Xiaohong Yuan

Orcid: 0000-0002-1295-9812

According to our database1, Xiaohong Yuan authored at least 108 papers between 1995 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Spatiotemporal Evolutions of the Suspended Particulate Matter in the Yellow River Estuary, Bohai Sea and Characterized by Gaofen Imagery.
Remote. Sens., October, 2023

Driver and automation cooperation approach for share steering control system.
J. Frankl. Inst., 2023

Anomaly-Based Intrusion on IoT Networks Using AIGAN-a Generative Adversarial Network.
IEEE Access, 2023

A Survey on Bias Mitigation in Federated Learning.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2023

Visualization Dashboard for Recommending Attack Patterns Using Topic Modeling.
Proceedings of the 2023 12th International Conference on Software and Information Engineering, 2023

A Survey of Attacks and Defenses for Deep Neural Networks.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

2022
Examining Factors Impacting the Effectiveness of Anti-Phishing Trainings.
J. Comput. Inf. Syst., September, 2022

Comparative Study on Recognition Models of Black-Odorous Water in Hangzhou Based on GF-2 Satellite Data.
Sensors, 2022

An Automated Security Concerns Recommender Based on Use Case Specification Ontology.
Autom. Softw. Eng., 2022

Face Authentication from Masked Face Images Using Deep Learning on Periocular Biometrics.
Proceedings of the Advances and Trends in Artificial Intelligence. Theory and Practices in Artificial Intelligence, 2022

Deep Learning Approaches for the Protein Scaffold Filling Problem.
Proceedings of the 34th IEEE International Conference on Tools with Artificial Intelligence, 2022

Semi-Supervised Machine Learning for Analyzing COVID-19 Related Twitter Data for Asian Hate Speech.
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022

Determining Phishing Emails using URL Domain Features.
Proceedings of the 1st International Conference on AI in Cybersecurity, 2022

An Analysis of COVID-19 related Twitter Data for Asian Hate Speech Using Machine Learning Algorithms.
Proceedings of the 1st International Conference on AI in Cybersecurity, 2022

IoT to Structured Data (IoT2SD): A Big Data Information Extraction Framework.
Proceedings of the 1st International Conference on AI in Cybersecurity, 2022

Learn ARP Spoofing Attack in a Game.
Proceedings of the IEEE Frontiers in Education Conference, 2022

2021
Using Embedded Feature Selection and CNN for Classification on CCD-INID-V1 - A New IoT Dataset.
Sensors, 2021

Ultrasonic Diagnosis and Analysis of the Effect of Labor Analgesia on Early Pelvic Floor Function and Pelvic Floor Dysfunction.
J. Medical Imaging Health Informatics, 2021

A Study of Gender Bias in Face Presentation Attack and Its Mitigation.
Future Internet, 2021

Semi-Supervised Self Training to Assess the Credibility of Tweets.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

A Survey on Skeleton-Based Activity Recognition using Graph Convolutional Networks (GCN).
Proceedings of the 12th International Symposium on Image and Signal Processing and Analysis, 2021

Learn Access Control Concepts in a Game.
Proceedings of the IEEE Frontiers in Education Conference, 2021

Implementing a network intrusion detection system using semi-supervised support vector machine and random forest.
Proceedings of the ACM SE '21: 2021 ACM Southeast Conference, 2021

2020
Using a Long Short-Term Memory Recurrent Neural Network (LSTM-RNN) to Classify Network Attacks.
Inf., 2020

Teaching Flooding Attack to the SDN Data Plane with POGIL.
Proceedings of the SIGITE '20: The 21st Annual Conference on Information Technology Education, 2020

Identifying Security Concerns Based on a Use Case Ontology Framework.
Proceedings of the 32nd International Conference on Software Engineering and Knowledge Engineering, 2020

Identifying Panic Triggers from Disaster-Related Tweets.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

US Traffic Sign Recognition Using CNNs.
Proceedings of the Intelligent Systems and Applications, 2020

Developing and Assessing an Educational Game for Teaching Access Control.
Proceedings of the ICER 2020: International Computing Education Research Conference, 2020

Developing and Assessing a Web-Based Interactive Visualization Tool to Teach Buffer Overflow Concepts.
Proceedings of the IEEE Frontiers in Education Conference, 2020

The Design and Implementation of Secure Program Design Education Tool.
Proceedings of the 12th International Conference on Computer Supported Education, 2020

Anomaly Based Intrusion Detection for IoT with Machine Learning.
Proceedings of the 49th IEEE Applied Imagery Pattern Recognition Workshop, 2020

