Yi Xie

Orcid: 0000-0001-6884-2851

Affiliations:
  • Sun Yat-Sen University, Guangzhou, China


According to our database1, Yi Xie authored at least 55 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Estimating the composition ratios of network services carried in mixed traffic.
Comput. Commun., 2024

Identifying the Fraudulent Users for E-commerce Applications Based on the Access Behaviors.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024

SAME: Sample Reconstruction against Model Extraction Attacks.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Network Traffic Content Identification Based on Time-Scale Signal Modeling.
IEEE Trans. Dependable Secur. Comput., 2023

Range-Free Localization Using Extreme Learning Machine and Ring-Shaped Salp Swarm Algorithm in Anisotropic Networks.
IEEE Internet Things J., 2023

A survey on privacy inference attacks and defenses in cloud-based Deep Neural Network.
Comput. Stand. Interfaces, 2023

Mobile-Aware Online Task Offloading Based on Deep Reinforcement Learning in Mobile Edge Computing Networks.
Proceedings of the 34th IEEE Annual International Symposium on Personal, 2023

Boost Off/On-Manifold Adversarial Robustness for Deep Learning with Latent Representation Mixup.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Threat-Event Detection for Distributed Networks Based on Spatiotemporal Markov Random Field.
IEEE Trans. Dependable Secur. Comput., 2022

PowerFDNet: Deep Learning-Based Stealthy False Data Injection Attack Detection for AC-Model Transmission Systems.
IEEE Open J. Comput. Soc., 2022

Stacked Autoencoders-Based Localization Without Ranging Over Internet of Things.
IEEE Internet Things J., 2022

FPGA-based DFT system design, optimisation and implementation using high-level synthesis.
Int. J. Comput. Appl. Technol., 2022

Application Identification under Multi-Service Integration Platform.
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022

GAME: Generative-Based Adaptive Model Extraction Attack.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
Identifying click-requests for the network-side through traffic behavior.
J. Netw. Comput. Appl., 2021

Performance analysis of a healthcare internet of things system subject to wireless cloud connection failure.
Int. J. Wirel. Mob. Comput., 2021

Privacy Inference Attacks and Defenses in Cloud-based Deep Neural Network: A Survey.
CoRR, 2021

Range-free localization using Reliable Anchor Pair Selection and Quantum-behaved Salp Swarm Algorithm for anisotropic Wireless Sensor Networks.
Ad Hoc Networks, 2021

A Light-Weight Scheme for Detecting Component Structure of Network Traffic.
Proceedings of the Parallel and Distributed Computing, Applications and Technologies, 2021

A Review on the Research of Producer Services Supply Chain in China.
Proceedings of the Design, Operation and Evaluation of Mobile Communications, 2021

2020
A Novel Range-Free Localization Scheme Based on Anchor Pairs Condition Decision in Wireless Sensor Networks.
IEEE Trans. Commun., 2020

Serially concatenated scheme of polar codes and the improved belief propagation decoding algorithm.
IET Commun., 2020

2019
Detecting Anomalous Behavior in Cloud Servers by Nested-Arc Hidden SEMI-Markov Model with State Summarization.
IEEE Trans. Big Data, 2019

Corrigendum to "Recognizing the content types of network traffic based on a hybrid DNN-HMM model" [J. Netw. Comput. Appl. 142 (2019) 51-62].
J. Netw. Comput. Appl., 2019

Recognizing the content types of network traffic based on a hybrid DNN-HMM model.
J. Netw. Comput. Appl., 2019

Content Recognition of Network Traffic Using Wavelet Transform and CNN.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

2018
Hybrid Deep Neural Network - Hidden Markov Model Based Network Traffic Classification.
Proceedings of the Communications and Networking, 2018

Detecting Network Events by Analyzing Dynamic Behavior of Distributed Network.
Proceedings of the Communications and Networking, 2018

2017
Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling.
J. Netw. Comput. Appl., 2017

2016
A General Collaborative Framework for Modeling and Perceiving Distributed Network Behavior.
IEEE/ACM Trans. Netw., 2016

Comments and Corrections.
IEEE Trans. Comput. Soc. Syst., 2016

Impact of sensing errors on the performance of an unreliable opportunistic spectrum sharing system.
Int. J. Wirel. Mob. Comput., 2016

Windows Based Data Sets for Evaluation of Robustness of Host Based Intrusion Detection Systems (IDS) to Zero-Day and Stealth Attacks.
Future Internet, 2016

2015
A Performance Evaluation of Machine Learning-Based Streaming Spam Tweets Detection.
IEEE Trans. Comput. Soc. Syst., 2015

Integer Data Zero-Watermark Assisted System Calls Abstraction and Normalization for Host Based Anomaly Detection Systems.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2013
Resisting Web Proxy-Based HTTP Attacks by Temporal and Spatial Locality Behavior.
IEEE Trans. Parallel Distributed Syst., 2013

Modeling Oscillation Behavior of Network Traffic by Nested Hidden Markov Model with Variable State-Duration.
IEEE Trans. Parallel Distributed Syst., 2013

Modeling Web Session for Detecting Pseudo HTTP Traffic.
J. Comput., 2013

Analysis of TDOA based radar target positioning in LOS and NLOS environments.
Int. J. Wirel. Mob. Comput., 2013

A Forward-Backward Algorithm for Nested Hidden semi-Markov Model and Application to Network Traffic.
Comput. J., 2013

2012
A structural approach for modelling the hierarchical dynamic process of Web workload in a large-scale campus network.
J. Netw. Comput. Appl., 2012

A Comparative Study of Power Line Communication Networks With and Without Buffer.
Int. J. Commun. Networks Inf. Secur., 2012

Online Anomaly Detection Based on Web Usage Mining.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012

A Periodic Structural Model for Characterizing Network Traffic.
Proceedings of the Intelligent Computing Theories and Applications, 2012

2011
Performance Analysis of Unreliable Sensing for an Opportunistic Spectrum Sharing System.
Int. J. Commun. Networks Inf. Secur., 2011

A Two-Layer Hidden Markov Model for the Arrival Process of Web Traffic.
Proceedings of the MASCOTS 2011, 2011

Modeling and Analysis of Network Security Situation Prediction Based on Covariance Likelihood Neural.
Proceedings of the Bio-Inspired Computing and Applications, 2011

Modeling and Analysis of a Power Line Communication Network Subject to Channel Failure.
Proceedings of the ICEIS 2011, 2011

A new model for generating burst traffic based on hierarchical HMM.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011

2009
A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors.
IEEE/ACM Trans. Netw., 2009

Monitoring the application-layer DDoS attacks for popular websites.
IEEE/ACM Trans. Netw., 2009

2008
Measuring the Normality of Web Proxies' Behavior Based on Locality Principles.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2008

2007
Detecting Shrew HTTP Flood Attacks for Flash Crowds.
Proceedings of the Computational Science, 2007

2006
A Novel Model for Detecting Application Layer DDoS Attacks.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

A Dynamic Anomaly Detection Model for Web User Behavior Based on HsMM.
Proceedings of the 10th International Conference on CSCW in Design, 2006


  Loading...