Li Yang
Orcid: 0000-0003-2750-7031Affiliations:
- Xidian University, School of Cyber Engineering, Xi'an, China
- Xidian University, Cryptography, Xi'an, China (PhD 2010)
According to our database1,
Li Yang
authored at least 44 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Dependable Secur. Comput., 2024
DawnGNN: Documentation augmented windows malware detection using graph neural network.
Comput. Secur., 2024
Obfuscating Provenance-Based Forensic Investigations with Mapping System Meta-Behavior.
Proceedings of the 27th International Symposium on Research in Attacks, 2024
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024
2023
J. Supercomput., September, 2023
IRGA: An Intelligent Implicit Real-time Gait Authentication System in Heterogeneous Complex Scenarios.
ACM Trans. Internet Techn., 2023
2022
Achieving privacy-preserving sensitive attributes for large universe based on private set intersection.
Inf. Sci., 2022
SEMMI: Multi-party security decision-making scheme for linear functions in the internet of medical things.
Inf. Sci., 2022
Vacuum: Efficient and Assured Deletion Scheme for User Sensitive Data on Mobile Devices.
IEEE Internet Things J., 2022
SEMMI: Multi-party Security Decision-making Scheme Under the Internet of Medical Things.
Proceedings of the IEEE International Conference on Communications, 2022
2021
Wirel. Commun. Mob. Comput., 2021
Proceedings of the IEEE Global Communications Conference, 2021
2020
A Secure and Verifiable Outsourcing Scheme for Assisting Mobile Device Training Machine Learning Model.
Wirel. Commun. Mob. Comput., 2020
Proceedings of the Security and Privacy in Digital Economy, 2020
2019
Secur. Commun. Networks, 2019
J. Netw. Comput. Appl., 2019
A trust-based collaborative filtering algorithm for E-commerce recommendation system.
J. Ambient Intell. Humaniz. Comput., 2019
Online handwritten signature verification based on the most stable feature and partition.
Clust. Comput., 2019
A DNS Tunneling Detection Method Based on Deep Learning Models to Prevent Data Exfiltration.
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019
BQSV: Protecting SDN Controller Cluster's Network Topology View Based on Byzantine Quorum System with Verification Function.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
Achieving Efficient and Verifiable Assured Deletion for Outsourced Data Based on Access Right Revocation.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
2018
Identifying opinion leader nodes in online social networks with a new closeness evaluation algorithm.
Soft Comput., 2018
Soft Comput., 2018
IEEE Netw., 2018
J. Netw. Comput. Appl., 2018
Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems.
J. Ambient Intell. Humaniz. Comput., 2018
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
2017
Toward better data veracity in mobile cloud computing: A context-aware and incentive-based reputation mechanism.
Inf. Sci., 2017
The Sound and the Fury: Hiding Communications in Noisy Wireless Networks with Interference Uncertainty.
CoRR, 2017
Clust. Comput., 2017
A Novel Multifactor Two-Server Authentication Scheme under the Mobile Cloud Computing.
Proceedings of the International Conference on Networking and Network Applications, 2017
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
2015
Comput. Networks, 2015
Comput. J., 2015
Sci. China Inf. Sci., 2015
2014
An Efficient Ticket Based Authentication Protocol with Unlinkability for Wireless Access Networks.
Wirel. Pers. Commun., 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
2013
An Enhanced Authentication Scheme with Privacy Preservation for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2013
2012
Int. J. Netw. Secur., 2012
A Trusted Authentication Scheme for Wireless Networks Using Direct Anonymous Attestation.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
2010
Security Flaws and Improvements to a Direct Anonymous Attestation Scheme for Mobile Computing Platforms.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010