Yang Xin

Orcid: 0000-0002-9706-3950

Affiliations:
  • Beijing University of Posts and Telecommunications, Beijing, China


According to our database1, Yang Xin authored at least 39 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Vulnerability detection based on federated learning.
Inf. Softw. Technol., March, 2024

2023
Static vulnerability detection based on class separation.
J. Syst. Softw., December, 2023

GLPS: A Geohash-Based Location Privacy Protection Scheme.
Entropy, December, 2023

VulGAI: vulnerability detection based on graphs and images.
Comput. Secur., December, 2023

COBATS: A Novel Consortium Blockchain-Based Trust Model for Data Sharing in Vehicular Networks.
IEEE Trans. Intell. Transp. Syst., November, 2023

CPVD: Cross Project Vulnerability Detection Based on Graph Attention Network and Domain Adaptation.
IEEE Trans. Software Eng., August, 2023

GL-Tree: A Hierarchical Tree Structure for Efficient Retrieval of Massive Geographic Locations.
Sensors, February, 2023

Cross-domain vulnerability detection using graph embedding and domain adaptation.
Comput. Secur., 2023

Malware Detection Using Contrastive Learning Based on Multi-Feature Fusion.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

2022
Privacy-Preserving Query Scheme (PPQS) for Location-Based Services in Outsourced Cloud.
Secur. Commun. Networks, 2022

Cross-domain entity identity association analysis and prediction based on representation learning.
Int. J. Distributed Sens. Networks, 2022

2021
Representativeness-Based Instance Selection for Intrusion Detection.
Secur. Commun. Networks, 2021

Cross-Platform Strong Privacy Protection Mechanism for Review Publication.
Secur. Commun. Networks, 2021

A blockchain index structure based on subchain query.
J. Cloud Comput., 2021

Secure ABE Scheme for Access Management in Blockchain-Based IoT.
IEEE Access, 2021

2020
Using User Behavior to Measure Privacy on Online Social Networks.
IEEE Access, 2020

Hierarchical Long Short-Term Memory Network for Cyberattack Detection.
IEEE Access, 2020

2019
A Secure and Efficient Data Integrity Verification Scheme for Cloud-IoT Based on Short Signature.
IEEE Access, 2019

An Intrusion Action-Based IDS Alert Correlation Analysis and Prediction Framework.
IEEE Access, 2019

A Mechanism to Improve Effectiveness and Privacy Preservation for Review Publication in LBS.
IEEE Access, 2019

LRM: A Location Recombination Mechanism for Achieving Trajectory k-Anonymity Privacy Protection.
IEEE Access, 2019

A Authentication and Access Authorization Mechanism on the PaaS Platform.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019

Intrusion Detection Based on Fusing Deep Neural Networks and Transfer Learning.
Proceedings of the Digital TV and Wireless Multimedia Communication, 2019

2018
A Clone Detection Algorithm with Low Resource Expenditure for Wireless Sensor Networks.
J. Sensors, 2018

Detection of selective forwarding attacks based on adaptive learning automata and communication quality in wireless sensor networks.
Int. J. Distributed Sens. Networks, 2018

Multimodal Feature-Level Fusion for Biometrics Identification System on IoMT Platform.
IEEE Access, 2018

Machine Learning and Deep Learning Methods for Cybersecurity.
IEEE Access, 2018

Automatic Tongue Verification Based on Appearance Manifold Learning in Image Sequences for the Internet of Medical Things Platform.
IEEE Access, 2018

A Survey of Malicious Accounts Detection in Large-Scale Online Social Networks.
Proceedings of the 4th IEEE International Conference on Big Data Security on Cloud, 2018

2017
Intrusion Detection Based on State Context and Hierarchical Trust in Wireless Sensor Networks.
IEEE Access, 2017

2016
Based on the character of cloud storage string encryption and cipher text retrieval of string research.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

2014
An Improved Directed Diffusion Protocol based on Opportunistic Routing.
J. Networks, 2014

A Weakly Homomorphic Encryption with LDN.
J. Networks, 2014

2013
A Novel Trust Evaluation Model Based on Grey Clustering Theory for Routing Networks.
J. Comput., 2013

2011
Research on Secure Multi-party Computational Geometry.
Proceedings of the Information Computing and Applications, 2011

Some results on preserving K-member simply separable relations in partial K-valued logic.
Proceedings of the Third International Conference on Digital Image Processing, 2011

An Anti-JPEG Compression Image Perceptual Hashing Algorithm.
Proceedings of the Applied Informatics and Communication - International Conference, 2011

2010
A near reversible image watermarking algorithm.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

2009
Vulnerabilities Analyzing Model for Alert Correlation in Distributed Environment.
Proceedings of the 2009 IITA International Conference on Services Science, 2009


  Loading...