


Остановите войну!
for scientists:


default search action
Qiben Yan
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j37]Guangjing Wang, Nikolay Ivanov, Bocheng Chen, Qi Wang, ThanhVu Nguyen, Qiben Yan:
Graph Learning for Interactive Threat Detection in Heterogeneous Smart Home Rule Data. Proc. ACM Manag. Data 1(1): 102:1-102:27 (2023) - [j36]Nikolay Ivanov
, Qiben Yan
, Anurag Kompalli
:
TxT: Real-Time Transaction Encapsulation for Ethereum Smart Contracts. IEEE Trans. Inf. Forensics Secur. 18: 1141-1155 (2023) - [j35]Zirui Yuan
, Minglai Shao
, Qiben Yan
:
Motif-Level Anomaly Detection in Dynamic Graphs. IEEE Trans. Inf. Forensics Secur. 18: 2870-2882 (2023) - [j34]Nikolay Ivanov
, Qiben Yan
:
AutoThing: A Secure Transaction Framework for Self-Service Things. IEEE Trans. Serv. Comput. 16(2): 983-995 (2023) - [j33]Mohannad Alhanahnah
, Clay Stevens
, Bocheng Chen, Qiben Yan
, Hamid Bagheri
:
IoTCom: Dissecting Interaction Threats in IoT Systems. IEEE Trans. Software Eng. 49(4): 1523-1539 (2023) - [i23]Nikolay Ivanov, Qiben Yan, Anurag Kompalli:
TxT: Real-time Transaction Encapsulation for Ethereum Smart Contracts. CoRR abs/2301.08806 (2023) - [i22]Nikolay Ivanov, Chenning Li, Qiben Yan, Zhiyuan Sun, Zhichao Cao, Xiapu Luo:
Security Threat Mitigation For Smart Contracts: A Survey. CoRR abs/2302.07347 (2023) - [i21]Ce Zhou, Qian Li, Chen Li, Jun Yu, Yixin Liu, Guangjing Wang, Kai Zhang, Cheng Ji, Qiben Yan, Lifang He, Hao Peng, Jianxin Li, Jia Wu, Ziwei Liu, Pengtao Xie, Caiming Xiong, Jian Pei, Philip S. Yu, Lichao Sun:
A Comprehensive Survey on Pretrained Foundation Models: A History from BERT to ChatGPT. CoRR abs/2302.09419 (2023) - [i20]Yuanda Wang, Hanqing Guo, Guangjing Wang, Bocheng Chen, Qiben Yan:
VSMask: Defending Against Voice Synthesis Attack via Real-Time Predictive Perturbation. CoRR abs/2305.05736 (2023) - [i19]Ce Zhou, Qiben Yan, Zhiyuan Yu, Eshan Dixit, Ning Zhang, Huacheng Zeng, Alireza Safdari Ghanhdari:
ChargeX: Exploring State Switching Attack on Electric Vehicle Charging Systems. CoRR abs/2305.08037 (2023) - 2022
- [j32]Qiben Yan
, Qi Xia, Yuanda Wang, Pan Zhou
, Huacheng Zeng
:
URadio: Wideband Ultrasound Communication for Smart Home Applications. IEEE Internet Things J. 9(15): 13113-13125 (2022) - [j31]Shichen Zhang
, Pedram Kheirkhah Sangdeh
, Hossein Pirayesh
, Huacheng Zeng
, Qiben Yan
, Kai Zeng
:
AuthIoT: A Transferable Wireless Authentication Scheme for IoT Devices Without Input Interface. IEEE Internet Things J. 9(22): 23072-23085 (2022) - [j30]Yutian Tang
, Haoyu Wang, Xian Zhan
, Xiapu Luo
, Yajin Zhou
, Hao Zhou, Qiben Yan
, Yulei Sui, Jacky Keung
:
A Systematical Study on Application Performance Management Libraries for Apps. IEEE Trans. Software Eng. 48(8): 3044-3065 (2022) - [c59]Hanqing Guo, Qiben Yan, Nikolay Ivanov, Ying Zhu, Li Xiao, Eric J. Hunter
:
SUPERVOICE: Text-Independent Speaker Verification Using Ultrasound Energy in Human Speech. AsiaCCS 2022: 1019-1033 - [c58]Hanqing Guo, Yuanda Wang, Nikolay Ivanov, Li Xiao, Qiben Yan:
SPECPATCH: Human-In-The-Loop Adversarial Audio Spectrogram Patch Attack on Speech Recognition. CCS 2022: 1353-1366 - [c57]Hanqing Guo, Chenning Li
, Lingkun Li, Zhichao Cao, Qiben Yan, Li Xiao:
NEC: Speaker Selective Cancellation via Neural Enhanced Ultrasound Shadowing. DSN 2022: 355-366 - [c56]Yuanda Wang, Hanqing Guo, Qiben Yan:
GhostTalk: Interactive Attack on Smartphone Voice System Through Power Line. NDSS 2022 - [c55]Ce Zhou, Qiben Yan, Yan Shi, Lichao Sun:
DoubleStar: Long-Range Attack Towards Depth Estimation based Obstacle Avoidance in Autonomous Systems. USENIX Security Symposium 2022: 1885-1902 - [i18]Yuanda Wang, Hanqing Guo, Qiben Yan:
GhostTalk: Interactive Attack on Smartphone Voice System Through Power Line. CoRR abs/2202.02585 (2022) - [i17]Hanqing Guo, Qiben Yan, Nikolay Ivanov, Ying Zhu, Li Xiao, Eric J. Hunter:
SuperVoice: Text-Independent Speaker Verification Using Ultrasound Energy in Human Speech. CoRR abs/2205.14496 (2022) - [i16]Yuhui Zhu, Zhenxiang Chen, Qiben Yan, Shanshan Wang, Enlong Li, Lizhi Peng, Chuan Zhao:
Mining Function Homology of Bot Loaders from Honeypot Logs. CoRR abs/2206.00385 (2022) - [i15]Hanqing Guo, Chenning Li, Lingkun Li, Zhichao Cao, Qiben Yan, Li Xiao:
NEC: Speaker Selective Cancellation via Neural Enhanced Ultrasound Shadowing. CoRR abs/2207.05848 (2022) - [i14]Nikolay Ivanov, Qiben Yan:
Et tu, Blockchain? Outsmarting Smart Contracts via Social Engineering. CoRR abs/2209.08356 (2022) - [i13]Nikolay Ivanov, Qiben Yan:
Decentralization Paradox: A Study of Hegemonic and Risky ERC-20 Tokens. CoRR abs/2209.08370 (2022) - [i12]Yuhui Zhu, Zhenxiang Chen, Qiben Yan, Shanshan Wang, Alberto Giaretta, Enlong Li, Lizhi Peng, Chuan Zhao, Mauro Conti:
Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders. CoRR abs/2211.14790 (2022) - 2021
- [j29]Peiyuan Sun, Qiben Yan, Haoyi Zhou, Jianxin Li:
Osprey: A fast and accurate patch presence test framework for binaries. Comput. Commun. 173: 95-106 (2021) - [j28]Jun Zhao, Xudong Liu, Qiben Yan, Bo Li, Minglai Shao, Hao Peng
, Lichao Sun
:
Automatically predicting cyber attack preference with attributed heterogeneous attention networks and transductive learning. Comput. Secur. 102: 102152 (2021) - [j27]Zhiyuan Yu
, Zack Kaplan
, Qiben Yan
, Ning Zhang
:
Security and Privacy in the Emerging Cyber-Physical World: A Survey. IEEE Commun. Surv. Tutorials 23(3): 1879-1919 (2021) - [j26]Haroon Elahi
, Guojun Wang, Yang Xu
, Aniello Castiglione
, Qiben Yan, Muhammad Naeem Shehzad:
On the Characterization and Risk Assessment of AI-Powered Mobile Cloud Applications. Comput. Stand. Interfaces 78: 103538 (2021) - [j25]Anli Yan, Zhenxiang Chen, Haibo Zhang, Lizhi Peng, Qiben Yan, Muhammad Umair Hassan, Chuan Zhao, Bo Yang:
Effective detection of mobile malware behavior based on explainable deep neural network. Neurocomputing 453: 482-492 (2021) - [j24]Pedram Kheirkhah Sangdeh
, Hossein Pirayesh
, Qiben Yan
, Huacheng Zeng
:
DM-COM: Combining Device-to-Device and MU-MIMO Communications for Cellular Networks. IEEE Internet Things J. 8(17): 13516-13527 (2021) - [j23]Minglai Shao
, Jianxin Li
, Qiben Yan
, Feng Chen
, Hongyi Huang
, Xunxun Chen
:
Structured Sparsity Model Based Trajectory Tracking Using Private Location Data Release. IEEE Trans. Dependable Secur. Comput. 18(6): 2983-2995 (2021) - [j22]Jian Yu
, Yuewang He, Qiben Yan
, Xiangui Kang
:
SpecView: Malware Spectrum Visualization Framework With Singular Spectrum Transformation. IEEE Trans. Inf. Forensics Secur. 16: 5093-5107 (2021) - [j21]Qiben Yan, Jianzhi Lou, Mehmet C. Vuran, Suat Irmak:
Scalable Privacy-preserving Geo-distance Evaluation for Precision Agriculture IoT Systems. ACM Trans. Sens. Networks 17(4): 38:1-38:30 (2021) - [c54]Nikolay Ivanov, Jianzhi Lou, Ting Chen, Jin Li, Qiben Yan:
Targeting the Weakest Link: Social Engineering Attacks in Ethereum Smart Contracts. AsiaCCS 2021: 787-801 - [c53]Nikolay Ivanov, Qiben Yan:
EthClipper: A Clipboard Meddling Attack on Hardware Wallets with Address Verification Evasion. CNS 2021: 191-199 - [c52]Wei Song, Mengfei Tang, Qiben Yan, Yuan Shen, Yang Cao, Qian Wang
, Zhiyong Peng:
Privacy-Preserving Polynomial Evaluation over Spatio-Temporal Data on an Untrusted Cloud Server. DASFAA (1) 2021: 474-490 - [c51]Nikolay Ivanov, Qiben Yan, Qingyang Wang:
Blockumulus: A Scalable Framework for Smart Contracts on the Cloud. ICDCS 2021: 607-617 - [c50]Nikolay Ivanov, Hanqing Guo, Qiben Yan:
Rectifying Administrated ERC20 Tokens. ICICS (1) 2021: 22-37 - [c49]Cong Liu, Anli Yan, Zhenxiang Chen, Haibo Zhang, Qiben Yan, Lizhi Peng, Chuan Zhao:
IEdroid: Detecting Malicious Android Network Behavior Using Incremental Ensemble of Ensembles. ICPADS 2021: 788-795 - [c48]Jianzhi Lou, Qiben Yan, Qing Hui, Huacheng Zeng:
SoundFence: Securing Ultrasonic Sensors in Vehicles Using Physical-Layer Defense. SECON 2021: 1-9 - [c47]Hossein Pirayesh, Pedram Kheirkhah Sangdeh, Qiben Yan, Huacheng Zeng:
UD-MIMO: Uplink Distributed MIMO for Wireless LANs. SECON 2021: 1-9 - [c46]Hossein Pirayesh, Pedram Kheirkhah Sangdeh, Shichen Zhang, Qiben Yan, Huacheng Zeng:
JammingBird: Jamming-Resilient Communications for Vehicular Ad Hoc Networks. SECON 2021: 1-9 - [c45]Nikolay Ivanov, Qiben Yan:
System-Wide Security for Offline Payment Terminals. SecureComm (2) 2021: 99-119 - [c44]Chenning Li
, Hanqing Guo, Shuai Tong, Xiao Zeng, Zhichao Cao, Mi Zhang, Qiben Yan, Li Xiao, Jiliang Wang, Yunhao Liu:
NELoRa: Towards Ultra-low SNR LoRa Communication with Neural-enhanced Demodulation. SenSys 2021: 56-68 - [i11]Yutian Tang, Haoyu Wang, Xian Zhan, Xiapu Luo, Yajin Zhou, Hao Zhou, Qiben Yan, Yulei Sui, Jacky Keung:
A Systematical Study on Application Performance Management Libraries for Apps. CoRR abs/2103.11286 (2021) - [i10]Nikolay Ivanov, Jianzhi Lou, Ting Chen, Jin Li, Qiben Yan:
Targeting the Weakest Link: Social Engineering Attacks in Ethereum Smart Contracts. CoRR abs/2105.00132 (2021) - [i9]Jianzhi Lou, Qiben Yan, Qing Hui, Huacheng Zeng:
SoundFence: Securing Ultrasonic Sensors in Vehicles Using Physical-Layer Defense. CoRR abs/2105.07574 (2021) - [i8]Zhiyuan Yu, Zack Kaplan, Qiben Yan, Ning Zhang:
Security and Privacy in the Emerging Cyber-Physical World: A Survey. CoRR abs/2105.13347 (2021) - [i7]Nikolay Ivanov, Qiben Yan:
Constraint-Based Inference of Heuristics for Foreign Exchange Trade Model Optimization. CoRR abs/2105.14194 (2021) - [i6]Nikolay Ivanov, Qiben Yan, Qingyang Wang:
Blockumulus: A Scalable Framework for Smart Contracts on the Cloud. CoRR abs/2107.04904 (2021) - [i5]Nikolay Ivanov, Qiben Yan:
System-Wide Security for Offline Payment Terminals. CoRR abs/2107.08490 (2021) - [i4]Nikolay Ivanov, Hanqing Guo, Qiben Yan:
Rectifying Administrated ERC20 Tokens. CoRR abs/2107.10979 (2021) - [i3]Nikolay Ivanov, Qiben Yan:
EthClipper: A Clipboard Meddling Attack on Hardware Wallets with Address Verification Evasion. CoRR abs/2108.14004 (2021) - [i2]Ce Zhou, Qiben Yan, Yan Shi, Lichao Sun:
DoubleStar: Long-Range Attack Towards Depth Estimation based Obstacle Avoidance in Autonomous Systems. CoRR abs/2110.03154 (2021) - 2020
- [j20]Jun Zhao, Qiben Yan
, Jianxin Li, Minglai Shao, Zuti He, Bo Li:
TIMiner: Automatically extracting and analyzing categorized cyber threat intelligence from social data. Comput. Secur. 95: 101867 (2020) - [j19]Minglai Shao
, Peiyuan Sun, Jianxin Li, Qiben Yan
, Zhirui Feng:
Tree decomposition based anomalous connected subgraph scanning for detecting and forecasting events in attributed social media networks. Neurocomputing 407: 83-93 (2020) - [j18]Shanshan Wang, Zhenxiang Chen, Qiben Yan
, Ke Ji, Lizhi Peng, Bo Yang, Mauro Conti
:
Deep and broad URL feature mining for android malware detection. Inf. Sci. 513: 600-613 (2020) - [j17]Jun Zhao, Xudong Liu, Qiben Yan
, Bo Li, Minglai Shao, Hao Peng
:
Multi-attributed heterogeneous graph convolutional network for bot detection. Inf. Sci. 537: 380-393 (2020) - [j16]Pedram Kheirkhah Sangdeh
, Hossein Pirayesh
, Qiben Yan
, Kai Zeng
, Wenjing Lou
, Huacheng Zeng
:
A Practical Downlink NOMA Scheme for Wireless LANs. IEEE Trans. Commun. 68(4): 2236-2250 (2020) - [j15]Mohannad Alhanahnah
, Qiben Yan
, Hamid Bagheri, Hao Zhou, Yutaka Tsutano, Witawas Srisa-an
, Xiapu Luo
:
DINA: Detecting Hidden Android Inter-App Communication in Dynamic Loaded Code. IEEE Trans. Inf. Forensics Secur. 15: 2782-2797 (2020) - [j14]Pan Zhou
, Qiben Yan
, Kehao Wang
, Zichuan Xu
, Shouling Ji
, Kaigui Bian:
Jamsa: A Utility Optimal Contextual Online Learning Framework for Anti-Jamming Wireless Scheduling Under Reactive Jamming Attack. IEEE Trans. Netw. Sci. Eng. 7(3): 1862-1878 (2020) - [c43]Hongting Zhang, Pan Zhou, Qiben Yan, Xiao-Yang Liu:
Generating Robust Audio Adversarial Examples with Temporal Dependency. IJCAI 2020: 3167-3173 - [c42]Woojae Jeong, Jinhwan Jung, Yuanda Wang, Shuai Wang, Seokwon Yang, Qiben Yan, Yung Yi, Song Min Kim:
SDR receiver using commodity wifi via physical-layer signal reconstruction. MobiCom 2020: 32:1-32:14 - [c41]Qiben Yan, Kehai Liu, Qin Zhou, Hanqing Guo, Ning Zhang:
SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves. NDSS 2020 - [c40]Jun Zhao, Qiben Yan, Xudong Liu, Bo Li, Guangsheng Zuo:
Cyber Threat Intelligence Modeling Based on Heterogeneous Graph Convolutional Network. RAID 2020: 241-256 - [c39]Nikolay Ivanov, Jianzhi Lou, Qiben Yan:
SmartWiFi: Universal and Secure Smart Contract-Enabled WiFi Hotspot. SecureComm (1) 2020: 425-445 - [e3]Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang:
