Yingyuan Yang

Orcid: 0000-0003-2464-2123

According to our database1, Yingyuan Yang authored at least 16 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
BubbleMap: Privilege Mapping for Behavior-Based Implicit Authentication Systems.
IEEE Trans. Mob. Comput., August, 2023

A Sub-pixel Location Method of Circular PCB Markers Based on Partial Area Effect.
Proceedings of the IEEE International Conference on Real-time Computing and Robotics, 2023

Towards Adversarial-Resilient Deep Neural Networks for False Data Injection Attack Detection in Power Grids.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023

2022
EchoIA: A Cloud-Based Implicit Authentication Leveraging User Feedback.
Network, 2022

2021
Towards Predicting COVID-19 Trends: Feature Engineering on Social Media Responses.
Proceedings of the 18th International Conference on Information Systems for Crisis Response and Management, 2021

ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Exploiting Vulnerabilities of Deep Learning-based Energy Theft Detection in AMI through Adversarial Attacks.
CoRR, 2020

EchoIA: Implicit Authentication System Based on User Feedback.
CoRR, 2020

ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems.
CoRR, 2020

SearchFromFree: Adversarial Measurements for Machine Learning-based Energy Theft Detection.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Dynamic Multi-level Privilege Control in Behavior-based Implicit Authentication Systems Leveraging Mobile Devices.
Proceedings of the 17th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2020

2019
PersonaIA: A Lightweight Implicit Authentication System Based on Customized User Behavior Selection.
IEEE Trans. Dependable Secur. Comput., 2019

2018
Dynamic Multi-level Privilege Control in Behavior-based Implicit Authentication Systems Leveraging Mobile Devices.
CoRR, 2018

2017
Energy-efficient W-layer for behavior-based implicit authentication on mobile devices.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

2015
Retraining and Dynamic Privilege for Implicit Authentication Systems.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015

2013
An improved bound on acyclic chromatic index of planar graphs.
Discret. Math., 2013


  Loading...