Qiben Yan
Títol
Citada per
Citada per
Any
Significant permission identification for machine-learning-based android malware detection
J Li, L Sun, Q Yan, Z Li, W Srisa-an, H Ye
IEEE Transactions on Industrial Informatics 14 (7), 3216-3225, 2018
1552018
Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks
Q Yan, M Li, T Jiang, W Lou, YT Hou
2012 Proceedings IEEE INFOCOM, 900-908, 2012
1052012
Throughput analysis of cooperative mobile content distribution in vehicular network using symbol level network coding
Q Yan, M Li, Z Yang, W Lou, H Zhai
IEEE Journal on Selected Areas in Communications 30 (2), 484-492, 2012
672012
Proximity-based security techniques for mobile users in wireless networks
L Xiao, Q Yan, W Lou, G Chen, YT Hou
IEEE Transactions on Information Forensics and Security 8 (12), 2089-2100, 2013
452013
Jamming resilient communication using MIMO interference cancellation
Q Yan, H Zeng, T Jiang, M Li, W Lou, YT Hou
IEEE Transactions on Information Forensics and Security 11 (7), 1486-1499, 2016
382016
MIMO-based jamming resilient communication in wireless networks
Q Yan, H Zeng, T Jiang, M Li, W Lou, YT Hou
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 2697-2706, 2014
372014
Machine learning based mobile malware detection using highly imbalanced network traffic
Z Chen, Q Yan, H Han, S Wang, L Peng, L Wang, B Yang
Information Sciences 433, 346-364, 2018
362018
SigPID: significant permission identification for android malware detection
L Sun, Z Li, Q Yan, W Srisa-an, Y Pan
2016 11th international conference on malicious and unwanted software …, 2016
322016
Detecting android malware leveraging text semantics of network flows
S Wang, Q Yan, Z Chen, B Yang, C Zhao, M Conti
IEEE Transactions on Information Forensics and Security 13 (5), 1096-1109, 2017
312017
Identity management using blockchain for cognitive cellular networks
S Raju, S Boddepalli, S Gampa, Q Yan, JS Deogun
2017 IEEE International Conference on Communications (ICC), 1-6, 2017
312017
Trafficav: An effective and explainable detection of mobile malware behavior using network traffic
S Wang, Z Chen, L Zhang, Q Yan, B Yang, L Peng, Z Jia
2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS), 1-6, 2016
282016
A first look at android malware traffic in first few minutes
Z Chen, H Han, Q Yan, B Yang, L Peng, L Zhang, J Li
2015 IEEE Trustcom/BigDataSE/ISPA 1, 206-213, 2015
232015
Peerclean: Unveiling peer-to-peer botnets through dynamic group behavior analysis
Q Yan, Y Zheng, T Jiang, W Lou, YT Hou
2015 IEEE Conference on Computer Communications (INFOCOM), 316-324, 2015
222015
Droidclassifier: Efficient adaptive mining of application-layer header for classifying android malware
Z Li, L Sun, Q Yan, W Srisa-an, Z Chen
International Conference on Security and Privacy in Communication Systems …, 2016
202016
Efficient signature generation for classifying cross-architecture IoT malware
M Alhanahnah, Q Lin, Q Yan, N Zhang, Z Chen
2018 IEEE Conference on Communications and Network Security (CNS), 1-9, 2018
132018
Security analysis of Internet-of-Things: A case study of august smart lock
M Ye, N Jiang, H Yang, Q Yan
2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2017
132017
Non-parametric passive traffic monitoring in cognitive radio networks
Q Yan, M Li, F Chen, T Jiang, W Lou, YT Hou, CT Lu
2013 Proceedings IEEE INFOCOM, 1240-1248, 2013
132013
SpecMonitor: Toward efficient passive traffic monitoring for cognitive radio networks
Q Yan, M Li, F Chen, T Jiang, W Lou, YT Hou, CT Lu
IEEE Transactions on Wireless Communications 13 (10), 5893-5905, 2014
122014
On the limitation of embedding cryptographic signature for primary transmitter authentication
T Jiang, H Zeng, Q Yan, W Lou, YT Hou
IEEE Wireless Communications Letters 1 (4), 324-327, 2012
122012
Very short intermittent ddos attacks in an unsaturated system
H Shan, Q Wang, Q Yan
International Conference on Security and Privacy in Communication Systems, 45-66, 2017
92017
En aquests moments el sistema no pot dur a terme l'operació. Torneu-ho a provar més tard.
Articles 1–20