Yuexiang Yang

Orcid: 0000-0002-8495-7795

According to our database1, Yuexiang Yang authored at least 71 papers between 2008 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
ANODYNE: Mitigating backdoor attacks in federated learning.
Expert Syst. Appl., 2025

2024
Multiview Deep Anomaly Detection: A Systematic Exploration.
IEEE Trans. Neural Networks Learn. Syst., February, 2024

Speedy Privacy-Preserving Skyline Queries on Outsourced Data.
Proceedings of the Computer Security - ESORICS 2024, 2024

Honest-Majority Maliciously Secure Skyline Queries on Outsourced Data.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024

2023
Contrastive Multi-View Kernel Learning.
IEEE Trans. Pattern Anal. Mach. Intell., August, 2023

Defending against Adversarial Attacks in Federated Learning on Metric Learning Model.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Defending against Poisoning Attacks in Federated Learning from a Spatial-temporal Perspective.
Proceedings of the 42nd International Symposium on Reliable Distributed Systems, 2023

2022
Multiview Subspace Clustering via Co-Training Robust Data Representation.
IEEE Trans. Neural Networks Learn. Syst., 2022

Optimal Neighborhood Multiple Kernel Clustering With Adaptive Local Kernels.
IEEE Trans. Knowl. Data Eng., 2022

Gradient Privacy-Preserving In Federated Learning via Proxy Re-Encryption.
Proceedings of the 5th International Conference on Information Science and Systems, 2022

A Two-Stage Out-Of-Box Method for Detecting Side-Channel Attacks in Cloud Computing.
Proceedings of the 6th International Conference on Cryptography, Security and Privacy, 2022

MADDC: Multi-Scale Anomaly Detection, Diagnosis and Correction for Discrete Event Logs.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Dual-branch combination network (DCN): Towards accurate diagnosis and lesion segmentation of COVID-19 using CT images.
Medical Image Anal., 2021

FREPD: A Robust Federated Learning Framework on Variational Autoencoder.
Comput. Syst. Sci. Eng., 2021

Multi-view Deep One-class Classification: A Systematic Exploration.
CoRR, 2021

Detecting Malicious Gradients from Asynchronous SGD on Variational Autoencoder.
Proceedings of the 40th International Symposium on Reliable Distributed Systems, 2021

Self-Representation Subspace Clustering for Incomplete Multi-view Data.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

Detecting Malicious Model Updates from Federated Learning on Conditional Variational Autoencoder.
Proceedings of the 35th IEEE International Parallel and Distributed Processing Symposium, 2021

One-pass Multi-view Clustering for Large-scale Data.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

Hierarchical Multiple Kernel Clustering.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Assessing the reliability of electronic products using customer knowledge discovery.
Reliab. Eng. Syst. Saf., 2020

An Evidence Combination Rule Based on Transferable Belief Model and Application in Reliability Assessment With Multi-Source Data.
IEEE Access, 2020

2019
Automated Hybrid Analysis of Android Malware through Augmenting Fuzzing with Forced Execution.
IEEE Trans. Mob. Comput., 2019

Study on Massive-Scale Slow-Hash Recovery Using Unified Probabilistic Context-Free Grammar and Symmetrical Collaborative Prioritization with Parallel Machines.
Symmetry, 2019

LeakDoctor: Toward Automatically Diagnosing Privacy Leaks in Mobile Applications.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019

PrivacyContext: identifying malicious mobile privacy leak using program context.
Int. J. Inf. Comput. Secur., 2019

Optimizing partitioning strategies for faster inverted index compression.
Frontiers Comput. Sci., 2019

Pricing Interval European Option with the Principle of Maximum Entropy.
Entropy, 2019

A Blockchain-Based Traffic Conditions and Driving Behaviors Warning Scheme in the Internet of Vehicles.
Proceedings of the 19th IEEE International Conference on Communication Technology, 2019

2018
A Novel Android Malware Detection Approach Based on Convolutional Neural Network.
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018

Feedback based Sampling for Intrusion Detection in Software Defined Network.
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018

Enhancing Machine Learning Based Malware Detection Model by Reinforcement Learning.
Proceedings of the 8th International Conference on Communication and Network Security, 2018

2017
An SDN-based Sampling System for Cloud P2P Bots Detection.
J. Inf. Sci. Eng., 2017

Adaptive traffic sampling for P2P botnet detection.
Int. J. Netw. Manag., 2017

Well-Balanced Successive Simple-9 for Inverted Lists Compression.
IEICE Trans. Inf. Syst., 2017

SIMD-Based Multiple Sets Intersection with Dual-Scale Search Algorithm.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

Software Optimizations of Multiple Sets Intersection via SIMD Instructions.
Proceedings of the 24th Asia-Pacific Software Engineering Conference, 2017

Droid-AntiRM: Taming Control Flow Anti-analysis to Support Automated Dynamic Analysis of Android Malware.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Efficient dynamic pruning on largest scores first (LSF) retrieval.
Frontiers Inf. Technol. Electron. Eng., 2016

DroidContext: Identifying Malicious Mobile Privacy Leak Using Context.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

CapaDroid: Detecting Capability Leak for Android Applications.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

AppWalker: Efficient and Accurate Dynamic Analysis of Apps via Concolic Walking Along the Event-Dependency Graph.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

IacCE: Extended Taint Path Guided Dynamic Analysis of Android Inter-App Data Leakage.
Proceedings of the Security and Privacy in Communication Networks, 2016

Architecture Support for Controllable VMI on Untrusted Cloud.
Proceedings of the Security and Privacy in Communication Networks, 2016

Crafting Intents to Detect ICC Vulnerabilities of Android Apps.
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016

A Heuristically Optimized Partitioning Strategy on Elias-Fano Index.
Proceedings of the Advances on P2P, 2016

2015
Fine-grained P2P traffic classification by simply counting flows.
Frontiers Inf. Technol. Electron. Eng., 2015

Highly Compressed Lists of Integers with Dense Padding Modes.
IEICE Trans. Inf. Syst., 2015

A Disjunctive VMI Model Based on XSM.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015

A Novel Hybrid Mobile Malware Detection System Integrating Anomaly Detection With Misuse Detection.
Proceedings of the 6th International Workshop on Mobile Cloud Computing and Services, 2015

Exhaustive Hybrid Posting Lists Traversing Technique.
Proceedings of the Intelligence Science and Big Data Engineering. Big Data and Machine Learning Techniques, 2015

SPEMS: A Stealthy and Practical Execution Monitoring System Based on VMI.
Proceedings of the Cloud Computing and Security - First International Conference, 2015

On Structures of Inverted Index for Query Processing Efficiency.
Proceedings of the Information Retrieval Technology, 2015

2014
Modeling and optimization of two-stage procurement in dual-channel supply chain.
Inf. Technol. Manag., 2014

An information dissemination model of product quality and safety based on scale-free networks.
Inf. Technol. Manag., 2014

Faster MaxScore Document Retrieval with Aggressive Processing.
Proceedings of the Web-Age Information Management - 15th International Conference, 2014

Identifying P2P Network Activities on Encrypted Traffic.
Proceedings of the 13th IEEE International Conference on Trust, 2014

A Collaborative Traceback against P2P Botnet Using Information Sharing and Correlation Analysis.
Proceedings of the 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2014

Performance Evaluation of Inverted Index Traversal Techniques.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

PeerSorter: Classifying Generic P2P Traffic in Real-Time.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

PeerDigger: Digging Stealthy P2P Hosts through Traffic Analysis in Real-Time.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

Design of a comprehensive virtual machine monitoring system.
Proceedings of the IEEE 3rd International Conference on Cloud Computing and Intelligence Systems, 2014

Faster MaxScore Query Processing with Essential List Skipping.
Proceedings of the Advanced Data Mining and Applications - 10th International Conference, 2014

2013
Detecting P2P bots by mining the regional periodicity.
J. Zhejiang Univ. Sci. C, 2013

Dynamic Vehicle Routing Using an Improved Variable Neighborhood Search Algorithm.
J. Appl. Math., 2013

A Lightweight Design of Malware Behavior Representation.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Analyzing Malware by Abstracting the Frequent Itemsets in API Call Sequences.
Proceedings of the 12th IEEE International Conference on Trust, 2013

2012
Shedding light on the use of AS relationships for path inference.
J. Commun. Networks, 2012

A New Variable Neighborhood Search Algorithm for the Multi Depot Heterogeneous Vehicle Routing Problem with Time Windows.
Electron. Notes Discret. Math., 2012

2011
Detecting Parasite P2P Botnet in eMule-like Networks through Quasi-periodicity Recognition.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

2008
Intelligent Agents Using Competitive Bidding Mechanism in Storage Grids.
Proceedings of the Fourth International Conference on Semantics, Knowledge and Grid, 2008


  Loading...