Yu-an Tan
Orcid: 0000-0001-6404-8853Affiliations:
- Beijing Institute of Technology, School of Computer Science and Technology, China
According to our database1,
Yu-an Tan
authored at least 105 papers
between 2006 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Interpretable adversarial example detection via high-level concept activation vector.
Comput. Secur., 2025
2024
Cybersecur., December, 2024
Crafting Transferable Adversarial Examples Against Face Recognition via Gradient Eroding.
IEEE Trans. Artif. Intell., January, 2024
Dataflow optimization with layer-wise design variables estimation method for enflame CNN accelerators.
J. Parallel Distributed Comput., 2024
Inf. Sci., 2024
Dynamic fuzz testing of UAV configuration parameters based on dual guidance of fitness and coverage.
Connect. Sci., 2024
COVER: Enhancing virtualization obfuscation through dynamic scheduling using flash controller-based secure module.
Comput. Secur., 2024
ATT&CK-based Advanced Persistent Threat attacks risk propagation assessment model for zero trust networks.
Comput. Networks, 2024
Proceedings of the 2024 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
A blockchain-based access control protocol for secure resource sharing with mobile edge-cloud collaboration.
J. Ambient Intell. Humaniz. Comput., October, 2023
Improving the invisibility of adversarial examples with perceptually adaptive perturbation.
Inf. Sci., July, 2023
Deep Fusion: Crafting Transferable Adversarial Examples and Improving Robustness of Industrial Artificial Intelligence of Things.
IEEE Trans. Ind. Informatics, June, 2023
Expert Syst. J. Knowl. Eng., June, 2023
Building Covert Timing Channel of the IoT-Enabled MTS Based on Multi-Stage Verification.
IEEE Trans. Intell. Transp. Syst., February, 2023
Sensors, February, 2023
IEEE Trans. Dependable Secur. Comput., 2023
Towards interpreting vulnerability of object detection models via adversarial distillation.
J. Inf. Secur. Appl., 2023
A group key exchange and secure data sharing based on privacy protection for federated learning in edge-cloud collaborative computing environment.
Int. J. Netw. Manag., 2023
CoRR, 2023
Towards Invisible Backdoor Attacks in the Frequency Domain against Deep Neural Networks.
CoRR, 2023
Proceedings of the Machine Learning for Cyber Security - 5th International Conference, 2023
Proceedings of the Neural Information Processing - 30th International Conference, 2023
Proceedings of the Blockchain Technology and Emerging Applications, 2023
2022
Int. J. Intell. Syst., December, 2022
A fine-grained and traceable multidomain secure data-sharing model for intelligent terminals in edge-cloud collaboration scenarios.
Int. J. Intell. Syst., 2022
Improving the Transferability of Adversarial Examples with Restructure Embedded Patches.
CoRR, 2022
Decision-based Black-box Attack Against Vision Transformers via Patch-wise Adversarial Removal.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022
2021
Mob. Networks Appl., 2021
Inf. Sci., 2021
Int. J. Intell. Syst., 2021
Data security sharing model based on privacy protection for blockchain-enabled industrial Internet of Things.
Int. J. Intell. Syst., 2021
Appl. Soft Comput., 2021
Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021
2020
IEEE Wirel. Commun., 2020
J. Netw. Comput. Appl., 2020
Inf. Sci., 2020
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020
Proceedings of the IEEE International Conference on Multimedia and Expo, 2020
2019
A sensitive network jitter measurement for covert timing channels over interactive traffic.
Multim. Tools Appl., 2019
J. Parallel Distributed Comput., 2019
J. Netw. Comput. Appl., 2019
J. Ambient Intell. Humaniz. Comput., 2019
Inf. Sci., 2019
Optimizing the restoration performance of deduplication systems through an energy-saving data layout.
Ann. des Télécommunications, 2019
IEEE Access, 2019
2018
Wirel. Commun. Mob. Comput., 2018
IEEE Trans. Circuits Syst. Video Technol., 2018
An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks.
Sensors, 2018
Multim. Tools Appl., 2018
Multim. Tools Appl., 2018
J. Netw. Comput. Appl., 2018
J. Netw. Comput. Appl., 2018
Inf. Sci., 2018
RootAgency: A digital signature-based root privilege management agency for cloud terminal devices.
Inf. Sci., 2018
Inf. Sci., 2018
Int. J. Distributed Sens. Networks, 2018
Sci. China Inf. Sci., 2018
A Dynamic and Cross-Domain Authentication Asymmetric Group Key Agreement in Telemedicine Application.
IEEE Access, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
2017
A methodology for determining the image base of ARM-based industrial control system firmware.
Int. J. Crit. Infrastructure Prot., 2017
Future Gener. Comput. Syst., 2017
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
2016
IEICE Trans. Inf. Syst., 2016
Digit. Investig., 2016
2015
Int. J. Wirel. Mob. Comput., 2015
Int. J. Comput. Sci. Math., 2015
Frontiers Comput. Sci., 2015
Digit. Investig., 2015
2014
Inf. Sci., 2014
2013
Int. J. Wirel. Mob. Comput., 2013
IACR Cryptol. ePrint Arch., 2013
Enhanced Privacy Preserving Pattern-Code Based Data Aggregation in Wireless Sensor Networks.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013
2012
Digit. Investig., 2012
Proceedings of the 13th International Conference on Parallel and Distributed Computing, 2012
Proceedings of the 13th International Conference on Parallel and Distributed Computing, 2012
2011
J. Comput., 2011
Proceedings of the Applied Informatics and Communication - International Conference, 2011
Proceedings of the Applied Informatics and Communication - International Conference, 2011
Proceedings of the 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, 2011
2010
Proceedings of the Computer and Computing Technologies in Agriculture IV, 2010
2009
Proceedings of the Design, Automation and Test in Europe, 2009
2007
Research on Customer Classification in E-Supermarket by Using Modified Fuzzy Neural Networks.
Proceedings of the Advances in Neural Networks, 2007
A Collaborative Teaching Approach Using Integrated Electronic Environments for Information Security.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007
2006
Proceedings of the Agent Computing and Multi-Agent Systems, 2006