Yong Wang

Orcid: 0000-0002-1962-4847

Affiliations:
  • Dakota State University, Beacom College of Computer and Cyber Sciences, Madison, SD, USA


According to our database1, Yong Wang authored at least 42 papers between 2012 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
From LLMs to Randomness: Analyzing Program Input Efficacy With Resource and Language Metrics.
IEEE Access, 2025

Assessing Evasion Attacks on Tree-Based Machine Learning Models: Supervised vs. Unsupervised Approaches.
Proceedings of the IEEE International Conference on Consumer Electronics, 2025

Evasion Attacks on Tree-Based Machine Learning Models.
Proceedings of the IEEE International Conference on Consumer Electronics, 2025

Access Control Policy Generation for IoT Using Deep Generative Models.
Proceedings of the 22nd IEEE Consumer Communications & Networking Conference, 2025

Extracting Information from Hypersphere-Based Machine Learning Models.
Proceedings of the 22nd IEEE Consumer Communications & Networking Conference, 2025

2024
Machine Learning Security: Threat Model, Attacks, and Challenges.
Computer, October, 2024

Quantum Adversarial Machine Learning and Defense Strategies: Challenges and Opportunities.
CoRR, 2024

Survey on Unified Threat Management (UTM) Systems for Home Networks.
IEEE Commun. Surv. Tutorials, 2024

SUTMS: Designing a Unified Threat Management System for Home Networks.
IEEE Access, 2024

A Comprehensive Study of Supervised Machine Learning Assisted Approaches for IoT Device Identification.
Proceedings of the International Conference on Computing, Networking and Communications, 2024

Safeguarding Virtual Healthcare: A Novel Attacker-Centric Model for Data Security and Privacy.
Proceedings of the International Conference on Computer and Applications, 2024

Malware Dataset Availability & Inherent Bias Study.
Proceedings of the IEEE International Conference on Electro Information Technology, 2024

Revolutionizing IoT Security: Integrating Audio Data Transfer and Multi-Factor Authentication with Smartphones.
Proceedings of the IEEE International Conference on Electro Information Technology, 2024

Exploring LoRaWAN Class B and Class C Devices: Performance Analysis and Parameter Optimization Strategies.
Proceedings of the IEEE International Conference on Electro Information Technology, 2024

Community-Sourced Bluetooth Low Energy Device Fingerprinting Based on Link Layer Packets.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

2023
Access Control for IoT: A Survey of Existing Research, Dynamic Policies and Future Directions.
Sensors, February, 2023

IoT Device Identification Using Unsupervised Machine Learning.
Inf., 2023

2022
BYOD security issues: a systematic literature review.
Inf. Secur. J. A Glob. Perspect., 2022

IoT Device Identification Using Supervised Machine Learning.
Proceedings of the IEEE International Conference on Consumer Electronics, 2022

Identity Relationship Management for Internet of Things: A Case Study.
Proceedings of the IEEE International Conference on Consumer Electronics, 2022

2021
An Overview of Identity Relationship Management in the Internet of Things.
Proceedings of the IEEE International Conference on Consumer Electronics, 2021

Towards Trusted Data Processing for Information and Intelligence Systems.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

A Systematic Mapping Study of Access Control in the Internet of Things.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Towards Automated Policy Generation for Dynamic Access Control in the Internet of Things.
Proceedings of the 27th Americas Conference on Information Systems, 2021

2020
BYOD-Insure vs Existing Modalities for BYOD Security Assessment: A Comparison Study.
Proceedings of the 26th Americas Conference on Information Systems, 2020

2019
CARVE: A Scientific Method-Based Threat Hunting Hypothesis Development Model.
Proceedings of the 2019 IEEE International Conference on Electro Information Technology, 2019

What Social Media Can Tell Us About Opioid Addicts: Twitter Data Case Analysis.
Proceedings of the 25th Americas Conference on Information Systems, 2019

Employee Acceptance of Employer Control Over Personal Devices.
Proceedings of the 25th Americas Conference on Information Systems, 2019

2018
End-to-End Trust and Security for Internet of Things Applications.
Computer, 2018

An Optimized Running Window Entropy Algorithm.
Proceedings of the National Cyber Summit, 2018

Geographic Variations and The Utilization of Health Care Resources.
Proceedings of the 24th Americas Conference on Information Systems, 2018

2017
Impact of E-Visits on Emergency Departments and Urgent Care Centers.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

2016
Analysis of Healthcare Workflows in Accordance with Access Control Policies.
Int. J. Heal. Inf. Syst. Informatics, 2016

2015
Remote mobile screen (RMS): An approach for secure BYOD environments.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

Privacy impact assessment for online social networks.
Proceedings of the 2015 International Conference on Collaboration Technologies and Systems, 2015

Privacy threat modeling framework for online social networks.
Proceedings of the 2015 International Conference on Collaboration Technologies and Systems, 2015

2014
Social network privacy measurement and simulation.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

Hypervisor-based cloud intrusion detection system.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

MobileGuardian: A security policy enforcement framework for mobile devices.
Proceedings of the 2014 International Conference on Collaboration Technologies and Systems, 2014

Mobile malware security challeges and cloud-based detection.
Proceedings of the 2014 International Conference on Collaboration Technologies and Systems, 2014

Bring your own device security issues and challenges.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

2012
Smartphone Security Challenges.
Computer, 2012


  Loading...