Chuan Yue
Orcid: 0000-0002-6095-4768Affiliations:
- Colorado School of Mines, Golden, CO, USA
According to our database1,
Chuan Yue
authored at least 82 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Multim. Tools Appl., October, 2024
Expert Syst. Appl., March, 2024
A software trustworthiness evaluation methodology for cloud services with picture fuzzy information.
Appl. Soft Comput., 2024
2023
A Tale of Two Communities: Privacy of Third Party App Users in Crowdsourcing - The Case of Receipt Transcription.
Proc. ACM Hum. Comput. Interact., 2023
Proceedings of the Science of Cyber Security - 5th International Conference, 2023
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
Exploring the Negotiation Behaviors of Owners and Bystanders over Data Practices of Smart Home Devices.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Soft Comput., 2022
Exploring the Privacy Concerns of Bystanders in Smart Homes from the Perspectives of Both Owners and Bystanders.
Proc. Priv. Enhancing Technol., 2022
Comput. Secur., 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the Science of Cyber Security - 4th International Conference, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
Proc. ACM Hum. Comput. Interact., 2021
Attribute Normalization Approaches to Group Decision-making and Application to Software Reliability Assessment.
Cogn. Comput., 2021
An Ensemble Intrusion Detection Method for Train Ethernet Consist Network Based on CNN and RNN.
IEEE Access, 2021
IEEE Access, 2021
Proceedings of the IEEE International Performance, 2021
2020
An intuitionistic fuzzy projection-based approach and application to software quality evaluation.
Soft Comput., 2020
Proc. Priv. Enhancing Technol., 2020
Picture fuzzy normalized projection and extended VIKOR approach to software reliability assessment.
Appl. Soft Comput., 2020
Attention Please: Your Attention Check Questions in Survey Studies Can Be Automatically Answered.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
IEEE Trans. Inf. Forensics Secur., 2019
An interval-valued intuitionistic fuzzy projection-based approach and application to evaluating knowledge transfer effectiveness.
Neural Comput. Appl., 2019
A projection-based approach to software quality evaluation from the users' perspectives.
Int. J. Mach. Learn. Cybern., 2019
计算机科学, 2019
Normalization of attribute values with interval information in group decision-making setting: with an application to software quality evaluation.
J. Exp. Theor. Artif. Intell., 2019
Projection-based approach to group decision-making with hybrid information representations and application to software quality evaluation.
Comput. Ind. Eng., 2019
A normalized projection-based group decision-making method with heterogeneous decision information and application to software development effort assessment.
Appl. Intell., 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
Normalized projection approach to group decision-making with hybrid decision information.
Int. J. Mach. Learn. Cybern., 2018
A novel approach to interval comparison and application to software quality evaluation.
J. Exp. Theor. Artif. Intell., 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Discover and Secure (DaS): An Automated Virtual Machine Security Management Framework.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
2017
J. Intell. Fuzzy Syst., 2017
Comput. Secur., 2017
Entropy-based weights on decision makers in group decision-making setting with hybrid preference representations.
Appl. Soft Comput., 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies, 2017
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
2016
A geometric approach for ranking interval-valued intuitionistic fuzzy numbers with an application to group decision-making.
Comput. Ind. Eng., 2016
Proceedings of the 2016 USENIX Workshop on Advances in Security Education (ASE 16), 2016
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016
2015
Proceedings of the 24th International Conference on World Wide Web, 2015
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems, 2015
2014
Comput. Secur., 2014
2013
ACM Trans. Web, 2013
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013
Proceedings of the Security and Privacy in Communication Networks, 2013
Proceedings of the 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2013
Proceedings of the 5th USENIX Workshop on Hot Topics in Cloud Computing, 2013
All your browser-saved passwords could belong to us: a security analysis and a cloud-based new design.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
2012
A bidding strategy using genetic network programming with adjusting parameters for large-scale continuous double auction.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2012
Preventing the Revealing of Online Passwords to Inappropriate Websites with LoginInspector.
Proceedings of the Strategies, 2012
2011
Enhancing Bidding Strategy Using Genetic Network Programming in Agent-Based Multiple Round English Auction.
J. Adv. Comput. Intell. Intell. Informatics, 2011
No Time Limit and Time Limit Model of Multiple Round Dutch Auction Based on Genetic Network Programming.
J. Adv. Comput. Intell. Intell. Informatics, 2011
A bidding strategy for Continuous Double Auctions based on Genetic Network Programming with generalized judgments.
Proceedings of the IEEE International Conference on Systems, 2011
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2011
2010
ACM Trans. Internet Techn., 2010
Proceedings of the IEEE Congress on Evolutionary Computation, 2010
2009
J. Netw. Comput. Appl., 2009
Proceedings of the 18th International Conference on World Wide Web, 2009
Proceedings of the 2009 USENIX Annual Technical Conference, 2009
Network Intrusion Detection using Fuzzy Class Association Rule Mining Based on Genetic Network Programming.
Proceedings of the IEEE International Conference on Systems, 2009
Proceedings of the 23rd Large Installation System Administration Conference, 2009
Proceedings of the UbiComp 2009: Ubiquitous Computing, 2009
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009
2008
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
2007
Runtime and Programming Support for Memory Adaptation in Scientific Applications via Local Disk and Remote Memory.
J. Grid Comput., 2007
Proceedings of the Fifteenth IEEE International Workshop on Quality of Service, 2007
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007
2006
Runtime Support for Memory Adaptation in Scientific Applications via Local Disk and Remote Memory.
Proceedings of the 15th IEEE International Symposium on High Performance Distributed Computing, 2006