Xiaoyan Hu

Orcid: 0000-0002-4172-1977

According to our database1, Xiaoyan Hu authored at least 168 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
STAR-RIS Assisted Covert Communications in NOMA Systems.
IEEE Trans. Veh. Technol., April, 2024

RT-CBCH: Real-Time VPN Traffic Service Identification Based on Sampled Data in High-Speed Networks.
IEEE Trans. Netw. Serv. Manag., February, 2024

Value function assessment to different RL algorithms for heparin treatment policy of patients with sepsis in ICU.
Artif. Intell. Medicine, January, 2024

On the Generalization and Advancement of Half-Sine-Based Pulse Shaping Filters for Constant Envelope OQPSK Modulation.
IEEE Trans. Veh. Technol., 2024

STAR-RIS Enhanced UAV-Enabled MEC Networks with Bi-Directional Task Offloading.
CoRR, 2024

An Information Theoretic Approach to Interaction-Grounded Learning.
CoRR, 2024

Identifying Video Resolution from Encrypted QUIC Streams in Segment-combined Transmission Scenarios.
Proceedings of the 34th edition of the Workshop on Network and Operating System Support for Digital Audio and Video, 2024

2023
A Countermeasure Against RIS Jamming Attack in Physical-Layer Key Generation.
IEEE Wirel. Commun. Lett., December, 2023

AF-FDS: An Accurate, Fast, and Fine-Grained Detection Scheme for DDoS Attacks in High-Speed Networks With Asymmetric Routing.
IEEE Trans. Netw. Serv. Manag., December, 2023

Fine-grained Ethereum behavior identification via encrypted traffic analysis with serialized backward inference.
Comput. Networks, December, 2023

An Optimal RIS Design Strategy for Jointly Improving Key Rate and Communication Performance in Quasi-Static Environments.
IEEE Wirel. Commun. Lett., September, 2023

Event-triggered secure control of nonlinear multi-agent systems under sensor attacks.
J. Frankl. Inst., September, 2023

Human-pose estimation based on weak supervision.
Virtual Real. Intell. Hardw., August, 2023

Towards verifiable and privacy-preserving account model on a consortium blockchain based on zk-SNARKs.
Peer Peer Netw. Appl., August, 2023

PD-CPS: A practical scheme for detecting covert port scans in high-speed networks.
Comput. Networks, July, 2023

GLIM-Net: Chronic Glaucoma Forecast Transformer for Irregularly Sampled Sequential Fundus Images.
IEEE Trans. Medical Imaging, June, 2023

Structurally Optimized Neural Fuzzy Modeling for Model Predictive Control.
IEEE Trans. Ind. Informatics, June, 2023

Some Jerk Systems with Hidden Chaotic Dynamics.
Int. J. Bifurc. Chaos, May, 2023

Event-Triggered Adaptive Fuzzy Asymptotic Tracking Control of Nonlinear Pure-Feedback Systems With Prescribed Performance.
IEEE Trans. Cybern., April, 2023

LossDetection: Real-Time Packet Loss Monitoring System for Sampled Traffic Data.
IEEE Trans. Netw. Serv. Manag., March, 2023

A Deep Subdomain Adaptation Network With Attention Mechanism for Malware Variant Traffic Identification at an IoT Edge Gateway.
IEEE Internet Things J., March, 2023

A lightweight encryption and message authentication framework for wireless communication.
IET Commun., February, 2023

CUR Transformer: A Convolutional Unbiased Regional Transformer for Image Denoising.
ACM Trans. Multim. Comput. Commun. Appl., 2023

Resolution Identification of Encrypted Video Streaming Based on HTTP/2 Features.
ACM Trans. Multim. Comput. Commun. Appl., 2023

Toward Early and Accurate Network Intrusion Detection Using Graph Embedding.
IEEE Trans. Inf. Forensics Secur., 2023

ReplaceDGA: BiLSTM-Based Adversarial DGA With High Anti-Detection Ability.
IEEE Trans. Inf. Forensics Secur., 2023

Provably Efficient CVaR RL in Low-rank MDPs.
CoRR, 2023

Block-Level Interference Exploitation Precoding for MU-MISO: An ADMM Approach.
CoRR, 2023

STAR-RIS Enhanced Joint Physical Layer Security and Covert Communications for Multi-antenna mmWave Systems.
CoRR, 2023

Simultaneously Transmitting and Reflecting RIS (STAR-RIS) Assisted Multi-Antenna Covert Communications: Analysis and Optimization.
CoRR, 2023

STAR-RIS Aided Covert Communication.
CoRR, 2023

Batch classifier with adaptive update for backbone traffic classification.
Comput. Commun., 2023

STAR-RIS-Assisted Joint Physical Layer Security and Covert Communications.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023

UAV-Assisted Edge computing with 3D Trajectory Design and Resource Allocation.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023

STAR-RIS Assisted Secret Key Generation: Joint Active and Passive Precoding Design.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023

Real-Time Platform Identification of VPN Video Streaming Based on Side-Channel Attack.
Proceedings of the ICT Systems Security and Privacy Protection, 2023

An Accurate and Real-Time Detection Method for Concealed Slow HTTP DoS in Backbone Network.
Proceedings of the ICT Systems Security and Privacy Protection, 2023

Provably (More) Sample-Efficient Offline RL with Options.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Intelligent Reflecting Surface Aided Robust Secure Integrated Sensing and Communication Systems.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023

Real-Time Phishing Detection Based on URL Multi-Perspective Features: Aiming at the Real Web Environment.
Proceedings of the IEEE International Conference on Communications, 2023

A Novel Darknet Traffic Classification Method Based on Knowledge Graph with Dynamic Embedding Learning.
Proceedings of the IEEE International Conference on Communications, 2023

Detecting Cryptomining Traffic Over an Encrypted Proxy Based on K-S Test.
Proceedings of the IEEE International Conference on Communications, 2023

NFlowGAN: High-Utility Privacy-Preserving Network Flow Synthesis Based on GAN.
Proceedings of the IEEE International Conference on Communications, 2023

Research On Multipath Separation And Parameter Estimation Algorithm Based On DHA.
Proceedings of the IEEE International Conference on Acoustics, 2023

STAR-RIS Aided Covert Communications.
Proceedings of the IEEE Global Communications Conference, 2023

Website Fingerprinting with Packet Sampling: A More Realistic Approach in Real-World Networks.
Proceedings of the IEEE Global Communications Conference, 2023

Towards Early and Accurate IoT Device-Type Identification with Global Attention Mechanism.
Proceedings of the IEEE Global Communications Conference, 2023

Provably Efficient Offline RL with Options.
Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems, 2023

Accurate Identification of Encrypted Videos in Asymmetric Routing Scenarios.
Proceedings of the 24st Asia-Pacific Network Operations and Management Symposium, 2023

A Tighter Problem-Dependent Regret Bound for Risk-Sensitive Reinforcement Learning.
Proceedings of the International Conference on Artificial Intelligence and Statistics, 2023

2022
An immediate-return reinforcement learning for the atypical Markov decision processes.
Frontiers Neurorobotics, September, 2022

Intelligent Reflecting Surface-Assisted Secret Key Generation with Discrete Phase Shifts in Static Environment.
Dataset, May, 2022

Electric Taxi Charging Strategy Based on Stackelberg Game Considering Hotspot Information.
IEEE Trans. Veh. Technol., 2022

Voltage Regulation With Electric Taxi Based on Dynamic Game Strategy.
IEEE Trans. Veh. Technol., 2022

A Colorization Framework for Monochrome-Color Dual-Lens Systems Using a Deep Convolutional Network.
IEEE Trans. Vis. Comput. Graph., 2022

Event-Based Adaptive Neural Asymptotic Tracking Control for Networked Nonlinear Stochastic Systems.
IEEE Trans. Netw. Sci. Eng., 2022

Spatially Consistent Transformer for Colorization in Monochrome-Color Dual-Lens System.
IEEE Trans. Image Process., 2022

Event-Triggered Fuzzy Adaptive Fixed-Time Tracking Control for Nonlinear Systems.
IEEE Trans. Cybern., 2022

Identifying Ethereum traffic based on an active node library and DEVp2p features.
Future Gener. Comput. Syst., 2022

Unconditional Authentication Based on Physical Layer Offered Chain Key in Wireless Communication.
Entropy, 2022

Approximation-free control based on the bioinspired reference model for suspension systems with uncertainty and unknown nonlinearity.
CoRR, 2022

Efficient sharing of privacy-preserving sensing data on consortium blockchain via group key agreement.
Comput. Commun., 2022

Verifying Privacy-Preserving Financing Orders on a Consortium Blockchain Based on zk-SNARKs.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

Service-Based Identification of Highly Coupled Mobile Applications.
Proceedings of the 47th IEEE Conference on Local Computer Networks, 2022

Identify IoT Devices from Backbone Networks Using Lightweight Neural Networks.
Proceedings of the 47th IEEE Conference on Local Computer Networks, 2022

PSCM: Towards Practical Encrypted Unknown Protocol Classification.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

Real-time Application Identification of RTC Media Streams via Encrypted Traffic Analysis.
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022

Low-PAPR DFRC MIMO-OFDM Waveform Design for Integrated Sensing and Communications.
Proceedings of the IEEE International Conference on Communications, 2022

Towards Accurate DGA Detection based on Siamese Network with Insufficient Training Samples.
Proceedings of the IEEE International Conference on Communications, 2022

IM-Shield: A Novel Defense System against DDoS Attacks under IP Spoofing in High-speed Networks.
Proceedings of the IEEE International Conference on Communications, 2022

Real-time Identification of VPN Traffic based on Counting Bloom Filter and Chained Hash Table from Sampled Data in High-speed Networks.
Proceedings of the IEEE International Conference on Communications, 2022

Detecting Slow Port Scans of Long Duration in High-Speed Networks.
Proceedings of the IEEE Global Communications Conference, 2022

A Dynamic Access Control Model Based on Attributes and Intro VAE.
Proceedings of the IEEE Global Communications Conference, 2022

An Adversarial Learning-based Tor Malware Traffic Detection Model.
Proceedings of the IEEE Global Communications Conference, 2022

Research on driving mechanism of total energy consumption in Jiangsu province based on the extended STIRPAT model.
Proceedings of the BIC 2022: 2nd International Conference on Bioinformatics and Intelligent Computing, Harbin, China, January 21, 2022

HDS: A Hierarchical Scheme for Accurate and Efficient DDoS Flooding Attack Detection.
Proceedings of the 23rd Asia-Pacific Network Operations and Management Symposium, 2022

Service classification of high-speed network traffic based on Two-Stage Clustering.
Proceedings of the 23rd Asia-Pacific Network Operations and Management Symposium, 2022

2021
Intelligent Reflecting Surface-Assisted Secret Key Generation With Discrete Phase Shifts in Static Environment.
IEEE Wirel. Commun. Lett., 2021

Self-Supervised Colorization Towards Monochrome-Color Camera Systems Using Cycle CNN.
IEEE Trans. Image Process., 2021

Event-Based Adaptive Fuzzy Asymptotic Tracking Control of Uncertain Nonlinear Systems.
IEEE Trans. Fuzzy Syst., 2021

Reconfigurable Intelligent Surface Aided Mobile Edge Computing: From Optimization-Based to Location-Only Learning-Based Solutions.
IEEE Trans. Commun., 2021

SFIM: Identify user behavior based on stable features.
Peer-to-Peer Netw. Appl., 2021

Unsupervised motion capture data segmentation based on topic model.
Comput. Animat. Virtual Worlds, 2021

Algorithm of radiation hydrodynamics with nonorthogonal mesh for 3D implosion problem.
J. Comput. Phys., 2021

Exploring real-time super-resolution generative adversarial networks.
Int. J. Sens. Networks, 2021

Native Security Scheme Based on Physical Layer Chain Key for Encryption and Authentication.
Proceedings of the IEEE Wireless Communications and Networking Conference Workshops, 2021

Event-Triggered Adaptive Fuzzy Asymptotic Tracking Control for Single Link Robot Manipulator with Prescribed Performance.
Proceedings of the 2021 International Conference on Security, 2021

Towards Efficient Co-audit of Privacy-Preserving Data on Consortium Blockchain via Group Key Agreement.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

BCAC: Batch Classifier based on Agglomerative Clustering for traffic classification in a backbone network.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

Real-time Packet Loss Detection for TCP and UDP Based on Feature-Sketch.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

Monitoring Video Resolution of Adaptive Encrypted Video Traffic Based on HTTP/2 Features.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

Mobile Application Encryption Traffic Classification Based On TLS Flow Sequence Network.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

Removing Channel Estimation by Location-Only Based Deep Learning for RIS Aided Mobile Edge Computing.
Proceedings of the ICC 2021, 2021

Accurate and Fast Detection of DDoS Attacks in High-Speed Network with Asymmetric Routing.
Proceedings of the IEEE Global Communications Conference, 2021

Detecting Cryptojacking Traffic Based on Network Behavior Features.
Proceedings of the IEEE Global Communications Conference, 2021

MIEHDR CNN: Main Image Enhancement based Ghost-Free High Dynamic Range Imaging using Dual-Lens Systems.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Wireless-Powered Edge Computing With Cooperative UAV: Task, Time Scheduling and Trajectory Design.
IEEE Trans. Wirel. Commun., 2020

Edge and Central Cloud Computing: A Perfect Pairing for High Energy Efficiency and Low-Latency.
IEEE Trans. Wirel. Commun., 2020

A Secure Communication Scheme Based on Equivalent Interference Channel Assisted by Physical Layer Secret Keys.
Secur. Commun. Networks, 2020

A network-wide view-based detection and mitigation of a sophisticated Interest Flooding Attack.
EURASIP J. Wirel. Commun. Netw., 2020

Joint Pose and Shape Estimation of Vehicles from LiDAR Data.
CoRR, 2020

Geometry-Aware Instance Segmentation with Disparity Maps.
CoRR, 2020

An on-demand off-path cache exploration based multipath forwarding strategy.
Comput. Networks, 2020

COMPASS: Directing Named Data Transmission in VANETs by Dynamic Directional Interfaces.
IEEE Access, 2020

A Demand and Responsiveness-based Caching Strategy for Network Coding Enabled NDN.
Proceedings of the IEEE Global Communications Conference, 2020

Towards Network Coding and Request Pipelining Enabled NDN for Big Data Transmission.
Proceedings of the IEEE Global Communications Conference, 2020

2019
UAV-Assisted Relaying and Edge Computing: Scheduling and Trajectory Optimization.
IEEE Trans. Wirel. Commun., 2019

GPU based Real-time Super Hosts Detection at Distributed Edge Routers.
CoRR, 2019

<i>VATE</i>: A trade-off between memory and preserving time for high accurate cardinality estimation under sliding time window.
Comput. Commun., 2019

IP backbone traffic behavior characteristic spectrum composing and role mining.
CCF Trans. Netw., 2019

An Enlarging-the-Capacity Packet Sorting Covert Channel.
IEEE Access, 2019

An Enhanced Steganographic Code and its Application in Voice-Over-IP Steganography.
IEEE Access, 2019

An Adaptive Profile-Based Approach for Detecting Anomalous Traffic in Backbone.
IEEE Access, 2019

A Super Point Detection Algorithm Under Sliding Time Windows Based on Rough and Linear Estimators.
IEEE Access, 2019

Region Growing Algorithm Combined With Fast Peak Detection for Segmenting Colloidal Gold Immunochromatographic Strip Images.
IEEE Access, 2019

Wireless-Powered Mobile Edge Computing with Cooperated UAV.
Proceedings of the 20th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2019

Exploration and Exploitation of Off-path Cached Content in Network Coding Enabled Named Data Networking.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

Detecting and Mitigating A Sophisticated Interest Flooding Attack in NDN from the Network-Wide View.
Proceedings of the First IEEE International Workshop on Network Meets Intelligent Computations, 2019

Task and Bandwidth Allocation for UAV-Assisted Mobile Edge Computing with Trajectory Design.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

The Synergy of Edge and Central Cloud Computing with Wireless MIMO Backhaul.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Inferring ADU Combinations from Encrypted QUIC Stream.
Proceedings of the 14th International Conference on Future Internet Technologies, 2019

Enabling Linearly Homomorphic Signatures in Network Coding-based Named Data Networking.
Proceedings of the 14th International Conference on Future Internet Technologies, 2019

RTSRGAN: Real-Time Super-Resolution Generative Adversarial Networks.
Proceedings of the Seventh International Conference on Advanced Cloud and Big Data, 2019

2018
Wireless Powered Cooperation-Assisted Mobile Edge Computing.
IEEE Trans. Wirel. Commun., 2018

VATE: a trade-off between memory and preserving time for high accuracy cardinalities estimation under sliding time window.
CoRR, 2018

SRLA: A real time sliding time window super point cardinality estimation algorithm for high speed network based on GPU.
CoRR, 2018

Mitigating Content Poisoning With Name-Key Based Forwarding and Multipath Forwarding Based Inband Probe for Energy Management in Smart Cities.
IEEE Access, 2018

Abnormal Hosts Monitor for City Wide Core Network by Real Time Super Points Cardinality Estimation.
Proceedings of the 2018 IEEE SmartWorld, 2018

Design of an on-Chip Joule-Thomson Micro Cryogenic Cooler Based on MEMS Compressor.
Proceedings of the 13th IEEE Annual International Conference on Nano/Micro Engineered and Molecular Systems, 2018

Power Minimization for Cooperative Wireless Powered Mobile Edge Computing Systems.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Most Memory Efficient Distributed Super Points Detection on Core Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

SRLA: A Real Time Sliding Time Window Super Point Cardinality Estimation Algorithm for High Speed Network Based on GPU.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

A Data Validation Method Based on IP Covert Channel Packet Ordering.
Proceedings of the 14th International Conference on Computational Intelligence and Security, 2018

A Security Evaluation Method for Voice-over-IP Streaming Media Information Hiding.
Proceedings of the 14th International Conference on Computational Intelligence and Security, 2018

2017
On the Secrecy Rate Maximization With Uncoordinated Cooperative Jamming by Single-Antenna Helpers.
IEEE Trans. Veh. Technol., 2017

High Speed Network Super Points Detection Based on Sliding Time Window by GPU.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Inferring the Most Popular Route Based on Ant Colony Optimization with Trajectory Data.
Proceedings of the Wireless Sensor Networks, 2017

Efficient and robust motion segmentation via adaptive similarity metric.
Proceedings of the Computer Graphics International Conference, 2017

Node Localization Based on Multiple Radio Transmission Power Levels for Wireless Sensor Networks.
Proceedings of the 5G for Future Wireless Networks - First International Conference, 2017

2016
Optimal Semiadaptive Transmission With Artificial-Noise-Aided Beamforming in MISO Wiretap Channels.
IEEE Trans. Veh. Technol., 2016

Social relationship discovery of IP addresses in the managed IP networks by observing traffic at network boundary.
Comput. Networks, 2016

Secrecy rate maximization for SIMO wiretap channel with uncoordinated cooperative jamming under secrecy outage probability constraint.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

Enabling Fast Recovery from Unanticipated Data Access Failure in Named Data Networking.
Proceedings of the 11th International Conference on Future Internet Technologies, 2016

2015
RTT Estimation with Sampled Flow Data.
IEICE Trans. Commun., 2015

Secrecy Rate Maximization With Uncoordinated Cooperative Jamming by Single-Antenna Helpers Under Secrecy Outage Probability Constraint.
IEEE Commun. Lett., 2015

Practical Transmission Scheme With Fixed Communication Rate Under Constraints of Transmit Power and Secrecy Outage Probability.
IEEE Commun. Lett., 2015

An Improved Seeding Algorithm of Magnetic Flux Lines Based on Data in 3D Space.
Data Sci. J., 2015

Adaptable Anatomical Models for Realistic Bone Motion Reconstruction.
Comput. Graph. Forum, 2015

Enhancing in-network caching by coupling cache placement, replacement and location.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Semi-Adaptive Transmission in Slow Fading MISOME Wiretap Channels.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015

3D shape estimation from 2D landmarks: A convex relaxation approach.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2015

Secrecy rate maximization for SIMO wiretap channel with uncoordinated cooperative jamming by single-antenna helpers.
Proceedings of the 10th International Conference on Communications and Networking in China, 2015

2014
Opportunistic On-Path Caching for Named Data Networking.
IEICE Trans. Commun., 2014

3D Shape Reconstruction from 2D Landmarks: A Convex Formulation.
CoRR, 2014

CANR: Cache-Aware Name-based Routing.
Proceedings of the IEEE 3rd International Conference on Cloud Computing and Intelligence Systems, 2014

2013
An interactive tool for teaching right management in 3D e-learning platform.
Proceedings of the 12th ACM International Conference on Virtual Reality Continuum and Its Applications in Industry, 2013

PhD forum: Not so cooperative caching.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013

Not So Cooperative Caching in Named Data Networking.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
A Quantitative Evaluation of Confidence Measures for Stereo Vision.
IEEE Trans. Pattern Anal. Mach. Intell., 2012

Extended Torelli Map to the Igusa Blowup in Genus 6, 7, and 8.
Exp. Math., 2012

Distributed in-network cooperative caching.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

Robust Probabilistic Occupancy Grid Estimation from Positive and Negative Distance Fields.
Proceedings of the 2012 Second International Conference on 3D Imaging, 2012

Least Commitment, Viewpoint-Based, Multi-view Stereo.
Proceedings of the 2012 Second International Conference on 3D Imaging, 2012

2011
Image Skeletonization Based on Curve Skeleton Extraction.
Proceedings of the Human-Computer Interaction. Design and Development Approaches, 2011

2010
Evaluation of stereo confidence indoors and outdoors.
Proceedings of the Twenty-Third IEEE Conference on Computer Vision and Pattern Recognition, 2010

2009
An Improved Cloud Rendering Method.
Proceedings of the Fifth International Conference on Image and Graphics, 2009

2008
Gene selection using genetic algorithm and support vectors machines.
Soft Comput., 2008

2005
Footprint Analysis and Motion Synthesis.
Proceedings of the Computational Science and Its Applications, 2005


  Loading...