Yubo Song

Orcid: 0000-0002-1347-6126

According to our database1, Yubo Song authored at least 35 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Neuromorphic Event-Driven Semantic Communication in Microgrids.
CoRR, 2024

2023
A Survey of Blockchain-Based Schemes for Data Sharing and Exchange.
IEEE Trans. Big Data, December, 2023

Conditional Droop Adjustment for Reliability-Oriented Power Sharing in Microgrids.
IEEE Trans. Circuits Syst. II Express Briefs, July, 2023

MODGF: Multi-Objective Optimization Approach for Directed Greybox Fuzzing.
Proceedings of the IEEE International Conference on High Performance Computing & Communications, 2023

A Novel Fuzzy Identity-Based Encryption with Wireless PUF for IoT Device Authentication.
Proceedings of the IEEE International Conference on High Performance Computing & Communications, 2023

2022
Griffin: Real-Time Network Intrusion Detection System via Ensemble of Autoencoder in SDN.
IEEE Trans. Netw. Serv. Manag., 2022

Computer-Aided Recognition Based on Decision-Level Multimodal Fusion for Depression.
IEEE J. Biomed. Health Informatics, 2022

An Adaptive BSCO Algorithm of Solid Color Optimization for 3D Reconstruction System with PIFuHD.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Smart Grid Data Aggregation Scheme Based on Local Differential Privacy.
Proceedings of the IEEE International Conference on Trust, 2022

VecSeeds: Generate fuzzing testcases from latent vectors based on VAE-GAN.
Proceedings of the IEEE International Conference on Trust, 2022

: A Traceable and Privacy-Preserving Data Exchange Scheme based on Non-Fungible Token and Zero-Knowledge.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

VulMiningBGS: Detection of overflow vulnerabilities based on graph similarity.
Proceedings of the 18th International Conference on Computational Intelligence and Security, 2022

2021
Just Shake Them Together: Imitation-Resistant Secure Pairing of Smart Devices via Shaking.
Wirel. Commun. Mob. Comput., 2021

Permission Sensitivity-Based Malicious Application Detection for Android.
Secur. Commun. Networks, 2021

Leaking Arbitrarily Many Secrets: Any-out-of-Many Proofs and Applications to RingCT Protocols.
IACR Cryptol. ePrint Arch., 2021

Data desensitization mechanism of Android application based on differential privacy.
Proceedings of the 94th IEEE Vehicular Technology Conference, 2021

Detection of Virtual Machines Based on Thread Scheduling.
Proceedings of the Artificial Intelligence and Security - 7th International Conference, 2021

My Site Knows Where You Are: A Novel Browser Fingerprint to Track User Position.
Proceedings of the ICC 2021, 2021

You Can Hear But You Cannot Record: Privacy Protection by Jamming Audio Recording.
Proceedings of the ICC 2021, 2021

IoT-ID: Robust IoT Device Identification Based on Feature Drift Adaptation.
Proceedings of the IEEE Global Communications Conference, 2021

Authenticating Mobile Wireless Device Through Per-packet Channel State Information.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2021

2020
Detection and Mitigation of DoS Attacks in Software Defined Networks.
IEEE/ACM Trans. Netw., 2020

ClickGuard: Exposing Hidden Click Fraud via Mobile Sensor Side-channel Analysis.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Griffin: An Ensemble of AutoEncoders for Anomaly Traffic Detection in SDN.
Proceedings of the IEEE Global Communications Conference, 2020

2019
iShake: Imitation-Resistant Secure Pairing of Smart Devices via Shaking.
Proceedings of the 25th IEEE International Conference on Parallel and Distributed Systems, 2019

IoT device fingerprinting for relieving pressure in the access control.
Proceedings of the ACM Turing Celebration Conference - China, 2019

Abnormal traffic detection of IoT terminals based on Bloom filter.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2018
Route-Based Signal Preemption Control of Emergency Vehicle.
J. Control. Sci. Eng., 2018

I Know What You Type: Leaking User Privacy via Novel Frequency-Based Side-Channel Attacks.
Proceedings of the IEEE Global Communications Conference, 2018

2017
WebLogger: Stealing your personal PINs via mobile web application.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017

SCoP: Smartphone energy saving by merging push services in Fog computing.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

Novel attacks in OSPF networks to poison routing table.
Proceedings of the IEEE International Conference on Communications, 2017

2016
Secure and energy efficient prefetching design for smartphones.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2012
Fake BTS Attacks of GSM System on Software Radio Platform.
J. Networks, 2012

The equilibrium generalized assignment problem and genetic algorithm.
Appl. Math. Comput., 2012


  Loading...