


default search action
Yang Xiang 0001
Person information
- affiliation: Swinburne University of Technology, School of Software and Electrical Engineering, Hawthorn, VIC, Australia
- affiliation: Deakin University, School of Information Technology, Geelong, VIC, Australia
- affiliation (former): Xidian University, State Key Laboratory of Integrated Service Networks, Xi'an, China
- affiliation (former): Central Queensland University, School of Management and Information Systems, Rockhampton, Australia
- affiliation (PhD): Deakin University, Geelong, VIC, Australia
Other persons with the same name
- Yang Xiang — disambiguation page
- Yang Xiang 0002
— Hong Kong University of Science and Technology, Department of Mathematics, Hong Kong
- Yang Xiang 0003
— Pengcheng Laboratory, Shenzhen, China (and 1 more)
- Yang Xiang 0004
— University of Guelph, School of Computer Science, Canada (and 5 more)
- Yang Xiang 0005 — Tongji University, State Key Laboratory of Marine Geology, Shanghai, China
- Yang Xiang 0006
— Tongji University, College of Electronics and Information Engineering, Shanghai, China (and 1 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2025
- [j325]Xue Li, Yang Xiang, Lan Ma, Hong Li, Huawei Wang, Lili Cai, Shuai Lu, Chao Tang, Xilian Wei:
Probabilistic Risk Analysis for Catenary System of Heavy-Haul Railway Based on Casual Inference. Concurr. Comput. Pract. Exp. 37(3) (2025) - [j324]Wei Zhou, Xiaogang Zhu, Qing-Long Han, Lin Li, Xiao Chen, Sheng Wen, Yang Xiang:
The Security of Using Large Language Models: A Survey with Emphasis on ChatGPT. IEEE CAA J. Autom. Sinica 12(1): 1-26 (2025) - [j323]Xiaogang Zhu, Wei Zhou, Qing-Long Han, Wanlun Ma, Sheng Wen, Yang Xiang:
When Software Security Meets Large Language Models: A Survey. IEEE CAA J. Autom. Sinica 12(2): 317-334 (2025) - [j322]Kai Ye, Xiaogang Zhu, Xi Xiao, Sheng Wen, Minhui Xue, Yang Xiang:
BazzAFL: Moving Fuzzing Campaigns Towards Bugs via Grouping Bug-Oriented Seeds. IEEE Trans. Dependable Secur. Comput. 22(1): 179-191 (2025) - [j321]Cong Wu, Jianfei Sun, Jing Chen, Mamoun Alazab, Yang Liu, Yang Xiang:
$\mathsf{TCG}\text{-}\mathsf{IDS}$ : Robust Network Intrusion Detection via Temporal Contrastive Graph Learning. IEEE Trans. Inf. Forensics Secur. 20: 1475-1486 (2025) - [j320]Xiaodong Dong
, Lihai Nie
, Zheli Liu
, Yang Xiang
:
Slark: A Performance Robust Decentralized Inter-Datacenter Deadline-Aware Coflows Scheduling Framework With Local Information. IEEE Trans. Parallel Distributed Syst. 36(2): 197-211 (2025) - 2024
- [j319]Lihong Tang, Tingmin Wu, Xiao Chen, Sheng Wen, Wei Zhou, Xiaogang Zhu, Yang Xiang:
How COVID-19 impacts telehealth: an empirical study of telehealth services, users and the use of metaverse. Connect. Sci. 36(1) (2024) - [j318]Yanmei Cao, Jianghong Wei, Yang Xiang, Willy Susilo
, Xiaofeng Chen:
Abuse-resistant deniable encryption. Comput. Stand. Interfaces 87: 103761 (2024) - [j317]Tengyun Jiao
, Zhiyu Xu
, Minfeng Qi
, Sheng Wen
, Yang Xiang
, Gary Nan
:
A Survey of Ethereum Smart Contract Security: Attacks and Detection. Distributed Ledger Technol. Res. Pract. 3(3): 23:1-23:28 (2024) - [j316]Minfeng Qi
, Ziyuan Wang, Qing-Long Han, Jun Zhang, Shiping Chen, Yang Xiang:
Privacy Protection for Blockchain-Based Healthcare IoT Systems: A Survey. IEEE CAA J. Autom. Sinica 11(8): 1757-1776 (2024) - [j315]Chuan Sheng
, Wanlun Ma
, Qing-Long Han
, Wei Zhou
, Xiaogang Zhu
, Sheng Wen
, Yang Xiang
, Fei-Yue Wang
:
Pager Explosion: Cybersecurity Insights and Afterthoughts. IEEE CAA J. Autom. Sinica 11(12): 2359-2362 (2024) - [j314]Jun Shen
, Xiaofeng Chen
, Xinyi Huang
, Yang Xiang
:
Public Proofs of Data Replication and Retrievability With User-Friendly Replication. IEEE Trans. Dependable Secur. Comput. 21(4): 2057-2067 (2024) - [j313]Lihong Tang
, Xiao Chen
, Sheng Wen
, Li Li
, Marthie Grobler
, Yang Xiang
:
Demystifying the Evolution of Android Malware Variants. IEEE Trans. Dependable Secur. Comput. 21(4): 3324-3341 (2024) - [j312]Wanlun Ma
, Yiliao Song
, Minhui Xue
, Sheng Wen
, Yang Xiang
:
The "Code" of Ethics: A Holistic Audit of AI Code Generators. IEEE Trans. Dependable Secur. Comput. 21(5): 4997-5013 (2024) - [j311]Chuer Yu
, Xuhong Zhang
, Yuxuan Duan
, Senbo Yan
, Zonghui Wang
, Yang Xiang
, Shouling Ji
, Wenzhi Chen
:
Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection. IEEE Trans. Dependable Secur. Comput. 21(5): 5029-5045 (2024) - [j310]Gaolei Fei
, Yang Liu, Guangmin Hu
, Sheng Wen
, Yang Xiang
:
Online Social Network User Home Location Inference Based on Heterogeneous Networks. IEEE Trans. Dependable Secur. Comput. 21(6): 5509-5525 (2024) - [j309]Wanlun Ma
, Derui Wang
, Chao Chen
, Sheng Wen
, Gaolei Fei
, Yang Xiang
:
LocGuard: A Location Privacy Defender for Image Sharing. IEEE Trans. Dependable Secur. Comput. 21(6): 5526-5537 (2024) - [j308]Xiaogang Zhu
, Siyu Zhang
, Chaoran Li
, Sheng Wen
, Yang Xiang
:
Fuzzing Android Native System Libraries via Dynamic Data Dependency Graph. IEEE Trans. Inf. Forensics Secur. 19: 3733-3744 (2024) - [j307]Cong Wu
, Jing Chen
, Qianru Fang, Kun He
, Ziming Zhao, Hao Ren, Guowen Xu
, Yang Liu
, Yang Xiang
:
Rethinking Membership Inference Attacks Against Transfer Learning. IEEE Trans. Inf. Forensics Secur. 19: 6441-6454 (2024) - [j306]Jianghua Liu, Jian Yang, Xinyi Huang, Lei Xu, Yang Xiang:
Privacy Enhanced Authentication for Online Learning Healthcare Systems. IEEE Trans. Serv. Comput. 17(4): 1670-1681 (2024) - [c148]Zhi Zhang
, Decheng Chen
, Jiahao Qi
, Yueqiang Cheng
, Shijie Jiang
, Yiyang Lin
, Yansong Gao
, Surya Nepal
, Yi Zou
, Jiliang Zhang
, Yang Xiang
:
SoK: Rowhammer on Commodity Operating Systems. AsiaCCS 2024 - [c147]Cong Wu
, Jing Chen
, Ziming Zhao
, Kun He
, Guowen Xu
, Yueming Wu
, Haijun Wang
, Hongwei Li
, Yang Liu
, Yang Xiang
:
TokenScout: Early Detection of Ethereum Scam Tokens via Temporal Graph Learning. CCS 2024: 956-970 - [c146]Xiaoxing Mo, Yechao Zhang, Leo Yu Zhang, Wei Luo
, Nan Sun
, Shengshan Hu, Shang Gao, Yang Xiang:
Robust Backdoor Detection for Deep Learning via Topological Evolution Dynamics. SP 2024: 2048-2066 - [c145]Shigang Liu, Di Cao, Junae Kim, Tamas Abraham, Paul Montague, Seyit Camtepe, Jun Zhang, Yang Xiang:
EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection. USENIX Security Symposium 2024 - [i46]Zehang Deng, Ruoxi Sun, Minhui Xue, Sheng Wen, Seyit Camtepe, Surya Nepal, Yang Xiang:
Leakage-Resilient and Carbon-Neutral Aggregation Featuring the Federated AI-enabled Critical Infrastructure. CoRR abs/2405.15258 (2024) - [i45]Zehang Deng, Yongjian Guo, Changzhou Han, Wanlun Ma, Junwu Xiong, Sheng Wen, Yang Xiang:
AI Agents Under Threat: A Survey of Key Security Challenges and Future Pathways. CoRR abs/2406.02630 (2024) - [i44]Jiaheng Wei, Yanjun Zhang, Leo Yu Zhang, Ming Ding, Chao Chen, Kok-Leong Ong, Jun Zhang, Yang Xiang:
Memorization in deep learning: A survey. CoRR abs/2406.03880 (2024) - [i43]Shigang Liu, Di Cao, Junae Kim, Tamas Abraham, Paul Montague, Seyit Camtepe, Jun Zhang, Yang Xiang:
EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection. CoRR abs/2407.19216 (2024) - 2023
- [j305]Lin Li
, Chao Chen, Lei Pan, Leo Yu Zhang, Zhifeng Wang, Jun Zhang, Yang Xiang:
A Survey of PPG's Application in Authentication. Comput. Secur. 135: 103488 (2023) - [j304]Xiaoyu Zhang, Chao Chen, Yi Xie, Xiaofeng Chen, Jun Zhang, Yang Xiang:
A survey on privacy inference attacks and defenses in cloud-based Deep Neural Network. Comput. Stand. Interfaces 83: 103672 (2023) - [j303]Huacheng Li, Chunhe Xia, Tianbo Wang, Sheng Wen, Chao Chen, Yang Xiang:
Capturing Dynamics of Information Diffusion in SNS: A Survey of Methodology and Techniques. ACM Comput. Surv. 55(2): 22:1-22:51 (2023) - [j302]Qin Wang
, Jiangshan Yu
, Shiping Chen
, Yang Xiang
:
SoK: DAG-based Blockchain Systems. ACM Comput. Surv. 55(12): 261:1-261:38 (2023) - [j301]Qin Wang
, Rujia Li
, Shiping Chen
, Yang Xiang
:
Formal Security Analysis on dBFT Protocol of NEO. Distributed Ledger Technol. Res. Pract. 2(1): 2:1-2:19 (2023) - [j300]Qin Wang
, Rujia Li
, Qi Wang
, David Galindo
, Shiping Chen
, Yang Xiang
:
Transparent Registration-Based Encryption through Blockchain. Distributed Ledger Technol. Res. Pract. 2(1): 3:1-3:14 (2023) - [j299]Xiaotao Feng, Xiaogang Zhu
, Qing-Long Han, Wei Zhou, Sheng Wen, Yang Xiang:
Detecting Vulnerability on IoT Device Firmware: A Survey. IEEE CAA J. Autom. Sinica 10(1): 25-41 (2023) - [j298]Jun Feng
, Hu Xiong
, Jinhao Chen
, Yang Xiang
, Kuo-Hui Yeh
:
Scalable and Revocable Attribute-Based Data Sharing With Short Revocation List for IIoT. IEEE Internet Things J. 10(6, March 15): 4815-4829 (2023) - [j297]Yulei Wu
, Ning Zhang, Zheng Yan, Mohammed Atiquzzaman, Yang Xiang:
Guest Editorial Special Issue on AI and Blockchain-Powered IoT Sustainable Computing. IEEE Internet Things J. 10(8, April 15): 6531-6534 (2023) - [j296]Yuming Feng
, Weizhe Zhang
, Shujun Yin, Hao Tang
, Yang Xiang
, Yu Zhang:
A Collaborative Stealthy DDoS Detection Method Based on Reinforcement Learning at the Edge of Internet of Things. IEEE Internet Things J. 10(20): 17934-17948 (2023) - [j295]Hao Zhou
, Geng Yang
, Yang Xiang, Yunlu Bai, Weiya Wang:
A Lightweight Matrix Factorization for Recommendation With Local Differential Privacy in Big Data. IEEE Trans. Big Data 9(1): 160-173 (2023) - [j294]Jianghua Liu
, Jian Yang
, Wei Wu
, Xinyi Huang
, Yang Xiang
:
Lightweight Authentication Scheme for Data Dissemination in Cloud-Assisted Healthcare IoT. IEEE Trans. Computers 72(5): 1384-1395 (2023) - [j293]Shi-Cho Cha
, Chun-Lin Chang
, Yang Xiang
, Tzu-Jia Huang, Kuo-Hui Yeh
:
Enhancing OAuth With Blockchain Technologies for Data Portability. IEEE Trans. Cloud Comput. 11(1): 349-366 (2023) - [j292]Xiaoqin Feng
, Jianfeng Ma
, Huaxiong Wang
, Sheng Wen
, Yang Xiang
, Yinbin Miao
:
Space-Efficient Storage Structure of Blockchain Transactions Supporting Secure Verification. IEEE Trans. Cloud Comput. 11(3): 2631-2645 (2023) - [j291]Junyang Qiu
, Qing-Long Han
, Wei Luo
, Lei Pan
, Surya Nepal
, Jun Zhang
, Yang Xiang
:
Cyber Code Intelligence for Android Malware Detection. IEEE Trans. Cybern. 53(1): 617-627 (2023) - [j290]Nan Sun
, Jun Zhang
, Shang Gao
, Leo Yu Zhang
, Seyit Camtepe
, Yang Xiang
:
Cyber Information Retrieval Through Pragmatics Understanding and Visualization. IEEE Trans. Dependable Secur. Comput. 20(2): 1186-1199 (2023) - [j289]Lihong Tang
, Tingmin Wu, Xiao Chen
, Sheng Wen
, Li Li
, Xin Xia
, Marthie Grobler
, Yang Xiang
:
How Does Visualisation Help App Practitioners Analyse Android Apps? IEEE Trans. Dependable Secur. Comput. 20(3): 2238-2255 (2023) - [j288]Hao Zhou
, Geng Yang
, Yuxian Huang
, Hua Dai
, Yang Xiang:
Privacy-Preserving and Verifiable Federated Learning Framework for Edge Computing. IEEE Trans. Inf. Forensics Secur. 18: 565-580 (2023) - [j287]Rongjunchen Zhang
, Tingmin Wu
, Sheng Wen
, Surya Nepal
, Cécile Paris, Yang Xiang
:
SAM: Multi-turn Response Selection Based on Semantic Awareness Matching. ACM Trans. Internet Techn. 23(1): 3:1-3:18 (2023) - [j286]Guangming Cui
, Qiang He
, Feifei Chen
, Hai Jin
, Yang Xiang
, Yun Yang
:
Location Privacy Protection via Delocalization in 5G Mobile Edge Computing Environment. IEEE Trans. Serv. Comput. 16(1): 412-423 (2023) - [j285]Chenkai Guo
, Weijie Zhang
, Naipeng Dong
, Zheli Liu
, Yang Xiang
:
QoS-Aware Diversified Service Selection. IEEE Trans. Serv. Comput. 16(3): 2085-2099 (2023) - [c144]Lin Li
, Chao Chen, Lei Pan, Yonghang Tai, Jun Zhang, Yang Xiang:
Hiding Your Signals: A Security Analysis of PPG-Based Biometric Authentication. ESORICS (3) 2023: 183-202 - [c143]Lin Li
, Chao Chen, Lei Pan, Jun Zhang, Yang Xiang:
SigD: A Cross-Session Dataset for PPG-based User Authentication in Different Demographic Groups. IJCNN 2023: 1-8 - [c142]Wanlun Ma, Derui Wang, Ruoxi Sun, Minhui Xue, Sheng Wen, Yang Xiang:
The "Beatrix" Resurrections: Robust Backdoor Detection via Gram Matrices. NDSS 2023 - [c141]Lin Li
, Chao Chen
, Lei Pan
, Leo Yu Zhang
, Jun Zhang
, Yang Xiang
:
SigA: rPPG-based Authentication for Virtual Reality Head-mounted Display. RAID 2023: 686-699 - [c140]Rongjunchen Zhang
, Tingmin Wu
, Xiao Chen
, Sheng Wen
, Surya Nepal
, Cécile Paris, Yang Xiang
:
Dynalogue: A Transformer-Based Dialogue System with Dynamic Attention. WWW 2023: 1604-1615 - [e17]Joseph K. Liu, Yang Xiang, Surya Nepal, Gene Tsudik:
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, ASIA CCS 2023, Melbourne, VIC, Australia, July 10-14, 2023. ACM 2023 [contents] - [i42]Chuer Yu, Xuhong Zhang, Yuxuan Duan, Senbo Yan, Zonghui Wang, Yang Xiang, Shouling Ji, Wenzhi Chen:
Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection. CoRR abs/2303.18174 (2023) - [i41]Wanlun Ma, Yiliao Song, Minhui Xue, Sheng Wen, Yang Xiang:
The "code" of Ethics: A Holistic Audit of AI Code Generators. CoRR abs/2305.12747 (2023) - [i40]Zian Liu, Zhi Zhang, Siqi Ma, Dongxi Liu, Jun Zhang, Chao Chen, Shigang Liu, Muhammad Ejaz Ahmed, Yang Xiang:
SemDiff: Binary Similarity Detection by Diffing Key-Semantics Graphs. CoRR abs/2308.01463 (2023) - [i39]Jiaheng Wei, Yanjun Zhang, Leo Yu Zhang, Chao Chen, Shirui Pan, Kok-Leong Ong, Jun Zhang, Yang Xiang:
Client-side Gradient Inversion Against Federated Learning from Poisoning. CoRR abs/2309.07415 (2023) - [i38]Xiaoxing Mo, Yechao Zhang, Leo Yu Zhang, Wei Luo, Nan Sun, Shengshan Hu, Shang Gao, Yang Xiang:
Robust Backdoor Detection for Deep Learning via Topological Evolution Dynamics. CoRR abs/2312.02673 (2023) - 2022
- [j284]Rory Coulter
, Jun Zhang, Lei Pan, Yang Xiang
:
Domain adaptation for Windows advanced persistent threat detection. Comput. Secur. 112: 102496 (2022) - [j283]Yueqiang Cheng, Zhi Zhang
, Yansong Gao, Zhaofeng Chen, Shengjian Guo, Qifei Zhang, Rui Mei
, Surya Nepal
, Yang Xiang
:
Meltdown-type attacks are still feasible in the wall of kernel page-Table isolation. Comput. Secur. 113: 102556 (2022) - [j282]Wenjuan Li
, Fei Tian, Jin Li, Yang Xiang
:
Evaluating intrusion sensitivity allocation with supervised learning in collaborative intrusion detection. Concurr. Comput. Pract. Exp. 34(16) (2022) - [j281]Yanmei Cao, Jianghong Wei, Fangguo Zhang
, Yang Xiang
, Xiaofeng Chen:
Efficient public-key authenticated deniable encryption schemes. Comput. Stand. Interfaces 82: 103620 (2022) - [j280]Xiangyu Hu
, Wanlun Ma, Chao Chen
, Sheng Wen, Jun Zhang
, Yang Xiang
, Gaolei Fei:
Event detection in online social network: Methodologies, state-of-art, and evolution. Comput. Sci. Rev. 46: 100500 (2022) - [j279]Yuantian Miao, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, Yang Xiang
:
Machine Learning-based Cyber Attacks Targeting on Controlled Information: A Survey. ACM Comput. Surv. 54(7): 139:1-139:36 (2022) - [j278]Xiaogang Zhu
, Sheng Wen
, Seyit Camtepe
, Yang Xiang
:
Fuzzing: A Survey for Roadmap. ACM Comput. Surv. 54(11s): 230:1-230:36 (2022) - [j277]Minfeng Qi
, Ziyuan Wang
, Shiping Chen
, Yang Xiang
:
A Hybrid Incentive Mechanism for Decentralized Federated Learning. Distributed Ledger Technol. Res. Pract. 1(1): 1-15 (2022) - [j276]Jun Zhang, Lei Pan, Qing-Long Han, Chao Chen, Sheng Wen, Yang Xiang
:
Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey. IEEE CAA J. Autom. Sinica 9(3): 377-391 (2022) - [j275]Feixue Yan
, Sheng Wen, Surya Nepal
, Cécile Paris, Yang Xiang:
Explainable machine learning in cybersecurity: A survey. Int. J. Intell. Syst. 37(12): 12305-12334 (2022) - [j274]Hong Zhao
, Yuexin Zhang
, Xinyi Huang
, Yang Xiang
, Chunhua Su
:
A Physical-Layer Key Generation Approach Based on Received Signal Strength in Smart Homes. IEEE Internet Things J. 9(7): 4917-4927 (2022) - [j273]Qin Wang
, Longxia Huang
, Shiping Chen
, Yang Xiang
:
Blockchain Enables Your Bill Safer. IEEE Internet Things J. 9(16): 14162-14171 (2022) - [j272]Bo Li
, Qiang He
, Feifei Chen
, Hai Jin
, Yang Xiang
, Yun Yang
:
Inspecting Edge Data Integrity With Aggregate Signature in Distributed Edge Computing Environment. IEEE Trans. Cloud Comput. 10(4): 2691-2703 (2022) - [j271]Derui Wang
, Chaoran Li
, Sheng Wen
, Qing-Long Han
, Surya Nepal
, Xiangyu Zhang, Yang Xiang
:
Daedalus: Breaking Nonmaximum Suppression in Object Detection via Adversarial Examples. IEEE Trans. Cybern. 52(8): 7427-7440 (2022) - [j270]Shigang Liu
, Guanjun Lin
, Lizhen Qu, Jun Zhang
, Olivier Y. de Vel, Paul Montague, Yang Xiang
:
CD-VulD: Cross-Domain Vulnerability Discovery Based on Deep Domain Adaptation. IEEE Trans. Dependable Secur. Comput. 19(1): 438-451 (2022) - [j269]Xiaogang Zhu
, Xiaotao Feng, Xiaozhu Meng, Sheng Wen
, Seyit Camtepe
, Yang Xiang
, Kui Ren:
CSI-Fuzz: Full-Speed Edge Tracing Using Coverage Sensitive Instrumentation. IEEE Trans. Dependable Secur. Comput. 19(2): 912-923 (2022) - [j268]Derui Wang
, Chaoran Li
, Sheng Wen
, Surya Nepal
, Yang Xiang
:
Defending Against Adversarial Attack Towards Deep Neural Networks Via Collaborative Multi-Task Training. IEEE Trans. Dependable Secur. Comput. 19(2): 953-965 (2022) - [j267]Jian Shen
, Ziyuan Gui
, Xiaofeng Chen
, Jun Zhang
, Yang Xiang
:
Lightweight and Certificateless Multi-Receiver Secure Data Transmission Protocol for Wireless Body Area Networks. IEEE Trans. Dependable Secur. Comput. 19(3): 1464-1475 (2022) - [j266]Qiang He
, Cheng Wang
, Guangming Cui
, Bo Li
, Rui Zhou, Qingguo Zhou
, Yang Xiang
, Hai Jin
, Yun Yang
:
A Game-Theoretical Approach for Mitigating Edge DDoS Attack. IEEE Trans. Dependable Secur. Comput. 19(4): 2333-2348 (2022) - [j265]Jing Chen
, Xin Chen
, Kun He
, Ruiying Du, Weihang Chen, Yang Xiang
:
DELIA: Distributed Efficient Log Integrity Audit Based on Hierarchal Multi-Party State Channel. IEEE Trans. Dependable Secur. Comput. 19(5): 3286-3300 (2022) - [j264]Chaoran Li
, Xiao Chen
, Derui Wang
, Sheng Wen
, Muhammad Ejaz Ahmed, Seyit Camtepe
, Yang Xiang
:
Backdoor Attack on Machine Learning Based Android Malware Detectors. IEEE Trans. Dependable Secur. Comput. 19(5): 3357-3370 (2022) - [j263]Tianbo Wang
, Chunhe Xia
, Xiaojian Li, Yang Xiang
:
Epidemic Heterogeneity and Hierarchy: A Study of Wireless Hybrid Worm Propagation. IEEE Trans. Mob. Comput. 21(5): 1639-1656 (2022) - [j262]Wanlun Ma, Xiangyu Hu, Chao Chen, Sheng Wen
, Kim-Kwang Raymond Choo
, Yang Xiang
:
Social Media Event Prediction using DNN with Feedback Mechanism. ACM Trans. Manag. Inf. Syst. 13(3): 33:1-33:24 (2022) - [j261]Xiaogang Zhu
, Sheng Wen
, Alireza Jolfaei
, Mohammad Sayad Haghighi
, Seyit Camtepe
, Yang Xiang
:
Vulnerability Detection in SIoT Applications: A Fuzzing Method on their Binaries. IEEE Trans. Netw. Sci. Eng. 9(3): 970-979 (2022) - [j260]Derui Wang, Sheng Wen, Alireza Jolfaei
, Mohammad Sayad Haghighi
, Surya Nepal
, Yang Xiang
:
On the Neural Backdoor of Federated Generative Models in Edge Computing. ACM Trans. Internet Techn. 22(2): 43:1-43:21 (2022) - [j259]Tingmin Wu
, Wanlun Ma, Sheng Wen, Xin Xia, Cécile Paris, Surya Nepal
, Yang Xiang
:
Analysis of Trending Topics and Text-based Channels of Information Delivery in Cybersecurity. ACM Trans. Internet Techn. 22(2): 52:1-52:27 (2022) - [j258]Liang Yuan
, Qiang He
, Feifei Chen
, Jun Zhang
, Lianyong Qi
, Xiaolong Xu
, Yang Xiang
, Yun Yang
:
CSEdge: Enabling Collaborative Edge Storage for Multi-Access Edge Computing Based on Blockchain. IEEE Trans. Parallel Distributed Syst. 33(8): 1873-1887 (2022) - [j257]Guoxiu Liu
, Geng Yang
, Shuangjie Bai
, Huaqun Wang, Yang Xiang
:
FASE: A Fast and Accurate Privacy-Preserving Multi-Keyword Top-k Retrieval Scheme Over Encrypted Cloud Data. IEEE Trans. Serv. Comput. 15(4): 1855-1867 (2022) - [j256]Guangming Cui
, Qiang He
, Bo Li
, Xiaoyu Xia
, Feifei Chen
, Hai Jin
, Yang Xiang
, Yun Yang
:
Efficient Verification of Edge Data Integrity in Edge Computing Environment. IEEE Trans. Serv. Comput. 15(6): 3233-3244 (2022) - [j255]Hua Dai
, Maohu Yang
, T. G. Yang, Yang Xiang
, Zheng Hu, Huaqun Wang
:
A Keyword-Grouping Inverted Index Based Multi-Keyword Ranked Search Scheme Over Encrypted Cloud Data. IEEE Trans. Sustain. Comput. 7(3): 561-578 (2022) - [c139]Qin Wang
, Rujia Li, Qi Wang, Shiping Chen, Yang Xiang:
Exploring Unfairness on Proof of Authority: Order Manipulation Attacks and Remedies. AsiaCCS 2022: 123-137 - [c138]Minfeng Qi, Zhiyu Xu
, Ziyuan Wang, Shiping Chen, Yang Xiang:
DeDa: A DeFi-enabled Data Sharing and Trading System. BSCI 2022: 47-57 - [c137]Lin Li
, Chao Chen, Lei Pan, Jun Zhang, Yang Xiang:
Video is All You Need: Attacking PPG-based Biometric Authentication. AISec@CCS 2022: 57-66 - [c136]Yuantian Miao, Chao Chen, Lei Pan, Shigang Liu, Seyit Camtepe, Jun Zhang, Yang Xiang:
No-Label User-Level Membership Inference for ASR Model Auditing. ESORICS (2) 2022: 610-628 - [c135]Minfeng Qi, Zhiyu Xu
, Ziyuan Wang, Shiping Chen, Yang Xiang:
Databox-based Delivery Service via Blockchain. ICWS 2022: 79-84 - [c134]Lei Shi, Shanti Krishnan
, Sheng Wen, Yang Xiang:
Supporting Cyber-Attacks and System Anomaly Detection Research with an Industry 4.0 Dataset. NSS 2022: 335-353 - [c133]Chaoran Li, Xiao Chen, Ruoxi Sun
, Minhui Xue, Sheng Wen, Muhammad Ejaz Ahmed, Seyit Camtepe, Yang Xiang:
Cross-language Android permission specification. ESEC/SIGSOFT FSE 2022: 772-783 - [c132]Minfeng Qi, Zhiyu Xu
, Tengyun Jiao, Sheng Wen, Yang Xiang, Gary Nan:
A Comparative Study on the Security of Cryptocurrency Wallets in Android System. TrustCom 2022: 399-406 - [i37]Lin Li, Chao Chen, Lei Pan, Jun Zhang, Yang Xiang:
SoK: An Overview of PPG's Application in Authentication. CoRR abs/2201.11291 (2022) - [i36]Yuantian Miao, Chao Chen, Lei Pan, Jun Zhang, Yang Xiang:
FAAG: Fast Adversarial Audio Generation through Interactive Attack Optimisation. CoRR abs/2202.05416 (2022) - [i35]Lin Li, Chao Chen, Lei Pan, Jun Zhang, Yang Xiang:
Video is All You Need: Attacking PPG-based Biometric Authentication. CoRR abs/2203.00928 (2022) - [i34]Qin Wang, Rujia Li, Qi Wang, Shiping Chen, Yang Xiang:
Exploring Unfairness on Proof of Authority: Order Manipulation Attacks and Remedies. CoRR abs/2203.03008 (2022) - [i33]