Yan Xiong
Orcid: 0000-0001-6347-8747Affiliations:
- University of Science and Technology of China, School of Computer Science and Technology, Hefei, China
According to our database1,
Yan Xiong
authored at least 119 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
MalFlows: Context-aware Fusion of Heterogeneous Flow Semantics for Android Malware Detection.
CoRR, August, 2025
Detecting Android Malware by Visualizing App Behaviors From Multiple Complementary Views.
IEEE Trans. Inf. Forensics Secur., 2025
Efficient and Robust Neural Combinatorial Optimization via Wasserstein-Based Coresets.
Proceedings of the Thirteenth International Conference on Learning Representations, 2025
2024
IEEE Trans. Dependable Secur. Comput., 2024
WACANA: A Concolic Analyzer for Detecting On-chain Data Vulnerabilities in WASM Smart Contracts.
CoRR, 2024
JANUS: A Difference-Oriented Analyzer For Financial Centralization Risks in Smart Contracts.
CoRR, 2024
LightSLH: Provable and Low-Overhead Spectre v1 Mitigation through Targeted Instruction Hardening.
CoRR, 2024
Cooking-Clip: Context-Aware Language-Image Pretraining for Zero-Shot Recipe Generation.
Proceedings of the IEEE International Conference on Acoustics, 2024
Encrypted Mining Traffic Detection Mechanism Based on TLS Handshake Message and Machine Learning.
Proceedings of the 10th International Conference on Big Data Computing and Communications, 2024
2023
Proceedings of the IEEE International Conference on Software Analysis, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
A Multi-scale Multi-modal Multi-dimension Joint Transformer for Two-Stream Action Classification.
Proceedings of the PRICAI 2023: Trends in Artificial Intelligence, 2023
Learning a Contextualized Multimodal Embedding for Zero-shot Cooking Video Caption Generation.
Proceedings of the ACM Multimedia Asia 2023, 2023
Usage of Application-driven Ternary Divide-and-conquer Architecture of Heterogeneous Internet of Things in Environmental Monitoring.
Proceedings of the 9th International Conference on Big Data Computing and Communications, 2023
Proceedings of the 9th International Conference on Big Data Computing and Communications, 2023
SolScope: Effectively Hunting Potential Permission Backdoor Threats in Smart Contracts.
Proceedings of the 9th International Conference on Big Data Computing and Communications, 2023
Proceedings of the 9th International Conference on Big Data Computing and Communications, 2023
2022
D<sup>2</sup>F: discriminative dense fusion of appearance and motion modalities for end-to-end video classification.
Multim. Tools Appl., 2022
2021
IEEE Trans. Inf. Theory, 2021
AppAngio: Revealing Contextual Information of Android App Behaviors by API-Level Audit Logs.
IEEE Trans. Inf. Forensics Secur., 2021
Potential Pathogenic Genes Prioritization Based on Protein Domain Interaction Network Analysis.
IEEE ACM Trans. Comput. Biol. Bioinform., 2021
IEEE ACM Trans. Comput. Biol. Bioinform., 2021
A reversible extended secret image sharing scheme based on Chinese remainder theorem.
Signal Process. Image Commun., 2021
Grouped Secret Sharing Schemes Based on Lagrange Interpolation Polynomials and Chinese Remainder Theorem.
Secur. Commun. Networks, 2021
Frontiers Comput. Sci., 2021
Proceedings of the 32nd IEEE International Symposium on Software Reliability Engineering, 2021
A Certificate Authority Domain-based Cross-domain Authentication Scheme for Virtual Enterprise Using Identity Based Encryption.
Proceedings of the 7th International Conference on Big Data Computing and Communications, 2021
Security Analysis of Session Initiation Protocol Digest Access Authentication Scheme.
Proceedings of the 7th International Conference on Big Data Computing and Communications, 2021
2020
SieveDroid: Intercepting Undesirable Private-Data Transmissions in Android Applications.
IEEE Syst. J., 2020
Quantum Inf. Process., 2020
A verifiable framework of entanglement-free quantum secret sharing with information-theoretical security.
Quantum Inf. Process., 2020
Incremental learning imbalanced data streams with concept drift: The dynamic updated ensemble algorithm.
Knowl. Based Syst., 2020
Inf. Process. Lett., 2020
Int. J. Netw. Secur., 2020
Detecting Improper Behaviors of Stubbornly Requesting Permissions in Android Applications.
Int. J. Netw. Secur., 2020
Int. J. Netw. Secur., 2020
IEEE Access, 2020
SmartVerif: Push the Limit of Automation Capability of Verifying Security Protocols by Dynamic Strategies.
Proceedings of the 29th USENIX Security Symposium, 2020
Identifying compatibility-related APIs by exploring biased distribution in Android apps.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Companion Volume, Seoul, South Korea, 27 June, 2020
Proceedings of the 6th International Conference on Big Data Computing and Communications, 2020
Automated Theorem Proving via Interacting with Proof Assistants by Dynamic Strategies.
Proceedings of the 6th International Conference on Big Data Computing and Communications, 2020
Proceedings of the 6th International Conference on Big Data Computing and Communications, 2020
Proceedings of the 6th International Conference on Big Data Computing and Communications, 2020
Proceedings of the 6th International Conference on Big Data Computing and Communications, 2020
2019
AppScalpel: Combining static analysis and outlier detection to identify and prune undesirable usage of sensitive data in Android applications.
