Yahui Yang

According to our database1, Yahui Yang authored at least 41 papers between 2008 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Role Engineering Approach Based on Spectral Clustering Analysis for Restful Permissions in Cloud.
Proceedings of the IEEE International Conference on Acoustics, 2023

2021
Hard Disk Failure Prediction Based on Lightgbm with CID.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

2020
Identifying the Motives of Using Weibo from Digital Traces.
Proceedings of the NLPIR 2020: 4th International Conference on Natural Language Processing and Information Retrieval, 2020

ADF2T: an Active Disk Failure Forecasting and Tolerance Software.
Proceedings of the 2020 IEEE International Symposium on Software Reliability Engineering Workshops, 2020

ZTE-Predictor: Disk Failure Prediction System Based on LSTM.
Proceedings of the 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks, 2020

2019
PTAD: Provable and Traceable Assured Deletion in Cloud Storage.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

S3R5: A Snapshot Storage System Based on ROW with Rapid Rollback, Recovery and Read-Write.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

uSendfile: A User-Space Sendfile Verb Based on Flash and RDMA.
Proceedings of the 12th IEEE International Conference on Cloud Computing, 2019

2018
HDR video quality assessment: Perceptual evaluation of compressed HDR video.
J. Vis. Commun. Image Represent., 2018

Memory Cache Attacks on Alluxio Impede High Performance Computing.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Non-Authentication Based Checkpoint Fault-tolerant Vulnerability in Spark Streaming.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

Towards Real-Time Privacy Preservation: A Streaming Location Anonymous Method Based on Distributed Framework.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

2017
A joint Bloom Filter and cross-encoding for data verification and recovery in cloud.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

FMR-PDP: Flexible multiple-replica provable data possession in cloud storage.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

RestSep: Towards a Test-Oriented Privilege Partitioning Approach for RESTful APIs.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

MCS: Memory Constraint Strategy for Unified Memory Manager in Spark.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017

Statically Defend Network Consumption Against Acker Failure Vulnerability in Storm.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

SeEagle: Semantic-Enhanced Anomaly Detection for Securing Eagle.
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017

The Research and Implementation of the Fine-Grained Implicit Authentication Framework for Android.
Proceedings of the Geo-Spatial Knowledge and Intelligence - 5th International Conference, 2017

2016
SEYARN: Enhancing Security of YARN Clusters Based on Health Check Service.
Proceedings of the Information Systems Security and Privacy, 2016

DDHCS: Distributed Denial-of-service Threat to YARN Clusters based on Health Check Service.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Whispers in the Cloud - A Covert Channel using the Result of Creating a Virtual Machine.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Sift - An Efficient Method for Co-residency Detection on Amazon EC2.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

SECapacity: A Secure Capacity Scheduler in YARN.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

S-Storm: A Slot-Aware Scheduling Strategy for Even Scheduler in Storm.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

2015
POSTER: Ciphertext-Policy Attribute-Based Encryption Method with Secure Decryption Key Generation and Outsourcing Decryption of ABE Ciphertexts.
Proceedings of the Security and Privacy in Communication Networks, 2015

MB-DDIVR: A Map-Based Dynamic Data Integrity Verification and Recovery Scheme in Cloud Storage.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

Eavesdropper: A Framework for Detecting the Location of the Processed Result in Hadoop.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

User Rank: A User Influence-Based Data Distribution Optimization Method for Privacy Protection in Cloud Storage System.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

2013
Securing data services: a security architecture design for private storage cloud based on HDFS.
Int. J. Grid Util. Comput., 2013

2012
SAPSC: Security Architecture of Private Storage Cloud Based on HDFS.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
A Way of Key Management in Cloud Storage Based on Trusted Computing.
Proceedings of the Network and Parallel Computing - 8th IFIP International Conference, 2011

SecDM: Securing Data Migration between Cloud Storage Systems.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

Towards Data Isolation & Collaboration in Storage Cloud.
Proceedings of the 2011 IEEE Asia-Pacific Services Computing Conference, 2011

2009
Exploiting Text Content in Image Search by Semi-supervised Learning Techniques.
Proceedings of the IEEE International Conference on Systems, 2009

Multi-Instance Multi-Label Learning For Automatic Tag Recommendation.
Proceedings of the IEEE International Conference on Systems, 2009

A General Framework of Feature Selection for Text Categorization.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2009

Trusted Isolation Environment: An Attestation Architecture with Usage Control Model.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

An Automated Mechanism of Security Test on Network Protocols.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Research on Intrusion Detection Based on an Improved SOM Neural Network.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Improving BitTorrent Network's Performance via Deploying Helpers.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008


  Loading...