Li Yang

Orcid: 0000-0003-2750-7031

Affiliations:
  • Xidian University, School of Cyber Engineering, Xi'an, China
  • Xidian University, Cryptography, Xi'an, China (PhD 2010)


According to our database1, Li Yang authored at least 44 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
ADDITION: Detecting Adversarial Examples With Image-Dependent Noise Reduction.
IEEE Trans. Dependable Secur. Comput., 2024

DawnGNN: Documentation augmented windows malware detection using graph neural network.
Comput. Secur., 2024

Obfuscating Provenance-Based Forensic Investigations with Mapping System Meta-Behavior.
Proceedings of the 27th International Symposium on Research in Attacks, 2024

Adaptive Oriented Adversarial Attacks on Visible and Infrared Image Fusion Models.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024

2023
BejaGNN: behavior-based Java malware detection via graph neural network.
J. Supercomput., September, 2023

IRGA: An Intelligent Implicit Real-time Gait Authentication System in Heterogeneous Complex Scenarios.
ACM Trans. Internet Techn., 2023

2022
Achieving privacy-preserving sensitive attributes for large universe based on private set intersection.
Inf. Sci., 2022

SEMMI: Multi-party security decision-making scheme for linear functions in the internet of medical things.
Inf. Sci., 2022

Vacuum: Efficient and Assured Deletion Scheme for User Sensitive Data on Mobile Devices.
IEEE Internet Things J., 2022

SEMMI: Multi-party Security Decision-making Scheme Under the Internet of Medical Things.
Proceedings of the IEEE International Conference on Communications, 2022

2021
UserRBPM: User Retweet Behavior Prediction with Graph Representation Learning.
Wirel. Commun. Mob. Comput., 2021

FedGR: A Lossless-Obfuscation Approach for Secure Federated Learning.
Proceedings of the IEEE Global Communications Conference, 2021

2020
A Secure and Verifiable Outsourcing Scheme for Assisting Mobile Device Training Machine Learning Model.
Wirel. Commun. Mob. Comput., 2020

Protecting the Data Plane of SDN From Malicious Flow Entries Based on P4.
Proceedings of the Security and Privacy in Digital Economy, 2020

2019
Fingerprint Protected Password Authentication Protocol.
Secur. Commun. Networks, 2019

Inference attack in Android Activity based on program fingerprint.
J. Netw. Comput. Appl., 2019

A trust-based collaborative filtering algorithm for E-commerce recommendation system.
J. Ambient Intell. Humaniz. Comput., 2019

Online handwritten signature verification based on the most stable feature and partition.
Clust. Comput., 2019

A DNS Tunneling Detection Method Based on Deep Learning Models to Prevent Data Exfiltration.
Proceedings of the Network and System Security - 13th International Conference, 2019

An Automatic Crisis Information Recognition Model Based on BP Neural Network.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

BQSV: Protecting SDN Controller Cluster's Network Topology View Based on Byzantine Quorum System with Verification Function.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

Achieving Efficient and Verifiable Assured Deletion for Outsourced Data Based on Access Right Revocation.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

MineAuth: Mining Behavioural Habits for Continuous Authentication on a Smartphone.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Identifying opinion leader nodes in online social networks with a new closeness evaluation algorithm.
Soft Comput., 2018

Online handwritten signature verification using feature weighting algorithm relief.
Soft Comput., 2018

Integrated Authentication and Key Agreement Framework for Vehicular Cloud Computing.
IEEE Netw., 2018

A remotely keyed file encryption scheme under mobile cloud computing.
J. Netw. Comput. Appl., 2018

Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems.
J. Ambient Intell. Humaniz. Comput., 2018

SADUS: Secure data deletion in user space for mobile devices.
Comput. Secur., 2018

Inference Attack in Android Activity based on Program Fingerprint.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Toward better data veracity in mobile cloud computing: A context-aware and incentive-based reputation mechanism.
Inf. Sci., 2017

The Sound and the Fury: Hiding Communications in Noisy Wireless Networks with Interference Uncertainty.
CoRR, 2017

Identifying opinion leaders in social networks with topic limitation.
Clust. Comput., 2017

A Novel Multifactor Two-Server Authentication Scheme under the Mobile Cloud Computing.
Proceedings of the International Conference on Networking and Network Applications, 2017

A Trusted Recommendation Scheme Based on the Improved Slope One Algorithm.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2015
A delegation based cross trusted domain direct anonymous attestation scheme.
Comput. Networks, 2015

CRM: A New Dynamic Cross-Layer Reputation Computation Model in Wireless Networks.
Comput. J., 2015

Universally composable secure positioning in the bounded retrieval model.
Sci. China Inf. Sci., 2015

2014
An Efficient Ticket Based Authentication Protocol with Unlinkability for Wireless Access Networks.
Wirel. Pers. Commun., 2014

Multi-domain Direct Anonymous Attestation Scheme from Pairings.
Proceedings of the Network and System Security - 8th International Conference, 2014

2013
An Enhanced Authentication Scheme with Privacy Preservation for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2013

2012
Mutual Authentication Scheme with Smart Cards and Password under Trusted Computing.
Int. J. Netw. Secur., 2012

A Trusted Authentication Scheme for Wireless Networks Using Direct Anonymous Attestation.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

2010
Security Flaws and Improvements to a Direct Anonymous Attestation Scheme for Mobile Computing Platforms.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010


  Loading...