Search Results - "Yixian Yang"

Refine Results
  1. 1

    Improving the Classification Effectiveness of Intrusion Detection by Using Improved Conditional Variational AutoEncoder and Deep Neural Network by Yang, Yanqing, Zheng, Kangfeng, Wu, Chunhua, Yang, Yixian

    Published in Sensors (Basel, Switzerland) (02-06-2019)
    “…Intrusion detection systems play an important role in preventing security threats and protecting networks from attacks. However, with the emergence of unknown…”
    Get full text
    Journal Article
  2. 2

    Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things by Huang, Qinlong, Yang, Yixian, Wang, Licheng

    Published in IEEE access (01-01-2017)
    “…Fog computing is a paradigm that extends cloud computing to the edge of the network. It can provide computation and storage services to end devices in Internet…”
    Get full text
    Journal Article
  3. 3

    Robust biometrics based authentication and key agreement scheme for multi-server environments using smart cards by Lu, Yanrong, Li, Lixiang, Yang, Xing, Yang, Yixian

    Published in PloS one (15-05-2015)
    “…Biometrics authenticated schemes using smart cards have attracted much attention in multi-server environments. Several schemes of this type where proposed in…”
    Get full text
    Journal Article
  4. 4

    Network Intrusion Detection Based on Supervised Adversarial Variational Auto-Encoder With Regularization by Yang, Yanqing, Zheng, Kangfeng, Wu, Bin, Yang, Yixian, Wang, Xiujuan

    Published in IEEE access (2020)
    “…To explore the advantages of adversarial learning and deep learning, we propose a novel network intrusion detection model called SAVAER-DNN, which can not only…”
    Get full text
    Journal Article
  5. 5

    Building an Effective Intrusion Detection System Using the Modified Density Peak Clustering Algorithm and Deep Belief Networks by Yang, Yanqing, Zheng, Kangfeng, Wu, Chunhua, Niu, Xinxin, Yang, Yixian

    Published in Applied sciences (10-01-2019)
    “…Machine learning plays an important role in building intrusion detection systems. However, with the increase of data capacity and data dimension, the ability…”
    Get full text
    Journal Article
  6. 6

    Secure and Energy-Efficient Data Transmission System Based on Chaotic Compressive Sensing in Body-to-Body Networks by Haipeng Peng, Ye Tian, Kurths, Jurgen, Lixiang Li, Yixian Yang, Daoshun Wang

    “…Applications of wireless body area networks (WBANs) are extended from remote health care to military, sports, disaster relief, etc. With the network scale…”
    Get full text
    Journal Article
  7. 7

    An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks by Lu, Yanrong, Li, Lixiang, Peng, Haipeng, Yang, Yixian

    Published in Sensors (Basel, Switzerland) (08-06-2016)
    “…WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in…”
    Get full text
    Journal Article
  8. 8

    Finite-time projective synchronization of memristor-based delay fractional-order neural networks by Zheng, Mingwen, Li, Lixiang, Peng, Haipeng, Xiao, Jinghua, Yang, Yixian, Zhao, Hui

    Published in Nonlinear dynamics (01-09-2017)
    “…This paper mainly investigates the finite-time projective synchronization problem of memristor-based delay fractional-order neural networks (MDFNNs). By using…”
    Get full text
    Journal Article
  9. 9

    Hat problem: a new strategy based on quantum stabilizer codes by Zhao, Liyun, Chen, Xiubo, Xu, Gang, Yang, Yixian

    Published in Quantum information processing (01-03-2022)
    “…The hat problem has been investigated in plenty of papers and has become a hot mathematical topic. In this paper, we will investigate the hat problem by…”
    Get full text
    Journal Article
  10. 10

    Secure Identity-Based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing by Huang, Qinlong, Yue, Wei, He, Yue, Yang, Yixian

    Published in IEEE access (01-01-2018)
    “…Cloud computing and social networks are changing the way of healthcare by providing realtime data sharing in a cost-effective manner. However, data security…”
    Get full text
    Journal Article
  11. 11

