient radio signals.
Proceedings of IEEE International Conference on Communications, 2013

2012
On the Limitation of Embedding Cryptographic Signature for Primary Transmitter Authentication.
IEEE Wireless Commun. Letters, 2012

Throughput Analysis of Cooperative Mobile Content Distribution in Vehicular Network using Symbol Level Network Coding.
IEEE Journal on Selected Areas in Communications, 2012

Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012


  Loading...