Ping Yi

Orcid: 0000-0003-4530-5118

According to our database1, Ping Yi authored at least 104 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Detection and Analysis of Broken Access Control Vulnerabilities in App-Cloud Interaction in IoT.
IEEE Internet Things J., September, 2024

Building Intelligence Identification System via Large Language Model Watermarking: A Survey and Beyond.
CoRR, 2024

Magnitude-based Neuron Pruning for Backdoor Defens.
CoRR, 2024

Rethinking Pruning for Backdoor Mitigation: An Optimization Perspective.
CoRR, 2024

TrojanRAG: Retrieval-Augmented Generation Can Be Backdoor Driver in Large Language Models.
CoRR, 2024

Few-VulD: A Few-shot learning framework for software vulnerability detection.
Comput. Secur., 2024

New Approach for Estimating Intersection Control Delay From Passive Traffic Sensors at Network Level.
IEEE Access, 2024

Sponge Backdoor Attack: Increasing the Latency of Object Detection Exploiting Non-Maximum Suppression.
Proceedings of the International Joint Conference on Neural Networks, 2024

OCGEC: One-class Graph Embedding Classification for DNN Backdoor Detection.
Proceedings of the International Joint Conference on Neural Networks, 2024

PUBA: A Physical Undirected Backdoor Attack in Vision-based UAV Detection and Tracking Systems.
Proceedings of the International Joint Conference on Neural Networks, 2024

2023
SlicedLocator: Code vulnerability locator based on sliced dependence graph.
Comput. Secur., November, 2023

Investigation on AEB Key Parameters for Improving Car to Two-Wheeler Collision Safety Using In-Depth Traffic Accident Data.
IEEE Trans. Veh. Technol., 2023

2022
Smart Grid: Cyber Attacks, Critical Defense Approaches, and Digital Twin.
CoRR, 2022

Graph-based Malicious Account Groups Detection in Electronic Trading of Bulk Commodities.
Proceedings of the 9th IEEE International Conference on Cyber Security and Cloud Computing, 2022

Graph-based Algorithm For Self-trading Accounts Detection in Bulk Commodity Trade.
Proceedings of the 9th IEEE International Conference on Cyber Security and Cloud Computing, 2022

Automated Generation of Bug Samples Based on Source Code Analysis.
Proceedings of the 29th Asia-Pacific Software Engineering Conference, 2022

2021
Winning Rate Prediction Model Based on Monte Carlo Tree Search for Computer Dou Dizhu.
IEEE Trans. Games, 2021

An algorithm based on valuation forecasting for game tree search.
Int. J. Mach. Learn. Cybern., 2021

Energy distribution in EV energy network under energy shortage.
Neurocomputing, 2021

DAFAR: Defending against Adversaries by Feedback-Autoencoder Reconstruction.
CoRR, 2021

MailLeak: Obfuscation-Robust Character Extraction Using Transfer Learning.
Proceedings of the 6th IEEE/ACM Symposium on Edge Computing, 2021

DeepMark: Embedding Watermarks into Deep Neural Network Using Pruning.
Proceedings of the 33rd IEEE International Conference on Tools with Artificial Intelligence, 2021

2020
GENPass: A Multi-Source Deep Learning Model for Password Guessing.
IEEE Trans. Multim., 2020

Mobile terminal identity authentication system based on behavioral characteristics.
Int. J. Distributed Sens. Networks, 2020

Traffic Classification of User Behaviors in Tor, I2P, ZeroNet, Freenet.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Sentiment-Driven Price Prediction of the Bitcoin based on Statistical and Deep Learning Approaches.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

2019
CCID: Cross-Correlation Identity Distinction Method for Detecting Shrew DDoS.
Wirel. Commun. Mob. Comput., 2019

Dynamic Enhanced Field Division: An Advanced Localizing and Tracking Middleware.
ACM Trans. Sens. Networks, 2019

Generating Adversarial Samples With Constrained Wasserstein Distance.
IEEE Access, 2019

Energy Transport Station Deployment in Electric Vehicles Energy Internet.
IEEE Access, 2019

Detecting Adversarial Examples in Deep Neural Networks using Normalizing Filters.
Proceedings of the 11th International Conference on Agents and Artificial Intelligence, 2019

An Encrypted Malicious Traffic Detection System Based on Neural Network.
Proceedings of the 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2019

Chatbot Application on Cryptocurrency.
Proceedings of the IEEE Conference on Computational Intelligence for Financial Engineering & Economics, 2019

2018
Web Phishing Detection Using a Deep Learning Framework.
Wirel. Commun. Mob. Comput., 2018

Virtual exoskeleton-driven uncalibrated visual servoing control for mobile robotic manipulators based on human-robot-robot cooperation.
Trans. Inst. Meas. Control, 2018

Detection for Pulmonary Nodules using RGB Channel Superposition Method in Deep Learning Framework.
Proceedings of the Third International Conference on Security of Smart Cities, 2018

Dispatching and Distributing Energy in Energy Internet under Energy Dilemma.
Proceedings of the Third International Conference on Security of Smart Cities, 2018

GENPass: A General Deep Learning Model for Password Guessing with PCFG Rules and Adversarial Generation.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

2017
Regularization feature selection projection twin support vector machine via exterior penalty.
Neural Comput. Appl., 2017

Computational efficiency of accelerated particle swarm optimization combined with different chaotic maps for global optimization.
Neural Comput. Appl., 2017

Egocentric-Vision based Hand Posture Control System for Reconnaissance Robots.
J. Intell. Robotic Syst., 2017

A power storage station placement algorithm for power distribution based on electric vehicle.
Int. J. Distributed Sens. Networks, 2017

Edge computing in the Internet of Things.
Int. J. Distributed Sens. Networks, 2017

Poster: Smart Object-Oriented Dynamic Energy Management for Base Stations in Smart Cities.
Proceedings of the 3rd Workshop on Experiences with the Design and Implementation of Smart Objects, 2017

Charge station placement in electric vehicle energy distribution network.
Proceedings of the IEEE International Conference on Communications, 2017

Optimization for charge station placement in electric vehicles energy network.
Proceedings of the Workshop on Smart Internet of Things, SmartIoT@SEC 2017, 2017

2016
Deploying Energy Routers in an Energy Internet Based on Electric Vehicles.
IEEE Trans. Veh. Technol., 2016

Puppet attack: A denial of service attack in advanced metering infrastructure network.
J. Netw. Comput. Appl., 2016

Energy scheduling and allocation in electric vehicles energy internet.
Proceedings of the 2016 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2016

A New Block-Based Data Distribution Mechanism in Cloud Computing.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

Enhanced Wearable Medical Systems for Effective Blood Glucose Control.
Proceedings of the First IEEE International Conference on Connected Health: Applications, 2016

2015
Security and trust management in opportunistic networks: a survey.
Secur. Commun. Networks, 2015

Detecting Malware Based on DNS Graph Mining.
Int. J. Distributed Sens. Networks, 2015

Big Data in Future Sensing.
Int. J. Distributed Sens. Networks, 2015

Emergent Technologies in Big Data Sensing: A Survey.
Int. J. Distributed Sens. Networks, 2015

A Dempster-Shafer theory based traffic information trust model in vehicular ad hoc networks.
Proceedings of the International Conference on Cyber Security of Smart Cities, 2015

Impact Study of Vehicle Platooning and Gap Management on Traffic Operation Through Automated Vehicles.
Proceedings of the Information Technology and Intelligent Transportation Systems, 2015

Optimal renewable energy transfer via electrical vehicles.
Proceedings of the 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2015

Fingerprint-free tracking with dynamic enhanced field division.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Context-Centric Target Localization with Optimal Anchor Deployments.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015

2014
A truthful auction mechanism for channel allocation in multi-radio, multi-channel non-cooperative wireless networks.
Pers. Ubiquitous Comput., 2014

A Three-Dimensional Wireless Indoor Localization System.
J. Electr. Comput. Eng., 2014

A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network.
J. Electr. Comput. Eng., 2014

A Performance Perspective on Choosing between Single Aggregate and Multiple Aggregates for GENI Experime nts.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2014

Feature selection for least squares projection twin support vector machine.
Neurocomputing, 2014

The Tradeoff Between Single Aggregate and Multiple Aggregates in Designing GENI Experiments.
Proceedings of the Testbeds and Research Infrastructure: Development of Networks and Communities, 2014

Renewable energy transmission through multiple routes in a mobile electrical grid.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2014

A 3-hop message relay algorithm for connected dominating sets in wireless ad-hoc sensor networks.
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014

A denial of service attack in advanced metering infrastructure network.
Proceedings of the IEEE International Conference on Communications, 2014

EEP2P: An energy-efficient and economy-efficient P2P network protocol.
Proceedings of the International Green Computing Conference, 2014

iDES: Incentive-driven distributed energy sharing in sustainable microgrids.
Proceedings of the International Green Computing Conference, 2014

Characterizing the GENI Networks.
Proceedings of the 2014 Third GENI Research and Educational Experiment Workshop, 2014

An Asynchronous Distributed Algorithm for Constructing a Connected Dominating Set Optimized by Minimum-Weight Spanning Tree.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

Constructing Minimum Connected Dominating Sets with Constant Update Time in Wireless Ad-Hoc Sensor Networks.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

Distributed Construction of Connected Dominating Sets Optimized by Minimum-Weight Spanning Tree in Wireless Ad-Hoc Sensor Networks.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

2013
Intrusion Detection for Black Hole and Gray Hole in MANETs.
KSII Trans. Internet Inf. Syst., 2013

An Intrusion Prevention Mechanism in Mobile Ad Hoc Networks.
Ad Hoc Sens. Wirel. Networks, 2013

Mobile Anchor Assisted Error Bounded Sensing in Sensor Networks: An Implementation Perspective.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

Routing Renewable Energy Using Electric Vehicles in Mobile Electrical Grid.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

Energy scheduling and allocation in electric vehicle energy distribution networks.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2013

2012
An energy transmission and distribution network using electric vehicles.
Proceedings of IEEE International Conference on Communications, 2012

Green firewall: An energy-efficient intrusion prevention mechanism in wireless sensor network.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Security Framework for Wireless Communications in Smart Distribution Grid.
IEEE Trans. Smart Grid, 2011

2010
Securing Wireless Mesh Network with Mobile Firewall.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2010

An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
Investigating the Effect of Detector Spacing on Midpoint-Based Travel Time Estimation.
J. Intell. Transp. Syst., 2009

Efficient implementation of FIR type time domain equalizers for MIMO wireless channels via M-LESQ.
Proceedings of the IEEE 20th International Symposium on Personal, 2009

Security in Wireless Mesh Networks: Challenges and Solutions.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Outage Behavior of Multi-Antenna Multi-Relay Non-Regenerative Cooperative Networks.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Alert correlation by a retrospective method.
Proceedings of the 2009 International Conference on Information Networking, 2009

2008
A Group Key Management Scheme with Revocation and Loss-tolerance Capability for Wireless Sensor Networks.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

The Effect of Opportunistic Scheduling on TCP Performance over Shared Wireless Downlink.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Group-Based Trust Model in P2P System Based on Trusted Computing.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2006
Improved Signal Control for Oversaturated Intersection.
Proceedings of the IEEE Intelligent Transportation Systems Conference, 2006

2005
Distributed Intrusion Detection for Mobile Ad Hoc Networks.
Proceedings of the 2005 IEEE/IPSJ International Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops), 31 January, 2005

Resisting Flooding Attacks in Ad Hoc Networks.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

An Architecture for Intrusion Detection and Active Response Using Autonomous Agents in Mobile Ad Hoc Networks.
Proceedings of the ICEIS 2005, 2005

Optimizing Path Expression Queries of XML Data.
Proceedings of the 2005 IEEE International Conference on e-Business Engineering (ICEBE 2005), 2005

Applying Mobile Agent to Intrusion Response for Ad Hoc Networks.
Proceedings of the Computational Science, 2005

A Novel Intrusion Detection Method for Mobile Ad Hoc Networks.
Proceedings of the Advances in Grid Computing, 2005

2004
Securing ad hoc networks through mobile agent.
Proceedings of the 3rd International Conference on Information Security, 2004

Gossip-based scalable and reliable group key distribution framework.
Proceedings of the 3rd International Conference on Information Security, 2004

2001
Relocatable detector Concept for Dilemma Zone Protection at High-Speed Intersections.
J. Intell. Transp. Syst., 2001

Teaching highway safety analysis through networking and visualization.
Comput. Appl. Eng. Educ., 2001


  Loading...