default search action
Xiangzhan Yu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j37]Xunzhi Jiang, Shen Wang, Yuxin Gong, Tingyue Yu, Li Liu, Xiangzhan Yu:
HAformer: Semantic fusion of hex machine code and assembly code for cross-architecture binary vulnerability detection. Comput. Secur. 145: 104029 (2024) - [j36]Zhichao Hu, Xiangzhan Yu, Likun Liu, Yu Zhang, Haining Yu:
ASOD: an adaptive stream outlier detection method using online strategy. J. Cloud Comput. 13(1): 120 (2024) - [j35]Junzhong Miao, Xiangzhan Yu, Zhichao Hu, Yanru Song, Likun Liu, Zhigang Zhou:
An effective deep learning adversarial defense method based on spatial structural constraints in embedding space. Pattern Recognit. Lett. 178: 160-166 (2024) - [j34]Yinggang Sun, Haining Yu, Xiang Li, Yizheng Yang, Xiangzhan Yu:
pFind: Privacy-preserving lost object finding in vehicular crowdsensing. World Wide Web (WWW) 27(5): 64 (2024) - [i6]Yinggang Sun, Ziming Guo, Haining Yu, Chuanyi Liu, Xiang Li, Bingxuan Wang, Xiangzhan Yu, Tiancheng Zhao:
QDA-SQL: Questions Enhanced Dialogue Augmentation for Multi-Turn Text-to-SQL. CoRR abs/2406.10593 (2024) - 2023
- [j33]Tingyue Yu, Shen Wang, Xiangzhan Yu:
Global Wasserstein Margin maximization for boosting generalization in adversarial training. Appl. Intell. 53(10): 11490-11504 (2023) - [j32]Dongyang Zhan, Zhaofeng Yu, Xiangzhan Yu, Hongli Zhang, Lin Ye, Likun Liu:
Securing Operating Systems Through Fine-Grained Kernel Access Limitation for IoT Systems. IEEE Internet Things J. 10(6, March 15): 5378-5392 (2023) - [j31]Dongyang Zhan, Kai Tan, Lin Ye, Xiangzhan Yu, Hongli Zhang, Zheng He:
An Adversarial Robust Behavior Sequence Anomaly Detection Approach Based on Critical Behavior Unit Learning. IEEE Trans. Computers 72(11): 3286-3299 (2023) - [j30]Haining Yu, Hongli Zhang, Xiaohua Jia, Xiao Chen, Xiangzhan Yu:
pSafety: Privacy-Preserving Safety Monitoring in Online Ride Hailing Services. IEEE Trans. Dependable Secur. Comput. 20(1): 209-224 (2023) - [j29]Xiao Chen, Haining Yu, Xiaohua Jia, Xiangzhan Yu:
APFed: Anti-Poisoning Attacks in Privacy-Preserving Heterogeneous Federated Learning. IEEE Trans. Inf. Forensics Secur. 18: 5749-5761 (2023) - [j28]Yang Gao, Hongli Zhang, Xiangzhan Yu:
Higher-Order Community Detection: On Information Degeneration and Its Elimination. IEEE/ACM Trans. Netw. 31(2): 891-903 (2023) - [j27]Dongyang Zhan, Zhaofeng Yu, Xiangzhan Yu, Hongli Zhang, Lin Ye:
Shrinking the Kernel Attack Surface Through Static and Dynamic Syscall Limitation. IEEE Trans. Serv. Comput. 16(2): 1431-1443 (2023) - [j26]Dongyang Zhan, Xiangzhan Yu, Hongli Zhang, Lin Ye:
ErrHunter: Detecting Error-Handling Bugs in the Linux Kernel Through Systematic Static Analysis. IEEE Trans. Software Eng. 49(2): 684-698 (2023) - [c44]Sanyuan Chen, Yu Wu, Chengyi Wang, Shujie Liu, Daniel Tompkins, Zhuo Chen, Wanxiang Che, Xiangzhan Yu, Furu Wei:
BEATs: Audio Pre-Training with Acoustic Tokenizers. ICML 2023: 5178-5193 - 2022
- [j25]Yang Gao, Xiangzhan Yu, Hongli Zhang:
Graph clustering using triangle-aware measures in large networks. Inf. Sci. 584: 618-632 (2022) - [j24]Sanyuan Chen, Chengyi Wang, Zhengyang Chen, Yu Wu, Shujie Liu, Zhuo Chen, Jinyu Li, Naoyuki Kanda, Takuya Yoshioka, Xiong Xiao, Jian Wu, Long Zhou, Shuo Ren, Yanmin Qian, Yao Qian, Jian Wu, Michael Zeng, Xiangzhan Yu, Furu Wei:
WavLM: Large-Scale Self-Supervised Pre-Training for Full Stack Speech Processing. IEEE J. Sel. Top. Signal Process. 16(6): 1505-1518 (2022) - [c43]Sanyuan Chen, Yu Wu, Chengyi Wang, Zhengyang Chen, Zhuo Chen, Shujie Liu, Jian Wu, Yao Qian, Furu Wei, Jinyu Li, Xiangzhan Yu:
Unispeech-Sat: Universal Speech Representation Learning With Speaker Aware Pre-Training. ICASSP 2022: 6152-6156 - [c42]Mengmeng Ge, Xiangzhan Yu, Vinay Mysore Sachidananda, Shangqing Liu, Likun Liu:
ENiD: An Encrypted Web Pages Traffic Identification Based on Web Visiting Behavior. ICDM (Workshops) 2022: 593-601 - [c41]Sanyuan Chen, Yu Wu, Chengyi Wang, Shujie Liu, Zhuo Chen, Peidong Wang, Gang Liu, Jinyu Li, Jian Wu, Xiangzhan Yu, Furu Wei:
Why does Self-Supervised Learning for Speech Recognition Benefit Speaker Recognition? INTERSPEECH 2022: 3699-3703 - [i5]Sanyuan Chen, Yu Wu, Chengyi Wang, Shujie Liu, Zhuo Chen, Peidong Wang, Gang Liu, Jinyu Li, Jian Wu, Xiangzhan Yu, Furu Wei:
Why does Self-Supervised Learning for Speech Recognition Benefit Speaker Recognition? CoRR abs/2204.12765 (2022) - [i4]Sanyuan Chen, Yu Wu, Zhuo Chen, Jian Wu, Takuya Yoshioka, Shujie Liu, Jinyu Li, Xiangzhan Yu:
Ultra Fast Speech Separation Model with Teacher Student Learning. CoRR abs/2204.12777 (2022) - 2021
- [j23]Jiantao Shi, Likun Liu, Xiangzhan Yu, Hui Lu:
A collaborative service resource evaluation model based on trust network. EURASIP J. Wirel. Commun. Netw. 2021(1): 51 (2021) - [j22]Yang Gao, Xiangzhan Yu, Hongli Zhang:
Overlapping community detection by constrained personalized PageRank. Expert Syst. Appl. 173: 114682 (2021) - [j21]Mengmeng Ge, Xiangzhan Yu, Likun Liu:
Robot Communication: Network Traffic Classification Based on Deep Neural Network. Frontiers Neurorobotics 15: 648374 (2021) - [j20]Haining Yu, Hongli Zhang, Xiangzhan Yu, Xiaojiang Du, Mohsen Guizani:
PGRide: Privacy-Preserving Group Ridesharing Matching in Online Ride Hailing Services. IEEE Internet Things J. 8(7): 5722-5735 (2021) - [j19]Jiantao Shi, Xiangzhan Yu, Zechao Liu:
Nowhere to Hide: A Novel Private Protocol Identification Algorithm. Secur. Commun. Networks 2021: 6672911:1-6672911:10 (2021) - [j18]Haining Yu, Xiaohua Jia, Hongli Zhang, Xiangzhan Yu, Jiangang Shu:
PSRide: Privacy-Preserving Shared Ride Matching for Online Ride Hailing Systems. IEEE Trans. Dependable Secur. Comput. 18(3): 1425-1440 (2021) - [j17]Xiangzhan Yu, Zhichao Hu, Yi Xin:
A New Approach Customizable Distributed Network Service Discovery System. Wirel. Commun. Mob. Comput. 2021: 6627639:1-6627639:10 (2021) - [c40]Sanyuan Chen, Yu Wu, Zhuo Chen, Takuya Yoshioka, Shujie Liu, Jin-Yu Li, Xiangzhan Yu:
Don't Shoot Butterfly with Rifles: Multi-Channel Continuous Speech Separation with Early Exit Transformer. ICASSP 2021: 6139-6143 - [c39]Shen Wang, Xunzhi Jiang, Xiangzhan Yu, Shuai Sun:
KCFuzz: Directed Fuzzing Based on Keypoint Coverage. ICAIS (1) 2021: 312-325 - [c38]Sanyuan Chen, Yu Wu, Zhuo Chen, Jian Wu, Takuya Yoshioka, Shujie Liu, Jinyu Li, Xiangzhan Yu:
Ultra Fast Speech Separation Model with Teacher Student Learning. Interspeech 2021: 3026-3030 - [i3]Sanyuan Chen, Yu Wu, Chengyi Wang, Zhengyang Chen, Zhuo Chen, Shujie Liu, Jian Wu, Yao Qian, Furu Wei, Jinyu Li, Xiangzhan Yu:
UniSpeech-SAT: Universal Speech Representation Learning with Speaker Aware Pre-Training. CoRR abs/2110.05752 (2021) - 2020
- [j16]Yang Gao, Xiangzhan Yu, Hongli Zhang:
Uncovering overlapping community structure in static and dynamic networks. Knowl. Based Syst. 201-202: 106060 (2020) - [j15]Haining Yu, Hongli Zhang, Xiangzhan Yu:
Hail the Closest Driver on Roads: Privacy-Preserving Ride Matching in Online Ride Hailing Services. Secur. Commun. Networks 2020: 4948387:1-4948387:13 (2020) - [c37]Jingwei Li, Chong Zhang, Xiangzhan Yu:
Webpage visual feature extraction and similarity algorithm. CIAT 2020: 80-85 - [c36]Rui Liu, Xiangzhan Yu:
A Survey on Encrypted Traffic Identification. CIAT 2020: 159-163 - [c35]Yunzu Song, Xiangzhan Yu, Jianning Huo, Haijie Wang:
Design and implementation of web page classification tool based on word vector. CIAT 2020: 244-249 - [c34]JiuJin Wang, Xu Gu, Xiangzhan Yu:
Early Analysis and Detection of Compressed Traffic. CIAT 2020: 471-476 - [c33]Kaiyu Shi, Xiangzhan Yu, Yue Zhao:
Fuzzing Improving Techniques Applied and Evaluated on a Network Traffic Analysis System. CIAT 2020: 543-548 - [c32]Sanyuan Chen, Yutai Hou, Yiming Cui, Wanxiang Che, Ting Liu, Xiangzhan Yu:
Recall and Learn: Fine-tuning Deep Pretrained Language Models with Less Forgetting. EMNLP (1) 2020: 7870-7881 - [i2]Sanyuan Chen, Yutai Hou, Yiming Cui, Wanxiang Che, Ting Liu, Xiangzhan Yu:
Recall and Learn: Fine-tuning Deep Pretrained Language Models with Less Forgetting. CoRR abs/2004.12651 (2020)
2010 – 2019
- 2019
- [j14]Haining Yu, Jiangang Shu, Xiaohua Jia, Hongli Zhang, Xiangzhan Yu:
lpRide: Lightweight and Privacy-Preserving Ride Matching Over Road Networks in Online Ride Hailing Systems. IEEE Trans. Veh. Technol. 68(11): 10418-10428 (2019) - [c31]Likun Liu, Jiantao Shi, Hongli Zhang, Xiangzhan Yu:
No Way to Evade: Detecting Multi-Path Routing Attacks for NIDS. GLOBECOM 2019: 1-6 - [c30]Zibo Li, Xiangzhan Yu, Dawei Wang, Yiru Liu, Huaidong Yin, Shoushuai He:
SuperEye: A Distributed Port Scanning System. ICAIS (4) 2019: 46-56 - [c29]Qiuping Zhu, Dong Li, Yi Xin, Xiangzhan Yu, Guocai Mu:
A Survey on Network Traffic Identification. ICAIS (4) 2019: 91-100 - [c28]Chen Chen, Lin Ye, Xiangzhan Yu, Bailang Ding:
A Survey of Network Security Situational Awareness Technology. ICAIS (4) 2019: 101-109 - [c27]Guanjun Guo, Yi Xin, Xiangzhan Yu, Likun Liu, Houhua Cao:
A Fast IP Matching Algorithm Under Large Traffic. ICAIS (4) 2019: 246-255 - [c26]Jian Jiang, Xiangzhan Yu, Yan Sun, Haohua Zeng:
A Survey of the Software Vulnerability Discovery Using Machine Learning Techniques. ICAIS (4) 2019: 308-317 - [c25]Likun Liu, Hongli Zhang, Jiantao Shi, Xiangzhan Yu, Haixiao Xu:
I2P Anonymous Communication Network Measurement and Analysis. SmartCom 2019: 105-115 - 2018
- [j13]Lin Ye, Xiangzhan Yu, Lei Yu, Bin Guo, Dongyang Zhan, Xiaojiang Du, Mohsen Guizani:
Checking Function-Level Kernel Control Flow Integrity for Cloud Computing. IEEE Access 6: 41856-41865 (2018) - [j12]Lin Ye, Xiangzhan Yu, Junda Zhao, Dongyang Zhan, Xiaojiang Du, Mohsen Guizani:
Deciding Your Own Anonymity: User-Oriented Node Selection in I2P. IEEE Access 6: 71350-71359 (2018) - [j11]Muhammad Shafiq, Xiangzhan Yu, Asif Ali Laghari:
WeChat traffic classification using machine learning algorithms and comparative analysis of datasets. Int. J. Inf. Comput. Secur. 10(2/3): 109-128 (2018) - [j10]Muhammad Shafiq, Xiangzhan Yu, Ali Kashif Bashir, Hassan Nazeer Chaudhry, Dawei Wang:
A machine learning approach for feature selection traffic classification using security analysis. J. Supercomput. 74(10): 4867-4892 (2018) - [j9]Likun Liu, Hongli Zhang, Xiangzhan Yu, Yi Xin, Muhammad Shafiq, Mengmeng Ge:
An Efficient Security System for Mobile Data Monitoring. Wirel. Commun. Mob. Comput. 2018: 9809345:1-9809345:10 (2018) - [c24]Guangwei Yang, Haining Yu, Hongli Zhang, Xiangzhan Yu:
A Metadata-Based Representation Method of the Internet of Things. DSC 2018: 498-505 - [c23]Ke Li, Xiangzhan Yu, Hongli Zhang, Longfei Wu, Xiaojiang Du, E. Paul Ratazzi, Mohsen Guizani:
Security Mechanisms to Defend against New Attacks on Software-Defined Radio. ICNC 2018: 537-541 - [c22]Likun Liu, Jiantao Shi, Hongli Zhang, Xiangzhan Yu:
Tearing Down the Face of Algorithmic Complexity Attacks for DPI Engines. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 751-758 - 2017
- [j8]Muhammad Shafiq, Xiangzhan Yu:
Effective Packet Number for 5G IM WeChat Application at Early Stage Traffic Classification. Mob. Inf. Syst. 2017: 3146868:1-3146868:22 (2017) - [j7]Muhammad Shafiq, Xiangzhan Yu, Asif Ali Laghari, Dawei Wang:
Effective Feature Selection for 5G IM Applications Traffic Classification. Mob. Inf. Syst. 2017: 6805056:1-6805056:12 (2017) - [c21]Muhammad Shafiq, Xiangzhan Yu, Dawei Wang:
Robust Feature Selection for IM Applications at Early Stage Traffic Classification Using Machine Learning Algorithms. HPCC/SmartCity/DSS 2017: 239-245 - [c20]Tingyue Yu, Shen Wang, Xiangzhan Yu:
A Preamble Mining Algorithm Oriented to Binary Protocol Using Random Probes. IIH-MSP (2) 2017: 318-326 - 2016
- [j6]Zhikai Xu, Hongli Zhang, Xiang-Zhan Yu, Shen Su:
Privacy-Aware Information Sharing in Location-Based Services: Attacks and Defense. IEICE Trans. Inf. Syst. 99-D(8): 1991-2001 (2016) - [c19]Muhammad Shafiq, Xiangzhan Yu, Asif Ali Laghari, Lu Yao, Nabin Kumar Karn, Foudil Abdessamia, Salahuddin:
WeChat Text and Picture Messages Service Flow Traffic Classification Using Machine Learning Technique. HPCC/SmartCity/DSS 2016: 58-62 - [c18]Hongli Zhang, Zhikai Xu, Xiang-Zhan Yu, Xiaojiang Du:
LPPS: Location privacy protection for smartphones. ICC 2016: 1-6 - [c17]Muhammad Shafiq, Xiangzhan Yu, Asif Ali Laghari:
WeChat Text Messages Service Flow Traffic Classification Using Machine Learning Technique. ICITCS 2016: 1-5 - [c16]Zhikai Xu, Hongli Zhang, Xiang-Zhan Yu:
Multiple Mix-Zones Deployment for Continuous Location Privacy Protection. Trustcom/BigDataSE/ISPA 2016: 760-766 - 2015
- [j5]Xiang-Zhan Yu, Zhaoxin Zhang, Haining Yu, Feng Jiang, Wen Ji:
An Asynchronous Periodic Sequential Pattern Mining Algorithm with Multiple Minimum Item Supports for Ad Hoc Networking. J. Sensors 2015: 461659:1-461659:13 (2015) - [c15]Zhigang Zhou, Hongli Zhang, Xiang-Zhan Yu, Junwu Guo:
Continuous resource allocation in cloud computing. ICC 2015: 319-324 - [c14]Zhigang Zhou, Hongli Zhang, Xiang-Zhan Yu, Junwu Guo:
Audit meets game theory: Verifying reliable execution of SLA for compute-intensive program in cloud. ICC 2015: 7456-7461 - 2014
- [j4]Hongli Zhang, Panpan Li, Zhigang Zhou, Junchao Wu, Xiang-Zhan Yu:
A Privacy-aware Virtual Machine Migration Framework on Hybrid Clouds. J. Networks 9(5): 1086-1095 (2014) - [c13]Xiang-Zhan Yu, Haining Yu:
An Asynchronous Periodic Sequential Patterns Mining Algorithm with Multiple Minimum Item Supports. 3PGCIC 2014: 274-281 - 2013
- [c12]Hongli Zhang, Zhigang Zhou, Xiaojiang Du, Panpan Li, Xiang-Zhan Yu:
Practical and privacy-assured data indexes for outsourced cloud data. GLOBECOM 2013: 671-676 - [c11]Zhigang Zhou, Hongli Zhang, Xiaojiang Du, Panpan Li, Xiang-Zhan Yu:
Prometheus: Privacy-aware data retrieval on hybrid cloud. INFOCOM 2013: 2643-2651 - 2012
- [j3]Hongli Zhang, Gang Lu, Mahmoud T. Qassrawi, Yu Zhang, Xiang-Zhan Yu:
Feature selection for optimizing traffic classification. Comput. Commun. 35(12): 1457-1471 (2012) - [j2]Haining Yu, Hongli Zhang, Binxing Fang, Xiang-Zhan Yu:
A Large Scale Code Resolution Service Network in the Internet of Things. Sensors 12(11): 15206-15243 (2012) - [c10]Haining Yu, Binxing Fang, Xiang-Zhan Yu, Juan Chen:
Semantic surface representation of physical entity in the WEB of things. CCIS 2012: 1032-1036 - [c9]Juan Chen, Hongli Zhang, Binxing Fang, Xiaojiang Du, Haining Yu, Xiang-Zhan Yu:
An efficient and sustainable self-healing protocol for Unattended Wireless Sensor Networks. GLOBECOM 2012: 5356-5361 - [c8]Gang Lu, Hongli Zhang, Mahmoud T. Qassrawi, Xiangzhan Yu:
Comparison and Analysis of Flow Features at the Packet Level for Traffic Classification. ICCVE 2012: 262-267 - [c7]Hongli Zhang, Panpan Li, Zhigang Zhou, Xiangzhan Yu:
A PSO-Based Hierarchical Resource Scheduling Strategy on Cloud Computing. ISCTCS 2012: 325-332 - 2011
- [c6]Jiantao Shi, Hongli Zhang, Xiang-Zhan Yu, Jianhong Zhai:
Reliable object rating framework for content sharing system. CSS 2011: 27-32 - [c5]Juan Chen, Hongli Zhang, Binxing Fang, Xiaojiang Du, Lihua Yin, Xiang-Zhan Yu:
Towards Efficient Anonymous Communications in Sensor Networks. GLOBECOM 2011: 1-5 - 2010
- [c4]Xiangzhan Yu, Gang Wu, Dailiang Jin, Wei Li:
Research on Performance Estimation Model of Distributed Network Simulation Based on PDNS Conservative Synchronization Mechanism in Complex Environment. CIT 2010: 2576-2580 - [c3]Wei-ling Chang, Binxing Fang, Xiao-chun Yun, Shupeng Wang, Xiang-Zhan Yu:
A Pseudo-Random Number Generator Based on LZSS. DCC 2010: 524 - [i1]Wei-ling Chang, Binxing Fang, Xiao-chun Yun, Shupeng Wang, Xiang-Zhan Yu:
Randomness Testing of Compressed Data. CoRR abs/1001.3485 (2010)
2000 – 2009
- 2007
- [j1]Shupeng Wang, Xiao-chun Yun, Xiang-Zhan Yu:
Survivability and Makespan Driven Scheduling Algorithm for Grid Workflow Applications. J. Inf. Sci. Eng. 23(4): 1299-1313 (2007) - 2006
- [c2]Lihua Yin, Binxing Fang, Xiang-Zhan Yu:
Distributed Group Membership Algorithm in Intrusion-Tolerant System. APWeb Workshops 2006: 511-515 - 2005
- [c1]Xiang-Zhan Yu, Xiao-chun Yun, Shupeng Wang:
Implementation of a Dynamic Failover Technology. PDPTA 2005: 339-345
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-26 01:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint