BibTeX records: Yulong Fu

download as .bib file

@article{DBLP:journals/jnca/LinYF19,
  author    = {Huaqing Lin and
               Zheng Yan and
               Yulong Fu},
  title     = {Adaptive security-related data collection with context awareness},
  journal   = {J. Network and Computer Applications},
  volume    = {126},
  pages     = {88--103},
  year      = {2019},
  url       = {https://doi.org/10.1016/j.jnca.2018.11.002},
  doi       = {10.1016/j.jnca.2018.11.002},
  timestamp = {Fri, 18 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/jnca/LinYF19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/XinFLW19,
  author    = {Xiaolong Xin and
               Yulong Fu and
               Yanyan Lai and
               Juntao Wang},
  title     = {Monadic pseudo BCI-algebras and corresponding logics},
  journal   = {Soft Comput.},
  volume    = {23},
  number    = {5},
  pages     = {1499--1510},
  year      = {2019},
  url       = {https://doi.org/10.1007/s00500-018-3189-7},
  doi       = {10.1007/s00500-018-3189-7},
  timestamp = {Wed, 27 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/soco/XinFLW19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/CaoMLFL18,
  author    = {Jin Cao and
               Maode Ma and
               Hui Li and
               Yulong Fu and
               Xuefeng Liu},
  title     = {{EGHR:} Efficient group-based handover authentication protocols for
               mMTC in 5G wireless networks},
  journal   = {J. Network and Computer Applications},
  volume    = {102},
  pages     = {1--16},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.jnca.2017.11.009},
  doi       = {10.1016/j.jnca.2017.11.009},
  timestamp = {Fri, 22 Dec 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/jnca/CaoMLFL18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ZhouYFY18,
  author    = {Donghao Zhou and
               Zheng Yan and
               Yulong Fu and
               Zhen Yao},
  title     = {A survey on network data collection},
  journal   = {J. Network and Computer Applications},
  volume    = {116},
  pages     = {9--23},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.jnca.2018.05.004},
  doi       = {10.1016/j.jnca.2018.05.004},
  timestamp = {Tue, 03 Jul 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jnca/ZhouYFY18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiYFC18,
  author    = {Guoquan Li and
               Zheng Yan and
               Yulong Fu and
               Hanlu Chen},
  title     = {Data Fusion for Network Intrusion Detection: {A} Review},
  journal   = {Security and Communication Networks},
  volume    = {2018},
  pages     = {8210614:1--8210614:16},
  year      = {2018},
  url       = {https://doi.org/10.1155/2018/8210614},
  doi       = {10.1155/2018/8210614},
  timestamp = {Thu, 16 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/scn/LiYFC18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiYF18,
  author    = {Guoquan Li and
               Zheng Yan and
               Yulong Fu},
  title     = {A Study and Simulation Research of Blackhole Attack on Mobile AdHoc
               Network},
  booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
               2018, Beijing, China, May 30 - June 1, 2018},
  pages     = {1--6},
  year      = {2018},
  crossref  = {DBLP:conf/cns/2018},
  url       = {https://doi.org/10.1109/CNS.2018.8433148},
  doi       = {10.1109/CNS.2018.8433148},
  timestamp = {Thu, 16 Aug 2018 12:45:02 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cns/LiYF18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FuYLXC17,
  author    = {Yulong Fu and
               Zheng Yan and
               Hui Li and
               Xiao{-}Long Xin and
               Jin Cao},
  title     = {A secure {SDN} based multi-RANs architecture for future 5G networks},
  journal   = {Computers {\&} Security},
  volume    = {70},
  pages     = {648--662},
  year      = {2017},
  url       = {https://doi.org/10.1016/j.cose.2017.08.013},
  doi       = {10.1016/j.cose.2017.08.013},
  timestamp = {Wed, 27 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/compsec/FuYLXC17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mis/FuYCKC17,
  author    = {Yulong Fu and
               Zheng Yan and
               Jin Cao and
               Ousmane Kon{\'{e}} and
               Xuefei Cao},
  title     = {An Automata Based Intrusion Detection Method for Internet of Things},
  journal   = {Mobile Information Systems},
  volume    = {2017},
  pages     = {1750637:1--1750637:13},
  year      = {2017},
  url       = {https://doi.org/10.1155/2017/1750637},
  doi       = {10.1155/2017/1750637},
  timestamp = {Wed, 12 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/mis/FuYCKC17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/CaoMLFNL17,
  author    = {Jin Cao and
               Maode Ma and
               Hui Li and
               Yulong Fu and
               Ben Niu and
               Fenghua Li},
  title     = {Trajectory prediction-based handover authentication mechanism for
               mobile relays in {LTE-A} high-speed rail networks},
  booktitle = {{IEEE} International Conference on Communications, {ICC} 2017, Paris,
               France, May 21-25, 2017},
  pages     = {1--6},
  year      = {2017},
  crossref  = {DBLP:conf/icc/2017},
  url       = {https://doi.org/10.1109/ICC.2017.7997254},
  doi       = {10.1109/ICC.2017.7997254},
  timestamp = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icc/CaoMLFNL17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/ChenFY17,
  author    = {Hanlu Chen and
               Yulong Fu and
               Zheng Yan},
  title     = {Survey on Big Data Analysis Algorithms for Network Security Measurement},
  booktitle = {Network and System Security - 11th International Conference, {NSS}
               2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  pages     = {128--142},
  year      = {2017},
  crossref  = {DBLP:conf/nss/2017},
  url       = {https://doi.org/10.1007/978-3-319-64701-2\_10},
  doi       = {10.1007/978-3-319-64701-2\_10},
  timestamp = {Thu, 19 Oct 2017 12:55:22 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/nss/ChenFY17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spaccs/CaoDFF17,
  author    = {Xuefei Cao and
               Lanjun Dang and
               Kai Fan and
               Yulong Fu},
  title     = {An Attack to an Anonymous Certificateless Group Key Agreement Scheme
               and Its Improvement},
  booktitle = {Security, Privacy, and Anonymity in Computation, Communication, and
               Storage - 10th International Conference, SpaCCS 2017, Guangzhou, China,
               December 12-15, 2017, Proceedings},
  pages     = {56--69},
  year      = {2017},
  crossref  = {DBLP:conf/spaccs/2017},
  url       = {https://doi.org/10.1007/978-3-319-72389-1\_5},
  doi       = {10.1007/978-3-319-72389-1\_5},
  timestamp = {Sat, 09 Dec 2017 14:40:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/spaccs/CaoDFF17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/swarm/WuWFX17,
  author    = {Yali Wu and
               Xinrui Wang and
               Yulong Fu and
               Yingruo Xu},
  title     = {Difference Brain Storm Optimization for Combined Heat and Power Economic
               Dispatch},
  booktitle = {Advances in Swarm Intelligence - 8th International Conference, {ICSI}
               2017, Fukuoka, Japan, July 27 - August 1, 2017, Proceedings, Part
               {I}},
  pages     = {519--527},
  year      = {2017},
  crossref  = {DBLP:conf/swarm/2017-1},
  url       = {https://doi.org/10.1007/978-3-319-61824-1\_57},
  doi       = {10.1007/978-3-319-61824-1\_57},
  timestamp = {Sun, 25 Mar 2018 23:31:48 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/swarm/WuWFX17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/XinHF16,
  author    = {Xiaolong Xin and
               Pengfei He and
               Yulong Fu},
  title     = {States on hyper MV-algebras},
  journal   = {Journal of Intelligent and Fuzzy Systems},
  volume    = {31},
  number    = {3},
  pages     = {1299--1309},
  year      = {2016},
  url       = {https://doi.org/10.3233/IFS-162196},
  doi       = {10.3233/IFS-162196},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jifs/XinHF16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CaoC0F16,
  author    = {Xuefei Cao and
               Bo Chen and
               Hui Li and
               Yulong Fu},
  title     = {Packet Header Anomaly Detection Using Bayesian Topic Models},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {40},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/040},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CaoC0F16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/FuK15,
  author    = {Yulong Fu and
               Ousmane Kon{\'{e}}},
  title     = {Model based security verification of protocol implementation},
  journal   = {J. Inf. Sec. Appl.},
  volume    = {22},
  pages     = {17--27},
  year      = {2015},
  url       = {https://doi.org/10.1016/j.jisa.2014.08.002},
  doi       = {10.1016/j.jisa.2014.08.002},
  timestamp = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/istr/FuK15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/XinF14,
