Yang Xiang

According to our database1, Yang Xiang authored at least 274 papers between 2003 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Data security against receiver corruptions: SOA security for receivers from simulatable DEMs.
Inf. Sci., 2019

2018
Robust Reputation-Based Cooperative Spectrum Sensing via Imperfect Common Control Channel.
IEEE Trans. Vehicular Technology, 2018

Cross-Project Transfer Representation Learning for Vulnerable Function Discovery.
IEEE Trans. Industrial Informatics, 2018

Guest Editor's Introduction to the Special Section on Social Network Security.
IEEE Trans. Dependable Sec. Comput., 2018

Rumor Source Identification in Social Networks with Time-Varying Topology.
IEEE Trans. Dependable Sec. Comput., 2018

Security Measurements of Cyber Networks.
Security and Communication Networks, 2018

Big network traffic data visualization.
Multimedia Tools Appl., 2018

A fog-based privacy-preserving approach for distributed signature-based intrusion detection.
J. Parallel Distrib. Comput., 2018

Pokémon GO in Melbourne CBD: A case study of the cyber-physical symbiotic social networks.
J. Comput. Science, 2018

Blockchain-based publicly verifiable data deletion scheme for cloud storage.
J. Network and Computer Applications, 2018

TouchWB: Touch behavioral user authentication based on web browsing on smartphones.
J. Network and Computer Applications, 2018

Garbled role-based access control in the cloud.
J. Ambient Intelligence and Humanized Computing, 2018

A matrix-based cross-layer key establishment protocol for smart homes.
Inf. Sci., 2018

Privacy-Preserving and Lightweight Key Agreement Protocol for V2G in the Social Internet of Things.
IEEE Internet of Things Journal, 2018

An over-the-air key establishment protocol using keyless cryptography.
Future Generation Comp. Syst., 2018

A variant of password authenticated key exchange protocol.
Future Generation Comp. Syst., 2018

High-Performance Computing for Big Data Processing.
Future Generation Comp. Syst., 2018

Privacy-preserving machine learning with multiple data providers.
Future Generation Comp. Syst., 2018

Efficient cache resource aggregation using adaptive multi-level exclusive caching policies.
Future Generation Comp. Syst., 2018

An iteration-based differentially private social network data release.
Comput. Syst. Sci. Eng., 2018

Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection.
CoRR, 2018

Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps.
CoRR, 2018

Using AI to Hack IA: A New Stealthy Spyware Against Voice Assistance Functions in Smart Phones.
CoRR, 2018

Automated Big Traffic Analytics for Cyber Security.
CoRR, 2018

Defensive Collaborative Multi-task Training - Defending against Adversarial Attack towards Deep Neural Networks.
CoRR, 2018

Comprehensive analysis of network traffic data.
Concurrency and Computation: Practice and Experience, 2018

Detecting and Preventing Cyber Insider Threats: A Survey.
IEEE Communications Surveys and Tutorials, 2018

Twitter spam detection: Survey of new approaches and comparative study.
Computers & Security, 2018

JFCGuard: Detecting juice filming charging attack via processor usage analysis on smartphones.
Computers & Security, 2018

Secure attribute-based data sharing for resource-limited users in cloud computing.
Computers & Security, 2018

Density-Based Location Preservation for Mobile Crowdsensing With Differential Privacy.
IEEE Access, 2018

Differential Private POI Queries via Johnson-Lindenstrauss Transform.
IEEE Access, 2018

Machine Learning Differential Privacy With Multifunctional Aggregation in a Fog Computing Architecture.
IEEE Access, 2018

Dissemination of Authenticated Tree-Structured Data with Privacy Protection and Fine-Grained Control in Outsourced Databases.
Proceedings of the Computer Security, 2018

A Data-driven Attack against Support Vectors of SVM.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Honeypot Frameworks and their Applications: A New Framework
SpringerBriefs on Cyber Security Systems and Networks, Springer, ISBN: 978-981-10-7738-8, 2018

2017
Network Coding Based Converge-Cast Scheme in Wireless Sensor Networks.
Wireless Personal Communications, 2017

TC-Release++: An Efficient Timestamp-Based Coherence Protocol for Many-Core Architectures.
IEEE Trans. Parallel Distrib. Syst., 2017

Adaptive Multimedia Data Forwarding for Privacy Preservation in Vehicular Ad-Hoc Networks.
IEEE Trans. Intelligent Transportation Systems, 2017

The Spatial-Temporal Perspective: The Study of the Propagation of Modern Social Worms.
IEEE Trans. Information Forensics and Security, 2017

Statistical Features-Based Real-Time Detection of Drifted Twitter Spam.
IEEE Trans. Information Forensics and Security, 2017

Fuzzy-Based Information Decomposition for Incomplete and Imbalanced Data Learning.
IEEE Trans. Fuzzy Systems, 2017

Fully Reversible Privacy Region Protection for Cloud Video Surveillance.
IEEE Trans. Cloud Computing, 2017

Towards Accurate Statistical Analysis of Security Margins: New Searching Strategies for Differential Attacks.
IEEE Trans. Computers, 2017

Joint affinity aware grouping and virtual machine placement.
Microprocessors and Microsystems - Embedded Hardware Design, 2017

Precise contention-aware performance prediction on virtualized multicore system.
Journal of Systems Architecture - Embedded Systems Design, 2017

Crossed Cube Ring: A k-connected virtual backbone for wireless sensor networks.
J. Network and Computer Applications, 2017

Using epidemic betweenness to measure the influence of users in complex networks.
J. Network and Computer Applications, 2017

A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks.
J. Network and Computer Applications, 2017

A general framework for secure sharing of personal health records in cloud system.
J. Comput. Syst. Sci., 2017

Secure independent-update concise-expression access control for video on demand in cloud.
Inf. Sci., 2017

FFSSE: Flexible Forward Secure Searchable Encryption with Efficient Performance.
IACR Cryptology ePrint Archive, 2017

Attribute-based data access control in mobile cloud computing: Taxonomy and open issues.
Future Generation Comp. Syst., 2017

Investigating the deceptive information in Twitter spam.
Future Generation Comp. Syst., 2017

Security and privacy in social networks.
Concurrency and Computation: Practice and Experience, 2017

Detecting spamming activities in twitter based on deep-learning technique.
Concurrency and Computation: Practice and Experience, 2017

The structure of communities in scale-free networks.
Concurrency and Computation: Practice and Experience, 2017

MBSA: a lightweight and flexible storage architecture for virtual machines.
Concurrency and Computation: Practice and Experience, 2017

Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies.
IEEE Communications Surveys and Tutorials, 2017

Addressing the class imbalance problem in Twitter spam detection using ensemble learning.
Computers & Security, 2017

A practical cross-datacenter fault-tolerance algorithm in the cloud storage system.
Cluster Computing, 2017

MIPE: a practical memory integrity protection method in a trusted execution environment.
Cluster Computing, 2017

Statistical Twitter Spam Detection Demystified: Performance, Stability and Scalability.
IEEE Access, 2017

My Face is Mine: Fighting Unpermitted Tagging on Personal/Group Photos in Social Media.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

Privacy Preserving Collaborative Filtering via the Johnson-Lindenstrauss Transform.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

How Spam Features Change in Twitter and the Impact to Machine Learning Based Detection.
Proceedings of the Information Security Practice and Experience, 2017

Catch Me If You Can: Detecting Compromised Users Through Partial Observation on Networks.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Personalized Privacy Preserving Collaborative Filtering.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

A Cross-Layer Key Establishment Model for Wireless Devices in Cyber-Physical Systems.
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017

POSTER: Vulnerability Discovery with Function Representation Learning from Unlabeled Projects.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Twitter spam detection based on deep learning.
Proceedings of the Australasian Computer Science Week Multiconference, 2017

2016
A General Collaborative Framework for Modeling and Perceiving Distributed Network Behavior.
IEEE/ACM Trans. Netw., 2016