    A Secure and Efficient Scalable Secret Image Sharing Scheme with Flexible Shadow Sizes by Xie, Dong, Li, Lixiang, Peng, Haipeng, Yang, Yixian

    Published in PloS one (10-01-2017)
    “…In a general (k, n) scalable secret image sharing (SSIS) scheme, the secret image is shared by n participants and any k or more than k participants have the…”
    Get full text
    Journal Article
  12. 12

    Synchronization control of memristor-based recurrent neural networks with perturbations by Wang, Weiping, Li, Lixiang, Peng, Haipeng, Xiao, Jinghua, Yang, Yixian

    Published in Neural networks (01-05-2014)
    “…In this paper, the synchronization control of memristor-based recurrent neural networks with impulsive perturbations or boundary perturbations is studied. We…”
    Get full text
    Journal Article
  13. 13

    Chaos–order transition in foraging behavior of ants by Li, Lixiang, Peng, Haipeng, Kurths, Jürgen, Yang, Yixian, Schellnhuber, Hans Joachim

    “…The study of the foraging behavior of group animals (especially ants) is of practical ecological importance, but it also contributes to the development of…”
    Get full text
    Journal Article
  14. 14

    Bounds and Constructions of Locally Repairable Codes: Parity-Check Matrix Approach by Hao, Jie, Xia, Shu-Tao, Shum, Kenneth W., Chen, Bin, Fu, Fang-Wei, Yang, Yixian

    Published in IEEE transactions on information theory (01-12-2020)
    “…A locally repairable code (LRC) is a linear code such that every code symbol can be recovered by accessing a small number of other code symbols. In this paper,…”
    Get full text
    Journal Article
  15. 15

    SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing by Huang, Qinlong, Yang, Yixian, Shi, Yuxiang

    Published in Sensors (Basel, Switzerland) (24-02-2018)
    “…With the growing number of vehicles and popularity of various services in vehicular cloud computing (VCC), message exchanging among vehicles under traffic…”
    Get full text
    Journal Article
  16. 16

    Low Energy Consumption Compressed Spectrum Sensing Based on Channel Energy Reconstruction in Cognitive Radio Network by Fang, Yuan, Li, Lixiang, Li, Yixiao, Peng, Haipeng, Yang, Yixian

    Published in Sensors (Basel, Switzerland) (26-02-2020)
    “…For wireless communication networks, cognitive radio (CR) can be used to obtain the available spectrum, and wideband compressed sensing plays a vital role in…”
    Get full text
    Journal Article
  17. 17

    Automated Vulnerability Detection in Source Code Using Minimum Intermediate Representation Learning by Li, Xin, Wang, Lu, Xin, Yang, Yang, Yixian, Chen, Yuling

    Published in Applied sciences (01-03-2020)
    “…Vulnerability is one of the root causes of network intrusion. An effective way to mitigate security threats is to discover and patch vulnerabilities before an…”
    Get full text
    Journal Article
  18. 18

    Finite time synchronization of memristor-based Cohen-Grossberg neural networks with mixed delays by Chen, Chuan, Li, Lixiang, Peng, Haipeng, Yang, Yixian

    Published in PloS one (20-09-2017)
    “…Finite time synchronization, which means synchronization can be achieved in a settling time, is desirable in some practical applications. However, most of the…”
    Get full text
    Journal Article
  19. 19

    A Heterogeneous Ensemble Learning Framework for Spam Detection in Social Networks with Imbalanced Data by Zhao, Chensu, Xin, Yang, Li, Xuefeng, Yang, Yixian, Chen, Yuling

    Published in Applied sciences (01-02-2020)
    “…The popularity of social networks provides people with many conveniences, but their rapid growth has also attracted many attackers. In recent years, the…”
    Get full text
    Journal Article
  20. 20

    A hybrid CPSO–SQP method for economic dispatch considering the valve-point effects by Cai, Jiejin, Li, Qiong, Li, Lixiang, Peng, Haipeng, Yang, Yixian

    Published in Energy conversion and management (2012)
    “…► We proposed a hybrid CPSO–SQP method for solving the ED problems with valve effects. ► Based on the CPSO, we further used the SQP to improve the solution of…”
    Get full text
    Journal Article