Yuyang Zhou

Orcid: 0000-0003-0001-2047

According to our database1, Yuyang Zhou authored at least 54 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Exploring unknown environments: motivated developmental learning for autonomous navigation of mobile robots.
Intell. Serv. Robotics, March, 2024

The Proximal Operator of the Piece-Wise Exponential Function.
IEEE Signal Process. Lett., 2024

2023
Decentralised fully probabilistic design for stochastic networks with multiplicative noise.
Int. J. Syst. Sci., June, 2023

Bifurcations and nonlinear dynamics of asymmetric tri-stable piezoelectric vibration energy harvesters.
Commun. Nonlinear Sci. Numer. Simul., May, 2023

An efficient message passing algorithm for decentrally controlling complex systems.
Int. J. Control, March, 2023

Tracking Control for Output Probability Density Function of Stochastic Systems Using FPD Method.
Entropy, February, 2023

Toward Early and Accurate Network Intrusion Detection Using Graph Embedding.
IEEE Trans. Inf. Forensics Secur., 2023

Searchable Public-Key Encryption With Cryptographic Reverse Firewalls for Cloud Storage.
IEEE Trans. Cloud Comput., 2023

MalPurifier: Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks.
CoRR, 2023

MoConVQ: Unified Physics-Based Motion Control via Scalable Discrete Representations.
CoRR, 2023

The Proximal Operator of the Piece-wise Exponential Function and Its Application in Compressed Sensing.
CoRR, 2023

Towards a Revolutionary Info-Geometric Control Theory with Potential Applications of Fokker Planck Kolmogorov(FPK) Equation to System Control, Modelling and Simulation.
Proceedings of the 28th International Conference on Automation and Computing, 2023

2022
Toward Proactive and Efficient DDoS Mitigation in IIoT Systems: A Moving Target Defense Approach.
IEEE Trans. Ind. Informatics, 2022

An immune algorithm for solving the optimization problem of locating the battery swapping stations.
Knowl. Based Syst., 2022

Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks.
Inf. Sci., 2022

Variance and Entropy Assignment for Continuous-Time Stochastic Nonlinear Systems.
Entropy, 2022

Length matters: Scalable fast encrypted internet traffic service classification based on multiple protocol data unit length sequence with composite deep learning.
Digit. Commun. Networks, 2022

A quantitative framework for network resilience evaluation using Dynamic Bayesian Network.
Comput. Commun., 2022

Higher Layers, Better Results: Application Layer Feature Engineering in Encrypted Traffic Classification.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

An Improved Equiangular Division Algorithm for SBR based Ray Tracing Channel Modeling.
Proceedings of the 96th Vehicular Technology Conference, 2022

A Fitness Landscape Analysis of the LeNet-5 Loss Function.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2022

CogKTR: A Knowledge-Enhanced Text Representation Toolkit for Natural Language Understanding.
Proceedings of the The 2022 Conference on Empirical Methods in Natural Language Processing, 2022

2021
Microgrid Group Control Method Based on Deep Learning under Cloud Edge Collaboration.
Wirel. Commun. Mob. Comput., 2021

An SDN-Enabled Proactive Defense Framework for DDoS Mitigation in IoT Networks.
IEEE Trans. Inf. Forensics Secur., 2021

Probabilistic message passing control for complex stochastic switching systems.
J. Frankl. Inst., 2021

Secure IoT edge: Threat situation awareness based on network traffic.
Comput. Networks, 2021

A Renewable Energy Certificate Trading System Based on Blockchain.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Bus Load Factor Analysis Based on Smart Card Data and Survey Data.
Proceedings of the 24th IEEE International Intelligent Transportation Systems Conference, 2021

Covariance Pattern Search with Eigenvalue-determined Radii.
Proceedings of the IEEE Congress on Evolutionary Computation, 2021

2020
A heterogeneous user authentication and key establishment for mobile client-server environment.
Wirel. Networks, 2020

Certificateless public key encryption with cryptographic reverse firewalls.
J. Syst. Archit., 2020

A cloud data deduplication scheme based on certificateless proxy re-encryption.
J. Syst. Archit., 2020

A hybrid method integrating an elite genetic algorithm with tabu search for the quadratic assignment problem.
Inf. Sci., 2020

Cost-effective moving target defense against DDoS attacks using trilateral game and multi-objective Markov decision processes.
Comput. Secur., 2020

Building an efficient intrusion detection system based on feature selection and ensemble classifier.
Comput. Networks, 2020

Dynamic performance enhancement for nonlinear stochastic systems using RBF driven nonlinear compensation with extended Kalman filter.
Autom., 2020

Joint Distribution Center Location Problem for Restaurant Industry Based on Improved K-Means Algorithm With Penalty.
IEEE Access, 2020

DOBC Based Fully Probability Design for Stochastic System With the Multiplicative Noise.
IEEE Access, 2020

Length Matters: Fast Internet Encrypted Traffic Service Classification based on Multi-PDU Lengths.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

Optimal Electricity Trading Strategy for a Household Microgrid.
Proceedings of the 16th IEEE International Conference on Control & Automation, 2020

Effectiveness Evaluation Method for Cyber Deception Based on Dynamic Bayesian Attack Graph.
Proceedings of the CSSE 2020: 3rd International Conference on Computer Science and Software Engineering, 2020

Covariance Local Search for Memetic Frameworks: A Fitness Landscape Analysis Approach.
Proceedings of the IEEE Congress on Evolutionary Computation, 2020

2019
A Blockchain-Based Access Control Scheme for Smart Grids.
IACR Cryptol. ePrint Arch., 2019

An Efficient Network Intrusion Detection System Based on Feature Selection and Ensemble Classifier.
CoRR, 2019

Spatial-Temporal Correlation Prediction Modeling of Origin-Destination Passenger Flow Under Urban Rail Transit Emergency Conditions.
IEEE Access, 2019

Semi-buspool: Demand-driven Scheduling for Intercity Bus Based on Smart Card Data.
Proceedings of the 2019 IEEE Intelligent Transportation Systems Conference, 2019

Fully Probabilistic Design for Stochastic Discrete System with Multiplicative Noise.
Proceedings of the 15th IEEE International Conference on Control and Automation, 2019

Cryptographic Reverse Firewalls for Identity-Based Encryption.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019

A Cost-effective Shuffling Method against DDoS Attacks using Moving Target Defense.
Proceedings of the 6th ACM Workshop on Moving Target Defense, 2019

2018
EKF-Based Enhanced Performance Controller Design for Nonlinear Stochastic Systems.
IEEE Trans. Autom. Control., 2018

Modeling the Travel Mode Choice for Outpatient Trips Before and After Bike-Sharing in Beijing.
Proceedings of the 21st International Conference on Intelligent Transportation Systems, 2018

Secure and Achievable Heterogeneous Access Control Scheme for Wireless Body Area Networks.
Proceedings of the Frontiers in Cyber Security - First International Conference, 2018

2017
Identity-Based Combined Public Key Schemes for Signature, Encryption, and Signcryption.
Proceedings of the Information Technology and Applied Mathematics - ICITAM 2017, Haldia, Purba Medinipur, West Bengal, India, October 30, 2017

2015
GIS-Based Commute Analysis Using Smart Card Data: A Case Study of Multi-Mode Public Transport for Smart City.
Proceedings of the Geo-Informatics in Resource Management and Sustainable Ecosystem, 2015


  Loading...