Neurocomputing, 2019
Tightly coupled multi-group threshold secret sharing based on Chinese Remainder Theorem.
Discret. Appl. Math., 2019
CoRR, 2019
Semi-supervised prediction of protein interaction sites from unlabeled sample information.
BMC Bioinform., 2019
Divide and conquer: recovering contextual information of behaviors in Android apps around limited-quantity audit logs.
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019
Proceedings of the 5th International Conference on Big Data Computing and Communications, 2019
Proceedings of the 5th International Conference on Big Data Computing and Communications, 2019
Drift-detection Based Incremental Ensemble for Reacting to Different Kinds of Concept Drift.
Proceedings of the 5th International Conference on Big Data Computing and Communications, 2019
Proceedings of the 5th International Conference on Big Data Computing and Communications, 2019
Proceedings of the 5th International Conference on Big Data Computing and Communications, 2019
2018
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018
A Privacy Enforcement Framework for Android Systems Using Symbolic Execution-Based Instrumentation.
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018
2017
IEEE J. Sel. Areas Commun., 2017
A General Formal Framework of Analyzing Selective Disclosure Attribute-Based Credential Systems.
Int. J. Netw. Secur., 2017
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017
2016
"Friend is Treasure": Exploring and Exploiting Mobile Social Contacts for Efficient Task Offloading.
IEEE Trans. Veh. Technol., 2016
Sensors, 2016
Pattern Anal. Appl., 2016
Formal Analysis of Selective Disclosure Attribute-Based Credential System in Applied Pi Calculus.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
WalkieLokie: sensing relative positions of surrounding presenters by acoustic signals.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016
Rotate and Guide: Accurate and Lightweight Indoor Direction Finding Using Smartphones.
Proceedings of the Big Data Computing and Communications - Second International Conference, 2016
2015
IEEE Wirel. Commun., 2015
Online Sequential Channel Accessing Control: A Double Exploration vs. Exploitation Problem.
IEEE Trans. Wirel. Commun., 2015
IEEE Trans. Mob. Comput., 2015
Swadloon: Direction Finding and Indoor Localization Using Acoustic Signal by Shaking Smartphones.
IEEE Trans. Mob. Comput., 2015
IEEE Trans. Inf. Forensics Secur., 2015
WalkieLokie: Relative Positioning for Augmented Reality Using a Dummy Acoustic Speaker.
CoRR, 2015
Proceedings of the 16th IEEE International Symposium on A World of Wireless, 2015
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015
Proceedings of the Database Systems for Advanced Applications, 2015
Proceedings of the Big Data Computing and Communications - First International Conference, 2015
2014
Sparsest Random Scheduling for Compressive Data Gathering in Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2014
A new similarity measure based on shape information for invariant with multiple distortions.
Neurocomputing, 2014
Walk globally, act locally: efficient influential user identification in mobile social networks.
Proceedings of the first international workshop on Mobile sensing, 2014
Proceedings of the first international workshop on Mobile sensing, 2014
Compressive sensing meets unreliable link: sparsest random scheduling for compressive data gathering in lossy WSNs.
Proceedings of the Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014
Shake and walk: Acoustic direction finding and fine-grained indoor localization using smartphones.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Proceedings of the 10th International Conference on Natural Computation, 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
Smart Comput. Rev., 2013
A Secure Distributed Authentication scheme based on CRT-VSS and Trusted Computing in MANET.
CoRR, 2013
CoRR, 2013
An efficient compressive data gathering routing scheme for large-scale wireless sensor networks.
Comput. Electr. Eng., 2013
Routing attacks detection and reaction scheme for mobile ad hoc networks using statistical methods.
Proceedings of the 22nd Wireless and Optical Communication Conference, 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Integrating Social Information into Collaborative Filtering for Celebrities Recommendation.
Proceedings of the Intelligent Information and Database Systems - 5th Asian Conference, 2013
2012
J. Comput. Sci. Eng., 2012
A Distributed ECC-DSS Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Replicator Dynamic Inspired Differential Evolution Algorithm for Global Optimization.
Proceedings of the IJCCI 2012 - Proceedings of the 4th International Joint Conference on Computational Intelligence, Barcelona, Spain, 5, 2012
Proceedings of the Information Computing and Applications - Third International Conference, 2012
Proceedings of the Ninth IEEE International Conference on e-Business Engineering, 2012
2011
A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks.
J. Comput. Sci. Technol., 2011
An Efficient and Lightweight User Authentication Scheme for Wireless Sensor Networks.
Proceedings of the Information Computing and Applications, 2011
Proceedings of the IEEE 8th International Conference on e-Business Engineering, 2011
2010
MoBility-Assisted Detection Of The Replication attacks in mobile wireless sensor networks.
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010
Constraints Partition Based Service Process Replacement with End-to-End QoS Constraints.
Proceedings of the Sixth International Conference on Semantics Knowledge and Grid, 2010
2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
2008
Proceedings of the Workshops Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), 2008
2006
J. Comput. Sci. Technol., 2006
2005
Sci. China Ser. F Inf. Sci., 2005