Password-Authenticated Group Key Exchange: A Cross-Layer Design.
ACM Trans. Internet Techn., 2016

On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor Networks.
IEEE Trans. Information Forensics and Security, 2016

Comments and Corrections.
IEEE Trans. Comput. Social Systems, 2016

Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing.
IEEE Trans. Computers, 2016

Two-Factor Data Security Protection Mechanism for Cloud Storage System.
IEEE Trans. Computers, 2016

Privacy preserving in cloud computing environment.
Security and Communication Networks, 2016

Detection and classification of anomaly intrusion using hierarchy clustering and SVM.
Security and Communication Networks, 2016

Certificate-based encryption resilient to key leakage.
Journal of Systems and Software, 2016

SEMD: Secure and efficient message dissemination with policy enforcement in VANET.
J. Comput. Syst. Sci., 2016

Spammers Are Becoming "Smarter" on Twitter.
IT Professional, 2016

Trustworthiness-hypercube-based reliable communication in mobile social networks.
Inf. Sci., 2016

Efficient consolidation-aware VCPU scheduling on multicore virtualization platform.
Future Generation Comp. Syst., 2016

Security and reliability in big data.
Concurrency and Computation: Practice and Experience, 2016

Security and privacy in big data.
Concurrency and Computation: Practice and Experience, 2016

Privacy Preserving Scheme for Location and Content Protection in Location-Based Services.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

Gatekeeping Behavior Analysis for Information Credibility Assessment on Weibo.
Proceedings of the Network and System Security - 10th International Conference, 2016

Statistical Detection of Online Drifting Twitter Spam: Invited Paper.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

An Ensemble Learning Approach for Addressing the Class Imbalance Problem in Twitter Spam Detection.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Fuzzy-Based Feature and Instance Recovery.
Proceedings of the Intelligent Information and Database Systems - 8th Asian Conference, 2016

Comprehensive Analysis of Network Traffic Data.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

2015
Robust Network Traffic Classification.
IEEE/ACM Trans. Netw., 2015

K-Center: An Approach on the Multi-Source Identification of Information Diffusion.
IEEE Trans. Information Forensics and Security, 2015

A Performance Evaluation of Machine Learning-Based Streaming Spam Tweets Detection.
IEEE Trans. Comput. Social Systems, 2015

A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid.
IEEE Trans. Cloud Computing, 2015

ANGEL: Agent-Based Scheduling for Real-Time Tasks in Virtualized Clouds.
IEEE Trans. Computers, 2015

A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks.
IEEE Trans. Computers, 2015

Verifiable Auditing for Outsourced Database in Cloud Computing.
IEEE Trans. Computers, 2015

FESTAL: Fault-Tolerant Elastic Scheduling Algorithm for Real-Time Tasks in Virtualized Clouds.
IEEE Trans. Computers, 2015

Secure Distributed Deduplication Systems with Improved Reliability.
IEEE Trans. Computers, 2015

Cost-Effective Authentic and Anonymous Data Sharing with Forward Security.
IEEE Trans. Computers, 2015

A Stochastic Time-Domain Model for Burst Data Aggregation in IEEE 802.15.4 Wireless Sensor Networks.
IEEE Trans. Computers, 2015

A Lightweight Virtualization Solution for Android Devices.
IEEE Trans. Computers, 2015

A privacy-preserving location tracking system for smartphones based on cloud storage.
Security and Communication Networks, 2015

Detecting stepping stones by abnormal causality probability.
Security and Communication Networks, 2015

Dynamic cloud service selection using an adaptive learning mechanism in multi-cloud computing.
Journal of Systems and Software, 2015

A strong provably secure IBE scheme without bilinear map.
J. Comput. Syst. Sci., 2015

Obtain confidentiality or/and authenticity in Big Data by ID-based generalized signcryption.
Inf. Sci., 2015

Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks 2014.
IJDSN, 2015

A Framework for Cloud-Based Healthcare Services to Monitor Noncommunicable Diseases Patient.
IJDSN, 2015

Certificate-Based Encryption Resilient to Key Leakage.
IACR Cryptology ePrint Archive, 2015

Cloud Computing: Security, Privacy and Practice.
Future Generation Comp. Syst., 2015

Target coverage through distributed clustering in directional sensor networks.
EURASIP J. Wireless Comm. and Networking, 2015

Fog Computing: Focusing on Mobile Users at the Edge.
CoRR, 2015

Availability, resilience, and fault tolerance of internet and distributed computing systems.
Concurrency and Computation: Practice and Experience, 2015

Frontier technologies of trust computing and network security.
Concurrency and Computation: Practice and Experience, 2015

AMC: an adaptive multi-level cache algorithm in hybrid storage systems.
Concurrency and Computation: Practice and Experience, 2015

Anonymous Credential-Based Access Control Scheme for Clouds.
IEEE Cloud Computing, 2015

Identifying Diffusion Sources in Large Networks: A Community Structure Based Approach.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Enhanced Twitter Sentiment Analysis by Using Feature Selection and Combination.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015

The Relation Between Local and Global Influence of Individuals in Scale-Free Networks.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015

A Secure and Efficient Data Sharing Framework with Delegated Capabilities in Hybrid Cloud.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015

Unknown pattern extraction for statistical network protocol identification.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

Asymmetric self-learning for tackling Twitter Spam Drift.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

6 million spam tweets: A large ground truth for timely Twitter spam detection.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
To Shut Them Up or to Clarify: Restraining the Spread of Rumors in Online Social Networks.
IEEE Trans. Parallel Distrib. Syst., 2014

Internet Traffic Classification Using Constrained Clustering.
IEEE Trans. Parallel Distrib. Syst., 2014

Securely Outsourcing Attribute-Based Encryption with Checkability.
IEEE Trans. Parallel Distrib. Syst., 2014

Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems.
IEEE Trans. Parallel Distrib. Syst., 2014

Chameleon Hashing for Secure and Privacy-Preserving Vehicular Communications.
IEEE Trans. Parallel Distrib. Syst., 2014

Secure Outsourced Attribute-Based Signatures.
IEEE Trans. Parallel Distrib. Syst., 2014

Guest Editors' Introduction: Special Issue on Trust, Security, and Privacy in Parallel and Distributed Systems.
IEEE Trans. Parallel Distrib. Syst., 2014

Modeling and Analysis on the Propagation Dynamics of Modern Email Malware.
IEEE Trans. Dependable Sec. Comput., 2014

Control Flow-Based Malware VariantDetection.
IEEE Trans. Dependable Sec. Comput., 2014

Are the popular users always important for information dissemination in online social networks?
IEEE Network, 2014

Editorial: Special Issue on Theory and Applications in Parallel and Distributed Computing Systems.
J. Comput. Syst. Sci., 2014

Internet traffic clustering with side information.
J. Comput. Syst. Sci., 2014

Detection and defense of application-layer DDoS attacks in backbone web traffic.
Future Generation Comp. Syst., 2014

Cryptography in Cloud Computing.
Future Generation Comp. Syst., 2014

Modeling the Propagation of Worms in Networks: A Survey.
IEEE Communications Surveys and Tutorials, 2014

An analytical model for optimal spectrum leasing under constraints of quality of service in CRNs.
Computer Networks, 2014

Enabling Cloud Computing in Emergency Management Systems.
IEEE Cloud Computing, 2014

Detecting replicated nodes in Wireless Sensor Networks using random walks and network division.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

FEACS: A Flexible and Efficient Access Control Scheme for Cloud Computing.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning.
Proceedings of the 13th IEEE International Conference on Trust, 2014

On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classification.
Proceedings of the Network and System Security - 8th International Conference, 2014

Spam Trapping System: Novel security framework to fight against spam botnets.
Proceedings of the 21st International Conference on Telecommunications, 2014

Security from the transparent computing aspect.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

Robustness enhancement of quantization based audio watermarking method using adaptive safe-band.
Proceedings of the IEEE International Conference on Communications, 2014

A Cross-Layer Key Establishment Scheme in Wireless Mesh Networks.
Proceedings of the Computer Security - ESORICS 2014, 2014

Detecting clones in wireless sensor networks using Single Stage Memory Random Walk with Network Division.
Proceedings of the 2014 IEEE Asia Pacific Conference on Circuits and Systems, 2014

2013
Network Traffic Classification Using Correlation Information.
IEEE Trans. Parallel Distrib. Syst., 2013

Resisting Web Proxy-Based HTTP Attacks by Temporal and Spatial Locality Behavior.
IEEE Trans. Parallel Distrib. Syst., 2013

Modeling Oscillation Behavior of Network Traffic by Nested Hidden Markov Model with Variable State-Duration.
IEEE Trans. Parallel Distrib. Syst., 2013

Modeling Propagation Dynamics of Social Network Worms.
IEEE Trans. Parallel Distrib. Syst., 2013

An Effective Network Traffic Classification Method with Unknown Flow Detection.
IEEE Trans. Network and Service Management, 2013

Novel Z-Domain Precoding Method for Blind Separation of Spatially Correlated Signals.
IEEE Trans. Neural Netw. Learning Syst., 2013

Evolution of cooperation in reputation system by group-based scheme.
The Journal of Supercomputing, 2013

Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions.
IEEE Trans. Information Forensics and Security, 2013

A Matrix-Based Pairwise Key Establishment Scheme for Wireless Mesh Networks Using Pre Deployment Knowledge.
IEEE Trans. Emerging Topics Comput., 2013

Malwise - An Effective and Efficient Classification System for Packed and Polymorphic Malware.
IEEE Trans. Computers, 2013

Unsupervised traffic classification using flow statistical properties and IP packet payload.
J. Comput. Syst. Sci., 2013

How to achieve non-repudiation of origin with privacy protection in cloud computing.
J. Comput. Syst. Sci., 2013

Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks.
IJDSN, 2013

Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey.
IJDSN, 2013

Robust image retrieval with hidden classes.
Computer Vision and Image Understanding, 2013

Advances in parallel, distributed, embedded, and ubiquitous systems.
Concurrency and Computation: Practice and Experience, 2013

A clustering based coscheduling strategy for efficient scientific workflow execution in cloud computing.
Concurrency and Computation: Practice and Experience, 2013

Mobile Phone Sensing Systems: A Survey.
IEEE Communications Surveys and Tutorials, 2013

A Markov model of safety message broadcasting for vehicular networks.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

An Effective Deferentially Private Data Releasing Algorithm for Decision Tree.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Clonewise - Detecting Package-Level Clones Using Machine Learning.
Proceedings of the Security and Privacy in Communication Networks, 2013

Modeling and Analysis for Thwarting Worm Propagation in Email Networks.
Proceedings of the Network and System Security - 7th International Conference, 2013

Fault-Tolerant Topology Control Based on Artificial Immune Theory in WMNs.
Proceedings of the Network and System Security - 7th International Conference, 2013

Towards Designing Privacy-Preserving Signature-Based IDS as a Service: A Study and Practice.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Matrix-based pairwise key establishment in wireless mesh networks using deployment knowledge.
Proceedings of IEEE International Conference on Communications, 2013

Network traffic clustering using Random Forest proximities.
Proceedings of IEEE International Conference on Communications, 2013

Zero-Day Traffic Identification.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

Detecting Stepping Stones by Abnormal Causality Probability.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

Traffic Identification in Semi-known Network Environment.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

Robust network traffic identification with unknown applications.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Special issue on security in ubiquitous computing.
Security and Communication Networks, 2012

Generating regular expression signatures for network traffic classification in trusted network management.
J. Network and Computer Applications, 2012

Semi-supervised and compound classification of network traffic.
IJSN, 2012

Locating Defense Positions for Thwarting the Propagation of Topological Worms.
IEEE Communications Letters, 2012

Advances in network and system security.
Concurrency and Computation: Practice and Experience, 2012

CAFS: a novel lightweight cache-based scheme for large-scale intrusion alert fusion.
Concurrency and Computation: Practice and Experience, 2012

A QoS-based fine-grained reputation system in the grid environment.
Concurrency and Computation: Practice and Experience, 2012

Advances in Network and System Security: Editorial Statement.
Comput. J., 2012

An Analytical Model on the Propagation of Modern Email Worms.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Classification of Correlated Internet Traffic Flows.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Wire - A Formal Intermediate Language for Binary Analysis.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Internet traffic clustering with constraints.
Proceedings of the 8th International Wireless Communications and Mobile Computing Conference, 2012

Semi-supervised and Compound Classification of Network Traffic.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

Software Similarity and Classification.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4471-2908-0, 2012

2011
A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems.
IEEE Trans. Parallel Distrib. Syst., 2011

Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics.
IEEE Trans. Information Forensics and Security, 2011

Optimistic Fair Exchange with Strong Resolution-Ambiguity.
IEEE Journal on Selected Areas in Communications, 2011

Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks.
J. Network and Computer Applications, 2011

Secure localization with attack detection in wireless sensor networks.
Int. J. Inf. Sec., 2011

Eliminating Errors in Worm Propagation Models.
IEEE Communications Letters, 2011

Special Section: Trusted computing.
Future Generation Comp. Syst., 2011

A Graphical Password Based System for Small Mobile Devices
CoRR, 2011

A secure and efficient data aggregation scheme for wireless sensor networks.
Concurrency and Computation: Practice and Experience, 2011

Special Issue: Securing Distributed Networks and Systems.
Concurrency and Computation: Practice and Experience, 2011

Editorial: Advances in network and system security.
Computers & Security, 2011

Special issue: Building secure parallel and distributed networks and systems.
Computer Communications, 2011

Secure Image Retrieval Based on Visual Content and Watermarking Protocol.
Comput. J., 2011

The Microcosmic Model of Worm Propagation.
Comput. J., 2011

Defending against Large-Scale and Coordinated Attacks in the Ubiquitous Environments.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Malware Variant Detection Using Similarity Search over Sets of Control Flow Graphs.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Trust Ticket Deployment: A Notion of a Data Owner's Trust in Cloud Computing.
Proceedings of the IEEE 10th International Conference on Trust, 2011

A novel semi-supervised approach for network traffic clustering.
Proceedings of the 5th International Conference on Network and System Security, 2011

Modeling worms propagation on probability.
Proceedings of the 5th International Conference on Network and System Security, 2011

The Probability Model of Peer-to-Peer Botnet Propagation.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011

A Hybrid Graphical Password Based System.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011

Polymorphic Malware Detection Using Hierarchical Hidden Markov Model.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

Internet Traffic Classification Using Machine Learning: A Token-based Approach.
Proceedings of the 14th IEEE International Conference on Computational Science and Engineering, 2011

2010
Defending against the propagation of active worms.
The Journal of Supercomputing, 2010

Security in next generation wireless networks.
Security and Communication Networks, 2010

Modeling the propagation of Peer-to-Peer worms.
Future Generation Comp. Syst., 2010

A microscopic competition model and its dynamics analysis on network attacks.
Concurrency and Computation: Practice and Experience, 2010

An automatic application signature construction system for unknown traffic.
Concurrency and Computation: Practice and Experience, 2010

Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting.
Proceedings of the Public Key Cryptography, 2010

Modeling the propagation of Peer-to-Peer worms under quarantine.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium, 2010

Fault tolerant scheduling with dynamic number of replicas in heterogeneous system.
Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, 2010

A Lightweight Intrusion Alert Fusion System.
Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, 2010

Above the Trust and Security in Cloud Computing: A Notion Towards Innovation.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Automatic Application Signature Construction from Unknown Traffic.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

Propagation Modeling of Peer-to-Peer Worms.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

A Fast Flowgraph Based Classification System for Packed and Polymorphic Malware on the Endhost.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of Attacks.
IEEE Trans. Parallel Distrib. Syst., 2009

