Yaping Chi

Orcid: 0009-0007-8548-0398

According to our database1, Yaping Chi authored at least 18 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
APT Attack Detection Scheme Based on CK Sketch and DNS Traffic.
Sensors, February, 2023

Block Cipher Identification Scheme Based on Hamming Weight Distribution.
IEEE Access, 2023

2022
A Robust and Anonymous Three-Factor Authentication Scheme Based ECC for Smart Home Environments.
Symmetry, November, 2022

Deep Learning-Based Multi-Classification for Malware Detection in IoT.
J. Circuits Syst. Comput., 2022

Anomalous Network Traffic Detection Based on CK Sketch and Machine Learning.
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022

2020
Review of Android Malware Detection Based on Deep Learning.
IEEE Access, 2020

Multi-classification of Android Applications Based on Convolutional Neural Networks.
Proceedings of the CSAE 2020: The 4th International Conference on Computer Science and Application Engineering, 2020

2019
DGA and DNS Covert Channel Detection System based on Machine Learning.
Proceedings of the 3rd International Conference on Computer Science and Application Engineering, 2019

Android Malware Detection Based on Convolutional Neural Networks.
Proceedings of the 3rd International Conference on Computer Science and Application Engineering, 2019

Honeynet Construction Based on Intrusion Detection.
Proceedings of the 3rd International Conference on Computer Science and Application Engineering, 2019

2018
Deep Learning Based Detection Method for SDN Malicious Applications.
Proceedings of the Communications, Signal Processing, and Systems, 2018

An Analysis of a New Detection Method for Spear Phishing Attack.
Proceedings of the Communications, Signal Processing, and Systems, 2018

Design and Implementation of OpenStack Cloud Platform Identity Management Scheme.
Proceedings of the 2018 International Conference on Computer, 2018

Medical Devices are at Risk: Information Security on Diagnostic Imaging System.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2015
基于CPK的虚拟桌面系统认证方法研究 (Research on Virtual Desktop System Authentication Method Based on CPK).
计算机科学, 2015

2013
Integrating Electrical Analogy and Computer Modeling of Groundwater Flow for Teaching Flownet Concepts.
Int. J. Eng. Pedagog., 2013

2009
An Improved Bytecode Verification Algorithm on Java Card.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

2007
An Feasible Key Management Scheme in Ad Hoc Network.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007


  Loading...