Yunchuan Guo

According to our database1, Yunchuan Guo authored at least 61 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Dynamic threshold strategy optimization for security protection in Internet of Things: An adversarial deep learning-based game-theoretical approach.
Concurr. Comput. Pract. Exp., 2023

Efficient and Privacy-Preserving Byzantine-Robust Federated Learning.
Proceedings of the IEEE Global Communications Conference, 2023

2022
Detecting conflict of heterogeneous access control policies.
Digit. Commun. Networks, 2022

Truthfully Negotiating Usage Policy for Data Sovereignty.
Proceedings of the IEEE International Conference on Trust, 2022

Privacy-Preserving Robust Federated Learning with Distributed Differential Privacy.
Proceedings of the IEEE International Conference on Trust, 2022

Efficiently Constructing Topology of Dynamic Networks.
Proceedings of the IEEE International Conference on Trust, 2022

DICOF: A Distributed and Collaborative Framework for Hybrid DDoS Attack Detection.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

Insider Threat Detection Using Generative Adversarial Graph Attention Networks.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Provenance-based data flow control mechanism for Internet of things.
Trans. Emerg. Telecommun. Technol., 2021

Resolving Policy Conflicts for Cross-Domain Access Control: A Double Auction Approach.
Proceedings of the Computational Science - ICCS 2021, 2021

Efficiently Managing Large-Scale Keys in HDFS.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

2020
A Stackelberg Security Game for Adversarial Outbreak Detection in the Internet of Things.
Sensors, 2020

Securing instruction interaction for hierarchical management.
J. Parallel Distributed Comput., 2020

Incentive mechanism for cooperative authentication: An evolutionary game approach.
Inf. Sci., 2020

Hierarchically defining Internet of Things security: From CIA to CACA.
Int. J. Distributed Sens. Networks, 2020

A topic-centric access control model for the publish/subscribe paradigm.
Concurr. Comput. Pract. Exp., 2020

Dynamic countermeasures selection for multi-path attacks.
Comput. Secur., 2020

Real-Time Detection Method for Small Traffic Signs Based on Yolov3.
IEEE Access, 2020

Decision-Making for Intrusion Response: Which, Where, in What Order, and How Long?
Proceedings of the 2020 IEEE International Conference on Communications, 2020

The Linear Geometry Structure of Label Matrix for Multi-label Learning.
Proceedings of the Database and Expert Systems Applications, 2020

A Commodity Review Sentiment Analysis Based on BERT-CNN Model.
Proceedings of the 5th International Conference on Computer and Communication Systems, 2020

2019
Combination Model of Heterogeneous Data for Security Measurement.
J. Univers. Comput. Sci., 2019

A game theoretic approach to cooperative intrusion detection.
J. Comput. Sci., 2019

Cyberspace-Oriented Access Control: A Cyberspace Characteristics-Based Model and its Policies.
IEEE Internet Things J., 2019

An Attribute-Based Assured Deletion Scheme in Cloud Computing.
Int. J. Inf. Technol. Web Eng., 2019

Incentive Mechanism for Cooperative Intrusion Response: A Dynamic Game Approach.
Proceedings of the Computational Science - ICCS 2019, 2019

Construction of Situation Assessment Indicator System Based on Latitude and Longitude Lines of Information Security.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

2018
A game-theoretic approach to advertisement dissemination in ephemeral networks.
World Wide Web, 2018

Security Measurement for Unknown Threats Based on Attack Preferences.
Secur. Commun. Networks, 2018

HAC: Hybrid Access Control for Online Social Networks.
Secur. Commun. Networks, 2018

Resolving Access Conflicts: An Auction-Based Incentive Approach.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Process Calculus for Modeling and Quantifying Location Privacy.
Proceedings of the 2018 International Conference on Identification, 2018

Selecting Combined Countermeasures for Multi-Attack Paths in Intrusion Response System.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Identifying the Propagation Sources of Stealth Worms.
Proceedings of the Computational Science - ICCS 2018, 2018

Incentive Mechanism for Cooperative Intrusion Detection: An Evolutionary Game Approach.
Proceedings of the Computational Science - ICCS 2018, 2018

Real-Time Data Incentives for IoT Searches.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

2017
A D-band divide-by-6 injection-locked frequency divider with Lange-coupler feedback architecture in 0.13 µm SiGe HBT.
IEICE Electron. Express, 2017

A true-time-delay transmit/receive module for X-band subarray phased arrays.
IEICE Electron. Express, 2017

Research on Similarity Record Detection of Device Status Information Based on Multiple Encoding Field.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

A Novel Threat-Driven Data Collection Method for Resource-Constrained Networks.
Proceedings of the Network and System Security - 11th International Conference, 2017

Optimally Selecting the Timing of Zero-Day Attack via Spatial Evolutionary Game.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2017

Cyberspace-Oriented Access Control: Model and Policies.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

2016
A Fine-Grained Multiparty Access Control Model for Photo Sharing in OSNs.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

2015
Enhancing the Trajectory Privacy with Laplace Mechanism.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Assessing the Disclosure of User Profile in Mobile-Aware Services.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

Ad Dissemination Game in Ephemeral Networks.
Proceedings of the Web Technologies and Applications - 17th Asia-PacificWeb Conference, 2015

2014
Bargaining-Based Dynamic Decision for Cooperative Authentication in MANETs.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Analyzing asking/bidding price in dynamic game for cooperative authentication.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

Utility-based cooperative decision in cooperative authentication.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Automatically verifying STRAC policy.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

EAC: A Framework of Authentication Property for the IOTs.
Proceedings of the 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2014

A Survey of Role Mining Methods in Role-Based Access Control System.
Proceedings of the Web Technologies and Applications, 2014

2013
A Framework of Evaluation Location Privacy in Mobile Network.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

Balancing authentication and location privacy in cooperative authentication.
Proceedings of the Symposium on Architecture for Networking and Communications Systems, 2013

2012
A Cluster-Based Multilevel Security Model for Wireless Sensor Networks.
Proceedings of the Intelligent Information Processing VI, 2012

Cyber Attacks Prediction Model Based on Bayesian Network.
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012

2010
Formalization and Quantitative Analysis of Controllability on Internet Information Security.
Int. J. Web Appl., 2010

Information content security on the Internet: the control model and its evaluation.
Sci. China Inf. Sci., 2010

Quantifying Information Leakage for Fully Probabilistic Systems.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Simulation Analysis of Probabilistic Timing Covert Channels.
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009

Research on Quantitative Evaluation for Integrity.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009


  Loading...