Yang Gao

Affiliations:
  • China Information Technology Security Evaluation Center, Technical Evaluation Laboratory, Beijing, China


According to our database1, Yang Gao authored at least 17 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Robust Malware identification via deep temporal convolutional network with symmetric cross entropy learning.
IET Softw., August, 2023

2022
Abnormal detection technology of industrial control system based on transfer learning.
Appl. Math. Comput., 2022

2021
S-PoDL: A two-stage computational-efficient consensus mechanism for blockchain-enabled multi-access edge computing.
Phys. Commun., 2021

Towards improving detection performance for malware with a correntropy-based deep learning method.
Digit. Commun. Networks, 2021

Abnormal flow detection in industrial control network based on deep reinforcement learning.
Appl. Math. Comput., 2021

2020
Categorizing Malware via A Word2Vec-based Temporal Convolutional Network Scheme.
J. Cloud Comput., 2020

Self-Triggered Consensus of Vehicle Platoon System With Time-Varying Topology.
Frontiers Neurorobotics, 2020

2019
Kernel Mixture Correntropy Conjugate Gradient Algorithm for Time Series Prediction.
Entropy, 2019

2015
Adequate is better: particle swarm optimization with limited-information.
Appl. Math. Comput., 2015

2014
Cyberphysical Security for Industrial Control Systems Based on Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

Evaluating Industrial Control Devices Security: Standards, Technologies and Challenges.
Proceedings of the Computer Information Systems and Industrial Management, 2014

2013
Security Testing Methods and Techniques of Industrial Control Devices.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Security Analysis on Cyber-physical System Using Attack Tree.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Cyber-physical System Risk Assessment.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

2012
Designated Verifier Signature Scheme over Circulant Matrices.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

The research and implementation of intelligent mobile video supervising system based on DSP.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

Stability analysis of software networks.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012


  Loading...