default search action
Qiben Yan
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j40]Shichen Zhang, Qiben Yan, Tianxing Li, Li Xiao, Huacheng Zeng:
TBP: Temporal Beam Prediction for Mobile Millimeter-Wave Networks. IEEE Internet Things J. 11(14): 24960-24972 (2024) - [j39]Yuewang He, Xiangui Kang, Qiben Yan, Enping Li:
ResNeXt+: Attention Mechanisms Based on ResNeXt for Malware Detection and Classification. IEEE Trans. Inf. Forensics Secur. 19: 1142-1155 (2024) - [c72]Bocheng Chen, Nikolay Ivanov, Guangjing Wang, Qiben Yan:
Multi-Turn Hidden Backdoor in Large Language Model-powered Chatbot Models. AsiaCCS 2024 - [c71]Xuhang Gu, Qingyang Wang, Qiben Yan, Jianshu Liu, Calton Pu:
Sync-Millibottleneck Attack on Microservices Cloud Architecture. AsiaCCS 2024 - [c70]Salman Ali, Cedric Gondro, Qiben Yan, Wolfgang Banzhaf:
End-to-End Decentralized Tracking of Carbon Footprint using Internet of Things and Distributed Databases. CIoT 2024: 1-8 - [c69]Juexing Wang, Yuda Feng, Gouree Kumbhar, Guangjing Wang, Qiben Yan, Qingxu Jin, Robert C. Ferrier, Jie Xiong, Tianxing Li:
SoilCares: Towards Low-cost Soil Macronutrients and Moisture Monitoring Using RF-VNIR Sensing. MobiSys 2024: 196-209 - [i36]Yaojian Chen, Qiben Yan:
Privacy-Preserving Diffusion Model Using Homomorphic Encryption. CoRR abs/2403.05794 (2024) - [i35]Bocheng Chen, Hanqing Guo, Guangjing Wang, Yuanda Wang, Qiben Yan:
The Dark Side of Human Feedback: Poisoning Large Language Models via User Inputs. CoRR abs/2409.00787 (2024) - [i34]Guangjing Wang, Hanqing Guo, Yuanda Wang, Bocheng Chen, Ce Zhou, Qiben Yan:
Protecting Activity Sensing Data Privacy Using Hierarchical Information Dissociation. CoRR abs/2409.03796 (2024) - [i33]Ce Zhou, Qiben Yan, Daniel Kent, Guangjing Wang, Ziqi Zhang, Hayder Radha:
Optical Lens Attack on Deep Learning Based Monocular Depth Estimation. CoRR abs/2409.17376 (2024) - [i32]Ce Zhou, Qiben Yan, Sijia Liu:
Transient Adversarial 3D Projection Attacks on Object Detection in Autonomous Driving. CoRR abs/2409.17403 (2024) - [i31]Guangjing Wang, Juexing Wang, Ce Zhou, Weikang Ding, Huacheng Zeng, Tianxing Li, Qiben Yan:
Decoding Emotions: Unveiling Facial Expressions through Acoustic Sensing with Contrastive Attention. CoRR abs/2410.12811 (2024) - [i30]Ce Zhou, Qiben Yan, Daniel Kent, Guangjing Wang, Weikang Ding, Ziqi Zhang, Hayder Radha:
Optical Lens Attack on Monocular Depth Estimation for Autonomous Driving. CoRR abs/2411.00192 (2024) - 2023
- [j38]Nikolay Ivanov, Chenning Li, Qiben Yan, Zhiyuan Sun, Zhichao Cao, Xiapu Luo:
Security Threat Mitigation for Smart Contracts: A Comprehensive Survey. ACM Comput. Surv. 55(14s): 326:1-326:37 (2023) - [j37]Guangjing Wang, Nikolay Ivanov, Bocheng Chen, Qi Wang, ThanhVu Nguyen, Qiben Yan:
Graph Learning for Interactive Threat Detection in Heterogeneous Smart Home Rule Data. Proc. ACM Manag. Data 1(1): 102:1-102:27 (2023) - [j36]Nikolay Ivanov, Qiben Yan, Anurag Kompalli:
TxT: Real-Time Transaction Encapsulation for Ethereum Smart Contracts. IEEE Trans. Inf. Forensics Secur. 18: 1141-1155 (2023) - [j35]Zirui Yuan, Minglai Shao, Qiben Yan:
Motif-Level Anomaly Detection in Dynamic Graphs. IEEE Trans. Inf. Forensics Secur. 18: 2870-2882 (2023) - [j34]Nikolay Ivanov, Qiben Yan:
AutoThing: A Secure Transaction Framework for Self-Service Things. IEEE Trans. Serv. Comput. 16(2): 983-995 (2023) - [j33]Mohannad Alhanahnah, Clay Stevens, Bocheng Chen, Qiben Yan, Hamid Bagheri:
IoTCom: Dissecting Interaction Threats in IoT Systems. IEEE Trans. Software Eng. 49(4): 1523-1539 (2023) - [c68]Bocheng Chen, Advait Paliwal, Qiben Yan:
Jailbreaker in Jail: Moving Target Defense for Large Language Models. MTD@CCS 2023: 29-32 - [c67]Yuhui Zhu, Zhenxiang Chen, Qiben Yan, Shanshan Wang, Alberto Giaretta, Enlong Li, Lizhi Peng, Chuan Zhao, Mauro Conti:
Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders. ICC 2023: 2338-2344 - [c66]Guangjing Wang, Hanqing Guo, Anran Li, Xiaorui Liu, Qiben Yan:
Federated IoT Interaction Vulnerability Analysis. ICDE 2023: 1517-1530 - [c65]Guangjing Wang, Qiben Yan, Shane Patrarungrong, Juexing Wang, Huacheng Zeng:
FacER: Contrastive Attention based Expression Recognition via Smartphone Earpiece Speaker. INFOCOM 2023: 1-10 - [c64]Hanqing Guo, Xun Chen, Junfeng Guo, Li Xiao, Qiben Yan:
MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems. MobiCom 2023: 48:1-48:15 - [c63]Bocheng Chen, Guangjing Wang, Hanqing Guo, Yuanda Wang, Qiben Yan:
Understanding Multi-Turn Toxic Behaviors in Open-Domain Chatbots. RAID 2023: 282-296 - [c62]Hanqing Guo, Guangjing Wang, Yuanda Wang, Bocheng Chen, Qiben Yan, Li Xiao:
PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection. RAID 2023: 366-380 - [c61]Bocheng Chen, Nikolay Ivanov, Guangjing Wang, Qiben Yan:
DynamicFL: Balancing Communication Dynamics and Client Manipulation for Federated Learning. SECON 2023: 312-320 - [c60]Yuanda Wang, Hanqing Guo, Guangjing Wang, Bocheng Chen, Qiben Yan:
VSMask: Defending Against Voice Synthesis Attack via Real-Time Predictive Perturbation. WISEC 2023: 239-250 - [i29]Nikolay Ivanov, Qiben Yan, Anurag Kompalli:
TxT: Real-time Transaction Encapsulation for Ethereum Smart Contracts. CoRR abs/2301.08806 (2023) - [i28]Nikolay Ivanov, Chenning Li, Qiben Yan, Zhiyuan Sun, Zhichao Cao, Xiapu Luo:
Security Threat Mitigation For Smart Contracts: A Survey. CoRR abs/2302.07347 (2023) - [i27]Ce Zhou, Qian Li, Chen Li, Jun Yu, Yixin Liu, Guangjing Wang, Kai Zhang, Cheng Ji, Qiben Yan, Lifang He, Hao Peng, Jianxin Li, Jia Wu, Ziwei Liu, Pengtao Xie, Caiming Xiong, Jian Pei, Philip S. Yu, Lichao Sun:
A Comprehensive Survey on Pretrained Foundation Models: A History from BERT to ChatGPT. CoRR abs/2302.09419 (2023) - [i26]Yuanda Wang, Hanqing Guo, Guangjing Wang, Bocheng Chen, Qiben Yan:
VSMask: Defending Against Voice Synthesis Attack via Real-Time Predictive Perturbation. CoRR abs/2305.05736 (2023) - [i25]Ce Zhou, Qiben Yan, Zhiyuan Yu, Eshan Dixit, Ning Zhang, Huacheng Zeng, Alireza Safdari Ghanhdari:
ChargeX: Exploring State Switching Attack on Electric Vehicle Charging Systems. CoRR abs/2305.08037 (2023) - [i24]Bocheng Chen, Guangjing Wang, Hanqing Guo, Yuanda Wang, Qiben Yan:
Understanding Multi-Turn Toxic Behaviors in Open-Domain Chatbots. CoRR abs/2307.09579 (2023) - [i23]Bocheng Chen, Nikolay Ivanov, Guangjing Wang, Qiben Yan:
DynamicFL: Balancing Communication Dynamics and Client Manipulation for Federated Learning. CoRR abs/2308.06267 (2023) - [i22]Hanqing Guo, Guangjing Wang, Yuanda Wang, Bocheng Chen, Qiben Yan, Li Xiao:
PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection. CoRR abs/2309.06960 (2023) - [i21]Hanqing Guo, Xun Chen, Junfeng Guo, Li Xiao, Qiben Yan:
MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems. CoRR abs/2309.06981 (2023) - [i20]Bocheng Chen, Advait Paliwal, Qiben Yan:
Jailbreaker in Jail: Moving Target Defense for Large Language Models. CoRR abs/2310.02417 (2023) - [i19]Guangjing Wang, Ce Zhou, Yuanda Wang, Bocheng Chen, Hanqing Guo, Qiben Yan:
Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems. CoRR abs/2311.11796 (2023) - [i18]Yuanda Wang, Qiben Yan, Nikolay Ivanov, Xun Chen:
A Practical Survey on Emerging Threats from AI-driven Voice Attacks: How Vulnerable are Commercial Voice Control Systems? CoRR abs/2312.06010 (2023) - 2022
- [j32]Qiben Yan, Qi Xia, Yuanda Wang, Pan Zhou, Huacheng Zeng:
URadio: Wideband Ultrasound Communication for Smart Home Applications. IEEE Internet Things J. 9(15): 13113-13125 (2022) - [j31]Shichen Zhang, Pedram Kheirkhah Sangdeh, Hossein Pirayesh, Huacheng Zeng, Qiben Yan, Kai Zeng:
AuthIoT: A Transferable Wireless Authentication Scheme for IoT Devices Without Input Interface. IEEE Internet Things J. 9(22): 23072-23085 (2022) - [j30]Yutian Tang, Haoyu Wang, Xian Zhan, Xiapu Luo, Yajin Zhou, Hao Zhou, Qiben Yan, Yulei Sui, Jacky Keung:
A Systematical Study on Application Performance Management Libraries for Apps. IEEE Trans. Software Eng. 48(8): 3044-3065 (2022) - [c59]Hanqing Guo, Qiben Yan, Nikolay Ivanov, Ying Zhu, Li Xiao, Eric J. Hunter:
SUPERVOICE: Text-Independent Speaker Verification Using Ultrasound Energy in Human Speech. AsiaCCS 2022: 1019-1033 - [c58]Hanqing Guo, Yuanda Wang, Nikolay Ivanov, Li Xiao, Qiben Yan:
SPECPATCH: Human-In-The-Loop Adversarial Audio Spectrogram Patch Attack on Speech Recognition. CCS 2022: 1353-1366 - [c57]Hanqing Guo, Chenning Li, Lingkun Li, Zhichao Cao, Qiben Yan, Li Xiao:
NEC: Speaker Selective Cancellation via Neural Enhanced Ultrasound Shadowing. DSN 2022: 355-366 - [c56]Yuanda Wang, Hanqing Guo, Qiben Yan:
GhostTalk: Interactive Attack on Smartphone Voice System Through Power Line. NDSS 2022 - [c55]Ce Zhou, Qiben Yan, Yan Shi, Lichao Sun:
DoubleStar: Long-Range Attack Towards Depth Estimation based Obstacle Avoidance in Autonomous Systems. USENIX Security Symposium 2022: 1885-1902 - [i17]Yuanda Wang, Hanqing Guo, Qiben Yan:
GhostTalk: Interactive Attack on Smartphone Voice System Through Power Line. CoRR abs/2202.02585 (2022) - [i16]Hanqing Guo, Qiben Yan, Nikolay Ivanov, Ying Zhu, Li Xiao, Eric J. Hunter:
SuperVoice: Text-Independent Speaker Verification Using Ultrasound Energy in Human Speech. CoRR abs/2205.14496 (2022) - [i15]Yuhui Zhu, Zhenxiang Chen, Qiben Yan, Shanshan Wang, Enlong Li, Lizhi Peng, Chuan Zhao:
Mining Function Homology of Bot Loaders from Honeypot Logs. CoRR abs/2206.00385 (2022) - [i14]Hanqing Guo, Chenning Li, Lingkun Li, Zhichao Cao, Qiben Yan, Li Xiao:
NEC: Speaker Selective Cancellation via Neural Enhanced Ultrasound Shadowing. CoRR abs/2207.05848 (2022) - [i13]Nikolay Ivanov, Qiben Yan:
Et tu, Blockchain? Outsmarting Smart Contracts via Social Engineering. CoRR abs/2209.08356 (2022) - [i12]Nikolay Ivanov, Qiben Yan:
Decentralization Paradox: A Study of Hegemonic and Risky ERC-20 Tokens. CoRR abs/2209.08370 (2022) - [i11]Yuhui Zhu, Zhenxiang Chen, Qiben Yan, Shanshan Wang, Alberto Giaretta, Enlong Li, Lizhi Peng, Chuan Zhao, Mauro Conti:
Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders. CoRR abs/2211.14790 (2022) - 2021
- [j29]Peiyuan Sun, Qiben Yan, Haoyi Zhou, Jianxin Li:
Osprey: A fast and accurate patch presence test framework for binaries. Comput. Commun. 173: 95-106 (2021) - [j28]Jun Zhao, Xudong Liu, Qiben Yan, Bo Li, Minglai Shao, Hao Peng, Lichao Sun:
Automatically predicting cyber attack preference with attributed heterogeneous attention networks and transductive learning. Comput. Secur. 102: 102152 (2021) - [j27]Zhiyuan Yu, Zack Kaplan, Qiben Yan, Ning Zhang:
Security and Privacy in the Emerging Cyber-Physical World: A Survey. IEEE Commun. Surv. Tutorials 23(3): 1879-1919 (2021) - [j26]Haroon Elahi, Guojun Wang, Yang Xu, Aniello Castiglione, Qiben Yan, Muhammad Naeem Shehzad:
On the Characterization and Risk Assessment of AI-Powered Mobile Cloud Applications. Comput. Stand. Interfaces 78: 103538 (2021) - [j25]Anli Yan, Zhenxiang Chen, Haibo Zhang, Lizhi Peng, Qiben Yan, Muhammad Umair Hassan, Chuan Zhao, Bo Yang:
Effective detection of mobile malware behavior based on explainable deep neural network. Neurocomputing 453: 482-492 (2021) - [j24]Pedram Kheirkhah Sangdeh, Hossein Pirayesh, Qiben Yan, Huacheng Zeng:
DM-COM: Combining Device-to-Device and MU-MIMO Communications for Cellular Networks. IEEE Internet Things J. 8(17): 13516-13527 (2021) - [j23]Minglai Shao, Jianxin Li, Qiben Yan, Feng Chen, Hongyi Huang, Xunxun Chen:
Structured Sparsity Model Based Trajectory Tracking Using Private Location Data Release. IEEE Trans. Dependable Secur. Comput. 18(6): 2983-2995 (2021) - [j22]Jian Yu, Yuewang He, Qiben Yan, Xiangui Kang:
SpecView: Malware Spectrum Visualization Framework With Singular Spectrum Transformation. IEEE Trans. Inf. Forensics Secur. 16: 5093-5107 (2021) - [j21]Qiben Yan, Jianzhi Lou, Mehmet C. Vuran, Suat Irmak:
Scalable Privacy-preserving Geo-distance Evaluation for Precision Agriculture IoT Systems. ACM Trans. Sens. Networks 17(4): 38:1-38:30 (2021) - [c54]Nikolay Ivanov, Jianzhi Lou, Ting Chen, Jin Li, Qiben Yan:
Targeting the Weakest Link: Social Engineering Attacks in Ethereum Smart Contracts. AsiaCCS 2021: 787-801 - [c53]Nikolay Ivanov, Qiben Yan:
EthClipper: A Clipboard Meddling Attack on Hardware Wallets with Address Verification Evasion. CNS 2021: 191-199 - [c52]Wei Song, Mengfei Tang, Qiben Yan, Yuan Shen, Yang Cao, Qian Wang, Zhiyong Peng:
Privacy-Preserving Polynomial Evaluation over Spatio-Temporal Data on an Untrusted Cloud Server. DASFAA (1) 2021: 474-490 - [c51]Nikolay Ivanov, Qiben Yan, Qingyang Wang:
Blockumulus: A Scalable Framework for Smart Contracts on the Cloud. ICDCS 2021: 607-617 - [c50]Nikolay Ivanov, Hanqing Guo, Qiben Yan:
Rectifying Administrated ERC20 Tokens. ICICS (1) 2021: 22-37 - [c49]Cong Liu, Anli Yan, Zhenxiang Chen, Haibo Zhang, Qiben Yan, Lizhi Peng, Chuan Zhao:
IEdroid: Detecting Malicious Android Network Behavior Using Incremental Ensemble of Ensembles. ICPADS 2021: 788-795 - [c48]Jianzhi Lou, Qiben Yan, Qing Hui, Huacheng Zeng:
SoundFence: Securing Ultrasonic Sensors in Vehicles Using Physical-Layer Defense. SECON 2021: 1-9 - [c47]Hossein Pirayesh, Pedram Kheirkhah Sangdeh, Qiben Yan, Huacheng Zeng:
UD-MIMO: Uplink Distributed MIMO for Wireless LANs. SECON 2021: 1-9 - [c46]Hossein Pirayesh, Pedram Kheirkhah Sangdeh, Shichen Zhang, Qiben Yan, Huacheng Zeng:
JammingBird: Jamming-Resilient Communications for Vehicular Ad Hoc Networks. SECON 2021: 1-9 - [c45]Nikolay Ivanov, Qiben Yan:
System-Wide Security for Offline Payment Terminals. SecureComm (2) 2021: 99-119 - [c44]Chenning Li, Hanqing Guo, Shuai Tong, Xiao Zeng, Zhichao Cao, Mi Zhang, Qiben Yan, Li Xiao, Jiliang Wang, Yunhao Liu:
NELoRa: Towards Ultra-low SNR LoRa Communication with Neural-enhanced Demodulation. SenSys 2021: 56-68 - [i10]Yutian Tang, Haoyu Wang, Xian Zhan, Xiapu Luo, Yajin Zhou, Hao Zhou, Qiben Yan, Yulei Sui, Jacky Keung:
A Systematical Study on Application Performance Management Libraries for Apps. CoRR abs/2103.11286 (2021) - [i9]Nikolay Ivanov, Jianzhi Lou, Ting Chen, Jin Li, Qiben Yan:
Targeting the Weakest Link: Social Engineering Attacks in Ethereum Smart Contracts. CoRR abs/2105.00132 (2021) - [i8]Zhiyuan Yu, Zack Kaplan, Qiben Yan, Ning Zhang:
Security and Privacy in the Emerging Cyber-Physical World: A Survey. CoRR abs/2105.13347 (2021) - [i7]Nikolay Ivanov, Qiben Yan:
Constraint-Based Inference of Heuristics for Foreign Exchange Trade Model Optimization. CoRR abs/2105.14194 (2021) - [i6]Nikolay Ivanov, Qiben Yan, Qingyang Wang:
Blockumulus: A Scalable Framework for Smart Contracts on the Cloud. CoRR abs/2107.04904 (2021) - [i5]Nikolay Ivanov, Qiben Yan:
System-Wide Security for Offline Payment Terminals. CoRR abs/2107.08490 (2021) - [i4]Nikolay Ivanov, Hanqing Guo, Qiben Yan:
Rectifying Administrated ERC20 Tokens. CoRR abs/2107.10979 (2021) - [i3]Nikolay Ivanov, Qiben Yan:
EthClipper: A Clipboard Meddling Attack on Hardware Wallets with Address Verification Evasion. CoRR abs/2108.14004 (2021) - [i2]Ce Zhou, Qiben Yan, Yan Shi, Lichao Sun:
DoubleStar: Long-Range Attack Towards Depth Estimation based Obstacle Avoidance in Autonomous Systems. CoRR abs/2110.03154 (2021) - 2020
- [j20]Jun Zhao, Qiben Yan, Jianxin Li, Minglai Shao, Zuti He, Bo Li:
TIMiner: Automatically extracting and analyzing categorized cyber threat intelligence from social data. Comput. Secur. 95: 101867 (2020) - [j19]Minglai Shao, Peiyuan Sun, Jianxin Li, Qiben Yan, Zhirui Feng:
Tree decomposition based anomalous connected subgraph scanning for detecting and forecasting events in attributed social media networks. Neurocomputing 407: 83-93 (2020) - [j18]Shanshan Wang, Zhenxiang Chen, Qiben Yan, Ke Ji, Lizhi Peng, Bo Yang, Mauro Conti:
Deep and broad URL feature mining for android malware detection. Inf. Sci. 513: 600-613 (2020) - [j17]Jun Zhao, Xudong Liu, Qiben Yan, Bo Li, Minglai Shao, Hao Peng:
Multi-attributed heterogeneous graph convolutional network for bot detection. Inf. Sci. 537: 380-393 (2020) - [j16]Pedram Kheirkhah Sangdeh, Hossein Pirayesh, Qiben Yan, Kai Zeng, Wenjing Lou, Huacheng Zeng:
A Practical Downlink NOMA Scheme for Wireless LANs. IEEE Trans. Commun. 68(4): 2236-2250 (2020) - [j15]Mohannad Alhanahnah, Qiben Yan, Hamid Bagheri, Hao Zhou, Yutaka Tsutano, Witawas Srisa-an, Xiapu Luo:
DINA: Detecting Hidden Android Inter-App Communication in Dynamic Loaded Code. IEEE Trans. Inf. Forensics Secur. 15: 2782-2797 (2020) - [j14]Pan Zhou, Qiben Yan, Kehao Wang, Zichuan Xu, Shouling Ji, Kaigui Bian:
Jamsa: A Utility Optimal Contextual Online Learning Framework for Anti-Jamming Wireless Scheduling Under Reactive Jamming Attack. IEEE Trans. Netw. Sci. Eng. 7(3): 1862-1878 (2020) - [c43]Hongting Zhang, Pan Zhou, Qiben Yan, Xiao-Yang Liu:
Generating Robust Audio Adversarial Examples with Temporal Dependency. IJCAI 2020: 3167-3173 - [c42]Woojae Jeong, Jinhwan Jung, Yuanda Wang, Shuai Wang, Seokwon Yang, Qiben Yan, Yung Yi, Song Min Kim:
SDR receiver using commodity wifi via physical-layer signal reconstruction. MobiCom 2020: 32:1-32:14 - [c41]Qiben Yan, Kehai Liu, Qin Zhou, Hanqing Guo, Ning Zhang:
SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves. NDSS 2020 - [c40]Jun Zhao, Qiben Yan, Xudong Liu, Bo Li, Guangsheng Zuo:
Cyber Threat Intelligence Modeling Based on Heterogeneous Graph Convolutional Network. RAID 2020: 241-256 - [c39]Nikolay Ivanov, Jianzhi Lou, Qiben Yan:
SmartWiFi: Universal and Secure Smart Contract-Enabled WiFi Hotspot. SecureComm (1) 2020: 425-445 - [e3]Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang:
