Yi Zhuang

Orcid: 0000-0003-0706-0148

Affiliations:
  • Nanjing University of Aeronautics and Astronautics, Department of Computer Science and Technology, China


According to our database1, Yi Zhuang authored at least 68 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
FRAMB: A man-machine cooperation risk assessment method for intelligent network information systems.
J. Intell. Fuzzy Syst., 2024

A method for analyzing the impact of SEUs on satellite networks from the perspective of distributed routing.
Ad Hoc Networks, 2024

2023
MDSSED: A safety and security enhanced model-driven development approach for smart home apps.
Inf. Softw. Technol., November, 2023

MBIPV: a model-based approach for identifying privacy violations from software requirements.
Softw. Syst. Model., August, 2023

Multi-bit Data Flow Error Detection Method Based on SDC Vulnerability Analysis.
ACM Trans. Embed. Comput. Syst., 2023

A Dynamic Hierarchical Single Link Fault Recovery Scheme for SDN Based on Dynamic Hierarchies.
Proceedings of the 2nd International Conference on Signal Processing, 2023

2021
A security type verifier for smart contracts.
Comput. Secur., 2021

2020
TZ-MRAS: A Remote Attestation Scheme for the Mobile Terminal Based on ARM TrustZone.
Secur. Commun. Networks, 2020

BAHK: Flexible Automated Binary Analysis Method with the Assistance of Hardware and System Kernel.
Secur. Commun. Networks, 2020

Exploiting Multiple Correlations Among Urban Regions for Crowd Flow Prediction.
J. Comput. Sci. Technol., 2020

Dynamic Measurement and Data Calibration for Aerial Mobile IoT.
IEEE Internet Things J., 2020

Mutual authentication-based RA scheme for embedded systems.
IET Inf. Secur., 2020

Malicious Code Detection for Trusted Execution Environment Based on Paillier Homomorphic Encryption.
IEICE Trans. Commun., 2020

A security modeling and verification method of embedded software based on Z and MARTE.
Comput. Secur., 2020

PHRiMA: A permission-based hybrid risk management framework for android apps.
Comput. Secur., 2020

Lightweight and Efficient Hypervisor-Based Dynamic Binary Instrumentation and Analysis Method.
IEEE Access, 2020

SCPAC: An Access Control Framework for Diverse IoT Platforms Based on OAuth2.0.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

A Blockchain-Based Reconstruction Framework for UAV Network.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

A Model-driven Collaborative Modeling Method for Software.
Proceedings of the ICMSS 2020: 2020 4th International Conference on Management Engineering, 2020

2019
A Robust Transmission Scheduling Approach for Internet of Things Sensing Service with Energy Harvesting.
Sensors, 2019

Efficient and Transparent Method for Large-Scale TLS Traffic Analysis of Browsers and Analogous Programs.
Secur. Commun. Networks, 2019

一种结合AADL与Z的嵌入式软件可靠性建模与评估方法 (Embedded Software Reliability Model and Evaluation Method Combining AADL and Z).
计算机科学, 2019

Load forecasting for cloud computing based on wavelet support vector machine.
Int. J. High Perform. Comput. Netw., 2019

Vulnerability Analysis of Instructions for SDC-Causing Error Detection.
IEEE Access, 2019

An Autonomous UAV Navigation System for Unknown Flight Environment.
Proceedings of the 15th International Conference on Mobile Ad-Hoc and Sensor Networks, 2019

Load Forecasting model of Mobile Cloud Computing Based on Glowworm Swarm Optimization LSTM Network.
Proceedings of the ICIT 2019, 2019

A Fault Detection Algorithm for Cloud Computing Using QPSO-Based Weighted One-Class Support Vector Machine.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

2018
Compressed Sensing Based Joint Rate Allocation and Routing Design in Wireless Sensor Networks.
Wirel. Commun. Mob. Comput., 2018

基于生存分析的GPS轨迹缺失规律挖掘 (Pattern Mining of Missing GPS Trajectory Based on Survival Analysis).
计算机科学, 2018

一种基于局部性原理的远程验证机制 (Remote Attestation Mechanism Based on Locality Principle).
计算机科学, 2018

A load prediction model for cloud computing using PSO-based weighted wavelet support vector machine.
Appl. Intell., 2018

Ego-network probabilistic graphical model for discovering on-line communities.
Appl. Intell., 2018

Visible Light Based Occupancy Inference Using Ensemble Learning.
IEEE Access, 2018

Consortium Blockchain-Based Malware Detection in Mobile Devices.
IEEE Access, 2018

