default search action
Yang Xiang 0001
Person information
- affiliation: Swinburne University of Technology, School of Software and Electrical Engineering, Hawthorn, VIC, Australia
- affiliation: Deakin University, School of Information Technology, Geelong, VIC, Australia
- affiliation (former): Xidian University, State Key Laboratory of Integrated Service Networks, Xi'an, China
- affiliation (former): Central Queensland University, School of Management and Information Systems, Rockhampton, Australia
- affiliation (PhD): Deakin University, Geelong, VIC, Australia
Other persons with the same name
- Yang Xiang — disambiguation page
- Yang Xiang 0002 — Hong Kong University of Science and Technology, Department of Mathematics, Hong Kong
- Yang Xiang 0003 — Pengcheng Laboratory, Shenzhen, China (and 1 more)
- Yang Xiang 0004 — University of Guelph, School of Computer Science, Canada (and 5 more)
- Yang Xiang 0005 — Tongji University, State Key Laboratory of Marine Geology, Shanghai, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j317]Lihong Tang, Tingmin Wu, Xiao Chen, Sheng Wen, Wei Zhou, Xiaogang Zhu, Yang Xiang:
How COVID-19 impacts telehealth: an empirical study of telehealth services, users and the use of metaverse. Connect. Sci. 36(1) (2024) - [j316]Yanmei Cao, Jianghong Wei, Yang Xiang, Willy Susilo, Xiaofeng Chen:
Abuse-resistant deniable encryption. Comput. Stand. Interfaces 87: 103761 (2024) - [j315]Tengyun Jiao, Zhiyu Xu, Minfeng Qi, Sheng Wen, Yang Xiang, Gary Nan:
A Survey of Ethereum Smart Contract Security: Attacks and Detection. Distributed Ledger Technol. Res. Pract. 3(3): 23:1-23:28 (2024) - [j314]Minfeng Qi, Ziyuan Wang, Qing-Long Han, Jun Zhang, Shiping Chen, Yang Xiang:
Privacy Protection for Blockchain-Based Healthcare IoT Systems: A Survey. IEEE CAA J. Autom. Sinica 11(8): 1757-1776 (2024) - [j313]Jun Shen, Xiaofeng Chen, Xinyi Huang, Yang Xiang:
Public Proofs of Data Replication and Retrievability With User-Friendly Replication. IEEE Trans. Dependable Secur. Comput. 21(4): 2057-2067 (2024) - [j312]Lihong Tang, Xiao Chen, Sheng Wen, Li Li, Marthie Grobler, Yang Xiang:
Demystifying the Evolution of Android Malware Variants. IEEE Trans. Dependable Secur. Comput. 21(4): 3324-3341 (2024) - [j311]Wanlun Ma, Yiliao Song, Minhui Xue, Sheng Wen, Yang Xiang:
The "Code" of Ethics: A Holistic Audit of AI Code Generators. IEEE Trans. Dependable Secur. Comput. 21(5): 4997-5013 (2024) - [j310]Chuer Yu, Xuhong Zhang, Yuxuan Duan, Senbo Yan, Zonghui Wang, Yang Xiang, Shouling Ji, Wenzhi Chen:
Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection. IEEE Trans. Dependable Secur. Comput. 21(5): 5029-5045 (2024) - [j309]Gaolei Fei, Yang Liu, Guangmin Hu, Sheng Wen, Yang Xiang:
Online Social Network User Home Location Inference Based on Heterogeneous Networks. IEEE Trans. Dependable Secur. Comput. 21(6): 5509-5525 (2024) - [j308]Wanlun Ma, Derui Wang, Chao Chen, Sheng Wen, Gaolei Fei, Yang Xiang:
LocGuard: A Location Privacy Defender for Image Sharing. IEEE Trans. Dependable Secur. Comput. 21(6): 5526-5537 (2024) - [j307]Xiaogang Zhu, Siyu Zhang, Chaoran Li, Sheng Wen, Yang Xiang:
Fuzzing Android Native System Libraries via Dynamic Data Dependency Graph. IEEE Trans. Inf. Forensics Secur. 19: 3733-3744 (2024) - [j306]Cong Wu, Jing Chen, Qianru Fang, Kun He, Ziming Zhao, Hao Ren, Guowen Xu, Yang Liu, Yang Xiang:
Rethinking Membership Inference Attacks Against Transfer Learning. IEEE Trans. Inf. Forensics Secur. 19: 6441-6454 (2024) - [c147]Zhi Zhang, Decheng Chen, Jiahao Qi, Yueqiang Cheng, Shijie Jiang, Yiyang Lin, Yansong Gao, Surya Nepal, Yi Zou, Jiliang Zhang, Yang Xiang:
SoK: Rowhammer on Commodity Operating Systems. AsiaCCS 2024 - [c146]Xiaoxing Mo, Yechao Zhang, Leo Yu Zhang, Wei Luo, Nan Sun, Shengshan Hu, Shang Gao, Yang Xiang:
Robust Backdoor Detection for Deep Learning via Topological Evolution Dynamics. SP 2024: 2048-2066 - [c145]Shigang Liu, Di Cao, Junae Kim, Tamas Abraham, Paul Montague, Seyit Camtepe, Jun Zhang, Yang Xiang:
EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection. USENIX Security Symposium 2024 - [i45]Zehang Deng, Ruoxi Sun, Minhui Xue, Sheng Wen, Seyit Camtepe, Surya Nepal, Yang Xiang:
Leakage-Resilient and Carbon-Neutral Aggregation Featuring the Federated AI-enabled Critical Infrastructure. CoRR abs/2405.15258 (2024) - [i44]Jiaheng Wei, Yanjun Zhang, Leo Yu Zhang, Ming Ding, Chao Chen, Kok-Leong Ong, Jun Zhang, Yang Xiang:
Memorization in deep learning: A survey. CoRR abs/2406.03880 (2024) - [i43]Shigang Liu, Di Cao, Junae Kim, Tamas Abraham, Paul Montague, Seyit Camtepe, Jun Zhang, Yang Xiang:
EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection. CoRR abs/2407.19216 (2024) - 2023
- [j305]Lin Li, Chao Chen, Lei Pan, Leo Yu Zhang, Zhifeng Wang, Jun Zhang, Yang Xiang:
A Survey of PPG's Application in Authentication. Comput. Secur. 135: 103488 (2023) - [j304]Xiaoyu Zhang, Chao Chen, Yi Xie, Xiaofeng Chen, Jun Zhang, Yang Xiang:
A survey on privacy inference attacks and defenses in cloud-based Deep Neural Network. Comput. Stand. Interfaces 83: 103672 (2023) - [j303]Huacheng Li, Chunhe Xia, Tianbo Wang, Sheng Wen, Chao Chen, Yang Xiang:
Capturing Dynamics of Information Diffusion in SNS: A Survey of Methodology and Techniques. ACM Comput. Surv. 55(2): 22:1-22:51 (2023) - [j302]Qin Wang, Jiangshan Yu, Shiping Chen, Yang Xiang:
SoK: DAG-based Blockchain Systems. ACM Comput. Surv. 55(12): 261:1-261:38 (2023) - [j301]Qin Wang, Rujia Li, Shiping Chen, Yang Xiang:
Formal Security Analysis on dBFT Protocol of NEO. Distributed Ledger Technol. Res. Pract. 2(1): 2:1-2:19 (2023) - [j300]Qin Wang, Rujia Li, Qi Wang, David Galindo, Shiping Chen, Yang Xiang:
