default search action
Jin Yang 0008
Person information
- affiliation: Sichuan University, College of Cyber Security, Chengdu, China
- affiliation (PhD 2007): Sichuan University, School of Computer Science, Chengdu, China
Other persons with the same name
- Jin Yang — disambiguation page
- Jin Yang 0001 — Technische Universität Ilmenau, Germany
- Jin Yang 0002 — Imperial College London, UK
- Jin Yang 0003 — Aston University, School of Engineering and Applied Science, Birmingham, UK (and 1 more)
- Jin Yang 0004 — South China University of Technology, School of Computer Science and Engineering, Guangzhou, China (and 1 more)
- Jin Yang 0005 — Hong Kong Polytechnic University, Internet and Mobile Computing Lab
- Jin Yang 0006 — Intel Corporation, Hillsboro, OR, USA
- Jin Yang 0007 — Chongqing Jiaotong University, College of Mathematics and Statistics, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j8]Bo Pang, Gang Liang, Jin Yang, Yijing Chen, Xinyi Wang, Wenbo He:
CWSOGG: Catching Web Shell Obfuscation Based on Genetic Algorithm and Generative Adversarial Network. Comput. J. 66(5): 1295-1309 (2023) - 2020
- [j7]Tianyu Gao, Jin Yang, Wenjun Peng, Luyu Jiang, Yihao Sun, Fangchuan Li:
A Content-Based Method for Sybil Detection in Online Social Networks via Deep Learning. IEEE Access 8: 38753-38766 (2020) - [j6]Junren Chen, Gang Liang, Wenbo He, Chun Xu, Jin Yang, Ruihang Liu:
A Pornographic Images Recognition Model based on Deep One-Class Classification With Visual Attention Mechanism. IEEE Access 8: 122709-122721 (2020) - [j5]Jin Yang, Tao Li, Gang Liang, Yunpeng Wang, Tianyu Gao, Fangdong Zhu:
Spam transaction attack detection model based on GRU and WGAN-div. Comput. Commun. 161: 172-182 (2020)
2010 – 2019
- 2019
- [j4]Jin Yang, Tao Li, Gang Liang, Wenbo He, Yue Zhao:
A Simple Recurrent Unit Model Based Intrusion Detection System With DCGAN. IEEE Access 7: 83286-83296 (2019) - 2018
- [c12]Ping Lin, Tao Li, Xiaojie Liu, Hui Zhao, Jin Yang, Fangdong Zhu:
An Immunity-Based Security Threat Detection System for Cyberspace Digital Virtual Assets. ICCCS (2) 2018: 601-611 - [c11]Fan Zhang, Jin Yang, Tao Li, Fangdong Zhu:
dnyNSA: A Novel Real-Value Based Negative Selection Algorithm. SSCI 2018: 1104-1109 - [c10]Ping Lin, Jin Yang, Tao Li, Lei Ai:
An immune based dynamic risk control system. SSCI 2018: 1130-1137 - 2017
- [j3]Zhengjun Liu, Tao Li, Jin Yang, Tao Yang:
An Improved Negative Selection Algorithm Based on Subspace Density Seeking. IEEE Access 5: 12189-12198 (2017) - [c9]Zhengjun Liu, Hui Zhao, Wen Chen, Xiaochun Cao, Haipeng Peng, Jin Yang, Tao Yang, Ping Lin:
Double-Spending Detection for Fast Bitcoin Payment Based on Artificial Immune. NCTCS 2017: 133-143
2000 – 2009
- 2009
- [j2]Jin Yang, XiaoJie Liu, Tao Li, Gang Liang, SunJun Liu:
Distributed agents model for intrusion detection based on AIS. Knowl. Based Syst. 22(2): 115-119 (2009) - 2007
- [j1]Jin Yang, Tao Li, SunJun Liu, Tiefang Wang, Diangang Wang, Gang Liang:
Computer Forensics System Based on Artificial Immune Systems. J. Univers. Comput. Sci. 13(9): 1354-1365 (2007) - 2006
- [c8]Gang Liang, Tao Li, Jiancheng Ni, Yaping Jiang, Jin Yang, Xun Gong:
An Immunity-Based Dynamic Multilayer Intrusion Detection System. ICIC (3) 2006: 641-650 - [c7]Xun Gong, Tao Li, Gang Liang, Tiefang Wang, Jin Yang, Xiaoqin Hu:
Immunity and Mobile Agent Based Grid Intrusion Detection. ICIC (3) 2006: 651-659 - [c6]Gang Liang, Tao Li, Xun Gong, Yaping Jiang, Jin Yang, Jiancheng Ni:
NASC: A Novel Approach for Spam Classification. ICIC (3) 2006: 672-681 - [c5]Xun Gong, Tao Li, Tiefang Wang, Jin Yang, Gang Liang, Xiaoqin Hu:
Grid Intrusion Detection Based on Immune Agent. ICNC (2) 2006: 73-82 - [c4]Tiefang Wang, Tao Li, Xun Gong, Jin Yang, Xiaoqin Hu, Diangang Wang, Hui Zhao:
Family Gene Based Grid Trust Model. ICNC (2) 2006: 110-113 - [c3]Xun Gong, Tao Li, Ji Lu, Tiefang Wang, Gang Liang, Jin Yang, Feixian Sun:
Immunity and Mobile Agent Based Intrusion Detection for Grid. PRIMA 2006: 187-198 - [c2]SunJun Liu, Tao Li, Kui Zhao, Jin Yang, Xun Gong, Jianhua Zhang:
Immune-Based Dynamic Intrusion Response Model. SEAL 2006: 96-103 - [c1]Xun Gong, Tao Li, Tiefang Wang, Jin Yang, SunJun Liu, Gang Liang:
An Immune Mobile Agent Based Grid Intrusion Detection Model. SEAL 2006: 112-119
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint