Yiqin Lu

Orcid: 0000-0002-5631-6413

According to our database1, Yiqin Lu authored at least 41 papers between 1999 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Edge propagation for link prediction in requirement-cyber threat intelligence knowledge graph.
Inf. Sci., January, 2024

2023
A management knowledge graph approach for critical infrastructure protection: Ontology design, information extraction and relation prediction.
Int. J. Crit. Infrastructure Prot., December, 2023

Enhancing transferability of adversarial examples with pixel-level scale variation.
Signal Process. Image Commun., October, 2023

Flow Ordering Problem for Time-Triggered Traffic in the Scheduling of Time-Sensitive Networking.
IEEE Commun. Lett., May, 2023

Boosting adversarial attacks with future momentum and future transformation.
Comput. Secur., April, 2023

Cybersecurity Named Entity Recognition Based on Word-level Enhancement and Multi-task Learning.
Proceedings of the 7th International Conference on Deep Learning Technologies, 2023

2022
Self-Learning Spatial Distribution-Based Intrusion Detection for Industrial Cyber-Physical Systems.
IEEE Trans. Comput. Soc. Syst., 2022

Source-Based Defense Against DDoS Attacks in SDN Based on sFlow and SOM.
IEEE Access, 2022

GazeDock: Gaze-Only Menu Selection in Virtual Reality using Auto-Triggering Peripheral Menu.
Proceedings of the IEEE Conference on Virtual Reality and 3D User Interfaces, 2022

Assessment of Security Index for SCADA Systems in Smart Grids.
Proceedings of the 22nd IEEE International Conference on Communication Technology, 2022

2021
An Optimal Seed Scheduling Strategy Algorithm Applied to Cyberspace Mimic Defense.
IEEE Access, 2021

Handover Scheme and Performance Analysis of Improved Chess Board Protocol for High-Speed Maglev Train-Ground Millimeter Wave Communication.
Proceedings of the 14th International Symposium on Computational Intelligence and Design, 2021

2020
Block-Split Array Coding Algorithm for Long-Stream Data Compression.
J. Sensors, 2020

Designing and Evaluating Hand-to-Hand Gestures with Dual Commodity Wrist-Worn Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020

A dynamic MLP-based DDoS attack detection method using feature selection and feedback.
Comput. Secur., 2020

SwiftIDS: Real-time intrusion detection system based on LightGBM and parallel intrusion detection mechanism.
Comput. Secur., 2020

MIN: Co-Governing Multi-Identifier Network Architecture and Its Prototype on Operator's Network.
IEEE Access, 2020

Real-Time Verification of Network Properties Based on Header Space.
IEEE Access, 2020

Investigating Bubble Mechanism for Ray-Casting to Improve 3D Target Acquisition in Virtual Reality.
Proceedings of the IEEE Conference on Virtual Reality and 3D User Interfaces, 2020

2019
Checking Intra-Switch Conflicts of Rules During Preprocessing of Network Verification in SDN.
IEEE Commun. Lett., 2019

MIN: Co-Governing Multi-Identifier Network Architecture and its Prototype on Operator's Network.
CoRR, 2019

The Prototype of Decentralized Multilateral Co-Governing Post-IP Internet Architecture and Its Testing on Operator Networks.
CoRR, 2019

Typing on Split Keyboards with Peripheral Vision.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
Fast Algorithm of Truncated Burrows-Wheeler Transform Coding for Data Compression of Sensors.
J. Sensors, 2018

Tap-to-Pair: Associating Wireless Devices with Synchronous Tapping.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

A Convolutional Encoder-Decoder Architecture for Retinal Blood Vessel Segmentation in Fundus Images.
Proceedings of the 5th International Conference on Systems and Informatics, 2018

2017
An SDN-Based Authentication Mechanism for Securing Neighbor Discovery Protocol in IPv6.
Secur. Commun. Networks, 2017

Parallel Algorithm for Wireless Data Compression and Encryption.
J. Sensors, 2017

A Hardware Architecture of Particle Swarm Optimization.
J. Comput., 2017

BlindType: Eyes-Free Text Entry on Handheld Touchpad by Leveraging Thumb's Muscle Memory.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017

2016
LDPC Decoding on GPU for Mobile Device.
Mob. Inf. Syst., 2016

Study of Wireless Authentication Center with Mixed Encryption in WSN.
J. Sensors, 2016

An Easy Defense Mechanism Against Botnet-based DDoS Flooding Attack Originated in SDN Environment Using sFlow.
Proceedings of the 11th International Conference on Future Internet Technologies, 2016

2014
The integrated optimization of container terminal scheduling with uncertain factors.
Comput. Ind. Eng., 2014

2012
Guest Editors' Introduction: Special Section on ISIP 2011.
J. Multim., 2012

2011
Guest Editorial.
J. Networks, 2011

2010
Detecting Intention-Violation Feature Interaction in NGN Based on Feature Re-presentation.
J. Networks, 2010

Guest Editorial.
J. Comput., 2010

2001
A use case driven approach to synthesis and analysis of flexible manufacturing systems.
Proceedings of the IEEE International Conference on Systems, 2001

Managing Feature Interactions in Telecommunications Systems by Temporal Colored Petri Nets.
Proceedings of the 7th International Conference on Engineering of Complex Computer Systems (ICECCS 2001), 2001

1999
Five Classes of Invariant-Preserving Transformations on Colored Petri Nets.
Proceedings of the Application and Theory of Petri Nets 1999, 1999


  Loading...