  author    = {Xiaolong Xin and
               Yulong Fu},
  title     = {Some results of convex fuzzy sublattices},
  journal   = {Journal of Intelligent and Fuzzy Systems},
  volume    = {27},
  number    = {1},
  pages     = {287--298},
  year      = {2014},
  url       = {https://doi.org/10.3233/IFS-130996},
  doi       = {10.3233/IFS-130996},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jifs/XinF14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/FuK14,
  author    = {Yulong Fu and
               Ousmane Kon{\'{e}}},
  title     = {Security and Robustness by Protocol Testing},
  journal   = {{IEEE} Systems Journal},
  volume    = {8},
  number    = {3},
  pages     = {699--707},
  year      = {2014},
  url       = {https://doi.org/10.1109/JSYST.2012.2223532},
  doi       = {10.1109/JSYST.2012.2223532},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/sj/FuK14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FuK13,
  author    = {Yulong Fu and
               Ousmane Kon{\'{e}}},
  title     = {Validation of security protocol implementations from security objectives},
  journal   = {Computers {\&} Security},
  volume    = {36},
  pages     = {27--39},
  year      = {2013},
  url       = {https://doi.org/10.1016/j.cose.2013.01.005},
  doi       = {10.1016/j.cose.2013.01.005},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/compsec/FuK13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/FuK13,
  author    = {Yulong Fu and
               Ousmane Kon{\'{e}}},
  title     = {Using transition systems to model and verify the implementation of
               security protocol},
  booktitle = {The 6th International Conference on Security of Information and Networks,
               {SIN} '13, Aksaray, Turkey, November 26-28, 2013},
  pages     = {210--217},
  year      = {2013},
  crossref  = {DBLP:conf/sin/2013},
  url       = {https://doi.org/10.1145/2523514.2527003},
  doi       = {10.1145/2523514.2527003},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sin/FuK13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/FuK13a,
  author    = {Yulong Fu and
               Ousmane Kon{\'{e}}},
  title     = {A finite transition model for security protocol verification},
  booktitle = {The 6th International Conference on Security of Information and Networks,
               {SIN} '13, Aksaray, Turkey, November 26-28, 2013},
  pages     = {368--371},
  year      = {2013},
  crossref  = {DBLP:conf/sin/2013},
  url       = {https://doi.org/10.1145/2523514.2523564},
  doi       = {10.1145/2523514.2523564},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sin/FuK13a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/FuK11,
  author    = {Yulong Fu and
               Ousmane Kon{\'{e}}},
  title     = {Network Securing against Threatening Requests},
  booktitle = {Data Privacy Management and Autonomous Spontaneus Security - 6th International
               Workshop, {DPM} 2011, and 4th International Workshop, {SETOP} 2011,
               Leuven, Belgium, September 15-16, 2011, Revised Selected Papers},
  pages     = {280--294},
  year      = {2011},
  crossref  = {DBLP:conf/esorics/2011-7122},
  url       = {https://doi.org/10.1007/978-3-642-28879-1\_19},
  doi       = {10.1007/978-3-642-28879-1\_19},
  timestamp = {Tue, 23 May 2017 01:07:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/FuK11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/FuK11,
  author    = {Yulong Fu and
               Ousmane Kon{\'{e}}},
  title     = {A Robustness Testing Method for Network Security},
  booktitle = {Global Security, Safety and Sustainability {\&} e-Democracy -
               7th International and 4th e-Democracy, Joint Conferences, ICGS3/e-Democracy
               2011, Thessaloniki, Greece, August 24-26, 2011, Revised Selected Papers},
  pages     = {38--45},
  year      = {2011},
  crossref  = {DBLP:conf/icgs3/2011},
  url       = {https://doi.org/10.1007/978-3-642-33448-1\_6},
  doi       = {10.1007/978-3-642-33448-1\_6},
  timestamp = {Tue, 23 May 2017 01:07:57 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icgs3/FuK11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cns/2018,
  title     = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
               2018, Beijing, China, May 30 - June 1, 2018},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8410986},
  isbn      = {978-1-5386-4586-4},
  timestamp = {Thu, 16 Aug 2018 12:45:02 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cns/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icc/2017,
  title     = {{IEEE} International Conference on Communications, {ICC} 2017, Paris,
               France, May 21-25, 2017},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7985734},
  isbn      = {978-1-4673-8999-0},
  timestamp = {Fri, 04 Aug 2017 13:37:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icc/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nss/2017,
  editor    = {Zheng Yan and
               Refik Molva and
               Wojciech Mazurczyk and
               Raimo Kantola},
  title     = {Network and System Security - 11th International Conference, {NSS}
               2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10394},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-64701-2},
  doi       = {10.1007/978-3-319-64701-2},
  isbn      = {978-3-319-64700-5},
  timestamp = {Thu, 19 Oct 2017 12:55:22 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/nss/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spaccs/2017,
  editor    = {Guojun Wang and
               Mohammed Atiquzzaman and
               Zheng Yan and
               Kim{-}Kwang Raymond Choo},
  title     = {Security, Privacy, and Anonymity in Computation, Communication, and
               Storage - 10th International Conference, SpaCCS 2017, Guangzhou, China,
               December 12-15, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10656},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-72389-1},
  doi       = {10.1007/978-3-319-72389-1},
  isbn      = {978-3-319-72388-4},
  timestamp = {Sat, 09 Dec 2017 14:40:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/spaccs/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/swarm/2017-1,
  editor    = {Ying Tan and
               Hideyuki Takagi and
               Yuhui Shi},
  title     = {Advances in Swarm Intelligence - 8th International Conference, {ICSI}
               2017, Fukuoka, Japan, July 27 - August 1, 2017, Proceedings, Part
               {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10385},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-61824-1},
  doi       = {10.1007/978-3-319-61824-1},
  isbn      = {978-3-319-61823-4},
  timestamp = {Sun, 25 Mar 2018 23:31:48 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/swarm/2017-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sin/2013,
  editor    = {Atilla El{\c{c}}i and
               Manoj Singh Gaur and
               Mehmet A. Orgun and
               Oleg B. Makarevich},
  title     = {The 6th International Conference on Security of Information and Networks,
               {SIN} '13, Aksaray, Turkey, November 26-28, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2523514},
  isbn      = {978-1-4503-2498-4},
  timestamp = {Thu, 09 Jan 2014 10:19:59 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sin/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2011-7122,
  editor    = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
               Guillermo Navarro{-}Arribas and
               Nora Cuppens{-}Boulahia and
               Sabrina De Capitani di Vimercati},
  title     = {Data Privacy Management and Autonomous Spontaneus Security - 6th International
               Workshop, {DPM} 2011, and 4th International Workshop, {SETOP} 2011,
               Leuven, Belgium, September 15-16, 2011, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7122},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-28879-1},
  doi       = {10.1007/978-3-642-28879-1},
  isbn      = {978-3-642-28878-4},
  timestamp = {Tue, 23 May 2017 01:07:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2011-7122},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icgs3/2011,
  editor    = {Christos K. Georgiadis and
               Hamid Jahankhani and
               Elias Pimenidis and
               Rabih Bashroush and
               Ameer Al{-}Nemrat},
  title     = {Global Security, Safety and Sustainability {\&} e-Democracy -
               7th International and 4th e-Democracy, Joint Conferences, ICGS3/e-Democracy
               2011, Thessaloniki, Greece, August 24-26, 2011, Revised Selected Papers},
  series    = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
               and Telecommunications Engineering},
  volume    = {99},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-33448-1},
  doi       = {10.1007/978-3-642-33448-1},
  isbn      = {978-3-642-33447-4},
  timestamp = {Tue, 23 May 2017 01:07:57 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icgs3/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI, founded at University of Trier