Jiangyong Shi

According to our database1, Jiangyong Shi authored at least 19 papers between 2013 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
ANODYNE: Mitigating backdoor attacks in federated learning.
Expert Syst. Appl., 2025

2024
Speedy Privacy-Preserving Skyline Queries on Outsourced Data.
Proceedings of the Computer Security - ESORICS 2024, 2024

2023
Defending against Adversarial Attacks in Federated Learning on Metric Learning Model.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Defending against Poisoning Attacks in Federated Learning from a Spatial-temporal Perspective.
Proceedings of the 42nd International Symposium on Reliable Distributed Systems, 2023

2022
A Two-Stage Out-Of-Box Method for Detecting Side-Channel Attacks in Cloud Computing.
Proceedings of the 6th International Conference on Cryptography, Security and Privacy, 2022

2021
FREPD: A Robust Federated Learning Framework on Variational Autoencoder.
Comput. Syst. Sci. Eng., 2021

One-pass Multi-view Clustering for Large-scale Data.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

A Competence-Based Three-Layer Cybersecurity Education Framework and Its Application.
Proceedings of the ACM TURC 2021: ACM Turing Award Celebration Conference - Hefei, China, 30 July 2021, 2021

2020
Markov Probability Fingerprints: A Method for Identifying Encrypted Video Traffic.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

2018
Feedback based Sampling for Intrusion Detection in Software Defined Network.
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018

Enhancing Machine Learning Based Malware Detection Model by Reinforcement Learning.
Proceedings of the 8th International Conference on Communication and Network Security, 2018

2017
An SDN-based Sampling System for Cloud P2P Bots Detection.
J. Inf. Sci. Eng., 2017

2016
Architecture Support for Controllable VMI on Untrusted Cloud.
Proceedings of the Security and Privacy in Communication Networks, 2016

2015
A Disjunctive VMI Model Based on XSM.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015

A Novel Hybrid Mobile Malware Detection System Integrating Anomaly Detection With Misuse Detection.
Proceedings of the 6th International Workshop on Mobile Cloud Computing and Services, 2015

SPEMS: A Stealthy and Practical Execution Monitoring System Based on VMI.
Proceedings of the Cloud Computing and Security - First International Conference, 2015

A Model of Dynamic Malware Analysis Based on VMI.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
Design of a comprehensive virtual machine monitoring system.
Proceedings of the IEEE 3rd International Conference on Cloud Computing and Intelligence Systems, 2014

2013
Time-Stealer: A Stealthy Threat for Virtualization Scheduler and Its Countermeasures.
Proceedings of the Information and Communications Security - 15th International Conference, 2013


  Loading...