Xiaohong Yuan
Orcid: 0000-0002-1295-9812
According to our database1,
Xiaohong Yuan
authored at least 112 papers
between 1995 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
1995
2000
2005
2010
2015
2020
0
5
10
1
1
3
3
3
1
2
2
1
1
2
1
1
1
2
1
5
7
4
8
8
4
5
6
7
8
1
2
3
2
2
4
3
2
2
1
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
CoRR, 2024
Efficient Federated Learning with Multi-Teacher Knowledge Distillation for COVID-19 Detection.
Proceedings of the 15th ACM International Conference on Bioinformatics, 2024
2023
Spatiotemporal Evolutions of the Suspended Particulate Matter in the Yellow River Estuary, Bohai Sea and Characterized by Gaofen Imagery.
Remote. Sens., October, 2023
J. Frankl. Inst., 2023
Anomaly-Based Intrusion on IoT Networks Using AIGAN-a Generative Adversarial Network.
IEEE Access, 2023
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2023
Proceedings of the Intelligent Systems and Applications, 2023
Using Ensemble Convolutional Neural Network to Detect Deepfakes Using Periocular Data.
Proceedings of the Intelligent Systems and Applications, 2023
Proceedings of the 2023 12th International Conference on Software and Information Engineering, 2023
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023
2022
J. Comput. Inf. Syst., September, 2022
Comparative Study on Recognition Models of Black-Odorous Water in Hangzhou Based on GF-2 Satellite Data.
Sensors, 2022
Autom. Softw. Eng., 2022
Face Authentication from Masked Face Images Using Deep Learning on Periocular Biometrics.
Proceedings of the Advances and Trends in Artificial Intelligence. Theory and Practices in Artificial Intelligence, 2022
Proceedings of the 34th IEEE International Conference on Tools with Artificial Intelligence, 2022
Semi-Supervised Machine Learning for Analyzing COVID-19 Related Twitter Data for Asian Hate Speech.
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022
Proceedings of the 1st International Conference on AI in Cybersecurity, 2022
An Analysis of COVID-19 related Twitter Data for Asian Hate Speech Using Machine Learning Algorithms.
Proceedings of the 1st International Conference on AI in Cybersecurity, 2022
Proceedings of the 1st International Conference on AI in Cybersecurity, 2022
Proceedings of the IEEE Frontiers in Education Conference, 2022
2021
Using Embedded Feature Selection and CNN for Classification on CCD-INID-V1 - A New IoT Dataset.
Sensors, 2021
Ultrasonic Diagnosis and Analysis of the Effect of Labor Analgesia on Early Pelvic Floor Function and Pelvic Floor Dysfunction.
J. Medical Imaging Health Informatics, 2021
Future Internet, 2021
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021
A Survey on Skeleton-Based Activity Recognition using Graph Convolutional Networks (GCN).
Proceedings of the 12th International Symposium on Image and Signal Processing and Analysis, 2021
Proceedings of the IEEE Frontiers in Education Conference, 2021
Implementing a network intrusion detection system using semi-supervised support vector machine and random forest.
Proceedings of the ACM SE '21: 2021 ACM Southeast Conference, 2021
2020
Using a Long Short-Term Memory Recurrent Neural Network (LSTM-RNN) to Classify Network Attacks.
Inf., 2020
Proceedings of the SIGITE '20: The 21st Annual Conference on Information Technology Education, 2020
Proceedings of the 32nd International Conference on Software Engineering and Knowledge Engineering, 2020
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020
Proceedings of the Intelligent Systems and Applications, 2020
Proceedings of the ICER 2020: International Computing Education Research Conference, 2020
Developing and Assessing a Web-Based Interactive Visualization Tool to Teach Buffer Overflow Concepts.
Proceedings of the IEEE Frontiers in Education Conference, 2020
Proceedings of the 12th International Conference on Computer Supported Education, 2020
Proceedings of the 49th IEEE Applied Imagery Pattern Recognition Workshop, 2020
2019
Investigating the impact of cybersecurity policy awareness on employees' cybersecurity behavior.
Int. J. Inf. Manag., 2019
Touch-Based Active Cloud Authentication Using Traditional Machine Learning and LSTM on a Distributed Tensorflow Framework.
Int. J. Comput. Intell. Appl., 2019
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019
Proceedings of the 18th IEEE International Conference On Machine Learning And Applications, 2019
Proceedings of the 2019 3rd International Conference on Deep Learning Technologies, 2019
Proceedings of the IEEE Frontiers in Education Conference, 2019
Developing and Assessing Educational Games to Enhance Cyber Security Learning in Computer Science.
Proceedings of the ACM Conference on Global Computing Education, 2019
Proceedings of the 25th Americas Conference on Information Systems, 2019
Proceedings of the 2019 ACM Southeast Conference, 2019
2018
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018
Performance Evaluation of Machine Learning Algorithms in Apache Spark for Intrusion Detection.
Proceedings of the 28th International Telecommunication Networks and Applications Conference, 2018
A User Study: Abuse Cases Derived from Use Case Description and CAPEC Attack Patterns.
