Yinhao Xiao

Orcid: 0000-0002-9871-9552

According to our database1, Yinhao Xiao authored at least 31 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
TBAC: A Tokoin-Based Accountable Access Control Scheme for the Internet of Things.
IEEE Trans. Mob. Comput., May, 2024

A Depression Detection Method Based on Multi-Modal Feature Fusion Using Cross-Attention.
CoRR, 2024

Background-aware Multi-source Fusion Financial Trend Forecasting Mechanism.
CoRR, 2024

2023
DeepVulSeeker: A novel vulnerability identification framework via code graph structure and pre-training mechanism.
Future Gener. Comput. Syst., November, 2023

CommandFence: A Novel Digital-Twin-Based Preventive Framework for Securing Smart Home Systems.
IEEE Trans. Dependable Secur. Comput., 2023

I Know Your Social Network Accounts: A Novel Attack Architecture for Device-Identity Association.
IEEE Trans. Dependable Secur. Comput., 2023

DefectHunter: A Novel LLM-Driven Boosted-Conformer-based Code Vulnerability Detection Mechanism.
CoRR, 2023

JFinder: A Novel Architecture for Java Vulnerability Identification Based Quad Self-Attention and Pre-training Mechanism.
CoRR, 2023

2022
Solving the Federated Edge Learning Participation Dilemma: A Truthful and Correlated Perspective.
IEEE Trans. Veh. Technol., 2022

A Combination of Host Overloading Detection and Virtual Machine Selection in Cloud Server Consolidation based on Learning Method.
CoRR, 2022

Multi-view Pre-trained Model for Code Vulnerability Identification.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

BDTwins: Blockchain-based Digital Twins Lifecycle Management.
Proceedings of the IEEE Smartworld, 2022

2021
Design of cloud computing task offloading algorithm based on dynamic multi-objective evolution.
Future Gener. Comput. Syst., 2021

A differential game view of antagonistic dynamics for cybersecurity.
Comput. Networks, 2021

2020
Image and Attribute Based Convolutional Neural Network Inference Attacks in Social Networks.
IEEE Trans. Netw. Sci. Eng., 2020

HomeShield: A Credential-Less Authentication Framework for Smart Home Systems.
IEEE Internet Things J., 2020

Queuing Without Patience: A Novel Transaction Selection Mechanism in Blockchain for IoT Enhancement.
IEEE Internet Things J., 2020

BC-SABE: Blockchain-Aided Searchable Attribute-Based Encryption for Cloud-IoT.
IEEE Internet Things J., 2020

Tokoin: A Coin-Based Accountable Access Control Scheme for Internet of Things.
CoRR, 2020

A Correlated Equilibrium based Transaction Pricing Mechanism in Blockchain.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020

Correlated Participation Decision Making for Federated Edge Learning.
Proceedings of the IEEE Global Communications Conference, 2020

2019
Edge Computing Security: State of the Art and Challenges.
Proc. IEEE, 2019

I Can See Your Brain: Investigating Home-Use Electroencephalography System Security.
IEEE Internet Things J., 2019

NormaChain: A Blockchain-Based Normalized Autonomous Transaction Settlement System for IoT-Based E-Commerce.
IEEE Internet Things J., 2019

2018
Cryptographic algorithms for privacy-preserving online applications.
Math. Found. Comput., 2018

Detecting Malicious Behaviors in JavaScript Applications.
IEEE Access, 2018

A Novel Graph-based Mechanism for Identifying Traffic Vulnerabilities in Smart Home IoT.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

2017
Privilege Leakage and Information Stealing through the Android Task Mechanism.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Personal Information Inference in Social Networks.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Inference attacks based on neural networks in social networks.
Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies, 2017

2016
A Function-Level Behavior Model for Anomalous Behavior Detection in Hybrid Mobile Applications.
Proceedings of the International Conference on Identification, 2016


  Loading...