Yuangang Yao

According to our database1, Yuangang Yao authored at least 16 papers between 2009 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
An Improved Fuzzy Test of Industrial Control System.
Proceedings of the 2018 10th International Conference on Computer and Automation Engineering, 2018

2017
Efficient data possession-checking protocol with deduplication in cloud.
Int. J. Distributed Sens. Networks, 2017

Dynamic data integrity auditing for secure outsourcing in the cloud.
Concurr. Comput. Pract. Exp., 2017

Security challenges and risk evaluation framework for industrial wireless sensor networks.
Proceedings of the 4th International Conference on Control, 2017

2016
A Novel Framework to Process the Quantity and Quality of User Behavior Data in Recommender Systems.
Proceedings of the Web-Age Information Management - 17th International Conference, 2016

A Framework for Big Data Security Analysis and the Semantic Technology.
Proceedings of the 6th International Conference on IT Convergence and Security, 2016

Detecting False Information of Social Network in Big Data.
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016

Efficiently secure multiparty computation based on homomorphic encryption.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

Phishing sites detection based on Url Correlation.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

An attack pattern mining algorithm based on fuzzy logic and sequence pattern.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

An Android malware detection method based on AndroidManifest file.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

2015
Research on Parallel Vulnerabilities Discovery Based on Open Source Database and Text Mining.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

ISEK: An Information Security Knowledge Graph for CISP Knowledge System.
Proceedings of the 5th International Conference on IT Convergence and Security, 2015

2014
A Semantic Knowledge Base Construction Method for Information Security.
Proceedings of the 13th IEEE International Conference on Trust, 2014

JTOWL: A JSON to OWL Converto.
Proceedings of the 5th International Workshop on Web-scale Knowledge Representation Retrieval & Reasoning, 2014

2009
Research on Ontology-Based Multi-source Engineering Information Retrieval in Integrated Environment of Enterprise.
Proceedings of the International Conference on Interoperability for Enterprise Software and Applications China, 2009


  Loading...