Proceedings of the Information Science and Applications 2018, 2018
Proceedings of the Fourth IEEE International Conference on Big Data Computing Service and Applications, 2018
2017
Faculty Workshops for Teaching Information Assurance through Hands-On Exercises and Case Studies.
J. Inf. Syst. Educ., 2017
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017
Proceedings of the IEEE Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, 2017
Proceedings of the 28th Modern Artificial Intelligence and Cognitive Science Conference 2017, 2017
Proceedings of the 2017 IEEE Frontiers in Education Conference, 2017
Proceedings of the 2017 IEEE Frontiers in Education Conference, 2017
2016
Proceedings of the 17th Annual Conference on Information Technology Education and the 5th Annual Conference on Research in Information Technology, 2016
Assessing the Effectiveness of Experiential-Learning-Based Teaching Tools in Cybersecurity Courses (Abstract Only).
Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016
Design and Evaluation of a Course Module on Android Cipher Programming (Abstract Only).
Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016
Proceedings of the 2016 IEEE Frontiers in Education Conference, 2016
Developing and evaluating a hands-on lab for teaching local area network vulnerabilities.
Proceedings of the 2016 IEEE Frontiers in Education Conference, 2016
Proceedings of the 2016 International Conference on Behavioral, 2016
2015
Integrating Mobile Computing and Security into a Computer Science Curriculum (Abstract Only).
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015
Proceedings of the 2015 Information Security Curriculum Development Conference, 2015
Proceedings of the 2015 Information Security Curriculum Development Conference, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Proceedings of the 2015 IEEE Frontiers in Education Conference, 2015
Using a case study to teach students about finding and fixing logic flaws in software.
Proceedings of the 2015 IEEE Frontiers in Education Conference, 2015
Proceedings of the 21st Americas Conference on Information Systems, 2015
2014
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014
Techniques for retaining low performing students: high-need student mentoring program (abstract only).
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014
Proceedings of the 2014 Information Security Curriculum Development Conference, 2014
Proceedings of the 2014 Information Security Curriculum Development Conference, 2014
Developing Faculty Expertise in Information Assurance through Case Studies and Hands-On Experiences.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014
Does Explicit Information Security Policy Affect Employees' Cyber Security Behavior? A Pilot Study.
Proceedings of the Enterprise Systems Conference, 2014
Proceedings of the Enterprise Systems Conference, 2014
Proceedings of the Cyber and Information Security Research Conference, 2014
2013
J. Inf. Syst. Educ., 2013
Int. J. Inf. Secur. Priv., 2013
Proceedings of the IEEE Frontiers in Education Conference, 2013
2012
Int. J. Inf. Secur. Priv., 2012
Developing an interdisciplinary health informatics security and privacy program (abstract only).
Proceedings of the 43rd ACM technical symposium on Computer science education, 2012
Proceedings of the 50th Annual Southeast Regional Conference, 2012
2011
A Visualization based Simulator for SYN Flood Attacks.
Proceedings of the IMAGAPP & IVAPP 2011, 2011
The Design and Implementation of a Cryptographic Education Tool.
Proceedings of the CSEDU 2011, 2011
Proceedings of the 49th Annual Southeast Regional Conference, 2011
2010
Designing an SOA-Based Earthquake Forewarning System using BPMN.
Proceedings of the 2010 International Conference on Software Engineering Research & Practice, 2010
Proceedings of the Information Security Curriculum Development Conference, 2010
2009
Using a Practice Oriented Approach to Teach Web Security Course.
Proceedings of the 2009 International Conference on Frontiers in Education: Computer Science & Computer Engineering, 2009
Laboratory Design For Demonstrating Phishing.
Proceedings of the 2009 International Conference on Frontiers in Education: Computer Science & Computer Engineering, 2009
2008
Proceedings of the Innovative Techniques in Instruction Technology, 2008
2007
J. Supercomput., 2007
Engine fault diagnosis based on multi-sensor information fusion using Dempster-Shafer evidence theory.
Inf. Fusion, 2007
Proceedings of the 38th SIGCSE Technical Symposium on Computer Science Education, 2007
Proceedings of the 45th Annual Southeast Regional Conference, 2007
Proceedings of the 45th Annual Southeast Regional Conference, 2007
Bridge Information Assurance Education Gap between the Majority and Minority Universities through Collaboration.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007
2006
Proceedings of the 37th SIGCSE Technical Symposium on Computer Science Education, 2006
Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, 2006
Proceedings of the 2006 IEEE International Conference on Granular Computing, 2006
2005
A Personal Software Process Tool for Eclipse Environment.
Proceedings of the International Conference on Software Engineering Research and Practice, 2005
Secure Remote Compiling Services on the Grid.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2005
2003
An Experience Report on Teaching the Personal Software Process.
Proceedings of the International Conference on Software Engineering Research and Practice, 2003
Proceedings of the 8th European Conference on Pattern Languages of Programms (EuroPLoP '2003), 2003
2001
Threshold-Based Connection Admission Control Scheme in ATM Networks: A Simulation Study.
Proceedings of the Networking, 2001
2000
1995
Visualization in Mechanical Geometry Theorem Proving.
Proceedings of the Fifth Scandinavian Conference on Artificial Intelligence, 1995