Transparent Registration-Based Encryption through Blockchain. Distributed Ledger Technol. Res. Pract. 2(1): 3:1-3:14 (2023) - [j299]Xiaotao Feng, Xiaogang Zhu, Qing-Long Han, Wei Zhou, Sheng Wen, Yang Xiang:
Detecting Vulnerability on IoT Device Firmware: A Survey. IEEE CAA J. Autom. Sinica 10(1): 25-41 (2023) - [j298]Jun Feng, Hu Xiong, Jinhao Chen, Yang Xiang, Kuo-Hui Yeh:
Scalable and Revocable Attribute-Based Data Sharing With Short Revocation List for IIoT. IEEE Internet Things J. 10(6, March 15): 4815-4829 (2023) - [j297]Yulei Wu, Ning Zhang, Zheng Yan, Mohammed Atiquzzaman, Yang Xiang:
Guest Editorial Special Issue on AI and Blockchain-Powered IoT Sustainable Computing. IEEE Internet Things J. 10(8, April 15): 6531-6534 (2023) - [j296]Yuming Feng, Weizhe Zhang, Shujun Yin, Hao Tang, Yang Xiang, Yu Zhang:
A Collaborative Stealthy DDoS Detection Method Based on Reinforcement Learning at the Edge of Internet of Things. IEEE Internet Things J. 10(20): 17934-17948 (2023) - [j295]Hao Zhou, Geng Yang, Yang Xiang, Yunlu Bai, Weiya Wang:
A Lightweight Matrix Factorization for Recommendation With Local Differential Privacy in Big Data. IEEE Trans. Big Data 9(1): 160-173 (2023) - [j294]Jianghua Liu, Jian Yang, Wei Wu, Xinyi Huang, Yang Xiang:
Lightweight Authentication Scheme for Data Dissemination in Cloud-Assisted Healthcare IoT. IEEE Trans. Computers 72(5): 1384-1395 (2023) - [j293]Shi-Cho Cha, Chun-Lin Chang, Yang Xiang, Tzu-Jia Huang, Kuo-Hui Yeh:
Enhancing OAuth With Blockchain Technologies for Data Portability. IEEE Trans. Cloud Comput. 11(1): 349-366 (2023) - [j292]Xiaoqin Feng, Jianfeng Ma, Huaxiong Wang, Sheng Wen, Yang Xiang, Yinbin Miao:
Space-Efficient Storage Structure of Blockchain Transactions Supporting Secure Verification. IEEE Trans. Cloud Comput. 11(3): 2631-2645 (2023) - [j291]Junyang Qiu, Qing-Long Han, Wei Luo, Lei Pan, Surya Nepal, Jun Zhang, Yang Xiang:
Cyber Code Intelligence for Android Malware Detection. IEEE Trans. Cybern. 53(1): 617-627 (2023) - [j290]Nan Sun, Jun Zhang, Shang Gao, Leo Yu Zhang, Seyit Camtepe, Yang Xiang:
Cyber Information Retrieval Through Pragmatics Understanding and Visualization. IEEE Trans. Dependable Secur. Comput. 20(2): 1186-1199 (2023) - [j289]Lihong Tang, Tingmin Wu, Xiao Chen, Sheng Wen, Li Li, Xin Xia, Marthie Grobler, Yang Xiang:
How Does Visualisation Help App Practitioners Analyse Android Apps? IEEE Trans. Dependable Secur. Comput. 20(3): 2238-2255 (2023) - [j288]Hao Zhou, Geng Yang, Yuxian Huang, Hua Dai, Yang Xiang:
Privacy-Preserving and Verifiable Federated Learning Framework for Edge Computing. IEEE Trans. Inf. Forensics Secur. 18: 565-580 (2023) - [j287]Rongjunchen Zhang, Tingmin Wu, Sheng Wen, Surya Nepal, Cécile Paris, Yang Xiang:
SAM: Multi-turn Response Selection Based on Semantic Awareness Matching. ACM Trans. Internet Techn. 23(1): 3:1-3:18 (2023) - [j286]Guangming Cui, Qiang He, Feifei Chen, Hai Jin, Yang Xiang, Yun Yang:
Location Privacy Protection via Delocalization in 5G Mobile Edge Computing Environment. IEEE Trans. Serv. Comput. 16(1): 412-423 (2023) - [j285]Chenkai Guo, Weijie Zhang, Naipeng Dong, Zheli Liu, Yang Xiang:
QoS-Aware Diversified Service Selection. IEEE Trans. Serv. Comput. 16(3): 2085-2099 (2023) - [c144]Lin Li, Chao Chen, Lei Pan, Yonghang Tai, Jun Zhang, Yang Xiang:
Hiding Your Signals: A Security Analysis of PPG-Based Biometric Authentication. ESORICS (3) 2023: 183-202 - [c143]Lin Li, Chao Chen, Lei Pan, Jun Zhang, Yang Xiang:
SigD: A Cross-Session Dataset for PPG-based User Authentication in Different Demographic Groups. IJCNN 2023: 1-8 - [c142]Wanlun Ma, Derui Wang, Ruoxi Sun, Minhui Xue, Sheng Wen, Yang Xiang:
The "Beatrix" Resurrections: Robust Backdoor Detection via Gram Matrices. NDSS 2023 - [c141]Lin Li, Chao Chen, Lei Pan, Leo Yu Zhang, Jun Zhang, Yang Xiang:
SigA: rPPG-based Authentication for Virtual Reality Head-mounted Display. RAID 2023: 686-699 - [c140]Rongjunchen Zhang, Tingmin Wu, Xiao Chen, Sheng Wen, Surya Nepal, Cécile Paris, Yang Xiang:
Dynalogue: A Transformer-Based Dialogue System with Dynamic Attention. WWW 2023: 1604-1615 - [e17]Joseph K. Liu, Yang Xiang, Surya Nepal, Gene Tsudik:
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, ASIA CCS 2023, Melbourne, VIC, Australia, July 10-14, 2023. ACM 2023 [contents] - [i42]Chuer Yu, Xuhong Zhang, Yuxuan Duan, Senbo Yan, Zonghui Wang, Yang Xiang, Shouling Ji, Wenzhi Chen:
Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection. CoRR abs/2303.18174 (2023) - [i41]Wanlun Ma, Yiliao Song, Minhui Xue, Sheng Wen, Yang Xiang:
The "code" of Ethics: A Holistic Audit of AI Code Generators. CoRR abs/2305.12747 (2023) - [i40]Zian Liu, Zhi Zhang, Siqi Ma, Dongxi Liu, Jun Zhang, Chao Chen, Shigang Liu, Muhammad Ejaz Ahmed, Yang Xiang:
SemDiff: Binary Similarity Detection by Diffing Key-Semantics Graphs. CoRR abs/2308.01463 (2023) - [i39]Jiaheng Wei, Yanjun Zhang, Leo Yu Zhang, Chao Chen, Shirui Pan, Kok-Leong Ong, Jun Zhang, Yang Xiang:
Client-side Gradient Inversion Against Federated Learning from Poisoning. CoRR abs/2309.07415 (2023) - [i38]Xiaoxing Mo, Yechao Zhang, Leo Yu Zhang, Wei Luo, Nan Sun, Shengshan Hu, Shang Gao, Yang Xiang:
Robust Backdoor Detection for Deep Learning via Topological Evolution Dynamics. CoRR abs/2312.02673 (2023) - 2022
- [j284]Rory Coulter, Jun Zhang, Lei Pan, Yang Xiang:
Domain adaptation for Windows advanced persistent threat detection. Comput. Secur. 112: 102496 (2022) - [j283]Yueqiang Cheng, Zhi Zhang, Yansong Gao, Zhaofeng Chen, Shengjian Guo, Qifei Zhang, Rui Mei, Surya Nepal, Yang Xiang:
