default search action
Lu-Xing Yang
Person information
- affiliation: Delft University of Technology, Delft, GA, The Netherlands
- affiliation (PhD 2015): Chongqing University, Chongqing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j44]Qingyi Zhu, Xuhang Luo, Yuhang Liu, Chenquan Gan, Yu Wu, Lu-Xing Yang:
Impact of cybersecurity awareness on mobile malware propagation: A dynamical model. Comput. Commun. 220: 1-11 (2024) - [j43]Yang Qin, Xiaofan Yang, Lu-Xing Yang, Kaifan Huang:
Modeling and study of defense outsourcing against advanced persistent threat through impulsive differential game approach. Comput. Secur. 145: 104003 (2024) - [j42]Qi Chu, Yang Qin, Lu-Xing Yang, Xiaofan Yang:
Game-theoretic modeling and analysis of cyberbullying spreading on OSNs. Inf. Sci. 659: 120067 (2024) - [j41]Yang Cao, Ye Zhu, Kai Ming Ting, Flora D. Salim, Hong Xian Li, Luxing Yang, Gang Li:
Detecting Change Intervals with Isolation Distributional Kernel. J. Artif. Intell. Res. 79: 273-306 (2024) - [j40]Mousa Tayseer Jafar, Lu-Xing Yang, Gang Li, Xiaofan Yang:
The evolution of the flip-it game in cybersecurity: Insights from the past to the future. J. King Saud Univ. Comput. Inf. Sci. 36(9): 102195 (2024) - [j39]Jiamin Hu, Xiaofan Yang, Lu-Xing Yang:
A Framework for Detecting False Data Injection Attacks in Large-Scale Wireless Sensor Networks. Sensors 24(5): 1643 (2024) - [j38]Mousa Tayseer Jafar, Lu-Xing Yang, Gang Li, Qingyi Zhu, Chenquan Gan:
Minimizing Malware Propagation in Internet of Things Networks: An Optimal Control Using Feedback Loop Approach. IEEE Trans. Inf. Forensics Secur. 19: 9682-9697 (2024) - [j37]Xiaojuan Cheng, Lu-Xing Yang, Qingyi Zhu, Chenquan Gan, Xiaofan Yang, Gang Li:
Cost-Effective Hybrid Control Strategies for Dynamical Propaganda War Game. IEEE Trans. Inf. Forensics Secur. 19: 9789-9802 (2024) - [j36]Kaifan Huang, Xiaofan Yang, Lu-Xing Yang, Ye Zhu, Gang Li:
Mitigating the Impact of a False Message Through Sequential Release of Clarifying Messages. IEEE Trans. Netw. Sci. Eng. 11(2): 1785-1798 (2024) - [j35]Jiamin Hu, Lu-Xing Yang, Xiaofan Yang, Kaifan Huang, Gang Li, Yong Xiang:
Cost-Effective Company Response Policy for Product Co-Creation in Company-Sponsored Online Community. IEEE Trans. Syst. Man Cybern. Syst. 54(7): 4494-4506 (2024) - [c5]Jongkil Jay Jeong, Lu-Xing Yang, Robin Doss, Praveen Gauravaram, Zoe Wang, Mohamed Abdelrazek, Ashish Nanda, Keerthivasan Viswanathan:
POSTER: Addressing the Privacy by Use Challenges in Verifiable Credential based Digital Wallets. AsiaCCS 2024 - [c4]Yang Cao, Ye Zhu, Kai Ming Ting, Flora D. Salim, Hong Xian Li, Luxing Yang, Gang Li:
Detecting Change Intervalswith Isolation Distributional Kernel (Abstract Reprint). IJCAI 2024: 8476 - [i13]Mousa Tayseer Jafar, Lu-Xing Yang, Gang Li, Xiaofan Yang:
Optimal Control of Malware Propagation in IoT Networks. CoRR abs/2401.11076 (2024) - [i12]Jiamin Hu, Lu-Xing Yang, Xiaofan Yang, Kaifan Huang, Gang Li, Yong Xiang:
Cost-effective company response policy for product co-creation in company-sponsored online community. CoRR abs/2404.09307 (2024) - [i11]Shiva Raj Pokhrel, Luxing Yang, Sutharshan Rajasegarar, Gang Li:
Robust Zero Trust Architecture: Joint Blockchain based Federated learning and Anomaly Detection based Framework. CoRR abs/2406.17172 (2024) - 2023
- [j34]Xiangli Xiao, Xiaotong He, Yushu Zhang, Xuewen Dong, Lu-Xing Yang, Yong Xiang:
Blockchain-based reliable image copyright protection. IET Blockchain 3(4): 222-237 (2023) - [j33]Jiamin Hu, Xiaofan Yang, Luxing Yang:
A Novel Diagnosis Scheme against Collusive False Data Injection Attack. Sensors 23(13): 5943 (2023) - [j32]Hao Sun, Xiaofan Yang, Lu-Xing Yang, Kaifan Huang, Gang Li:
Impulsive Artificial Defense Against Advanced Persistent Threat. IEEE Trans. Inf. Forensics Secur. 18: 3506-3516 (2023) - 2022
- [j31]Kaifan Huang, Lu-Xing Yang, Xiaofan Yang, Yuan Yan Tang:
Effective Multiplatform Advertising Policy. IEEE Trans. Syst. Man Cybern. Syst. 52(7): 4483-4493 (2022) - [c3]Lincan Li, Jichao Bi, Kaixiang Yang, Fengji Luo, Luxing Yang:
MGC-GAN: Multi-Graph Convolutional Generative Adversarial Networks for Accurate Citywide Traffic Flow Prediction. SMC 2022: 2557-2562 - 2021
- [j30]Da-Wen Huang, Lu-Xing Yang, Pengdeng Li, Xiaofan Yang, Yuan Yan Tang:
Developing Cost-Effective Rumor-Refuting Strategy Through Game-Theoretic Approach. IEEE Syst. J. 15(4): 5034-5045 (2021) - [j29]Lu-Xing Yang, Kaifan Huang, Xiaofan Yang, Yushu Zhang, Yong Xiang, Yuan Yan Tang:
Defense Against Advanced Persistent Threat Through Data Backup and Recovery. IEEE Trans. Netw. Sci. Eng. 8(3): 2001-2013 (2021) - [j28]Lu-Xing Yang, Pengdeng Li, Xiaofan Yang, Yong Xiang, Frank Jiang, Wanlei Zhou:
Effective Quarantine and Recovery Scheme Against Advanced Persistent Threat. IEEE Trans. Syst. Man Cybern. Syst. 51(10): 5977-5991 (2021) - 2020
- [j27]Kaifan Huang, Lu-Xing Yang, Xiaofan Yang, Yong Xiang, Yuan Yan Tang:
A Low-Cost Distributed Denial-of-Service Attack Architecture. IEEE Access 8: 42111-42119 (2020) - [j26]Hong Peng, Kaifan Huang, Lu-Xing Yang, Xiaofan Yang, Yuan Yan Tang:
Dynamic Maintenance Strategy for Word-of-Mouth Marketing. IEEE Access 8: 126496-126503 (2020) - [j25]Da-Wen Huang, Lu-Xing Yang, Xiaofan Yang, Xiang Zhong, Yuan Yan Tang:
Evaluating the Performance of a Static Patching Strategy against Computer Viruses. Complex. 2020: 9408942:1-9408942:10 (2020) - [j24]Lu-Xing Yang, Pengdeng Li, Xiaofan Yang, Yong Xiang, Yuan Yan Tang:
Simultaneous Benefit Maximization of Conflicting Opinions: Modeling and Analysis. IEEE Syst. J. 14(2): 1623-1634 (2020) - [j23]Lu-Xing Yang, Pengdeng Li, Xiaofan Yang, Yuan Yan Tang:
A Risk Management Approach to Defending Against the Advanced Persistent Threat. IEEE Trans. Dependable Secur. Comput. 17(6): 1163-1172 (2020) - [j22]Yushu Zhang, Xiangli Xiao, Lu-Xing Yang, Yong Xiang, Sheng Zhong:
Secure and Efficient Outsourcing of PCA-Based Face Recognition. IEEE Trans. Inf. Forensics Secur. 15: 1683-1695 (2020)
2010 – 2019
- 2019
- [j21]Jian Chen, Lu-Xing Yang, Da-Wen Huang, Xiaofan Yang, Yuan Yan Tang:
Dynamic Discount Pricing in Competitive Marketing. IEEE Access 7: 145340-145347 (2019) - [j20]Tianrui Zhang, Pengdeng Li, Lu-Xing Yang, Xiaofan Yang, Yuan Yan Tang, Yingbo Wu:
A discount strategy in word-of-mouth marketing. Commun. Nonlinear Sci. Numer. Simul. 74: 167-179 (2019) - [j19]Mohammad Belayet Hossain, Iynkaran Natgunanathan, Yong Xiang, Lu-Xing Yang, Guangyan Huang:
Enhanced Smart Meter Privacy Protection Using Rechargeable Batteries. IEEE Internet Things J. 6(4): 7079-7092 (2019) - [j18]Yushu Zhang, Yong Xiang, Leo Yu Zhang, Lu-Xing Yang, Jiantao Zhou:
Efficiently and securely outsourcing compressed sensing reconstruction to a cloud. Inf. Sci. 496: 150-160 (2019) - [j17]Yushu Zhang, Hui Huang, Lu-Xing Yang, Yong Xiang, Ming Li:
Serious Challenges and Potential Solutions for the Industrial Internet of Things with Edge Intelligence. IEEE Netw. 33(5): 41-45 (2019) - [j16]Kaifan Huang, Pengdeng Li, Lu-Xing Yang, Xiaofan Yang, Yuan Yan Tang:
Seeking Best-Balanced Patch-Injecting Strategies through Optimal Control Approach. Secur. Commun. Networks 2019: 2315627:1-2315627:12 (2019) - [j15]Ángel Martín del Rey, Lu-Xing Yang, Vasileios Karyotis:
Mathematical Models for Malware Propagation. Secur. Commun. Networks 2019: 6046353:1-6046353:2 (2019) - [j14]Pengdeng Li, Lu-Xing Yang, Xiaofan Yang, Xiang Zhong, Junhao Wen, Qingyu Xiong:
Energy-Efficient Patching Strategy for Wireless Sensor Networks. Sensors 19(2): 262 (2019) - [j13]Lu-Xing Yang, Pengdeng Li, Yushu Zhang, Xiaofan Yang, Yong Xiang, Wanlei Zhou:
Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach. IEEE Trans. Inf. Forensics Secur. 14(7): 1713-1728 (2019) - [c2]Juan Zhao, Lu-Xing Yang, Xiaofan Yang:
Maximum Profit of Viral Marketing: An Optimal Control Approach. ICMAI 2019: 209-214 - 2018
- [j12]Luxing Yang, Pengdeng Li, Xiaofan Yang, Yong Xiang, Wanlei Zhou:
A Differential Game Approach to Patch Injection. IEEE Access 6: 58924-58938 (2018) - [j11]Luxing Yang, Tianrui Zhang, Xiaofan Yang, Yingbo Wu, Yuan Yan Tang:
Effectiveness analysis of a mixed rumor-quelling strategy. J. Frankl. Inst. 355(16): 8079-8105 (2018) - [j10]Luxing Yang, Xiaofan Yang, Yuan Yan Tang:
A Bi-Virus Competing Spreading Model with Generic Infection Rates. IEEE Trans. Netw. Sci. Eng. 5(1): 2-13 (2018) - [c1]Xiang Zhong, Luxing Yang, Xiaofan Yang, Qingyu Xiong, Junhao Wen, Yuan Yan Tang:
Defending Against Advanced Persistent Threat: A Risk Management Perspective. SciSec 2018: 207-215 - 2017
- [j9]Luxing Yang, Pengdeng Li, Xiaofan Yang, Yuan Yan Tang:
Security Evaluation of the Cyber Networks Under Advanced Persistent Threats. IEEE Access 5: 20111-20123 (2017) - [j8]Luxing Yang, Xiaofan Yang:
The effect of network topology on the spread of computer viruses: a modelling study. Int. J. Comput. Math. 94(8): 1591-1608 (2017) - [i10]Tianrui Zhang, Xiaofan Yang, Luxing Yang, Yuan Yan Tang, Yingbo Wu:
A discount strategy in word-of-mouth marketing and its assessment. CoRR abs/1704.06910 (2017) - [i9]Pengdeng Li, Xiaofan Yang, Luxing Yang, Qingyu Xiong, Yingbo Wu, Yuan Yan Tang:
Maximizing the overall profit of a word-of-mouth marketing campaign: A modeling study. CoRR abs/1704.06920 (2017) - [i8]Luxing Yang, Pengdeng Li, Xiaofan Yang, Yuan Yan Tang:
Distributed interaction between computer virus and patch: A modeling study. CoRR abs/1705.04818 (2017) - [i7]Luxing Yang, Pengdeng Li, Xiaofan Yang, Yingbo Wu, Yuan Yan Tang:
Analysis of the effectiveness of the truth-spreading strategy for inhibiting rumors. CoRR abs/1705.06604 (2017) - [i6]Luxing Yang, Tianrui Zhang, Xiaofan Yang, Yingbo Wu, Yuan Yan Tang:
On the effectiveness of the truth-spreading/rumor-blocking strategy for restraining rumors. CoRR abs/1705.10618 (2017) - [i5]Jichao Bi, Luxing Yang, Xiaofan Yang, Yingbo Wu, Yuan Yan Tang:
The damage inflicted by a computer virus: A new estimation method. CoRR abs/1706.02035 (2017) - [i4]Xiaofan Yang, Tianrui Zhang, Luxing Yang, Luosheng Wen, Yuan Yan Tang:
Maximizing the effectiveness of an advanced persistent threat. CoRR abs/1707.02437 (2017) - [i3]Luxing Yang, Pengdeng Li, Xiaofan Yang, Luosheng Wen, Yingbo Wu, Yuan Yan Tang:
Security evaluation of cyber networks under advanced persistent threats. CoRR abs/1707.03611 (2017) - [i2]Cheng Pan, Luxing Yang, Xiaofan Yang, Yingbo Wu, Yuan Yan Tang:
A cost-effective rumor-containing strategy. CoRR abs/1709.02767 (2017) - [i1]Pengdeng Li, Luxing Yang, Xiaofan Yang, Qingyu Xiong, Junhao Wen, Yuan Yan Tang:
Defend against advanced persistent threats: An optimal control approach. CoRR abs/1709.02891 (2017) - 2014
- [j7]Lu-Xing Yang, Xiaofan Yang:
A new epidemic model of computer viruses. Commun. Nonlinear Sci. Numer. Simul. 19(6): 1935-1944 (2014) - 2013
- [j6]Luxing Yang, Xiaofan Yang, Jiming Liu, Qingyi Zhu, Chenquan Gan:
Epidemics of computer viruses: A complex-network approach. Appl. Math. Comput. 219(16): 8705-8717 (2013) - 2012
- [j5]Qingyi Zhu, Xiaofan Yang, Luxing Yang, Chunming Zhang:
Optimal control of computer virus under a delayed model. Appl. Math. Comput. 218(23): 11613-11619 (2012) - [j4]Luxing Yang, Xiaofan Yang:
The spread of computer viruses under the influence of removable storage devices. Appl. Math. Comput. 219(8): 3914-3922 (2012) - [j3]Luxing Yang, Xiaofan Yang, Luosheng Wen, Jiming Liu:
A novel computer virus propagation model and its dynamics. Int. J. Comput. Math. 89(17): 2307-2314 (2012) - [j2]Xiaofan Yang, Lei Wang, Luxing Yang:
Optimal broadcasting for locally twisted cubes. Inf. Process. Lett. 112(4): 129-134 (2012) - [j1]Cui Yu, Xiaofan Yang, Luxing Yang, Jing Zhang:
Routing and wavelength assignment for 3-ary n-cube in array-based optical network. Inf. Process. Lett. 112(6): 252-256 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint