default search action
Yang Xin 0001
Person information
- affiliation: Beijing University of Posts and Telecommunications, Beijing, China
Other persons with the same name
- Yang Xin — disambiguation page
- Yang Xin 0002
— Air Force Engineering University, Xi'an, China
- Yang Xin 0003 — State Grid Zhejiang Xinchang Electric Power Supply Company, Shaoxing, China
- Yang Xin 0004
— Shenzhen University, Shenzhen, China (and 1 more)
- Yang Xin 0005 — Huawei Technologies Co. Ltd., Shanghai, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Chunyong Zhang
, Tianxiang Yu, Bin Liu
, Yang Xin:
Vulnerability detection based on federated learning. Inf. Softw. Technol. 167: 107371 (2024) - 2023
- [j28]Xin Li
, Yang Xin, Hongliang Zhu, Yixian Yang, Yuling Chen:
Cross-domain vulnerability detection using graph embedding and domain adaptation. Comput. Secur. 125: 103017 (2023) - [j27]Chunyong Zhang
, Yang Xin:
VulGAI: vulnerability detection based on graphs and images. Comput. Secur. 135: 103501 (2023) - [j26]Bin Liu
, Chunyong Zhang, Liangwei Yao, Yang Xin:
GLPS: A Geohash-Based Location Privacy Protection Scheme. Entropy 25(12): 1569 (2023) - [j25]Chunyong Zhang
, Yang Xin:
Static vulnerability detection based on class separation. J. Syst. Softw. 206: 111832 (2023) - [j24]Bin Liu
, Chunyong Zhang, Yang Xin:
GL-Tree: A Hierarchical Tree Structure for Efficient Retrieval of Massive Geographic Locations. Sensors 23(4): 2245 (2023) - [j23]Qi Fan
, Yang Xin, Bin Jia
, Yang Zhang
, Pinxiang Wang
:
COBATS: A Novel Consortium Blockchain-Based Trust Model for Data Sharing in Vehicular Networks. IEEE Trans. Intell. Transp. Syst. 24(11): 12255-12271 (2023) - [j22]Chunyong Zhang
, Bin Liu
, Yang Xin
, Liangwei Yao
:
CPVD: Cross Project Vulnerability Detection Based on Graph Attention Network and Domain Adaptation. IEEE Trans. Software Eng. 49(8): 4152-4168 (2023) - [c10]Kailu Guo, Yang Xin, Tianxiang Yu:
Malware Detection Using Contrastive Learning Based on Multi-Feature Fusion. TrustCom 2023: 1681-1686 - 2022
- [j21]Mingcheng Gao
, Ruiheng Wang
, Lu Wang, Yang Xin, Hongliang Zhu
:
Cross-domain entity identity association analysis and prediction based on representation learning. Int. J. Distributed Sens. Networks 18(11): 155013292211350 (2022) - [j20]Guangcan Yang
, Yunhua He
, Ke Xiao
, Qifeng Tang, Yang Xin, Hongliang Zhu:
Privacy-Preserving Query Scheme (PPQS) for Location-Based Services in Outsourced Cloud. Secur. Commun. Networks 2022: 9360899:1-9360899:16 (2022) - 2021
- [j19]Jiansheng Zhang
, Yang Xin
, Yulong Gao
, Xiaohui Lei, Yixian Yang
:
Secure ABE Scheme for Access Management in Blockchain-Based IoT. IEEE Access 9: 54840-54849 (2021) - [j18]Xiaogang Xing, Yuling Chen
, Tao Li, Yang Xin, Hongwei Sun:
A blockchain index structure based on subchain query. J. Cloud Comput. 10(1): 52 (2021) - [j17]Mingzhen Li
, Yunfeng Wang, Yang Xin, Hongliang Zhu, Qifeng Tang, Yuling Chen
, Yixian Yang, Guangcan Yang:
Cross-Platform Strong Privacy Protection Mechanism for Review Publication. Secur. Commun. Networks 2021: 5556155:1-5556155:22 (2021) - [j16]Fei Zhao
, Yang Xin
, Kai Zhang, Xinxin Niu:
Representativeness-Based Instance Selection for Intrusion Detection. Secur. Commun. Networks 2021: 6638134:1-6638134:13 (2021) - 2020
- [j15]Haixia Hou, Yingying Xu
, Menghan Chen, Zhi Liu
, Wei Guo
, Mingcheng Gao, Yang Xin
, Lizhen Cui
:
Hierarchical Long Short-Term Memory Network for Cyberattack Detection. IEEE Access 8: 90907-90913 (2020) - [j14]Xuefeng Li
, Yang Xin
, Chensu Zhao
, Yixian Yang
, Shoushan Luo
, Yuling Chen
:
Using User Behavior to Measure Privacy on Online Social Networks. IEEE Access 8: 108387-108401 (2020)
2010 – 2019
- 2019
- [j13]Hongliang Zhu
, Ying Yuan
, Yuling Chen, Yaxing Zha
, Wanying Xi, Bin Jia, Yang Xin:
A Secure and Efficient Data Integrity Verification Scheme for Cloud-IoT Based on Short Signature. IEEE Access 7: 90036-90044 (2019) - [j12]Kai Zhang
, Fei Zhao
, Shoushan Luo, Yang Xin, Hongliang Zhu
:
An Intrusion Action-Based IDS Alert Correlation Analysis and Prediction Framework. IEEE Access 7: 150540-150551 (2019) - [j11]Guangcan Yang
, Shoushan Luo, Hongliang Zhu
, Yang Xin, Ke Xiao
, Yuling Chen
, Mingzhen Li
, Yunfeng Wang:
A Mechanism to Improve Effectiveness and Privacy Preservation for Review Publication in LBS. IEEE Access 7: 156659-156674 (2019) - [j10]Yunfeng Wang, Mingzhen Li, Shoushan Luo, Yang Xin
, Hongliang Zhu
, Yuling Chen
, Guangcan Yang
, Yixian Yang
:
LRM: A Location Recombination Mechanism for Achieving Trajectory k-Anonymity Privacy Protection. IEEE Access 7: 182886-182905 (2019) - [c9]Yingying Xu, Zhi Liu, Yan-Miao Li, Yushuo Zheng, Haixia Hou, Mingcheng Gao, Yongsheng Song, Yang Xin:
Intrusion Detection Based on Fusing Deep Neural Networks and Transfer Learning. IFTC 2019: 212-223 - [c8]Shuangshuang Xu, Yang Xin, Hongliang Zhu, Shoushan Luo, Yuling Chen:
A Authentication and Access Authorization Mechanism on the PaaS Platform. SSCI 2019: 893-900 - 2018
- [j9]Yang Xin, Lingshuang Kong, Zhi Liu
, Chunhua Wang, Hongliang Zhu, Mingcheng Gao, Chensu Zhao, Xiaoke Xu:
Multimodal Feature-Level Fusion for Biometrics Identification System on IoMT Platform. IEEE Access 6: 21418-21426 (2018) - [j8]Yang Xin, Lingshuang Kong, Zhi Liu
, Yuling Chen, Yan-Miao Li, Hongliang Zhu, Mingcheng Gao, Haixia Hou, Chunhua Wang:
Machine Learning and Deep Learning Methods for Cybersecurity. IEEE Access 6: 35365-35381 (2018) - [j7]Yang Xin, Yankun Cao, Zhi Liu
, Yuling Chen, Lizhen Cui, Yaowen Zhu, Haixia Hou, Guangzhe Zhao
, Mingyu Wang:
Automatic Tongue Verification Based on Appearance Manifold Learning in Image Sequences for the Internet of Medical Things Platform. IEEE Access 6: 43885-43891 (2018) - [j6]Hongliang Zhu, Zhihua Zhang
, Juan Du, Shoushan Luo, Yang Xin:
Detection of selective forwarding attacks based on adaptive learning automata and communication quality in wireless sensor networks. Int. J. Distributed Sens. Networks 14(11) (2018) - [j5]Zhihua Zhang
, Shoushan Luo, Hongliang Zhu
, Yang Xin:
A Clone Detection Algorithm with Low Resource Expenditure for Wireless Sensor Networks. J. Sensors 2018: 4396381:1-4396381:16 (2018) - [c7]Yang Xin, Chensu Zhao, Hongliang Zhu, Mingcheng Gao:
A Survey of Malicious Accounts Detection in Large-Scale Online Social Networks. BigDataSecurity/HPSC/IDS 2018: 155-158 - 2017
- [j4]Zhihua Zhang
, Hongliang Zhu, Shoushan Luo, Yang Xin, Xiaoming Liu:
Intrusion Detection Based on State Context and Hierarchical Trust in Wireless Sensor Networks. IEEE Access 5: 12088-12102 (2017) - 2016
- [c6]Hongliang Zhu, Wenhan Liu, Jing Wang, Yang Xin:
Based on the character of cloud storage string encryption and cipher text retrieval of string research. CCIS 2016: 409-413 - 2014
- [j3]Yi Xu, Yixian Yang, Yang Xin, Hongliang Zhu:
An Improved Directed Diffusion Protocol based on Opportunistic Routing. J. Networks 9(5): 1163-1168 (2014) - [j2]Chao Feng, Yang Xin, Hongliang Zhu, Yixian Yang:
A Weakly Homomorphic Encryption with LDN. J. Networks 9(6): 1464-1470 (2014) - 2013
- [j1]Ting Han, Shoushan Luo, Hongliang Zhu, Yang Xin, Yong Peng:
A Novel Trust Evaluation Model Based on Grey Clustering Theory for Routing Networks. J. Comput. 8(11): 2743-2749 (2013) - 2011
- [c5]Bin Zhang, Yang Xin, Xinxin Niu, Kaiguo Yuan, Bin Zhang:
An Anti-JPEG Compression Image Perceptual Hashing Algorithm. ICAIC (2) 2011: 397-406 - [c4]Yang Xin, Fen Xu, Hongliang Zhu:
Some results on preserving K-member simply separable relations in partial K-valued logic. ICDIP 2011: 80091I - [c3]Tao Geng, Shoushan Luo, Yang Xin, Xiaofeng Du, Yixian Yang:
Research on Secure Multi-party Computational Geometry. ICICA (LNCS) 2011: 322-329 - 2010
- [c2]Bin Zhang, Yang Xin, Xinxin Niu, Kaiguo Yuan, Hui-Bai Jiang:
A near reversible image watermarking algorithm. ICMLC 2010: 2824-2828
2000 – 2009
- 2009
- [c1]Wen Long, Yang Xin, Yixian Yang:
Vulnerabilities Analyzing Model for Alert Correlation in Distributed Environment. SSME 2009: 408-411
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint