Jing Yang

Orcid: 0000-0003-1632-6278

Affiliations:
  • Chinese Academy of Sciences, Institute of Information Engineering, State Key Laboratory of Information Security, Beijing, China
  • University of Chinese Academy of Sciences, School of Cyber Security, Beijing, China


According to our database1, Jing Yang authored at least 20 papers between 2016 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
FedSHE: privacy preserving and efficient federated learning with adaptive segmented CKKS homomorphic encryption.
Cybersecur., December, 2024

2023
ImpactTracer: Root Cause Localization in Microservices Based on Fault Propagation Modeling.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2023

A Blockchain-Based Privacy-Preserving Data Sharing Scheme with Security-Enhanced Access Control.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Similarizing the Influence of Words with Contrastive Learning to Defend Word-level Adversarial Text Attack.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023

Contrastive Learning with Adversarial Examples for Alleviating Pathology of Language Model.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023

2022
Crafting Textual Adversarial Examples through Second-Order Enhanced Word Saliency.
Proceedings of the International Joint Conference on Neural Networks, 2022

SITD: Insider Threat Detection Using Siamese Architecture on Imbalanced Data.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

PARSE: An Efficient Search Method for Black-box Adversarial Text Attacks.
Proceedings of the 29th International Conference on Computational Linguistics, 2022

2020
On the Analysis and Improvement of Min-Entropy Estimation on Time-Varying Data.
IEEE Trans. Inf. Forensics Secur., 2020

deMSF: a Method for Detecting Malicious Server Flocks for Same Campaign.
EAI Endorsed Trans. Security Safety, 2020

Erratum to "High-Efficiency Min-Entropy Estimation Based on Neural Network for Random Number Generators".
Secur. Commun. Networks, 2020

High-Efficiency Min-Entropy Estimation Based on Neural Network for Random Number Generators.
Secur. Commun. Networks, 2020

SiegeCannon: Detecting Malicious Infrastructures by Analyzing Integral Characteristics of Involved Server Flocks.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

2019
Entropy Estimation for ADC Sampling-Based True Random Number Generators.
IEEE Trans. Inf. Forensics Secur., 2019

On the Security of TRNGs Based on Multiple Ring Oscillators.
Proceedings of the Security and Privacy in Communication Networks, 2019

SVMDF: A Secure Virtual Machine Deployment Framework to Mitigate Co-Resident Threat in Cloud.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

A Blockchain-Based Authentication Method with One-Time Password.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

2018
Neural Network Based Min-entropy Estimation for Random Number Generators.
Proceedings of the Security and Privacy in Communication Networks, 2018

2017
A Novel Semantic-Aware Approach for Detecting Malicious Web Traffic.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2016
Extracting More Entropy for TRNGs Based on Coherent Sampling.
Proceedings of the Security and Privacy in Communication Networks, 2016


  Loading...