Qiben Yan

According to our database1, Qiben Yan authored at least 66 papers between 2012 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Targeting the Weakest Link: Social Engineering Attacks in Ethereum Smart Contracts.
CoRR, 2021

A Systematical Study on Application Performance Management Libraries for Apps.
CoRR, 2021

Automatically predicting cyber attack preference with attributed heterogeneous attention networks and transductive learning.
Comput. Secur., 2021

Privacy-Preserving Polynomial Evaluation over Spatio-Temporal Data on an Untrusted Cloud Server.
Proceedings of the Database Systems for Advanced Applications, 2021

2020
Jamsa: A Utility Optimal Contextual Online Learning Framework for Anti-Jamming Wireless Scheduling Under Reactive Jamming Attack.
IEEE Trans. Netw. Sci. Eng., 2020

DINA: Detecting Hidden Android Inter-App Communication in Dynamic Loaded Code.
IEEE Trans. Inf. Forensics Secur., 2020

A Practical Downlink NOMA Scheme for Wireless LANs.
IEEE Trans. Commun., 2020

Multi-attributed heterogeneous graph convolutional network for bot detection.
Inf. Sci., 2020

Deep and broad URL feature mining for android malware detection.
Inf. Sci., 2020

Tree decomposition based anomalous connected subgraph scanning for detecting and forecasting events in attributed social media networks.
Neurocomputing, 2020

TIMiner: Automatically extracting and analyzing categorized cyber threat intelligence from social data.
Comput. Secur., 2020

SmartWiFi: Universal and Secure Smart Contract-Enabled WiFi Hotspot.
Proceedings of the Security and Privacy in Communication Networks, 2020

SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

SDR receiver using commodity wifi via physical-layer signal reconstruction.
Proceedings of the MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking, 2020

Generating Robust Audio Adversarial Examples with Temporal Dependency.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

2019
A mobile malware detection method using behavior features in network traffic.
J. Netw. Comput. Appl., 2019

Special issue on advances in security and privacy in IoT.
J. Netw. Comput. Appl., 2019

Privacy-Preserving and Residential Context-Aware Online Learning for IoT-Enabled Energy Saving With Big Data Support in Smart Home Environment.
IEEE Internet Things J., 2019

Obfusifier: Obfuscation-Resistant Android Malware Detection System.
Proceedings of the Security and Privacy in Communication Networks, 2019

Demystifying Application Performance Management Libraries for Android.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

On User Selective Eavesdropping Attacks in MU-MIMO: CSI Forgery and Countermeasure.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Detecting Vulnerable Android Inter-App Communication in Dynamically Loaded Code.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Tail Amplification in n-Tier Systems: A Study of Transient Cross-Resource Contention Attacks.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

DART: Detecting Unseen Malware Variants using Adaptation Regularization Transfer Learning.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Characterizing Location-based Mobile Tracking in Mobile Ad Networks.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
Significant Permission Identification for Machine-Learning-Based Android Malware Detection.
IEEE Trans. Ind. Informatics, 2018

Detecting Android Malware Leveraging Text Semantics of Network Flows.
IEEE Trans. Inf. Forensics Secur., 2018

Machine learning based mobile malware detection using highly imbalanced network traffic.
Inf. Sci., 2018

Internet of Things: Security and privacy in a connected world.
Future Gener. Comput. Syst., 2018

Lexical Mining of Malicious URLs for Classifying Android Malware.
Proceedings of the Security and Privacy in Communication Networks, 2018

GranDroid: Graph-Based Detection of Malicious Network Behaviors in Android Applications.
Proceedings of the Security and Privacy in Communication Networks, 2018

Uplink MU-MIMO in Asynchronous Wireless LANs.
Proceedings of the Nineteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2018

Deep and Broad Learning Based Detection of Android Malware via Network Traffic.
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018

High-bandwidth ultrasonic communication using graphene-based acoustic devices.
Proceedings of the IEEE INFOCOM 2018, 2018

Tracking location privacy leakage of mobile ad networks at scale.
Proceedings of the IEEE INFOCOM 2018, 2018

Towards best secure coding practice for implementing SSL/TLS.
Proceedings of the IEEE INFOCOM 2018, 2018

MulAV: Multilevel and Explainable Detection of Android Malware with Data Fusion.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

PSCluster: Differentially Private Spatial Cluster Detection for Mobile Crowdsourcing Applications.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Efficient Signature Generation for Classifying Cross-Architecture IoT Malware.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Enabling Technologies towards 5G Mobile Networks.
Mob. Inf. Syst., 2017

Very Short Intermittent DDoS Attacks in an Unsaturated System.
Proceedings of the Security and Privacy in Communication Networks, 2017

Security analysis of Internet-of-Things: A case study of august smart lock.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

TextDroid: Semantics-based detection of mobile malware using network flows.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Identity management using blockchain for cognitive cellular networks.
Proceedings of the IEEE International Conference on Communications, 2017

Design and analysis of elastic handoff in cognitive cellular networks.
Proceedings of the IEEE International Conference on Communications, 2017

Black penguin: On the feasibility of detecting intrusion with homogeneous memory.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Enabling jamming-resistant communications in wireless MIMO networks.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

SPRIDE: Scalable and private continual geo-distance evaluation for precision agriculture.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
Jamming Resilient Communication Using MIMO Interference Cancellation.
IEEE Trans. Inf. Forensics Secur., 2016

DroidCollector: A High Performance Framework for High Quality Android Traffic Collection.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

DroidClassifier: Efficient Adaptive Mining of Application-Layer Header for Classifying Android Malware.
Proceedings of the Security and Privacy in Communication Networks, 2016

SigPID: significant permission identification for android malware detection.
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016

TrafficAV: An effective and explainable detection of mobile malware behavior using network traffic.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

Achieving 5As in Cloud Centric Cognitive Cellular Networks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
A First Look at Android Malware Traffic in First Few Minutes.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Using Map-Based Interactive Interface for Understanding and Characterizing Crime Data in Cities.
Proceedings of the Advances in Swarm and Computational Intelligence, 2015

PeerClean: Unveiling peer-to-peer botnets through dynamic group behavior analysis.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

A Real-time Android Malware Detection System Based on Network Traffic Analysis.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
SpecMonitor: Toward Efficient Passive Traffic Monitoring for Cognitive Radio Networks.
IEEE Trans. Wirel. Commun., 2014

MIMO-based jamming resilient communication in wireless networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

2013
Proximity-Based Security Techniques for Mobile Users in Wireless Networks.
IEEE Trans. Inf. Forensics Secur., 2013

Non-parametric passive traffic monitoring in cognitive radio networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Proximity-based security using ambient radio signals.
Proceedings of IEEE International Conference on Communications, 2013

2012
On the Limitation of Embedding Cryptographic Signature for Primary Transmitter Authentication.
IEEE Wirel. Commun. Lett., 2012

Throughput Analysis of Cooperative Mobile Content Distribution in Vehicular Network using Symbol Level Network Coding.
IEEE J. Sel. Areas Commun., 2012

Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012


  Loading...