Yingjun Zhang

According to our database1, Yingjun Zhang authored at least 48 papers between 2000 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
High-order Intuitionistic Fuzzy Cognitive Map Based on Evidential Reasoning Theory.
IEEE Trans. Fuzzy Systems, 2019

2018
Leveraging Information Asymmetry to Transform Android Apps into Self-Defending Code Against Repackaging Attacks.
IEEE Trans. Mob. Comput., 2018

Extended evidential cognitive maps and its applications.
J. Franklin Institute, 2018

Evaluation of AMSR2 and Modis Land Surface Temperature Using Ground Measurements in Heihe River Basin.
Proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018

2017
An Efficient Trustzone-Based In-application Isolation Schema for Mobile Authenticators.
Proceedings of the Security and Privacy in Communication Networks, 2017

TICS: Trusted Industry Control System Based on Hardware Security Module.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2016
Dynamically Discovering Likely Memory Layout to Perform Accurate Fuzzing.
IEEE Trans. Reliability, 2016

Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Automated Security Proof of Cryptographic Support Commands in TPM 2.0.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

A Lattice-Based Access Control Model for Social Networks.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2016

2015
TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems.
IACR Cryptology ePrint Archive, 2015

TrustTokenF: A Generic Security Framework for Mobile Two-Factor Authentication Using TrustZone.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Ship behavior recognition based on infrared video analysis in a maritime environment.
Proceedings of the 14th International Conference on ITS Telecommunications, 2015

TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

Intuitionistic Fuzzy Sets with Shannon Relative Entropy.
Proceedings of the BIOSIGNALS 2015, 2015

2014
AppMark: A Picture-Based Watermark for Android Apps.
Proceedings of the Eighth International Conference on Software Security and Reliability, 2014

Timing-Based Clone Detection on Android Markets.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Achieving accuracy and scalability simultaneously in detecting application clones on Android markets.
Proceedings of the 36th International Conference on Software Engineering, 2014

2013
Location Algorithm for Nodes of Ship-Borne Wireless Sensor Networks.
IJDSN, 2013

Vulnerability-Based Backdoors: Threats from Two-step Trojans.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

VulLocator: Automatically Locating Vulnerable Code in Binary Programs.
Proceedings of the Information Security Practice and Experience, 2013

Optimal Defense Strategies for DDoS Defender Using Bayesian Game Model.
Proceedings of the Information Security Practice and Experience, 2013

A marine oil-spilling emergency auxiliary decision-making system based on case-based reasoning.
Proceedings of the Ninth International Conference on Natural Computation, 2013

Hesitant fuzzy linguistic multiple attribute decision making.
Proceedings of the 16th International Conference on Information Fusion, 2013

2012
Black-box testing based on colorful taint analysis.
SCIENCE CHINA Information Sciences, 2012

Ranking alternatives expressed with interval-valued intuitionistic fuzzy set.
Proceedings of the 15th International Conference on Information Fusion, 2012

2011
A Map-Layer-Based Access Control Model.
Proceedings of the Information Security Applications - 12th International Workshop, 2011

The Research of Soft Component Library Based on Cloud Computing.
Proceedings of the First International Conference on Robot, Vision and Signal Processing, 2011

A Computation Method of Concept Semantic Similarity in Heterogeneous Ontologies.
Proceedings of the First International Conference on Robot, Vision and Signal Processing, 2011

AutoDunt: Dynamic Latent Dependence Analysis for Detection of Zero Day Vulnerability.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

Entropy on interval-valued intuitionistic fuzzy sets and its application in multi-attribute decision making.
Proceedings of the 14th International Conference on Information Fusion, 2011

Multiple attribute decision making method in the frame of interval-valued intuitionistic fuzzy sets.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011

2010
Service Interactions in CSCE Service Composition Environment.
Proceedings of the Sixth International Conference on Semantics Knowledge and Grid, 2010

Automatically Generating Patch in Binary Programs Using Attribute-Based Taint Analysis.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

A Component Clustering Algorithm Based on Semantic Similarity and Optimization.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2010

PDA Based Electronic Chart Pilotage System.
Proceedings of the 2010 Asia-Pacific Conference on Wearable Computing Systems, 2010

An Approach to Match Semantic Web Services Based on Multidimension.
Proceedings of the 5th IEEE Asia-Pacific Services Computing Conference, 2010

2008
A Prediction Algorithm Based on Time Series Analysis.
Proceedings of the Advances in Neural Networks, 2008

Research on Spatial Clustering Acetabuliform Model and Algorithm Based on Mathematical Morphology.
Proceedings of the Advances in Neural Networks, 2008

A Rough Set-Based Heuristic Algorithm for Attribute Reduction.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

An Efficient Attribute Reduction in Decision Information Systems.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
SEPCOM: customizable zero copy model.
Proceedings of the 2nd International Conference on Performance Evaluation Methodolgies and Tools, 2007

Web Marine Spatial Information Service Based on Electronic Nautical Charts.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Web System for Electronic Nautical Charts Service Based On ArcIMS.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

Research on the Algorithm for K-Shortest Paths Problem based on A* in Complicated Network.
Proceedings of the Six IEEE International Conference on Cognitive Informatics, 2007

2006
CCM: A Cooperative Computation Model of Services.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

2003
General Test Result Checking with Log File Analysis.
IEEE Trans. Software Eng., 2003

2000
Broad-spectrum studies of log file analysis.
Proceedings of the 22nd International Conference on on Software Engineering, 2000


  Loading...