Bin Yuan
Orcid: 0000-0002-5365-904X
According to our database1,
Bin Yuan
authored at least 91 papers
between 1994 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Pattern Anal. Appl., December, 2024
A method of hybrid dilated and global convolution networks for pavement crack detection.
Multim. Syst., August, 2024
IEEE Trans. Netw. Serv. Manag., June, 2024
A Broadband Cascode Low-Noise Amplifier Using Transformer Feedback and Darlington Techniques.
IEEE Trans. Circuits Syst. II Express Briefs, January, 2024
IEEE Trans. Dependable Secur. Comput., 2024
Generative AI Enables Synthesizing Cross-Modality Brain Image via Multi-Level-Latent Representation Learning.
IEEE Trans. Computational Imaging, 2024
Improved phase-state identification bypass approach of the hydrocarbons-CO2-H2O system for compositional reservoir simulation.
Comput. Geosci., 2024
Identification of important nodes in the information propagation network based on the artificial intelligence method.
CoRR, 2024
CoRR, 2024
Curriculum Recommendations Using Transformer Base Model with InfoNCE Loss And Language Switching Method.
CoRR, 2024
MQTTactic: Security Analysis and Verification for Logic Flaws in MQTT Implementations.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the Knowledge Science, Engineering and Management, 2024
Proceedings of the IGARSS 2024, 2024
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2024, 2024
Membership Inference Attacks against Vision Transformers: Mosaic MixUp Training to the Defense.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 4th International Conference on Artificial Intelligence, 2024
2023
DG-ALETSK: A High-Dimensional Fuzzy Approach With Simultaneous Feature Selection and Rule Extraction.
IEEE Trans. Fuzzy Syst., November, 2023
Analysis and Design of a Gain-Enhanced 1-20-GHz LNA With Output-Stage Transformer Feedback.
IEEE Trans. Circuits Syst. II Express Briefs, September, 2023
J. Comput. Sci. Technol., April, 2023
IEEE Trans. Dependable Secur. Comput., 2023
Double groups of gates based Takagi-Sugeno-Kang (DG-TSK) fuzzy system for simultaneous feature selection and rule extraction.
Fuzzy Sets Syst., 2023
Open Comput. Sci., 2023
Research on Defect Detection of the Outer Side of Bottle Cap Based on High Angle and Multi-View Vision System.
IEEE Access, 2023
Fine-Grained Code Clone Detection with Block-Based Splitting of Abstract Syntax Tree.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
Enhancing Deep Learning-based Vulnerability Detection by Building Behavior Graph Model.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
Prior-Enhanced Network for Image-Based PM2.5 Estimation from Imbalanced Data Distribution.
Proceedings of the Neural Information Processing - 30th International Conference, 2023
Proceedings of the International Conference on Advanced Robotics and Mechatronics, 2023
Structural Resilience and Connectivity of the IPv6 Internet: An AS-level Topology Examination.
Proceedings of the 4th International Conference on Artificial Intelligence and Computer Engineering, 2023
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023
Lost along the Way: Understanding and Mitigating Path-Misresolution Threats to Container Isolation.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
A Fuzzing-Based Method for Testing Rules in Intrusion Detection Systems in 6G Networks.
IEEE Netw., 2022
Effective network intrusion detection via representation learning: A Denoising AutoEncoder approach.
Comput. Commun., 2022
Cogn. Comput., 2022
SAND: semi-automated adaptive network defense via programmable rule generation and deployment.
Sci. China Inf. Sci., 2022
Q-Band Radial Waveguide Power Divider Based on a Specific Cycloidal-Like Transition Implementation.
IEEE Access, 2022
Research on Surface Defect Detection Technology Based on the Zonal and Time-Sharing Computational Imaging.
IEEE Access, 2022
P-Verifier: Understanding and Mitigating Security Risks in Cloud-based IoT Access Policies.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
Application of Motion Sensor Based on Neural Network in Basketball Technology and Physical Fitness Evaluation System.
Wirel. Commun. Mob. Comput., 2021
Research on Intelligent Algorithm of Identity Authentication Based on Facial Features.
Wirel. Commun. Mob. Comput., 2021
ACM Trans. Internet Techn., 2021
Deployment of Robust Security Scheme in SDN Based 5G Network over NFV Enabled Cloud Environment.
IEEE Trans. Emerg. Top. Comput., 2021
DSEOM: A Framework for Dynamic Security Evaluation and Optimization of MTD in Container-Based Cloud.
IEEE Trans. Dependable Secur. Comput., 2021
Introduction to special issue on advances in multi-phase fluid and multi-scale particulate reactive flow modeling and simulation for petroleum engineering applications.
Simul., 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the 6th International Conference on Automation, 2021
2020
IEEE Trans. Syst. Man Cybern. Syst., 2020
Exploring New Opportunities to Defeat Low-Rate DDoS Attack in Container-Based Cloud Environment.
IEEE Trans. Parallel Distributed Syst., 2020
Minimizing Financial Cost of DDoS Attack Defense in Clouds With Fine-Grained Resource Management.
IEEE Trans. Netw. Sci. Eng., 2020
Differential Evolution Analysis of Clinical Characteristics of Severe Viral Pneumonia in Children.
J. Medical Imaging Health Informatics, 2020
Secure Data Transportation With Software-Defined Networking and k-n Secret Sharing for High-Confidence IoT Services.
IEEE Internet Things J., 2020
HostWatcher: Protecting hosts in cloud data centers through software-defined networking.
Future Gener. Comput. Syst., 2020
Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the Knowledge Science, Engineering and Management, 2020
Performance of Existing Predictor of SubCellular Localization of Long Non-Coding RNA on the New Database.
Proceedings of the ICCPR 2020: 9th International Conference on Computing and Pattern Recognition, Xiamen, China, October 30, 2020
2019
IEEE Trans. Serv. Comput., 2019
A domain-divided configurable security model for cloud computing-based telecommunication services.
J. Supercomput., 2019
Proceedings of the IEEE International Reliability Physics Symposium, 2019
Self-Normalizing Generative Adversarial Network for Super-Resolution Reconstruction of SAR Images.
Proceedings of the 2019 IEEE International Geoscience and Remote Sensing Symposium, 2019
Proceedings of the 2019 IEEE International Geoscience and Remote Sensing Symposium, 2019
Proceedings of the 2019 IEEE International Geoscience and Remote Sensing Symposium, 2019
Automatic Sub-Images Extraction from Entire Urban SAR Scenes Based on the Clustering-Based Algorithm and Graph Traversal Methods.
Proceedings of the 2019 IEEE International Geoscience and Remote Sensing Symposium, 2019
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019
2018
A Practical Byzantine-Based Approach for Faulty Switch Tolerance in Software-Defined Networks.
IEEE Trans. Netw. Serv. Manag., 2018
Secur. Commun. Networks, 2018
IEEE Access, 2018
Solving Anomalies in NFV-SDN Based Service Function Chaining Composition for IoT Network.
IEEE Access, 2018
IEEE Access, 2018
Enhanced reliability of hexagonal boron nitride dielectric stacks due to high thermal conductivity.
Proceedings of the IEEE International Reliability Physics Symposium, 2018
The Influence Simulation Analysis of the Sensitive Area of the Instrument Landing System's Localizer On The Position Of The Aircraft Take-off Waiting Line.
Proceedings of the 4th International Conference on Robotics and Artificial Intelligence, 2018
Enhanced Attack Aware Security Provisioning Scheme in SDN/NFV Enabled over 5G Network.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
2017
计算机科学, 2017
Int. J. Manuf. Res., 2017
2015
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 3rd Workshop on Continuous Vector Space Models and their Compositionality, 2015
Proceedings of the 12th Web Information System and Application Conference, 2015
2014
Micro-Doppler Analysis and Separation Based on Complex Local Mean Decomposition for Aircraft With Fast-Rotating Parts in ISAR Imaging.
IEEE Trans. Geosci. Remote. Sens., 2014
MTRC compensation in high-resolution ISAR imaging via improved polar format algorithm based on ICPF.
EURASIP J. Adv. Signal Process., 2014
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014
Radar staring imaging scheme and target change detection based on range pulse compression and azimuth wavefront modulation.
Proceedings of the 2014 IEEE Geoscience and Remote Sensing Symposium, 2014
Relation between the Yin-cold or Yang-heat syndrome type of TCM and the EGFR gene status in patients with NSCLC.
Proceedings of the 2014 IEEE International Conference on Bioinformatics and Biomedicine, 2014
2013
Physical Modeling and Configuration Simulation for Constrained Cables of Electromechanical Products.
Proceedings of the 2013 International Conference on Computer-Aided Design and Computer Graphics, 2013
2011
Proceedings of the 12th International Conference on Computer-Aided Design and Computer Graphics, 2011
2009
A New Intelligent Technology of Steering-by-Wire System by Variable Structure Control with Sliding Mode.
Proceedings of the First IITA International Joint Conference on Artificial Intelligence, 2009
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009
2008
Improving Chinese Internet's Resilience through Degree Rank Based Overlay Relays Placement.
Proceedings of IEEE International Conference on Communications, 2008
1994
Proceedings of Second IEEE Workshop on Applications of Computer Vision, 1994