A Concept Drift Based Ensemble Incremental Learning Approach for Intrusion Detection.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

A Flexible Network Utility Optimization Approach for Energy Harvesting Sensor Networks.
Proceedings of the IEEE Global Communications Conference, 2018

A Sparse and Low-Rank Matrix Recovery Model for Saliency Detection.
Proceedings of the Advanced Data Mining and Applications - 14th International Conference, 2018

Instruction SDC Vulnerability Prediction Using Long Short-Term Memory Neural Network.
Proceedings of the Advanced Data Mining and Applications - 14th International Conference, 2018

2017
PMCAP: A Threat Model of Process Memory Data on the Windows Operating System.
Secur. Commun. Networks, 2017

基于有效锚节点的多传感器测向测时协同定位算法 (Multi-sensors Direction-and-Time Co-localization Algorithm Based on Efficient Anchor-nodes).
计算机科学, 2017

基于局部保持典型相关分析的无线传感器网络三维定位算法 (3D Localization Estimation Algorithm Based on Locality Preserving Canonical Correlation Analysis in Wireless Sensor Networks).
计算机科学, 2017

A three-dimensional virtual resource scheduling method for energy saving in cloud computing.
Future Gener. Comput. Syst., 2017

Modeling and validation for embedded software confidentiality and integrity.
Proceedings of the 12th International Conference on Intelligent Systems and Knowledge Engineering, 2017

Android Malware Detection Using Hybrid Analysis and Machine Learning Technique.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

Detect Storage Vulnerability of User-Input Privacy in Android Applications with Static and Dynamic Analysis.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

The cloud computing load forecasting algorithm based on wavelet support vector machine.
Proceedings of the Australasian Computer Science Week Multiconference, 2017

2016
Accuracy-Aware Interference Modeling and Measurement in Wireless Sensor Networks.
IEEE Trans. Mob. Comput., 2016

基于Uppaal的实时系统AADL数据流模型的转换与验证 (Transformation and Verification Method of AADL Data Flows for Real-time System Using Uppaal).
计算机科学, 2016

Sensor Module Based on the Wireless Sensor Network for the Dynamic Stress on the Flexible Object with Large Deformation.
J. Sensors, 2016

BSFCoS: Block and Sparse Principal Component Analysis-Based Fast Co-Saliency Detection Method.
Int. J. Pattern Recognit. Artif. Intell., 2016

A formal model and risk assessment method for security-critical real-time embedded systems.
Comput. Secur., 2016

On the optimal design of secure network coding against wiretapping attack.
Comput. Networks, 2016

Automatic Classification of Cloud Service Based on Weighted Euclidean Distance.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
Modeling Dependability Features for Real-Time Embedded Systems.
IEEE Trans. Dependable Secur. Comput., 2015

Fuzzy trust evaluation based on consistency intensity for cloud services.
Kybernetes, 2015

BSFCoS: 基于分块与稀疏主特征提取的快速协同显著性检测 (BSFCoS: Fast Co-saliency Detection Based on Block and Sparse Principal Feature Extraction).
计算机科学, 2015

一种基于稀疏主成分的基因表达数据特征提取方法 (Feature Extraction Method Based on Sparse Principal Components for Gene Expression Data).
计算机科学, 2015

An Improved 3D Localization Algorithm for the Wireless Sensor Network.
Int. J. Distributed Sens. Networks, 2015

Elite-guided multi-objective artificial bee colony algorithm.
Appl. Soft Comput., 2015

Discrete gbest-guided artificial bee colony algorithm for cloud service composition.
Appl. Intell., 2015

Computing contingency tables from sparse ADtrees.
Appl. Intell., 2015

The Design and Implementation of a Dynamic Verification System of Z.
Proceedings of the Cloud Computing and Security - First International Conference, 2015

2014
An efficient energy hole alleviating algorithm for wireless sensor networks.
IEEE Trans. Consumer Electron., 2014

Research and Application of Data Integration in Aircraft Designing Based on SDO.
J. Softw., 2014

A Formal Transformation Approach for Embedded Software Modeling.
J. Softw., 2014

An improved DDS publish/subscribe automatic discovery algorithm.
Int. J. High Perform. Comput. Netw., 2014

An ensemble algorithm with self-adaptive learning techniques for high-dimensional numerical optimization.
Appl. Math. Comput., 2014

2012
Flow-Sensitive Automaton-Based Monitoring of a Declassification Policy.
J. Softw., 2012


  Loading...