Zhiyuan Tan

According to our database1, Zhiyuan Tan authored at least 45 papers between 2009 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Design of multi-view based email classification for IoT systems via semi-supervised learning.
J. Network and Computer Applications, 2019

SmartEdge: An end-to-end encryption framework for an edge-enabled smart city application.
J. Network and Computer Applications, 2019

A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services.
Future Generation Comp. Syst., 2019

Urban data management system: Towards Big Data analytics for Internet of Things based smart urban environment using customized Hadoop.
Future Generation Comp. Syst., 2019

Decrypting live SSH traffic in virtual environments.
Digital Investigation, 2019

Discovering Encrypted Bot and Ransomware Payloads Through Memory Inspection Without A Priori Knowledge.
CoRR, 2019

Deriving ChaCha20 Key Streams From Targeted Memory Analysis.
CoRR, 2019

Decrypting live SSH traffic in virtual environments.
CoRR, 2019

ARCA-IoT: An Attack-Resilient Cloud-Assisted IoT System.
IEEE Access, 2019

A Learning-Based Vehicle-Trajectory Generation Method for Vehicular Networking.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

A 3D Smooth Random Walk Mobility Model for FANETs.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

2018
Virtual Resource Allocation for Heterogeneous Services in Full Duplex-Enabled SCNs With Mobile Edge Computing and Caching.
IEEE Trans. Vehicular Technology, 2018

Performance of Cognitive Radio Sensor Networks Using Hybrid Automatic Repeat ReQuest: Stop-and-Wait.
MONET, 2018

Moving Towards Highly Reliable and Effective Sensor Networks.
Ad Hoc & Sensor Wireless Networks, 2018

Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors.
IEEE Access, 2018

A Secured Data Management Scheme for Smart Societies in Industrial Internet of Things Environment.
IEEE Access, 2018

Power Consumption Interval Prediction Based on Quantile Regression Neural Network and Kernel Density Estimation.
Proceedings of the 11th International Symposium on Computational Intelligence and Design, 2018

A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

2017
Heterogeneous Services Provisioning in Small Cell Networks with Cache and Mobile Edge Computing.
CoRR, 2017

Joint Access Selection and Resource Allocation in Cache-Enabled HCNs with D2D Communications.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

An Intrusion Detection System Based on Polynomial Feature Correlation Analysis.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

A framework for data security in cloud using collaborative intrusion detection scheme.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

Virtual resource allocation for heterogeneous services in full duplex-enabled small cell networks with cache and MEC.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Joint Resource Allocation in Cache-Enabled Small Cell Networks with Massive MIMO and Full Duplex.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm.
IEEE Trans. Computers, 2016

An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Social-aware peer discovery and resource allocation for device-to-device communication.
Proceedings of the Digital Media Industry & Academic Forum, 2016

2015
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques.
IEEE Trans. Computers, 2015

2014
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis.
IEEE Trans. Parallel Distrib. Syst., 2014

Intrusion detection method based on nonlinear correlation measure.
IJIPT, 2014

Improving cloud network security using the Tree-Rule firewall.
Future Generation Comp. Syst., 2014

Enhancing Big Data Security with Collaborative Intrusion Detection.
IEEE Cloud Computing, 2014

Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning.
Proceedings of the 13th IEEE International Conference on Trust, 2014

A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment.
Proceedings of the 13th IEEE International Conference on Trust, 2014

A Stateful Mechanism for the Tree-Rule Firewall.
Proceedings of the 13th IEEE International Conference on Trust, 2014

A Novel Feature Selection Approach for Intrusion Detection Data Classification.
Proceedings of the 13th IEEE International Conference on Trust, 2014

2013
RePIDS: A multi tier Real-time Payload-based Intrusion Detection System.
Computer Networks, 2013

2012
Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Evaluation on multivariate correlation analysis based denial-of-service attack detection system.
Proceedings of the First International Conference on Security of Internet of Things, 2012

2011
Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis.
Proceedings of the Neural Information Processing - 18th International Conference, 2011

Multivariate Correlation Analysis Technique Based on Euclidean Distance Map for Network Traffic Characterization.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

2010
Intrusion detection using GSAD model for HTTP traffic on web services.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

A Two-Tier System for Web Attack Detection Using Linear Discriminant Method.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

2009
Web Service Locating Unit in RFID-Centric Anti-counterfeit System.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

Intrusion Detection Using Geometrical Structure.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009


  Loading...