Machine Learning for Cyber Security - Third International Conference, ML4CS 2020, Guangzhou, China, October 8-10, 2020, Proceedings, Part I. Lecture Notes in Computer Science 12486, Springer 2020, ISBN 978-3-030-62222-0 [contents] - [e2]Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang:
Machine Learning for Cyber Security - Third International Conference, ML4CS 2020, Guangzhou, China, October 8-10, 2020, Proceedings, Part II. Lecture Notes in Computer Science 12487, Springer 2020, ISBN 978-3-030-62459-0 [contents] - [e1]Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang:
Machine Learning for Cyber Security - Third International Conference, ML4CS 2020, Guangzhou, China, October 8-10, 2020, Proceedings, Part III. Lecture Notes in Computer Science 12488, Springer 2020, ISBN 978-3-030-62462-0 [contents]
2010 – 2019
- 2019
- [j13]Pan Zhou
, Guohui Zhong, Menglan Hu
, Ruixuan Li
, Qiben Yan
, Kun Wang, Shouling Ji, Dapeng Oliver Wu
:
Privacy-Preserving and Residential Context-Aware Online Learning for IoT-Enabled Energy Saving With Big Data Support in Smart Home Environment. IEEE Internet Things J. 6(5): 7450-7468 (2019) - [j12]Shanshan Wang, Zhenxiang Chen, Qiben Yan
, Bo Yang, Lizhi Peng, Zhongtian Jia:
A mobile malware detection method using behavior features in network traffic. J. Netw. Comput. Appl. 133: 15-25 (2019) - [j11]Jin Li, Francesco Palmieri, Qiben Yan
:
Special issue on advances in security and privacy in IoT. J. Netw. Comput. Appl. 137: 91-92 (2019) - [c38]Boyang Hu, Qicheng Lin, Yao Zheng
, Qiben Yan
, Matthew Troglia, Qingyang Wang:
Characterizing Location-based Mobile Tracking in Mobile Ad Networks. CNS 2019: 223-231 - [c37]Hao Li, Zhenxiang Chen, Riccardo Spolaor, Qiben Yan
, Chuan Zhao, Bo Yang:
DART: Detecting Unseen Malware Variants using Adaptation Regularization Transfer Learning. ICC 2019: 1-6 - [c36]Shungeng Zhang, Huasong Shan, Qingyang Wang, Jianshu Liu, Qiben Yan
, Jinpeng Wei:
Tail Amplification in n-Tier Systems: A Study of Transient Cross-Resource Contention Attacks. ICDCS 2019: 1527-1538 - [c35]Mohannad Alhanahnah, Qiben Yan
, Hamid Bagheri, Hao Zhou, Yutaka Tsutano, Witawas Srisa-an, Xiapu Luo:
Detecting Vulnerable Android Inter-App Communication in Dynamically Loaded Code. INFOCOM 2019: 550-558 - [c34]Sulei Wang, Zhe Chen, Yuedong Xu, Qiben Yan
, Chongbin Xu, Xin Wang:
On User Selective Eavesdropping Attacks in MU-MIMO: CSI Forgery and Countermeasure. INFOCOM 2019: 1963-1971 - [c33]Yutian Tang, Xian Zhan
, Hao Zhou, Xiapu Luo, Zhou Xu, Yajin Zhou, Qiben Yan
:
Demystifying Application Performance Management Libraries for Android. ASE 2019: 682-685 - [c32]Zhiqiang Li, Jun Sun, Qiben Yan
, Witawas Srisa-an, Yutaka Tsutano:
Obfusifier: Obfuscation-Resistant Android Malware Detection System. SecureComm (1) 2019: 214-234 - [i1]Boyang Hu, Qicheng Lin, Yao Zheng, Qiben Yan, Matthew Troglia, Qingyang Wang:
Characterizing Location-based Mobile Tracking in Mobile Ad Networks. CoRR abs/1903.09916 (2019) - 2018
- [j10]Jin Li, Qiben Yan
, Victor I. Chang
:
Internet of Things: Security and privacy in a connected world. Future Gener. Comput. Syst. 78: 931-932 (2018) - [j9]Zhenxiang Chen, Qiben Yan
, Hongbo Han, Shanshan Wang, Lizhi Peng, Lin Wang, Bo Yang:
Machine learning based mobile malware detection using highly imbalanced network traffic. Inf. Sci. 433-434: 346-364 (2018) - [j8]Shanshan Wang, Qiben Yan
, Zhenxiang Chen
, Bo Yang
, Chuan Zhao, Mauro Conti
:
Detecting Android Malware Leveraging Text Semantics of Network Flows. IEEE Trans. Inf. Forensics Secur. 13(5): 1096-1109 (2018) - [j7]Jin Li, Lichao Sun
, Qiben Yan
, Zhiqiang Li, Witawas Srisa-an
, Heng Ye
:
Significant Permission Identification for Machine-Learning-Based Android Malware Detection. IEEE Trans. Ind. Informatics 14(7): 3216-3225 (2018) - [c31]Mohannad Alhanahnah, Qicheng Lin, Qiben Yan
, Ning Zhang, Zhenxiang Chen:
Efficient Signature Generation for Classifying Cross-Architecture IoT Malware. CNS 2018: 1-9 - [c30]Boyang Hu, Baojian Zhou, Qiben Yan
, Adil Alim, Feng Chen, Huacheng Zeng:
PSCluster: Differentially Private Spatial Cluster Detection for Mobile Crowdsourcing Applications. CNS 2018: 1-9 - [c29]Qun Li, Zhenxiang Chen, Qiben Yan
, Shanshan Wang, Kun Ma
, Yuliang Shi, Lizhen Cui:
MulAV: Multilevel and Explainable Detection of Android Malware with Data Fusion. ICA3PP (4) 2018: 166-177 - [c28]Mohannad Alhanahnah, Qiben Yan
:
Towards best secure coding practice for implementing SSL/TLS. INFOCOM Workshops 2018: 1-6 - [c27]Boyang Hu, Qiben Yan
, Yao Zheng
:
Tracking location privacy leakage of mobile ad networks at scale. INFOCOM Workshops 2018: 1-2 - [c26]Qi Xia, Qiben Yan
, Qin Zhou:
High-bandwidth ultrasonic communication using graphene-based acoustic devices. INFOCOM Workshops 2018: 1-2 - [c25]Shanshan Wang, Zhenxiang Chen, Qiben Yan
, Ke Ji, Lin Wang, Bo Yang, Mauro Conti:
Deep and Broad Learning Based Detection of Android Malware via Network Traffic. IWQoS 2018: 1-6 - [c24]Huacheng Zeng, Hongxiang Li, Qiben Yan
:
Uplink MU-MIMO in Asynchronous Wireless LANs. MobiHoc 2018: 21-30 - [c23]Shanshan Wang, Qiben Yan
, Zhenxiang Chen, Lin Wang, Riccardo Spolaor, Bo Yang, Mauro Conti:
Lexical Mining of Malicious URLs for Classifying Android Malware. SecureComm (1) 2018: 248-263 - [c22]Zhiqiang Li, Jun Sun, Qiben Yan
, Witawas Srisa-an, Shakthi Bachala:
GranDroid: Graph-Based Detection of Malicious Network Behaviors in Android Applications. SecureComm (1) 2018: 264-280 - 2017
- [j6]Jing Zhao
, Yejun He
, Jian Qiao, Ben Niu, Qiben Yan
:
Enabling Technologies towards 5G Mobile Networks. Mob. Inf. Syst. 2017: 7401863:1-7401863:2 (2017) - [c21]Qiben Yan
, Hao Yang, Mehmet C. Vuran
, Suat Irmak:
SPRIDE: Scalable and private continual geo-distance evaluation for precision agriculture. CNS 2017: 1-9 - [c20]Huacheng Zeng, Chen Cao, Hongxiang Li, Qiben Yan
:
Enabling jamming-resistant communications in wireless MIMO networks. CNS 2017: 1-9 - [c19]Ning Zhang, Ruide Zhang, Qiben Yan
, Wenjing Lou, Y. Thomas Hou, Danfeng Yao
:
Black penguin: On the feasibility of detecting intrusion with homogeneous memory. CNS 2017: 586-594 - [c18]Saravanan Raju, Sai Boddepalli, Neelabjo Choudhury, Qiben Yan
