Yuyang Zhou
Orcid: 0000-0001-8626-0468
According to our database1,
Yuyang Zhou
authored at least 60 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Enhancing online yard crane scheduling through a two-stage rollout memetic genetic programming.
Memetic Comput., September, 2024
ACM Trans. Graph., July, 2024
Exploring unknown environments: motivated developmental learning for autonomous navigation of mobile robots.
Intell. Serv. Robotics, March, 2024
MTDroid: A Moving Target Defense-Based Android Malware Detector Against Evasion Attacks.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Signal Process. Lett., 2024
CoRR, 2024
Proceedings of the 47th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Proceedings of the IEEE Congress on Evolutionary Computation, 2024
2023
Decentralised fully probabilistic design for stochastic networks with multiplicative noise.
Int. J. Syst. Sci., June, 2023
Bifurcations and nonlinear dynamics of asymmetric tri-stable piezoelectric vibration energy harvesters.
Commun. Nonlinear Sci. Numer. Simul., May, 2023
Int. J. Control, March, 2023
Tracking Control for Output Probability Density Function of Stochastic Systems Using FPD Method.
Entropy, February, 2023
IEEE Trans. Inf. Forensics Secur., 2023
Searchable Public-Key Encryption With Cryptographic Reverse Firewalls for Cloud Storage.
IEEE Trans. Cloud Comput., 2023
MalPurifier: Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks.
CoRR, 2023
The Proximal Operator of the Piece-wise Exponential Function and Its Application in Compressed Sensing.
CoRR, 2023
Towards a Revolutionary Info-Geometric Control Theory with Potential Applications of Fokker Planck Kolmogorov(FPK) Equation to System Control, Modelling and Simulation.
Proceedings of the 28th International Conference on Automation and Computing, 2023
2022
Toward Proactive and Efficient DDoS Mitigation in IIoT Systems: A Moving Target Defense Approach.
IEEE Trans. Ind. Informatics, 2022
An immune algorithm for solving the optimization problem of locating the battery swapping stations.
Knowl. Based Syst., 2022
Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks.
Inf. Sci., 2022
Entropy, 2022
Length matters: Scalable fast encrypted internet traffic service classification based on multiple protocol data unit length sequence with composite deep learning.
Digit. Commun. Networks, 2022
A quantitative framework for network resilience evaluation using Dynamic Bayesian Network.
Comput. Commun., 2022
Higher Layers, Better Results: Application Layer Feature Engineering in Encrypted Traffic Classification.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
An Improved Equiangular Division Algorithm for SBR based Ray Tracing Channel Modeling.
Proceedings of the 96th Vehicular Technology Conference, 2022
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2022
CogKTR: A Knowledge-Enhanced Text Representation Toolkit for Natural Language Understanding.
Proceedings of the The 2022 Conference on Empirical Methods in Natural Language Processing, 2022
2021
Microgrid Group Control Method Based on Deep Learning under Cloud Edge Collaboration.
Wirel. Commun. Mob. Comput., 2021
IEEE Trans. Inf. Forensics Secur., 2021
J. Frankl. Inst., 2021
Comput. Networks, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the 24th IEEE International Intelligent Transportation Systems Conference, 2021
Proceedings of the IEEE Congress on Evolutionary Computation, 2021
2020
A heterogeneous user authentication and key establishment for mobile client-server environment.
Wirel. Networks, 2020
J. Syst. Archit., 2020
J. Syst. Archit., 2020
A hybrid method integrating an elite genetic algorithm with tabu search for the quadratic assignment problem.
Inf. Sci., 2020
Cost-effective moving target defense against DDoS attacks using trilateral game and multi-objective Markov decision processes.
Comput. Secur., 2020
Building an efficient intrusion detection system based on feature selection and ensemble classifier.
Comput. Networks, 2020
Dynamic performance enhancement for nonlinear stochastic systems using RBF driven nonlinear compensation with extended Kalman filter.
Autom., 2020
Joint Distribution Center Location Problem for Restaurant Industry Based on Improved K-Means Algorithm With Penalty.
IEEE Access, 2020
DOBC Based Fully Probability Design for Stochastic System With the Multiplicative Noise.
IEEE Access, 2020
Length Matters: Fast Internet Encrypted Traffic Service Classification based on Multi-PDU Lengths.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020
Proceedings of the 16th IEEE International Conference on Control & Automation, 2020
Effectiveness Evaluation Method for Cyber Deception Based on Dynamic Bayesian Attack Graph.
Proceedings of the CSSE 2020: 3rd International Conference on Computer Science and Software Engineering, 2020
Covariance Local Search for Memetic Frameworks: A Fitness Landscape Analysis Approach.
Proceedings of the IEEE Congress on Evolutionary Computation, 2020
2019
IACR Cryptol. ePrint Arch., 2019
An Efficient Network Intrusion Detection System Based on Feature Selection and Ensemble Classifier.
CoRR, 2019
Spatial-Temporal Correlation Prediction Modeling of Origin-Destination Passenger Flow Under Urban Rail Transit Emergency Conditions.
IEEE Access, 2019
Proceedings of the 2019 IEEE Intelligent Transportation Systems Conference, 2019
Proceedings of the 15th IEEE International Conference on Control and Automation, 2019
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019
Proceedings of the 6th ACM Workshop on Moving Target Defense, 2019
2018
IEEE Trans. Autom. Control., 2018
Modeling the Travel Mode Choice for Outpatient Trips Before and After Bike-Sharing in Beijing.
Proceedings of the 21st International Conference on Intelligent Transportation Systems, 2018
Secure and Achievable Heterogeneous Access Control Scheme for Wireless Body Area Networks.
Proceedings of the Frontiers in Cyber Security - First International Conference, 2018
2017
Identity-Based Combined Public Key Schemes for Signature, Encryption, and Signcryption.
Proceedings of the Information Technology and Applied Mathematics - ICITAM 2017, Haldia, Purba Medinipur, West Bengal, India, October 30, 2017
2015
GIS-Based Commute Analysis Using Smart Card Data: A Case Study of Multi-Mode Public Transport for Smart City.
Proceedings of the Geo-Informatics in Resource Management and Sustainable Ecosystem, 2015