Machine Learning for Cyber Security - Third International Conference, ML4CS 2020, Guangzhou, China, October 8-10, 2020, Proceedings, Part I. Lecture Notes in Computer Science 12486, Springer 2020, ISBN 978-3-030-62222-0 [contents] - [e2]Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang:
Machine Learning for Cyber Security - Third International Conference, ML4CS 2020, Guangzhou, China, October 8-10, 2020, Proceedings, Part II. Lecture Notes in Computer Science 12487, Springer 2020, ISBN 978-3-030-62459-0 [contents] - [e1]Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang:
Machine Learning for Cyber Security - Third International Conference, ML4CS 2020, Guangzhou, China, October 8-10, 2020, Proceedings, Part III. Lecture Notes in Computer Science 12488, Springer 2020, ISBN 978-3-030-62462-0 [contents]
2010 – 2019
- 2019
- [j13]Pan Zhou, Guohui Zhong, Menglan Hu, Ruixuan Li, Qiben Yan, Kun Wang, Shouling Ji, Dapeng Oliver Wu:
Privacy-Preserving and Residential Context-Aware Online Learning for IoT-Enabled Energy Saving With Big Data Support in Smart Home Environment. IEEE Internet Things J. 6(5): 7450-7468 (2019) - [j12]Shanshan Wang, Zhenxiang Chen, Qiben Yan, Bo Yang, Lizhi Peng, Zhongtian Jia:
A mobile malware detection method using behavior features in network traffic. J. Netw. Comput. Appl. 133: 15-25 (2019) - [j11]Jin Li, Francesco Palmieri, Qiben Yan:
Special issue on advances in security and privacy in IoT. J. Netw. Comput. Appl. 137: 91-92 (2019) - [c38]Boyang Hu, Qicheng Lin, Yao Zheng, Qiben Yan, Matthew Troglia, Qingyang Wang:
Characterizing Location-based Mobile Tracking in Mobile Ad Networks. CNS 2019: 223-231 - [c37]Hao Li, Zhenxiang Chen, Riccardo Spolaor, Qiben Yan, Chuan Zhao, Bo Yang:
DART: Detecting Unseen Malware Variants using Adaptation Regularization Transfer Learning. ICC 2019: 1-6 - [c36]Shungeng Zhang, Huasong Shan, Qingyang Wang, Jianshu Liu, Qiben Yan, Jinpeng Wei:
Tail Amplification in n-Tier Systems: A Study of Transient Cross-Resource Contention Attacks. ICDCS 2019: 1527-1538 - [c35]Mohannad Alhanahnah, Qiben Yan, Hamid Bagheri, Hao Zhou, Yutaka Tsutano, Witawas Srisa-an, Xiapu Luo:
Detecting Vulnerable Android Inter-App Communication in Dynamically Loaded Code. INFOCOM 2019: 550-558 - [c34]Sulei Wang, Zhe Chen, Yuedong Xu, Qiben Yan, Chongbin Xu, Xin Wang:
On User Selective Eavesdropping Attacks in MU-MIMO: CSI Forgery and Countermeasure. INFOCOM 2019: 1963-1971 - [c33]Yutian Tang, Xian Zhan, Hao Zhou, Xiapu Luo, Zhou Xu, Yajin Zhou, Qiben Yan:
Demystifying Application Performance Management Libraries for Android. ASE 2019: 682-685 - [c32]Zhiqiang Li, Jun Sun, Qiben Yan, Witawas Srisa-an, Yutaka Tsutano:
Obfusifier: Obfuscation-Resistant Android Malware Detection System. SecureComm (1) 2019: 214-234 - [i1]Boyang Hu, Qicheng Lin, Yao Zheng, Qiben Yan, Matthew Troglia, Qingyang Wang:
Characterizing Location-based Mobile Tracking in Mobile Ad Networks. CoRR abs/1903.09916 (2019) - 2018
- [j10]Jin Li, Qiben Yan, Victor I. Chang:
Internet of Things: Security and privacy in a connected world. Future Gener. Comput. Syst. 78: 931-932 (2018) - [j9]Zhenxiang Chen, Qiben Yan, Hongbo Han, Shanshan Wang, Lizhi Peng, Lin Wang, Bo Yang:
Machine learning based mobile malware detection using highly imbalanced network traffic. Inf. Sci. 433-434: 346-364 (2018) - [j8]Shanshan Wang, Qiben Yan, Zhenxiang Chen, Bo Yang, Chuan Zhao, Mauro Conti:
Detecting Android Malware Leveraging Text Semantics of Network Flows. IEEE Trans. Inf. Forensics Secur. 13(5): 1096-1109 (2018) - [j7]Jin Li, Lichao Sun, Qiben Yan, Zhiqiang Li, Witawas Srisa-an, Heng Ye:
Significant Permission Identification for Machine-Learning-Based Android Malware Detection. IEEE Trans. Ind. Informatics 14(7): 3216-3225 (2018) - [c31]Mohannad Alhanahnah, Qicheng Lin, Qiben Yan, Ning Zhang, Zhenxiang Chen:
Efficient Signature Generation for Classifying Cross-Architecture IoT Malware. CNS 2018: 1-9 - [c30]Boyang Hu, Baojian Zhou, Qiben Yan, Adil Alim, Feng Chen, Huacheng Zeng:
PSCluster: Differentially Private Spatial Cluster Detection for Mobile Crowdsourcing Applications. CNS 2018: 1-9 - [c29]Qun Li, Zhenxiang Chen, Qiben Yan, Shanshan Wang, Kun Ma, Yuliang Shi, Lizhen Cui:
MulAV: Multilevel and Explainable Detection of Android Malware with Data Fusion. ICA3PP (4) 2018: 166-177 - [c28]Mohannad Alhanahnah, Qiben Yan:
Towards best secure coding practice for implementing SSL/TLS. INFOCOM Workshops 2018: 1-6 - [c27]Boyang Hu, Qiben Yan, Yao Zheng:
Tracking location privacy leakage of mobile ad networks at scale. INFOCOM Workshops 2018: 1-2 - [c26]Qi Xia, Qiben Yan, Qin Zhou:
High-bandwidth ultrasonic communication using graphene-based acoustic devices. INFOCOM Workshops 2018: 1-2 - [c25]Shanshan Wang, Zhenxiang Chen, Qiben Yan, Ke Ji, Lin Wang, Bo Yang, Mauro Conti:
Deep and Broad Learning Based Detection of Android Malware via Network Traffic. IWQoS 2018: 1-6 - [c24]Huacheng Zeng, Hongxiang Li, Qiben Yan:
Uplink MU-MIMO in Asynchronous Wireless LANs. MobiHoc 2018: 21-30 - [c23]Shanshan Wang, Qiben Yan, Zhenxiang Chen, Lin Wang, Riccardo Spolaor, Bo Yang, Mauro Conti:
Lexical Mining of Malicious URLs for Classifying Android Malware. SecureComm (1) 2018: 248-263 - [c22]Zhiqiang Li, Jun Sun, Qiben Yan, Witawas Srisa-an, Shakthi Bachala:
GranDroid: Graph-Based Detection of Malicious Network Behaviors in Android Applications. SecureComm (1) 2018: 264-280 - 2017
- [j6]Jing Zhao, Yejun He, Jian Qiao, Ben Niu, Qiben Yan:
Enabling Technologies towards 5G Mobile Networks. Mob. Inf. Syst. 2017: 7401863:1-7401863:2 (2017) - [c21]Qiben Yan, Hao Yang, Mehmet C. Vuran, Suat Irmak:
SPRIDE: Scalable and private continual geo-distance evaluation for precision agriculture. CNS 2017: 1-9 - [c20]Huacheng Zeng, Chen Cao, Hongxiang Li, Qiben Yan:
Enabling jamming-resistant communications in wireless MIMO networks. CNS 2017: 1-9 - [c19]Ning Zhang, Ruide Zhang, Qiben Yan, Wenjing Lou, Y. Thomas Hou, Danfeng Yao:
Black penguin: On the feasibility of detecting intrusion with homogeneous memory. CNS 2017: 586-594 - [c18]Saravanan Raju, Sai Boddepalli, Neelabjo Choudhury, Qiben Yan, Jitender S. Deogun:
Design and analysis of elastic handoff in cognitive cellular networks. ICC 2017: 1-6 - [c17]Saravanan Raju, Sai Boddepalli, Suraj Gampa, Qiben Yan, Jitender S. Deogun:
Identity management using blockchain for cognitive cellular networks. ICC 2017: 1-6 - [c16]Shanshan Wang, Qiben Yan, Zhenxiang Chen, Bo Yang, Chuan Zhao, Mauro Conti:
TextDroid: Semantics-based detection of mobile malware using network flows. INFOCOM Workshops 2017: 18-23 - [c15]Mengmei Ye, Nan Jiang, Hao Yang, Qiben Yan:
Security analysis of Internet-of-Things: A case study of august smart lock. INFOCOM Workshops 2017: 499-504 - [c14]Huasong Shan, Qingyang Wang, Qiben Yan:
Very Short Intermittent DDoS Attacks in an Unsaturated System. SecureComm 2017: 45-66 - 2016
- [j5]Qiben Yan, Huacheng Zeng, Tingting Jiang, Ming Li, Wenjing Lou, Yiwei Thomas Hou:
Jamming Resilient Communication Using MIMO Interference Cancellation. IEEE Trans. Inf. Forensics Secur. 11(7): 1486-1499 (2016) - [c13]Saravanan Raju, Sai Boddepalli, Qiben Yan, Jitender S. Deogun:
Achieving 5As in Cloud Centric Cognitive Cellular Networks. GLOBECOM 2016: 1-6 - [c12]Shanshan Wang, Zhenxiang Chen, Lei Zhang, Qiben Yan, Bo Yang, Lizhi Peng, Zhongtian Jia:
TrafficAV: An effective and explainable detection of mobile malware behavior using network traffic. IWQoS 2016: 1-6 - [c11]Lichao Sun, Zhiqiang Li, Qiben Yan, Witawas Srisa-an, Yu Pan:
SigPID: significant permission identification for android malware detection. MALWARE 2016: 59-66 - [c10]Zhiqiang Li, Lichao Sun, Qiben Yan, Witawas Srisa-an, Zhenxiang Chen:
DroidClassifier: Efficient Adaptive Mining of Application-Layer Header for Classifying Android Malware. SecureComm 2016: 597-616 - [c9]Dong Cao, Shanshan Wang, Qun Li, Zhenxiang Chen, Qiben Yan, Lizhi Peng, Bo Yang:
DroidCollector: A High Performance Framework for High Quality Android Traffic Collection. Trustcom/BigDataSE/ISPA 2016: 1753-1758 - 2015
- [c8]Hongbo Han, Zhenxiang Chen, Qiben Yan, Lizhi Peng, Lei Zhang:
A Real-time Android Malware Detection System Based on Network Traffic Analysis. ICA3PP (3) 2015: 504-516 - [c7]Qiben Yan, Yao Zheng, Tingting Jiang, Wenjing Lou, Y. Thomas Hou:
PeerClean: Unveiling peer-to-peer botnets through dynamic group behavior analysis. INFOCOM 2015: 316-324 - [c6]Zhenxiang Chen, Qiben Yan, Lei Zhang, Lizhi Peng, Hongbo Han:
Using Map-Based Interactive Interface for Understanding and Characterizing Crime Data in Cities. ICSI (3) 2015: 479-490 - [c5]Zhenxiang Chen, Hongbo Han, Qiben Yan, Bo Yang, Lizhi Peng, Lei Zhang, Jin Li:
A First Look at Android Malware Traffic in First Few Minutes. TrustCom/BigDataSE/ISPA (1) 2015: 206-213 - 2014
- [j4]Qiben Yan, Ming Li, Feng Chen, Tingting Jiang, Wenjing Lou, Yiwei Thomas Hou, Chang-Tien Lu:
SpecMonitor: Toward Efficient Passive Traffic Monitoring for Cognitive Radio Networks. IEEE Trans. Wirel. Commun. 13(10): 5893-5905 (2014) - [c4]Qiben Yan, Huacheng Zeng, Tingting Jiang, Ming Li, Wenjing Lou, Y. Thomas Hou:
MIMO-based jamming resilient communication in wireless networks. INFOCOM 2014: 2697-2706 - 2013
- [j3]Liang Xiao, Qiben Yan, Wenjing Lou, Guiquan Chen, Y. Thomas Hou:
Proximity-Based Security Techniques for Mobile Users in Wireless Networks. IEEE Trans. Inf. Forensics Secur. 8(12): 2089-2100 (2013) - [c3]Liang Xiao, Qiben Yan, Wenjing Lou, Y. Thomas Hou:
Proximity-based security using ambient radio signals. ICC 2013: 1609-1613 - [c2]Qiben Yan, Ming Li, Feng Chen, Tingting Jiang, Wenjing Lou, Y. Thomas Hou, Chang-Tien Lu:
Non-parametric passive traffic monitoring in cognitive radio networks. INFOCOM 2013: 1240-1248 - 2012
- [j2]Qiben Yan, Ming Li, Zhenyu Yang, Wenjing Lou, Hongqiang Zhai:
Throughput Analysis of Cooperative Mobile Content Distribution in Vehicular Network using Symbol Level Network Coding. IEEE J. Sel. Areas Commun. 30(2): 484-492 (2012) - [j1]Tingting Jiang, Huacheng Zeng, Qiben Yan, Wenjing Lou, Y. Thomas Hou:
On the Limitation of Embedding Cryptographic Signature for Primary Transmitter Authentication. IEEE Wirel. Commun. Lett. 1(4): 324-327 (2012) - [c1]Qiben Yan, Ming Li, Tingting Jiang, Wenjing Lou, Y. Thomas Hou:
Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks. INFOCOM 2012: 900-908
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 20:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint