Folgen
Qiben Yan
Qiben Yan
Computer Science and Engineering, Michigan State University
Bestätigte E-Mail-Adresse bei msu.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Significant permission identification for machine-learning-based android malware detection
J Li, L Sun, Q Yan, Z Li, W Srisa-An, H Ye
IEEE Transactions on Industrial Informatics 14 (7), 3216-3225, 2018
6702018
A comprehensive survey on pretrained foundation models: A history from bert to chatgpt
C Zhou, Q Li, C Li, J Yu, Y Liu, G Wang, K Zhang, C Ji, Q Yan, L He, ...
International Journal of Machine Learning and Cybernetics, 1-65, 2024
5402024
Machine learning based mobile malware detection using highly imbalanced network traffic
Z Chen, Q Yan, H Han, S Wang, L Peng, L Wang, B Yang
Information Sciences 433, 346-364, 2018
2072018
Detecting android malware leveraging text semantics of network flows
S Wang, Q Yan, Z Chen, B Yang, C Zhao, M Conti
IEEE Transactions on Information Forensics and Security 13 (5), 1096-1109, 2017
1642017
A mobile malware detection method using behavior features in network traffic
S Wang, Z Chen, Q Yan, B Yang, L Peng, Z Jia
Journal of Network and Computer Applications 133, 15-25, 2019
1422019
Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks
Q Yan, M Li, T Jiang, W Lou, YT Hou
2012 Proceedings IEEE INFOCOM, 900-908, 2012
1382012
Surfingattack: Interactive hidden attack on voice assistants using ultrasonic guided waves
Q Yan, K Liu, Q Zhou, H Guo, N Zhang
Network and Distributed Systems Security (NDSS) Symposium, 2020
1322020
TIMiner: Automatically extracting and analyzing categorized cyber threat intelligence from social data
J Zhao, Q Yan, J Li, M Shao, Z He, B Li
Computers & Security 95, 101867, 2020
1242020
Jamming resilient communication using MIMO interference cancellation
Q Yan, H Zeng, T Jiang, M Li, W Lou, YT Hou
IEEE Transactions on Information Forensics and Security 11 (7), 1486-1499, 2016
1162016
Proximity-based security techniques for mobile users in wireless networks
L Xiao, Q Yan, W Lou, G Chen, YT Hou
IEEE Transactions on Information Forensics and Security 8 (12), 2089-2100, 2013
1132013
Efficient signature generation for classifying cross-architecture IoT malware
M Alhanahnah, Q Lin, Q Yan, N Zhang, Z Chen
2018 IEEE conference on communications and network security (CNS), 1-9, 2018
1012018
SigPID: significant permission identification for android malware detection
L Sun, Z Li, Q Yan, W Srisa-an, Y Pan
2016 11th international conference on malicious and unwanted software …, 2016
932016
Throughput analysis of cooperative mobile content distribution in vehicular network using symbol level network coding
Q Yan, M Li, Z Yang, W Lou, H Zhai
IEEE Journal on Selected Areas in Communications 30 (2), 484-492, 2012
932012
Trafficav: An effective and explainable detection of mobile malware behavior using network traffic
S Wang, Z Chen, L Zhang, Q Yan, B Yang, L Peng, Z Jia
2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS), 1-6, 2016
882016
Identity management using blockchain for cognitive cellular networks
S Raju, S Boddepalli, S Gampa, Q Yan, JS Deogun
2017 IEEE International Conference on Communications (ICC), 1-6, 2017
842017
MIMO-based jamming resilient communication in wireless networks
Q Yan, H Zeng, T Jiang, M Li, W Lou, YT Hou
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 2697-2706, 2014
832014
NELoRa: Towards ultra-low SNR LoRa communication with neural-enhanced demodulation
C Li, H Guo, S Tong, X Zeng, Z Cao, M Zhang, Q Yan, L Xiao, J Wang, ...
Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems …, 2021
822021
Multi-attributed heterogeneous graph convolutional network for bot detection
J Zhao, X Liu, Q Yan, B Li, M Shao, H Peng
Information Sciences 537, 380-393, 2020
822020
Cyber threat intelligence modeling based on heterogeneous graph convolutional network
J Zhao, Q Yan, X Liu, B Li, G Zuo
23rd international symposium on research in attacks, intrusions and defenses …, 2020
772020
Security analysis of Internet-of-Things: A case study of august smart lock
M Ye, N Jiang, H Yang, Q Yan
2017 IEEE conference on computer communications workshops (INFOCOM WKSHPS …, 2017
672017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20