Yu Yao

Orcid: 0000-0001-5458-541X

Affiliations:
  • Northeastern University, School of Computer Science and Engineering, Shenyang, China
  • Northeastern University, Shenyang, China (PhD 2005)


According to our database1, Yu Yao authored at least 32 papers between 2004 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Precise Defense Approach Against Small-Scale Backdoor Attacks in Industrial Internet of Things.
IEEE Internet Things J., March, 2025

Collecting Industrial Control System Device Data on the Internet: A Dataset for Domain Benchmark.
Dataset, March, 2025

Patty: Pattern Series-Based Semantics Analysis for Agnostic Industrial Control Protocols.
IEEE Trans. Inf. Forensics Secur., 2025

A Real-Time Anomaly Detection Method for Industrial Control Systems Based on Long-Short Period Deterministic Finite Automaton.
IEEE Internet Things J., 2025

IPv6 active address detection model based on diffusion model.
Comput. Networks, 2025

2024
An industrial network intrusion detection algorithm based on IGWO-GRU.
Clust. Comput., September, 2024

ALOC: Attack-Aware by Utilizing the Adversarially Learned One-Class Classifier for SCADA System.
IEEE Internet Things J., July, 2024

Networked Industrial Control Device Asset Identification Method Based on Improved Decision Tree.
J. Netw. Syst. Manag., April, 2024

CFL-IDS: An Effective Clustered Federated Learning Framework for Industrial Internet of Things Intrusion Detection.
IEEE Internet Things J., March, 2024

Scanner-Hunter: An Effective ICS Scanning Group Identification System.
IEEE Trans. Inf. Forensics Secur., 2024

A feature selection based on genetic algorithm for intrusion detection of industrial control systems.
Comput. Secur., 2024

2023
NeuPot: A Neural Network-Based Honeypot for Detecting Cyber Threats in Industrial Control Systems.
IEEE Trans. Ind. Informatics, October, 2023

Unknown Attack Traffic Classification in SCADA Network Using Heuristic Clustering Technique.
IEEE Trans. Netw. Serv. Manag., September, 2023

A Malware Propagation Model with Dual Delay in the Industrial Control Network.
Complex., 2023

2021
Study on the intelligent honeynet model for containing the spread of industrial viruses.
Comput. Secur., 2021

A cyber-physical model for SCADA system and its intrusion detection.
Comput. Networks, 2021

2020
Interplay Between Malware Epidemics and Honeynet Potency in Industrial Control System Network.
IEEE Access, 2020

Honeyeye: A Network Traffic Collection Framework for Distributed ICS Honeynets.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

2019
Community-based Malware Immunization Strategy.
Proceedings of the 6th International Conference on Systems and Informatics, 2019

2018
An Epidemic Model of Computer Worms with Time Delay and Variable Infection Rate.
Secur. Commun. Networks, 2018

2017
Modeling and Hopf Bifurcation Analysis of Benign Worms with Quarantine Strategy.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2016
Influence of removable devices on worm propagation under pulse quarantine strategy.
Intell. Autom. Soft Comput., 2016

2014
Modelling, analysis and containment of passive worms in P2P networks.
Int. J. Internet Protoc. Technol., 2014

2013
Hopf bifurcation in an Internet worm propagation model with time delay in quarantine.
Math. Comput. Model., 2013

Modeling and Analysis of Bifurcation in a Delayed Worm Propagation Model.
J. Appl. Math., 2013

2012
Pulse quarantine strategy of internet worm propagation: Modeling and analysis.
Comput. Electr. Eng., 2012

2011
Stability Analysis of P2P Worm Propagation Model with Dynamic Quarantine Defense.
J. Networks, 2011

2009
A Signature-Behavior-Based P2P Worm Detection Approach.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

2008
Behavior-Based Worm Detection and Signature Generation.
Proceedings of the International Multisymposiums on Computer and Computational Sciences, 2008

A WAW Model of P2P-based Anti-worm.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

2006
Anomaly Intrusion Detection Approach Using Hybrid MLP/CNN Neural Network.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006

2004
Hybrid BP/CNN neural network for intrusion detection.
Proceedings of the 3rd International Conference on Information Security, 2004


  Loading...