Search Results - "Yixian Yang"
-
1
Improving the Classification Effectiveness of Intrusion Detection by Using Improved Conditional Variational AutoEncoder and Deep Neural Network
Published in Sensors (Basel, Switzerland) (02-06-2019)“…Intrusion detection systems play an important role in preventing security threats and protecting networks from attacks. However, with the emergence of unknown…”
Get full text
Journal Article -
2
Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things
Published in IEEE access (01-01-2017)“…Fog computing is a paradigm that extends cloud computing to the edge of the network. It can provide computation and storage services to end devices in Internet…”
Get full text
Journal Article -
3
Robust biometrics based authentication and key agreement scheme for multi-server environments using smart cards
Published in PloS one (15-05-2015)“…Biometrics authenticated schemes using smart cards have attracted much attention in multi-server environments. Several schemes of this type where proposed in…”
Get full text
Journal Article -
4
Network Intrusion Detection Based on Supervised Adversarial Variational Auto-Encoder With Regularization
Published in IEEE access (2020)“…To explore the advantages of adversarial learning and deep learning, we propose a novel network intrusion detection model called SAVAER-DNN, which can not only…”
Get full text
Journal Article -
5
Building an Effective Intrusion Detection System Using the Modified Density Peak Clustering Algorithm and Deep Belief Networks
Published in Applied sciences (10-01-2019)“…Machine learning plays an important role in building intrusion detection systems. However, with the increase of data capacity and data dimension, the ability…”
Get full text
Journal Article -
6
Secure and Energy-Efficient Data Transmission System Based on Chaotic Compressive Sensing in Body-to-Body Networks
Published in IEEE transactions on biomedical circuits and systems (01-06-2017)“…Applications of wireless body area networks (WBANs) are extended from remote health care to military, sports, disaster relief, etc. With the network scale…”
Get full text
Journal Article -
7
An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks
Published in Sensors (Basel, Switzerland) (08-06-2016)“…WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in…”
Get full text
Journal Article -
8
Finite-time projective synchronization of memristor-based delay fractional-order neural networks
Published in Nonlinear dynamics (01-09-2017)“…This paper mainly investigates the finite-time projective synchronization problem of memristor-based delay fractional-order neural networks (MDFNNs). By using…”
Get full text
Journal Article -
9
Hat problem: a new strategy based on quantum stabilizer codes
Published in Quantum information processing (01-03-2022)“…The hat problem has been investigated in plenty of papers and has become a hot mathematical topic. In this paper, we will investigate the hat problem by…”
Get full text
Journal Article -
10
Secure Identity-Based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing
Published in IEEE access (01-01-2018)“…Cloud computing and social networks are changing the way of healthcare by providing realtime data sharing in a cost-effective manner. However, data security…”
Get full text
Journal Article -
11
A Secure and Efficient Scalable Secret Image Sharing Scheme with Flexible Shadow Sizes
Published in PloS one (10-01-2017)“…In a general (k, n) scalable secret image sharing (SSIS) scheme, the secret image is shared by n participants and any k or more than k participants have the…”
Get full text
Journal Article -
12
Synchronization control of memristor-based recurrent neural networks with perturbations
Published in Neural networks (01-05-2014)“…In this paper, the synchronization control of memristor-based recurrent neural networks with impulsive perturbations or boundary perturbations is studied. We…”
Get full text
Journal Article -
13
Chaos–order transition in foraging behavior of ants
Published in Proceedings of the National Academy of Sciences - PNAS (10-06-2014)“…The study of the foraging behavior of group animals (especially ants) is of practical ecological importance, but it also contributes to the development of…”
Get full text
Journal Article -
14
Bounds and Constructions of Locally Repairable Codes: Parity-Check Matrix Approach
Published in IEEE transactions on information theory (01-12-2020)“…A locally repairable code (LRC) is a linear code such that every code symbol can be recovered by accessing a small number of other code symbols. In this paper,…”
Get full text
Journal Article -
15
SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing
Published in Sensors (Basel, Switzerland) (24-02-2018)“…With the growing number of vehicles and popularity of various services in vehicular cloud computing (VCC), message exchanging among vehicles under traffic…”
Get full text
Journal Article -
16
Low Energy Consumption Compressed Spectrum Sensing Based on Channel Energy Reconstruction in Cognitive Radio Network
Published in Sensors (Basel, Switzerland) (26-02-2020)“…For wireless communication networks, cognitive radio (CR) can be used to obtain the available spectrum, and wideband compressed sensing plays a vital role in…”
Get full text
Journal Article -
17
Automated Vulnerability Detection in Source Code Using Minimum Intermediate Representation Learning
Published in Applied sciences (01-03-2020)“…Vulnerability is one of the root causes of network intrusion. An effective way to mitigate security threats is to discover and patch vulnerabilities before an…”
Get full text
Journal Article -
18
Finite time synchronization of memristor-based Cohen-Grossberg neural networks with mixed delays
Published in PloS one (20-09-2017)“…Finite time synchronization, which means synchronization can be achieved in a settling time, is desirable in some practical applications. However, most of the…”
Get full text
Journal Article -
19
A Heterogeneous Ensemble Learning Framework for Spam Detection in Social Networks with Imbalanced Data
Published in Applied sciences (01-02-2020)“…The popularity of social networks provides people with many conveniences, but their rapid growth has also attracted many attackers. In recent years, the…”
Get full text
Journal Article -
20
A hybrid CPSO–SQP method for economic dispatch considering the valve-point effects
Published in Energy conversion and management (2012)“…► We proposed a hybrid CPSO–SQP method for solving the ED problems with valve effects. ► Based on the CPSO, we further used the SQP to improve the solution of…”
Get full text
Journal Article