2019
Investigating the impact of cybersecurity policy awareness on employees' cybersecurity behavior.
Int. J. Inf. Manag., 2019

Touch-Based Active Cloud Authentication Using Traditional Machine Learning and LSTM on a Distributed Tensorflow Framework.
Int. J. Comput. Intell. Appl., 2019

Presentation Attack Detection Using Wavelet Transform and Deep Residual Neural Net.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

Security Labs for Software Defined Networks in CloudLab.
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019

Comparing Learning-Based Methods for Identifying Disaster-Related Tweets.
Proceedings of the 18th IEEE International Conference On Machine Learning And Applications, 2019

Deep Learning Approach for U.S. Traffic Sign Recognition.
Proceedings of the 2019 3rd International Conference on Deep Learning Technologies, 2019

Teaching Cybersecurity Using Guided Inquiry Collaborative Learning.
Proceedings of the IEEE Frontiers in Education Conference, 2019

Developing and Assessing Educational Games to Enhance Cyber Security Learning in Computer Science.
Proceedings of the ACM Conference on Global Computing Education, 2019

Effects of Evidence-Based Malware Cybersecurity Training on Employees.
Proceedings of the 25th Americas Conference on Information Systems, 2019

Mitigating Phishing Attacks: An Overview.
Proceedings of the 2019 ACM Southeast Conference, 2019

2018
Enhancing Security Education Through Designing SDN Security Labs in CloudLab.
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018

Performance Evaluation of Machine Learning Algorithms in Apache Spark for Intrusion Detection.
Proceedings of the 28th International Telecommunication Networks and Applications Conference, 2018

A User Study: Abuse Cases Derived from Use Case Description and CAPEC Attack Patterns.
Proceedings of the Information Science and Applications 2018, 2018

Applying Artificial Immune System for Intrusion Detection.
Proceedings of the Fourth IEEE International Conference on Big Data Computing Service and Applications, 2018

2017
Faculty Workshops for Teaching Information Assurance through Hands-On Exercises and Case Studies.
J. Inf. Syst. Educ., 2017

Gender difference and employees' cybersecurity behaviors.
Comput. Hum. Behav., 2017

Enhancing Cybersecurity Education Using POGIL (Abstract Only).
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

Creating Abuse Cases Based on Attack Patterns: A User Study.
Proceedings of the IEEE Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, 2017

Semi-supervised Random Forest for Intrusion Detection Network.
Proceedings of the 28th Modern Artificial Intelligence and Cognitive Science Conference 2017, 2017

An interactive visualization tool for teaching ARP spoofing attack.
Proceedings of the 2017 IEEE Frontiers in Education Conference, 2017

Demystifying ad fraud.
Proceedings of the 2017 IEEE Frontiers in Education Conference, 2017

2016
A Method for Developing Abuse Cases and Its Evaluation.
J. Softw., 2016

Teaching Security Management for Mobile Devices.
Proceedings of the 17th Annual Conference on Information Technology Education and the 5th Annual Conference on Research in Information Technology, 2016

Assessing the Effectiveness of Experiential-Learning-Based Teaching Tools in Cybersecurity Courses (Abstract Only).
Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016

Design and Evaluation of a Course Module on Android Cipher Programming (Abstract Only).
Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016

Teaching mobile computing and mobile security.
Proceedings of the 2016 IEEE Frontiers in Education Conference, 2016

Developing and evaluating a hands-on lab for teaching local area network vulnerabilities.
Proceedings of the 2016 IEEE Frontiers in Education Conference, 2016

Employment status and cybersecurity behaviors.
Proceedings of the 2016 International Conference on Behavioral, 2016

2015
Developing Abuse Cases Based on Threat Modeling and Attack Patterns.
J. Softw., 2015

Integrating Mobile Computing and Security into a Computer Science Curriculum (Abstract Only).
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015

Evaluating the effectiveness of Microsoft threat modeling tool.
Proceedings of the 2015 Information Security Curriculum Development Conference, 2015

A course module on web tracking and privacy.
Proceedings of the 2015 Information Security Curriculum Development Conference, 2015

Cloud Computing Threats and Provider Security Assessment.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Developing a course module for teaching cryptography programming on Android.
Proceedings of the 2015 IEEE Frontiers in Education Conference, 2015

Using a case study to teach students about finding and fixing logic flaws in software.
Proceedings of the 2015 IEEE Frontiers in Education Conference, 2015

A Security Behavior Model of Employees in Cyberspace.
Proceedings of the 21st Americas Conference on Information Systems, 2015

2014
New hands-on labs on browser security (abstract only).
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014

Techniques for retaining low performing students: high-need student mentoring program (abstract only).
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014

A course module on clickjacking.
Proceedings of the 2014 Information Security Curriculum Development Conference, 2014

A course module on mobile malware.
Proceedings of the 2014 Information Security Curriculum Development Conference, 2014

Developing Faculty Expertise in Information Assurance through Case Studies and Hands-On Experiences.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

Does Explicit Information Security Policy Affect Employees' Cyber Security Behavior? A Pilot Study.
Proceedings of the Enterprise Systems Conference, 2014

The Self-Efficacy Variable in Behavioral Information Security Research.
Proceedings of the Enterprise Systems Conference, 2014

Retrieving relevant CAPEC attack patterns for secure software development.
Proceedings of the Cyber and Information Security Research Conference, 2014

2013
Supporting Case-Based Learning in Information Security with Web-Based Technology.
J. Inf. Syst. Educ., 2013

A Survey of Security Standards Applicable to Health Information Systems.
Int. J. Inf. Secur. Priv., 2013

Developing an interdisciplinary Health Informatics Security and privacy program.
Proceedings of the IEEE Frontiers in Education Conference, 2013

2012
A Survey of U.S. Laws for Health Information Security & Privacy.
Int. J. Inf. Secur. Priv., 2012

Developing an interdisciplinary health informatics security and privacy program (abstract only).
Proceedings of the 43rd ACM technical symposium on Computer science education, 2012

Cloud computing and security challenges.
Proceedings of the 50th Annual Southeast Regional Conference, 2012

2011
Patterns for Business-to-consumer E-Commerce Applications
CoRR, 2011

A Visualization based Simulator for SYN Flood Attacks.
Proceedings of the IMAGAPP & IVAPP 2011, 2011

The Design and Implementation of a Cryptographic Education Tool.
Proceedings of the CSEDU 2011, 2011

Observation of recent Microsoft Zero-Day vulnerabilities.
Proceedings of the 49th Annual Southeast Regional Conference, 2011

2010
Visualization Tools for Teaching Computer Security.
ACM Trans. Comput. Educ., 2010

Designing an SOA-Based Earthquake Forewarning System using BPMN.
Proceedings of the 2010 International Conference on Software Engineering Research & Practice, 2010

Case studies for teaching physical security and security policy.
Proceedings of the Information Security Curriculum Development Conference, 2010

2009
Using a Practice Oriented Approach to Teach Web Security Course.
Proceedings of the 2009 International Conference on Frontiers in Education: Computer Science & Computer Engineering, 2009

Laboratory Design For Demonstrating Phishing.
Proceedings of the 2009 International Conference on Frontiers in Education: Computer Science & Computer Engineering, 2009

2008
Teaching Operating Systems Using Visualization: A Comparative Study.
Proceedings of the Innovative Techniques in Instruction Technology, 2008

2007
Trustworthy remote compiling services for grid-based scientific applications.
J. Supercomput., 2007

Engine fault diagnosis based on multi-sensor information fusion using Dempster-Shafer evidence theory.
Inf. Fusion, 2007

Inter-University software engineering using web services.
Proceedings of the 38th SIGCSE Technical Symposium on Computer Science Education, 2007

Using packet sniffer simulator in the class: experience and evaluation.
Proceedings of the 45th Annual Southeast Regional Conference, 2007

Securing analysis patterns.
Proceedings of the 45th Annual Southeast Regional Conference, 2007

Bridge Information Assurance Education Gap between the Majority and Minority Universities through Collaboration.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

2006
Teaching a web security course to practice information assurance.
Proceedings of the 37th SIGCSE Technical Symposium on Computer Science Education, 2006

LAN attacker: a visual education tool.
Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, 2006

Large-scale software unit testing on the grid.
Proceedings of the 2006 IEEE International Conference on Granular Computing, 2006

2005
A Personal Software Process Tool for Eclipse Environment.
Proceedings of the International Conference on Software Engineering Research and Practice, 2005

Secure Remote Compiling Services on the Grid.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2005

2003
An Experience Report on Teaching the Personal Software Process.
Proceedings of the International Conference on Software Engineering Research and Practice, 2003

An Analysis Pattern for Course Management.
Proceedings of the 8th European Conference on Pattern Languages of Programms (EuroPLoP '2003), 2003

2001
Threshold-Based Connection Admission Control Scheme in ATM Networks: A Simulation Study.
Proceedings of the Networking, 2001

2000
Semantic Analysis Patterns.
Proceedings of the Conceptual Modeling, 2000

1995
Visualization in Mechanical Geometry Theorem Proving.
Proceedings of the Fifth Scandinavian Conference on Artificial Intelligence, 1995


  Loading...