, Jitender S. Deogun:
Design and analysis of elastic handoff in cognitive cellular networks. ICC 2017: 1-6 - [c17]Saravanan Raju, Sai Boddepalli, Suraj Gampa, Qiben Yan
, Jitender S. Deogun:
Identity management using blockchain for cognitive cellular networks. ICC 2017: 1-6 - [c16]Shanshan Wang, Qiben Yan
, Zhenxiang Chen, Bo Yang, Chuan Zhao, Mauro Conti:
TextDroid: Semantics-based detection of mobile malware using network flows. INFOCOM Workshops 2017: 18-23 - [c15]Mengmei Ye, Nan Jiang
, Hao Yang, Qiben Yan
:
Security analysis of Internet-of-Things: A case study of august smart lock. INFOCOM Workshops 2017: 499-504 - [c14]Huasong Shan, Qingyang Wang
, Qiben Yan
:
Very Short Intermittent DDoS Attacks in an Unsaturated System. SecureComm 2017: 45-66 - 2016
- [j5]Qiben Yan
, Huacheng Zeng, Tingting Jiang, Ming Li, Wenjing Lou, Yiwei Thomas Hou:
Jamming Resilient Communication Using MIMO Interference Cancellation. IEEE Trans. Inf. Forensics Secur. 11(7): 1486-1499 (2016) - [c13]Saravanan Raju, Sai Boddepalli, Qiben Yan
, Jitender S. Deogun:
Achieving 5As in Cloud Centric Cognitive Cellular Networks. GLOBECOM 2016: 1-6 - [c12]Shanshan Wang, Zhenxiang Chen, Lei Zhang, Qiben Yan
, Bo Yang, Lizhi Peng, Zhongtian Jia:
TrafficAV: An effective and explainable detection of mobile malware behavior using network traffic. IWQoS 2016: 1-6 - [c11]Lichao Sun
, Zhiqiang Li, Qiben Yan
, Witawas Srisa-an, Yu Pan:
SigPID: significant permission identification for android malware detection. MALWARE 2016: 59-66 - [c10]Zhiqiang Li, Lichao Sun, Qiben Yan
, Witawas Srisa-an, Zhenxiang Chen:
DroidClassifier: Efficient Adaptive Mining of Application-Layer Header for Classifying Android Malware. SecureComm 2016: 597-616 - [c9]Dong Cao, Shanshan Wang, Qun Li, Zhenxiang Chen, Qiben Yan
, Lizhi Peng, Bo Yang:
DroidCollector: A High Performance Framework for High Quality Android Traffic Collection. Trustcom/BigDataSE/ISPA 2016: 1753-1758 - 2015
- [c8]Hongbo Han, Zhenxiang Chen, Qiben Yan
, Lizhi Peng, Lei Zhang:
A Real-time Android Malware Detection System Based on Network Traffic Analysis. ICA3PP (3) 2015: 504-516 - [c7]Qiben Yan
, Yao Zheng
, Tingting Jiang, Wenjing Lou, Y. Thomas Hou:
PeerClean: Unveiling peer-to-peer botnets through dynamic group behavior analysis. INFOCOM 2015: 316-324 - [c6]Zhenxiang Chen, Qiben Yan, Lei Zhang, Lizhi Peng, Hongbo Han:
Using Map-Based Interactive Interface for Understanding and Characterizing Crime Data in Cities. ICSI (3) 2015: 479-490 - [c5]Zhenxiang Chen, Hongbo Han, Qiben Yan
, Bo Yang, Lizhi Peng, Lei Zhang, Jin Li:
A First Look at Android Malware Traffic in First Few Minutes. TrustCom/BigDataSE/ISPA (1) 2015: 206-213 - 2014
- [j4]Qiben Yan
, Ming Li, Feng Chen, Tingting Jiang, Wenjing Lou, Yiwei Thomas Hou, Chang-Tien Lu
:
SpecMonitor: Toward Efficient Passive Traffic Monitoring for Cognitive Radio Networks. IEEE Trans. Wirel. Commun. 13(10): 5893-5905 (2014) - [c4]Qiben Yan
, Huacheng Zeng, Tingting Jiang, Ming Li, Wenjing Lou, Y. Thomas Hou:
MIMO-based jamming resilient communication in wireless networks.