Lu-Xing Yang

Orcid: 0000-0002-9229-5787

Affiliations:
  • Delft University of Technology, Delft, GA, The Netherlands
  • Chongqing University, Chongqing, China (PhD 2015)


According to our database1, Lu-Xing Yang authored at least 61 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Cost-Effective Company Response Policy for Product Co-Creation in Company-Sponsored Online Community.
IEEE Trans. Syst. Man Cybern. Syst., July, 2024

A Framework for Detecting False Data Injection Attacks in Large-Scale Wireless Sensor Networks.
Sensors, March, 2024

Game-theoretic modeling and analysis of cyberbullying spreading on OSNs.
Inf. Sci., February, 2024

Mitigating the Impact of a False Message Through Sequential Release of Clarifying Messages.
IEEE Trans. Netw. Sci. Eng., 2024

Minimizing Malware Propagation in Internet of Things Networks: An Optimal Control Using Feedback Loop Approach.
IEEE Trans. Inf. Forensics Secur., 2024

Cost-Effective Hybrid Control Strategies for Dynamical Propaganda War Game.
IEEE Trans. Inf. Forensics Secur., 2024

The evolution of the flip-it game in cybersecurity: Insights from the past to the future.
J. King Saud Univ. Comput. Inf. Sci., 2024

Detecting Change Intervals with Isolation Distributional Kernel.
J. Artif. Intell. Res., 2024

Robust Zero Trust Architecture: Joint Blockchain based Federated learning and Anomaly Detection based Framework.
CoRR, 2024

Optimal Control of Malware Propagation in IoT Networks.
CoRR, 2024

Modeling and study of defense outsourcing against advanced persistent threat through impulsive differential game approach.
Comput. Secur., 2024

Impact of cybersecurity awareness on mobile malware propagation: A dynamical model.
Comput. Commun., 2024

Detecting Change Intervalswith Isolation Distributional Kernel (Abstract Reprint).
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

POSTER: Addressing the Privacy by Use Challenges in Verifiable Credential based Digital Wallets.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Blockchain-based reliable image copyright protection.
IET Blockchain, December, 2023

A Novel Diagnosis Scheme against Collusive False Data Injection Attack.
Sensors, July, 2023

Impulsive Artificial Defense Against Advanced Persistent Threat.
IEEE Trans. Inf. Forensics Secur., 2023

2022
Effective Multiplatform Advertising Policy.
IEEE Trans. Syst. Man Cybern. Syst., 2022

MGC-GAN: Multi-Graph Convolutional Generative Adversarial Networks for Accurate Citywide Traffic Flow Prediction.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2022

2021
Effective Quarantine and Recovery Scheme Against Advanced Persistent Threat.
IEEE Trans. Syst. Man Cybern. Syst., 2021

Defense Against Advanced Persistent Threat Through Data Backup and Recovery.
IEEE Trans. Netw. Sci. Eng., 2021

Developing Cost-Effective Rumor-Refuting Strategy Through Game-Theoretic Approach.
IEEE Syst. J., 2021

2020
Secure and Efficient Outsourcing of PCA-Based Face Recognition.
IEEE Trans. Inf. Forensics Secur., 2020

A Risk Management Approach to Defending Against the Advanced Persistent Threat.
IEEE Trans. Dependable Secur. Comput., 2020

Simultaneous Benefit Maximization of Conflicting Opinions: Modeling and Analysis.
IEEE Syst. J., 2020

Evaluating the Performance of a Static Patching Strategy against Computer Viruses.
Complex., 2020

Dynamic Maintenance Strategy for Word-of-Mouth Marketing.
IEEE Access, 2020

A Low-Cost Distributed Denial-of-Service Attack Architecture.
IEEE Access, 2020

2019
Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach.
IEEE Trans. Inf. Forensics Secur., 2019

Energy-Efficient Patching Strategy for Wireless Sensor Networks.
Sensors, 2019

Mathematical Models for Malware Propagation.
Secur. Commun. Networks, 2019

Seeking Best-Balanced Patch-Injecting Strategies through Optimal Control Approach.
Secur. Commun. Networks, 2019

Serious Challenges and Potential Solutions for the Industrial Internet of Things with Edge Intelligence.
IEEE Netw., 2019

Efficiently and securely outsourcing compressed sensing reconstruction to a cloud.
Inf. Sci., 2019

Enhanced Smart Meter Privacy Protection Using Rechargeable Batteries.
IEEE Internet Things J., 2019

A discount strategy in word-of-mouth marketing.
Commun. Nonlinear Sci. Numer. Simul., 2019

Dynamic Discount Pricing in Competitive Marketing.
IEEE Access, 2019

Maximum Profit of Viral Marketing: An Optimal Control Approach.
Proceedings of the 4th International Conference on Mathematics and Artificial Intelligence, 2019

2018
A Bi-Virus Competing Spreading Model with Generic Infection Rates.
IEEE Trans. Netw. Sci. Eng., 2018

Effectiveness analysis of a mixed rumor-quelling strategy.
J. Frankl. Inst., 2018

A Differential Game Approach to Patch Injection.
IEEE Access, 2018

Defending Against Advanced Persistent Threat: A Risk Management Perspective.
Proceedings of the Science of Cyber Security - First International Conference, 2018

2017
The effect of network topology on the spread of computer viruses: a modelling study.
Int. J. Comput. Math., 2017

Defend against advanced persistent threats: An optimal control approach.
CoRR, 2017

A cost-effective rumor-containing strategy.
CoRR, 2017

A discount strategy in word-of-mouth marketing and its assessment.
CoRR, 2017

Maximizing the effectiveness of an advanced persistent threat.
CoRR, 2017

On the effectiveness of the truth-spreading/rumor-blocking strategy for restraining rumors.
CoRR, 2017

Security evaluation of cyber networks under advanced persistent threats.
CoRR, 2017

Analysis of the effectiveness of the truth-spreading strategy for inhibiting rumors.
CoRR, 2017

Distributed interaction between computer virus and patch: A modeling study.
CoRR, 2017

Maximizing the overall profit of a word-of-mouth marketing campaign: A modeling study.
CoRR, 2017

The damage inflicted by a computer virus: A new estimation method.
CoRR, 2017

Security Evaluation of the Cyber Networks Under Advanced Persistent Threats.
IEEE Access, 2017

2014
A new epidemic model of computer viruses.
Commun. Nonlinear Sci. Numer. Simul., 2014

2013
Epidemics of computer viruses: A complex-network approach.
Appl. Math. Comput., 2013

2012
Routing and wavelength assignment for 3-ary n-cube in array-based optical network.
Inf. Process. Lett., 2012

Optimal broadcasting for locally twisted cubes.
Inf. Process. Lett., 2012

A novel computer virus propagation model and its dynamics.
Int. J. Comput. Math., 2012

Optimal control of computer virus under a delayed model.
Appl. Math. Comput., 2012

The spread of computer viruses under the influence of removable storage devices.
Appl. Math. Comput., 2012


  Loading...