Managing email overload with an automatic nonparametric clustering system.
The Journal of Supercomputing, 2009

Network and system security.
J. Network and Computer Applications, 2009

An innovative analyser for multi-classifier e-mail classification based on grey list analysis.
J. Network and Computer Applications, 2009

Large-scale network intrusion detection based on distributed learning algorithm.
Int. J. Inf. Sec., 2009

Propagation of active worms: A survey.
Comput. Syst. Sci. Eng., 2009

Special Issue: Multi-core Supported Network and System Security.
Concurrency and Computation: Practice and Experience, 2009

Spam filtering for network traffic security on a multi-core environment.
Concurrency and Computation: Practice and Experience, 2009

Defending Grid Web Services from XDoS Attacks by SOTA.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

Modeling the Propagation Process of Topology-Aware Worms: An Innovative Logic Matrix Formulation.
Proceedings of the NPC 2009, 2009

Argus: A Light-Weighted Secure Localization Scheme for Sensor Networks.
Proceedings of the Autonomic and Trusted Computing, 6th International Conference, 2009

2008
Special Issue: Network Attacks and Defense Systems.
Comput. Syst. Sci. Eng., 2008

A cross-authentication model and implementation.
Comput. Syst. Sci. Eng., 2008

Checkpointing schemes for Grid workflow systems.
Concurrency and Computation: Practice and Experience, 2008

Detecting and Tracing DDoS Attacks by Intelligent Decision Prototype.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

Multi-Core Defense System (MSDS) for Protecting Computer Infrastructure against DDoS Attacks.
Proceedings of the Ninth International Conference on Parallel and Distributed Computing, 2008

A Multi-core Supported Intrusion Detection System.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

Accelerating the Propagation of Active Worms by Employing Multiple Target Discovery Techniques.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2008

Using Multi-core to Support Security-Related Applications.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2008

Using Multi-Core Processors to Support Network Security Applications.
Proceedings of the 12th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2008

Defending against the Propagation of Active Worms.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

Protecting web services with Service Oriented Traceback Architecture.
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008

2007
Defending against Distributed Denial of Service.
Proceedings of the Encyclopedia of Information Ethics and Security, 2007

Pervasive computing at tableside: a wireless web-based ordering system.
Int. J. Pervasive Computing and Communications, 2007

Managing Email Overload with an Automatic Nonparametric Clustering Approach.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2007

Spam Classification Using Adaptive Boosting Algorithm.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

2006
Protecting web applications from DDoS attacks by an active distributed defense system.
IJWIS, 2006

Protecting information infrastructure from DDoS attacks by MADF.
IJHPCN, 2006

Performance Optimization of Checkpointing Schemes with Task Duplication.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Optimizing Adaptive Checkpointing Schemes for Grid Workflow Systems.
Proceedings of the Grid and Cooperative Computing Workshops, 2006

Simulation and Analysis of DDoS in Active Defense Environment.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2005
Intelligent DDoS Packet Filtering in High-Speed Networks.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

A Defense System against DDoS Attacks by Large-Scale IP Traceback.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

Distributed Defense Against Distributed Denial-of-Service Attacks.
Proceedings of the Distributed and Parallel Computing, 2005

Mark-aided distributed filtering by using neural network for DDoS defense.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

Safeguard Information Infrastructure Against DDoS Attacks: Experiments and Modeling.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

2004
Combating DDoS Attacks in Web-based Services.
Proceedings of the iiWAS'2004, 2004

An Active Distributed Defense System to Protect Web Applications from DDOS Attacks.
Proceedings of the iiWAS'2004, 2004

Toward Pervasive Computing in Restaurant.
Proceedings of the ICETE 2004, 2004

Protect Grids from DDoS Attacks.
Proceedings of the Grid and Cooperative Computing, 2004

Towards Extended Machine Translation Model for Next Generation World Wide Web.
Proceedings of the Grid and Cooperative Computing, 2004

2003
GHIRS: Integration of Hotel Management Systems by Web Services.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003


  Loading...