Yang Xiang
TitleCited byYear
Mobile phone sensing systems: A survey
WZ Khan, Y Xiang, MY Aalsalem, Q Arshad
IEEE Communications Surveys & Tutorials 15 (1), 402-427, 2013
Securely outsourcing attribute-based encryption with checkability
J Li, X Huang, J Li, X Chen, Y Xiang
IEEE Transactions on Parallel and Distributed Systems 25 (8), 2201-2210, 2014
Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
A Chonka, Y Xiang, W Zhou, A Bonti
Journal of Network and Computer Applications 34 (4), 1097-1107, 2011
Low-rate DDoS attacks detection and traceback by using new information metrics
Y Xiang, K Li, W Zhou
IEEE transactions on information forensics and security 6 (2), 426-437, 2011
Network traffic classification using correlation information
J Zhang, Y Xiang, Y Wang, W Zhou, Y Xiang, Y Guan
IEEE Transactions on Parallel and Distributed Systems 24 (1), 104-117, 2013
Flexible deterministic packet marking: An IP traceback system to find the real source of attacks
Y Xiang, W Zhou, M Guo
IEEE Transactions on Parallel and Distributed Systems 20 (4), 567-580, 2009
Secure attribute-based data sharing for resource-limited users in cloud computing
J Li, Y Zhang, X Chen, Y Xiang
Computers & Security 72, 1-12, 2018
A secure cloud computing based framework for big data information management of smart grid
J Baek, QH Vu, JK Liu, X Huang, Y Xiang
IEEE transactions on cloud computing 3 (2), 233-244, 2015
Classification of malware using structured control flow
S Cesare, Y Xiang
Proceedings of the Eighth Australasian Symposium on Parallel and Distributed …, 2010
Internet traffic classification by aggregating correlated naive bayes predictions
J Zhang, C Chen, Y Xiang, W Zhou, Y Xiang
IEEE Transactions on Information Forensics and Security 8 (1), 5-15, 2013
Secure distributed deduplication systems with improved reliability
J Li, X Chen, X Huang, S Tang, Y Xiang, MM Hassan, A Alelaiwi
IEEE Transactions on Computers 64 (12), 3569-3579, 2015
Cost-effective authentic and anonymous data sharing with forward security
X Huang, JK Liu, S Tang, Y Xiang, K Liang, L Xu, J Zhou
IEEE Transactions on computers 64 (4), 971-983, 2015
Modeling the propagation of worms in networks: A survey
Y Wang, S Wen, Y Xiang, W Zhou
IEEE Communications Surveys & Tutorials 16 (2), 942-960, 2014
Robust network traffic classification
J Zhang, X Chen, Y Xiang, W Zhou, J Wu
IEEE/ACM Transactions on Networking (TON) 23 (4), 1257-1270, 2015
Modeling propagation dynamics of social network worms
S Wen, W Zhou, J Zhang, Y Xiang, W Zhou, W Jia
IEEE Transactions on Parallel and Distributed Systems 24 (8), 1633-1643, 2013
Multiple states based temporal consistency for dynamic verification of fixed‐time constraints in grid workflow systems
J Chen, Y Yang
Concurrency and Computation: Practice and Experience 19 (7), 965-982, 2007
Malwise—an effective and efficient classification system for packed and polymorphic malware
S Cesare, Y Xiang, W Zhou
IEEE Transactions on Computers 62 (6), 1193-1206, 2013
An effective network traffic classification method with unknown flow detection
J Zhang, C Chen, Y Xiang, W Zhou, AV Vasilakos
IEEE Transactions on Network and Service Management 10 (2), 133-147, 2013
Detection and defense of application-layer DDoS attacks in backbone web traffic
W Zhou, W Jia, S Wen, Y Xiang, W Zhou
Future Generation Computer Systems 38, 36-46, 2014
Robust multi-factor authentication for fragile communications
X Huang, Y Xiang, E Bertino, J Zhou, L Xu
IEEE Transactions on Dependable and Secure Computing 11 (6), 568-581, 2014
The system can't perform the operation now. Try again later.
Articles 1–20