Meltdown-type attacks are still feasible in the wall of kernel page-Table isolation. Comput. Secur. 113: 102556 (2022) - [j282]Wenjuan Li, Fei Tian, Jin Li, Yang Xiang:
Evaluating intrusion sensitivity allocation with supervised learning in collaborative intrusion detection. Concurr. Comput. Pract. Exp. 34(16) (2022) - [j281]Yanmei Cao, Jianghong Wei, Fangguo Zhang, Yang Xiang, Xiaofeng Chen:
Efficient public-key authenticated deniable encryption schemes. Comput. Stand. Interfaces 82: 103620 (2022) - [j280]Xiangyu Hu, Wanlun Ma, Chao Chen, Sheng Wen, Jun Zhang, Yang Xiang, Gaolei Fei:
Event detection in online social network: Methodologies, state-of-art, and evolution. Comput. Sci. Rev. 46: 100500 (2022) - [j279]Yuantian Miao, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, Yang Xiang:
Machine Learning-based Cyber Attacks Targeting on Controlled Information: A Survey. ACM Comput. Surv. 54(7): 139:1-139:36 (2022) - [j278]Xiaogang Zhu, Sheng Wen, Seyit Camtepe, Yang Xiang:
Fuzzing: A Survey for Roadmap. ACM Comput. Surv. 54(11s): 230:1-230:36 (2022) - [j277]Minfeng Qi, Ziyuan Wang, Shiping Chen, Yang Xiang:
A Hybrid Incentive Mechanism for Decentralized Federated Learning. Distributed Ledger Technol. Res. Pract. 1(1): 1-15 (2022) - [j276]Jun Zhang, Lei Pan, Qing-Long Han, Chao Chen, Sheng Wen, Yang Xiang:
Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey. IEEE CAA J. Autom. Sinica 9(3): 377-391 (2022) - [j275]Feixue Yan, Sheng Wen, Surya Nepal, Cécile Paris, Yang Xiang:
Explainable machine learning in cybersecurity: A survey. Int. J. Intell. Syst. 37(12): 12305-12334 (2022) - [j274]Hong Zhao, Yuexin Zhang, Xinyi Huang, Yang Xiang, Chunhua Su:
A Physical-Layer Key Generation Approach Based on Received Signal Strength in Smart Homes. IEEE Internet Things J. 9(7): 4917-4927 (2022) - [j273]Qin Wang, Longxia Huang, Shiping Chen, Yang Xiang:
Blockchain Enables Your Bill Safer. IEEE Internet Things J. 9(16): 14162-14171 (2022) - [j272]Bo Li, Qiang He, Feifei Chen, Hai Jin, Yang Xiang, Yun Yang:
Inspecting Edge Data Integrity With Aggregate Signature in Distributed Edge Computing Environment. IEEE Trans. Cloud Comput. 10(4): 2691-2703 (2022) - [j271]Derui Wang, Chaoran Li, Sheng Wen, Qing-Long Han, Surya Nepal, Xiangyu Zhang, Yang Xiang:
Daedalus: Breaking Nonmaximum Suppression in Object Detection via Adversarial Examples. IEEE Trans. Cybern. 52(8): 7427-7440 (2022) - [j270]Shigang Liu, Guanjun Lin, Lizhen Qu, Jun Zhang, Olivier Y. de Vel, Paul Montague, Yang Xiang:
CD-VulD: Cross-Domain Vulnerability Discovery Based on Deep Domain Adaptation. IEEE Trans. Dependable Secur. Comput. 19(1): 438-451 (2022) - [j269]Xiaogang Zhu, Xiaotao Feng, Xiaozhu Meng, Sheng Wen, Seyit Camtepe, Yang Xiang, Kui Ren:
CSI-Fuzz: Full-Speed Edge Tracing Using Coverage Sensitive Instrumentation. IEEE Trans. Dependable Secur. Comput. 19(2): 912-923 (2022) - [j268]Derui Wang, Chaoran Li, Sheng Wen, Surya Nepal, Yang Xiang:
Defending Against Adversarial Attack Towards Deep Neural Networks Via Collaborative Multi-Task Training. IEEE Trans. Dependable Secur. Comput. 19(2): 953-965 (2022) - [j267]Jian Shen, Ziyuan Gui, Xiaofeng Chen, Jun Zhang, Yang Xiang:
Lightweight and Certificateless Multi-Receiver Secure Data Transmission Protocol for Wireless Body Area Networks. IEEE Trans. Dependable Secur. Comput. 19(3): 1464-1475 (2022) - [j266]Qiang He, Cheng Wang, Guangming Cui, Bo Li, Rui Zhou, Qingguo Zhou, Yang Xiang, Hai Jin, Yun Yang:
A Game-Theoretical Approach for Mitigating Edge DDoS Attack. IEEE Trans. Dependable Secur. Comput. 19(4): 2333-2348 (2022) - [j265]Jing Chen, Xin Chen, Kun He, Ruiying Du, Weihang Chen, Yang Xiang:
DELIA: Distributed Efficient Log Integrity Audit Based on Hierarchal Multi-Party State Channel. IEEE Trans. Dependable Secur. Comput. 19(5): 3286-3300 (2022) - [j264]Chaoran Li, Xiao Chen, Derui Wang, Sheng Wen, Muhammad Ejaz Ahmed, Seyit Camtepe, Yang Xiang:
Backdoor Attack on Machine Learning Based Android Malware Detectors. IEEE Trans. Dependable Secur. Comput. 19(5): 3357-3370 (2022) - [j263]Tianbo Wang, Chunhe Xia, Xiaojian Li, Yang Xiang:
Epidemic Heterogeneity and Hierarchy: A Study of Wireless Hybrid Worm Propagation. IEEE Trans. Mob. Comput. 21(5): 1639-1656 (2022) - [j262]Wanlun Ma, Xiangyu Hu, Chao Chen, Sheng Wen, Kim-Kwang Raymond Choo, Yang Xiang:
Social Media Event Prediction using DNN with Feedback Mechanism. ACM Trans. Manag. Inf. Syst. 13(3): 33:1-33:24 (2022) - [j261]Xiaogang Zhu, Sheng Wen, Alireza Jolfaei, Mohammad Sayad Haghighi, Seyit Camtepe, Yang Xiang:
Vulnerability Detection in SIoT Applications: A Fuzzing Method on their Binaries. IEEE Trans. Netw. Sci. Eng. 9(3): 970-979 (2022) - [j260]Derui Wang, Sheng Wen, Alireza Jolfaei, Mohammad Sayad Haghighi, Surya Nepal, Yang Xiang:
On the Neural Backdoor of Federated Generative Models in Edge Computing. ACM Trans. Internet Techn. 22(2): 43:1-43:21 (2022) - [j259]Tingmin Wu, Wanlun Ma, Sheng Wen, Xin Xia, Cécile Paris, Surya Nepal, Yang Xiang:
Analysis of Trending Topics and Text-based Channels of Information Delivery in Cybersecurity. ACM Trans. Internet Techn. 22(2): 52:1-52:27 (2022) - [j258]Liang Yuan, Qiang He, Feifei Chen, Jun Zhang, Lianyong Qi, Xiaolong Xu, Yang Xiang, Yun Yang:
CSEdge: Enabling Collaborative Edge Storage for Multi-Access Edge Computing Based on Blockchain. IEEE Trans. Parallel Distributed Syst. 33(8): 1873-1887 (2022) - [j257]Guoxiu Liu, Geng Yang, Shuangjie Bai, Huaqun Wang, Yang Xiang:
FASE: A Fast and Accurate Privacy-Preserving Multi-Keyword Top-k Retrieval Scheme Over Encrypted Cloud Data. IEEE Trans. Serv. Comput. 15(4): 1855-1867 (2022) - [j256]Guangming Cui, Qiang He, Bo Li, Xiaoyu Xia, Feifei Chen, Hai Jin, Yang Xiang, Yun Yang:
Efficient Verification of Edge Data Integrity in Edge Computing Environment. IEEE Trans. Serv. Comput. 15(6): 3233-3244 (2022) - [j255]Hua Dai, Maohu Yang, T. G. Yang, Yang Xiang, Zheng Hu, Huaqun Wang:
A Keyword-Grouping Inverted Index Based Multi-Keyword Ranked Search Scheme Over Encrypted Cloud Data. IEEE Trans. Sustain. Comput. 7(3): 561-578 (2022) - [c139]Qin Wang, Rujia Li, Qi Wang, Shiping Chen, Yang Xiang:
Exploring Unfairness on Proof of Authority: Order Manipulation Attacks and Remedies. AsiaCCS 2022: 123-137 - [c138]Minfeng Qi, Zhiyu Xu, Ziyuan Wang, Shiping Chen, Yang Xiang:
DeDa: A DeFi-enabled Data Sharing and Trading System. BSCI 2022: 47-57 - [c137]Lin Li, Chao Chen, Lei Pan, Jun Zhang, Yang Xiang:
Video is All You Need: Attacking PPG-based Biometric Authentication. AISec@CCS 2022: 57-66 - [c136]Yuantian Miao, Chao Chen, Lei Pan, Shigang Liu, Seyit Camtepe, Jun Zhang, Yang Xiang:
No-Label User-Level Membership Inference for ASR Model Auditing. ESORICS (2) 2022: 610-628 - [c135]Minfeng Qi, Zhiyu Xu, Ziyuan Wang, Shiping Chen, Yang Xiang:
Databox-based Delivery Service via Blockchain. ICWS 2022: 79-84 - [c134]Lei Shi, Shanti Krishnan, Sheng Wen, Yang Xiang:
Supporting Cyber-Attacks and System Anomaly Detection Research with an Industry 4.0 Dataset. NSS 2022: 335-353 - [c133]Chaoran Li, Xiao Chen, Ruoxi Sun, Minhui Xue, Sheng Wen, Muhammad Ejaz Ahmed, Seyit Camtepe, Yang Xiang:
Cross-language Android permission specification. ESEC/SIGSOFT FSE 2022: 772-783 - [c132]Minfeng Qi, Zhiyu Xu, Tengyun Jiao, Sheng Wen, Yang Xiang, Gary Nan:
A Comparative Study on the Security of Cryptocurrency Wallets in Android System. TrustCom 2022: 399-406 - [i37]Lin Li, Chao Chen, Lei Pan, Jun Zhang, Yang Xiang:
SoK: An Overview of PPG's Application in Authentication. CoRR abs/2201.11291 (2022) - [i36]Yuantian Miao, Chao Chen, Lei Pan, Jun Zhang, Yang Xiang:
FAAG: Fast Adversarial Audio Generation through Interactive Attack Optimisation. CoRR abs/2202.05416 (2022) - [i35]Lin Li, Chao Chen, Lei Pan, Jun Zhang, Yang Xiang:
Video is All You Need: Attacking PPG-based Biometric Authentication. CoRR abs/2203.00928 (2022) - [i34]Qin Wang, Rujia Li, Qi Wang, Shiping Chen, Yang Xiang:
Exploring Unfairness on Proof of Authority: Order Manipulation Attacks and Remedies. CoRR abs/2203.03008 (2022) - [i33]Yang Xiang, Zhihua Wu, Weibao Gong, Siyu Ding, Xianjie Mo, Yuang Liu, Shuohuan Wang, Peng Liu, Yongshuai Hou, Long Li, Bin Wang, Shaohuai Shi, Yaqian Han, Yue Yu, Ge Li, Yu Sun, Yanjun Ma, Dianhai Yu:
Nebula-I: A General Framework for Collaboratively Training Deep Learning Models on Low-Bandwidth Cloud Clusters. CoRR abs/2205.09470 (2022) - [i32]Lin Li, Chao Chen, Lei Pan, Yonghang Tai, Jun Zhang, Yang Xiang:
Hiding Your Signals: A Security Analysis of PPG-based Biometric Authentication. CoRR abs/2207.04434 (2022) - [i31]Wanlun Ma, Derui Wang, Ruoxi Sun, Minhui Xue, Sheng Wen, Yang Xiang:
The "Beatrix" Resurrections: Robust Backdoor Detection via Gram Matrices. CoRR abs/2209.11715 (2022) - [i30]Shaohuai Shi, Qing Yang, Yang Xiang, Shuhan Qi, Xuan Wang:
An Efficient Split Fine-tuning Framework for Edge and Cloud Collaborative Learning. CoRR abs/2211.16703 (2022) - 2021
- [j254]Junyang Qiu, Jun Zhang, Wei Luo, Lei Pan, Surya Nepal, Yang Xiang:
A Survey of Android Malware Detection with Deep Neural Models. ACM Comput. Surv. 53(6): 126:1-126:36 (2021) - [j253]Wenjuan Li, Yu Wang, Zhiping Jin, Keping Yu, Jin Li, Yang Xiang:
Challenge-based collaborative intrusion detection in software-defined networking: an evaluation. Digit. Commun. Networks 7(2): 257-263 (2021) - [j252]Xiaoyu Zhang, Xiaofeng Chen, Hongyang Yan, Yang Xiang:
Privacy-preserving and verifiable online crowdsourcing with worker updates. Inf. Sci. 548: 212-232 (2021) - [j251]Liang Qin, Yang Xiang, Hong Liu:
Vortex-shock and vortex-vortex interactions in the compressible starting jet from two beveled nozzle configurations. J. Vis. 24(2): 225-236 (2021) - [j250]Yuantian Miao, Minhui Xue, Chao Chen, Lei Pan, Jun Zhang, Benjamin Zi Hao Zhao, Dali Kaafar, Yang Xiang:
The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services. Proc. Priv. Enhancing Technol. 2021(1): 209-228 (2021) - [j249]Jianghua Liu, Jingyu Hou, Wenjie Yang, Yang Xiang, Wanlei Zhou, Wei Wu, Xinyi Huang:
Leakage-Free Dissemination of Authenticated Tree-Structured Data With Multi-Party Control. IEEE Trans. Computers 70(7): 1120-1131 (2021) - [j248]Guoxi Li, Wenzhi Chen, Yang Xiang:
Zweilous: A Decoupled and Flexible Memory Management Framework. IEEE Trans. Computers 70(9): 1350-1362 (2021) - [j247]Jianghua Liu, Jinhua Ma, Yang Xiang, Wanlei Zhou, Xinyi Huang:
Authenticated Medical Documents Releasing with Privacy Protection and Release Control. IEEE Trans. Dependable Secur. Comput. 18(1): 448-459 (2021) - [j246]Yue Zhang, Jian Weng, Jiasi Weng, Lin Hou, Anjia Yang, Ming Li, Yang Xiang, Robert H. Deng:
Looking Back! Using Early Versions of Android Apps as Attack Vectors. IEEE Trans. Dependable Secur. Comput. 18(2): 652-666 (2021) - [j245]Xinghua Li, Mengyao Zhu, Laurence T. Yang, Mengfan Xu, Zhuo Ma, Cheng Zhong, Hui Li, Yang Xiang:
Sustainable Ensemble Learning Driving Intrusion Detection Model. IEEE Trans. Dependable Secur. Comput. 18(4): 1591-1604 (2021) - [j244]Derui Wang, Chaoran Li, Sheng Wen, Surya Nepal, Yang Xiang:
Man-in-the-Middle Attacks Against Machine Learning Classifiers Via Malicious Generative Models. IEEE Trans. Dependable Secur. Comput. 18(5): 2074-2087 (2021) - [j243]