default search action
Zhiyuan Tan 0001
Person information
- affiliation: Edinburgh Napier University, School of Computing, UK
- affiliation (PhD 2014): University of Technology Sydney, Australia
Other persons with the same name
- Zhiyuan Tan 0002 — University of Posts and Telecommunications, Key Laboratory of Universal Wireless Communications, Beijing, China
- Zhiyuan Tan 0003 — Tianjin University, College of Intelligence and Computing, China
- Zhiyuan Tan 0004 — Huawei Technologies Co., Ltd., Shanghai, China
- Zhiyuan Tan 0005 — Nankai University, Tianjin, China
- Zhiyuan Tan 0006 — Hefei Vocational College of Science and Technology, Department of Information Engineering, China
- Zhiyuan Tan 0007 — Shanghai Jiao Tong University, Shanghai Advanced Institute of Finance, China
- Zhiyuan Tan 0008 — Chinese Academy of Sciences, Institute of Software, Intelligent Software Research Center, Beijing, China
- Zhiyuan Tan 0009 — University of Electronic Science and Technology of China, Chengdu, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j64]Siva Sai, Uday Mittal, Vinay Chamola, Kaizhu Huang, Indro Spinelli, Simone Scardapane, Zhiyuan Tan, Amir Hussain:
Machine Un-learning: An Overview of Techniques, Applications, and Future Directions. Cogn. Comput. 16(2): 482-506 (2024) - [j63]Fangwei Wang, Xipeng Shi, Fang Yang, Ruixin Song, Qingru Li, Zhiyuan Tan, Changguang Wang:
MalSort: Lightweight and efficient image-based malware classification using masked self-supervised framework with Swin Transformer. J. Inf. Secur. Appl. 83: 103784 (2024) - [j62]Mingqi Fang, Lingyun Yu, Hongtao Xie, Qingfeng Tan, Zhiyuan Tan, Amir Hussain, Zezheng Wang, Jiahong Li, Zhihong Tian:
STIDNet: Identity-Aware Face Forgery Detection With Spatiotemporal Knowledge Distillation. IEEE Trans. Comput. Soc. Syst. 11(4): 5354-5366 (2024) - [j61]Fangwei Wang, Meiyun Xie, Zhiyuan Tan, Qingru Li, Changguang Wang:
Preserving Differential Privacy in Deep Learning Based on Feature Relevance Region Segmentation. IEEE Trans. Emerg. Top. Comput. 12(1): 307-315 (2024) - [j60]Liang Zhao, Hui Qian, Ammar Hawbani, Ahmed Yassin Al-Dubai, Zhiyuan Tan, Keping Yu, Albert Y. Zomaya:
Overtaking Feasibility Prediction for Mixed Connected and Connectionless Vehicles. IEEE Trans. Intell. Transp. Syst. 25(10): 15065-15080 (2024) - [c35]Michael Andrew Orme, Yanchao Yu, Zhiyuan Tan:
How Much Do Robots Understand Rudeness? Challenges in Human-Robot Interaction. LREC/COLING 2024: 8247-8257 - [e1]Zhiyuan Tan, Yulei Wu, Min Xu:
Big Data Technologies and Applications - 13th EAI International Conference, BDTA 2023, Edinburgh, UK, August 23-24, 2023, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 555, Springer 2024, ISBN 978-3-031-52264-2 [contents] - 2023
- [j59]Peter Aaby, Mario Valerio Giuffrida, William J. Buchanan, Zhiyuan Tan:
An omnidirectional approach to touch-based continuous authentication. Comput. Secur. 128: 103146 (2023) - [j58]Liang Zhao, Zijia Zhao, Enchao Zhang, Ammar Hawbani, Ahmed Yassin Al-Dubai, Zhiyuan Tan, Amir Hussain:
A Digital Twin-Assisted Intelligent Partial Offloading Approach for Vehicular Edge Computing. IEEE J. Sel. Areas Commun. 41(11): 3386-3400 (2023) - [j57]Cheng Qiao, Jing Qiu, Zhiyuan Tan, Geyong Min, Albert Y. Zomaya, Zhihong Tian:
Evaluation Mechanism for Decentralized Collaborative Pattern Learning in Heterogeneous Vehicular Networks. IEEE Trans. Intell. Transp. Syst. 24(11): 13123-13132 (2023) - [j56]Yinghai Zhou, Yitong Ren, Ming Yi, Yanjun Xiao, Zhiyuan Tan, Nour Moustafa, Zhihong Tian:
CDTier: A Chinese Dataset of Threat Intelligence Entity Relationships. IEEE Trans. Sustain. Comput. 8(4): 627-638 (2023) - [c34]Ahsen Tahir, Zhiyuan Tan, Kehinde O. Babaagba:
Can Federated Models Be Rectified Through Learning Negative Gradients? BDTA 2023: 18-32 - [c33]Peter Aaby, Mario Valerio Giuffrida, William J. Buchanan, Zhiyuan Tan:
TouchEnc: a Novel Behavioural Encoding Technique to Enable Computer Vision for Continuous Smartphone User Authentication. TrustCom 2023: 788-795 - [c32]Fangwei Wang, Ruixin Song, Zhiyuan Tan, Qingru Li, Changguang Wang, Yong Yang:
Self-attention is What You Need to Fool a Speaker Recognition System. TrustCom 2023: 929-936 - [c31]Aidan Spalding, Zhiyuan Tan, Kehinde O. Babaagba:
Challenges and Considerations in Data Recovery from Solid State Media: A Comparative Analysis with Traditional Devices. TrustCom 2023: 1751-1756 - [c30]Qingru Li, Yahong Wang, Fangwei Wang, Zhiyuan Tan, Changguang Wang:
A Probability Mapping-Based Privacy Preservation Method for Social Networks. UbiSec 2023: 289-303 - [i5]Peter Aaby, Mario Valerio Giuffrida, William J. Buchanan, Zhiyuan Tan:
An Omnidirectional Approach to Touch-based Continuous Authentication. CoRR abs/2302.08498 (2023) - 2022
- [j55]Na Lin, Luwei Fu, Liang Zhao, Ammar Hawbani, Zhiyuan Tan, Ahmed Al-Dubai, Geyong Min:
A novel nomad migration-inspired algorithm for global optimization. Comput. Electr. Eng. 100: 107862 (2022) - [j54]Honghao Gao, Zhiyuan Tan:
Special Issue on Adversarial AI to IoT Security and Privacy Protection: Attacks and Defenses. Comput. J. 65(11): 2847-2848 (2022) - [j53]Fangwei Wang, Shaojie Yang, Changguang Wang, Qingru Li, Kehinde O. Babaagba, Zhiyuan Tan:
Toward machine intelligence that learns to fingerprint polymorphic worms in IoT. Int. J. Intell. Syst. 37(10): 7058-7078 (2022) - [j52]Jian Hou, Fangai Liu, Hui Lu, Zhiyuan Tan, Xuqiang Zhuang, Zhihong Tian:
A novel flow-vector generation approach for malicious traffic detection. J. Parallel Distributed Comput. 169: 72-86 (2022) - [j51]Lingling Lv, Zongyu Wu, Jinhua Zhang, Lei Zhang, Zhiyuan Tan, Zhihong Tian:
A VMD and LSTM Based Hybrid Model of Load Forecasting for Power Grid Security. IEEE Trans. Ind. Informatics 18(9): 6474-6482 (2022) - [j50]Yulei Wu, Yi Pan, Payam M. Barnaghi, Zhiyuan Tan, Jingguo Ge, Hao Wang:
Editorial: Big data technologies and applications. Wirel. Networks 28(3): 1163-1167 (2022) - [j49]Sepideh Foroozan Yazdani, Zhiyuan Tan, Mohsen Kakavand, Aida Mustapha:
NgramPOS: a bigram-based linguistic and statistical feature process model for unstructured text classification. Wirel. Networks 28(3): 1251-1261 (2022) - [c29]Leigh Turnbull, Zhiyuan Tan, Kehinde O. Babaagba:
A Generative Neural Network for Enhancing Android Metamorphic Malware Detection based on Behaviour Profiling. DSC 2022: 1-9 - [c28]Ross A. J. McLaren, Kehinde O. Babaagba, Zhiyuan Tan:
A Generative Adversarial Network Based Approach to Malware Generation Based on Behavioural Graphs. LOD (2) 2022: 32-46 - 2021
- [j48]Andres Robles-Durazno, Naghmeh Moradpoor, James McWhinnie, Gordon Russell, Zhiyuan Tan:
Newly engineered energy-based features for supervised anomaly detection in a physical model of a water supply system. Ad Hoc Networks 120: 102590 (2021) - [j47]Liangfu Lu, Xiaohan Ren, Chenwei Cui, Zhiyuan Tan, Yulei Wu, Zhizhen Qin:
A novel tensor-information bottleneck method for multi-input single-output applications. Comput. Networks 193: 108088 (2021) - [j46]Craig Thomson, Isam Wadhaj, Zhiyuan Tan, Ahmed Al-Dubai:
Towards an energy balancing solution for wireless sensor network with mobile sink node. Comput. Commun. 170: 50-64 (2021) - [j45]Chenwei Cui, Liangfu Lu, Zhiyuan Tan, Amir Hussain:
Conceptual text region network: Cognition-inspired accurate scene text detection. Neurocomputing 464: 252-264 (2021) - [j44]Lingjun Zhao, Huakun Huang, Chunhua Su, Shuxue Ding, Huawei Huang, Zhiyuan Tan, Zhenni Li:
Block-Sparse Coding-Based Machine Learning Approach for Dependable Device-Free Localization in IoT Environment. IEEE Internet Things J. 8(5): 3211-3223 (2021) - [j43]Mian Ahmad Jan, Kuo-Hui Yeh, Zhiyuan Tan, Yulei Wu:
Blockchain for edge-enabled smart cities applications. J. Inf. Secur. Appl. 61: 102937 (2021) - [j42]Xiaoxian Yang, Zhiyuan Tan, Zhiling Luo:
Deep Learning in Mobile Computing: Architecture, Applications, and Future Challenges. Mob. Inf. Syst. 2021: 9874724:1-9874724:3 (2021) - [j41]Chaochao Luo, Zhiyuan Tan, Geyong Min, Jie Gan, Wei Shi, Zhihong Tian:
A Novel Web Attack Detection System for Internet of Things via Ensemble Classification. IEEE Trans. Ind. Informatics 17(8): 5810-5818 (2021) - [j40]Liang Zhao, Kaiqi Yang, Zhiyuan Tan, Houbing Song, Ahmed Al-Dubai, Albert Y. Zomaya, Xianwei Li:
Vehicular Computation Offloading for Industrial Mobile Edge Computing. IEEE Trans. Ind. Informatics 17(11): 7871-7881 (2021) - [j39]Liang Zhao, Kaiqi Yang, Zhiyuan Tan, Xianwei Li, Suraj Sharma, Zhi Liu:
A Novel Cost Optimization Strategy for SDN-Enabled UAV-Assisted Vehicular Computation Offloading. IEEE Trans. Intell. Transp. Syst. 22(6): 3664-3674 (2021) - [j38]Craig Thomson, Isam Wadhaj, Zhiyuan Tan, Ahmed Al-Dubai:
A mobility aware duty cycling and preambling solution for wireless sensor network with mobile sink node. Wirel. Networks 27(5): 3423-3439 (2021) - [i4]Chenwei Cui, Liangfu Lu, Zhiyuan Tan, Amir Hussain:
Conceptual Text Region Network: Cognition-Inspired Accurate Scene Text Detection. CoRR abs/2103.09179 (2021) - 2020
- [j37]Rui Zhu, Tiantian Yu, Zhiyuan Tan, Wei Du, Liang Zhao, Jiajia Li, Xiufeng Xia:
PTAOD: A Novel Framework for Supporting Approximate Outlier Detection Over Streaming Data for Edge Computing. IEEE Access 8: 1475-1485 (2020) - [j36]Shuang Lai, Xiaochen Fan, Qianwen Ye, Zhiyuan Tan, Yuanfang Zhang, Xiangjian He, Priyadarsi Nanda:
FairEdge: A Fairness-Oriented Task Offloading Scheme for Iot Applications in Mobile Cloudlet Networks. IEEE Access 8: 13516-13526 (2020) - [j35]Shuo Zhang, Yaping Liu, Shudong Li, Zhiyuan Tan, Xiaomeng Zhao, Junjie Zhou:
FIMPA: A Fixed Identity Mapping Prediction Algorithm in Edge Computing Environment. IEEE Access 8: 17356-17365 (2020) - [j34]Rui Zhu, Xiaoling Ji, Danyang Yu, Zhiyuan Tan, Liang Zhao, Jiajia Li, Xiufeng Xia:
KNN-Based Approximate Outlier Detection Algorithm Over IoT Streaming Data. IEEE Access 8: 42749-42759 (2020) - [j33]Shancang Li, Kim-Kwang Raymond Choo, Zhiyuan Tan, Xiangjian He, Jiankun Hu, Tao Qin:
IEEE Access Special Section Editorial: Security and Trusted Computing for Industrial Internet of Things: Research Challenges and Opportunities. IEEE Access 8: 145033-145036 (2020) - [j32]Tao Han, Syed Rooh Ullah Jan, Zhiyuan Tan, Muhammad Usman, Mian Ahmad Jan, Rahim Khan, Yongzhao Xu:
A comprehensive survey of security threats and their mitigation techniques for next-generation SDN controllers. Concurr. Comput. Pract. Exp. 32(16) (2020) - [j31]Liangfu Lu, Xiaoxu Ren, Kuo-Hui Yeh, Zhiyuan Tan, Jocelyn Chanussot:
Exploring coupled images fusion based on joint tensor decomposition. Hum. centric Comput. Inf. Sci. 10: 10 (2020) - [j30]Dongliang Xu, Zhihong Tian, Rufeng Lai, Xiangtao Kong, Zhiyuan Tan, Wei Shi:
Deep learning based emotion analysis of microblog texts. Inf. Fusion 64: 1-11 (2020) - [j29]Liangfu Lu, Wenbo Wang, Zhiyuan Tan:
Double-Arc Parallel Coordinates and its Axes re-Ordering Methods. Mob. Networks Appl. 25(4): 1376-1391 (2020) - [j28]Kun Tang, Wenjuan Tang, Entao Luo, Zhiyuan Tan, Weizhi Meng, Lianyong Qi:
Secure Information Transmissions in Wireless-Powered Cognitive Radio Networks for Internet of Medical Things. Secur. Commun. Networks 2020: 7542726:1-7542726:10 (2020) - [j27]Thawatchai Chomsiri, Xiangjian He, Priyadarsi Nanda, Zhiyuan Tan:
Hybrid Tree-Rule Firewall for High Speed Data Transmission. IEEE Trans. Cloud Comput. 8(4): 1237-1249 (2020) - [j26]Shih-Chao Cha, Hao Wang, Zhiyuan Tan, Yuh-Jzer Joung, Yen-Chung Tseng, Kuo-Hui Yeh:
On Privacy Aware Carriers for Value-Possessed e-Invoices Considering Intelligence Mining. IEEE Trans. Emerg. Top. Comput. Intell. 4(5): 641-652 (2020) - [j25]Suraj Sharma, Xuyun Zhang, Hesham El-Sayed, Zhiyuan Tan:
Introduction to the Special Issue on Privacy and Security in Evolving Internet of Multimedia Things. ACM Trans. Multim. Comput. Commun. Appl. 16(3s): 93:1-93:3 (2020) - [c27]Kehinde O. Babaagba, Zhiyuan Tan, Emma Hart:
Improving Classification of Metamorphic Malware by Augmenting Training Data with a Diverse Set of Evolved Mutant Samples. CEC 2020: 1-7 - [c26]Peter Aaby, Mario Valerio Giuffrida, William J. Buchanan, Zhiyuan Tan:
Towards Continuous User Authentication Using Personalised Touch-Based Behaviour. DASC/PiCom/CBDCom/CyberSciTech 2020: 41-48 - [c25]Kehinde O. Babaagba, Zhiyuan Tan, Emma Hart:
Automatic Generation of Adversarial Metamorphic Malware Using MAP-Elites. EvoApplications 2020: 117-132 - [c24]Craig Thomson, Isam Wadhaj, Ahmed Al-Dubai, Zhiyuan Tan:
A New Mobility Aware Duty Cycling and Dynamic Preambling Algorithm for Wireless Sensor Network. WF-IoT 2020: 1-6
2010 – 2019
- 2019
- [j24]Sabeen Javaid, Hammad Afzal, Muhammad Babar, Fahim Arif, Zhiyuan Tan, Mian Ahmad Jan:
ARCA-IoT: An Attack-Resilient Cloud-Assisted IoT System. IEEE Access 7: 19616-19630 (2019) - [j23]Wei Yao, Abid Yahya, Fazlullah Khan, Zhiyuan Tan, Ateeq Ur Rehman, Joseph Monamati Chuma, Mian Ahmad Jan, Muhammad Babar:
A Secured and Efficient Communication Scheme for Decentralized Cognitive Radio-Based Internet of Vehicles. IEEE Access 7: 160889-160900 (2019) - [j22]Mohsen Kakavand, Aida Mustapha, Zhiyuan Tan, Sepideh Foroozan Yazdani, Lingges Arulsamy:
O-ADPI: Online Adaptive Deep-Packet Inspector Using Mahalanobis Distance Map for Web Service Attacks Classification. IEEE Access 7: 167141-167156 (2019) - [j21]Peter McLaren, Gordon Russell, William J. Buchanan, Zhiyuan Tan:
Decrypting live SSH traffic in virtual environments. Digit. Investig. 29: 109-117 (2019) - [j20]Shaobo Zhang, Xiong Li, Zhiyuan Tan, Tao Peng, Guojun Wang:
A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services. Future Gener. Comput. Syst. 94: 40-50 (2019) - [j19]Muhammad Babar, Fahim Arif, Mian Ahmad Jan, Zhiyuan Tan, Fazlullah Khan:
Urban data management system: Towards Big Data analytics for Internet of Things based smart urban environment using customized Hadoop. Future Gener. Comput. Syst. 96: 398-409 (2019) - [j18]Rahim Khan, Muhammad Zakarya, Zhiyuan Tan, Muhammad Usman, Mian Ahmad Jan, Mukhtaj Khan:
PFARS: Enhancing throughput and lifetime of heterogeneous WSNs through power-aware fusion, aggregation, and routing scheme. Int. J. Commun. Syst. 32(18) (2019) - [j17]Peter McLaren, William J. Buchanan, Gordon Russell, Zhiyuan Tan:
Deriving ChaCha20 key streams from targeted memory analysis. J. Inf. Secur. Appl. 48 (2019) - [j16]Wenjuan Li, Weizhi Meng, Zhiyuan Tan, Yang Xiang:
Design of multi-view based email classification for IoT systems via semi-supervised learning. J. Netw. Comput. Appl. 128: 56-63 (2019) - [j15]Mian Ahmad Jan, Wenjing Zhang, Muhammad Usman, Zhiyuan Tan, Fazlullah Khan, Entao Luo:
SmartEdge: An end-to-end encryption framework for an edge-enabled smart city application. J. Netw. Comput. Appl. 137: 1-10 (2019) - [j14]Cong Lin, Wei Lu, Xinchao Huang, Ke Liu, Wei Sun, Hanhui Lin, Zhiyuan Tan:
Copy-move forgery detection using combined features and transitive matching. Multim. Tools Appl. 78(21): 30081-30096 (2019) - [j13]Fazlullah Khan, Ateeq Ur Rehman, Abid Yahya, Mian Ahmad Jan, Joseph Monamati Chuma, Zhiyuan Tan, Khalid Hussain:
A Quality of Service-Aware Secured Communication Scheme for Internet of Things-Based Networks. Sensors 19(19): 4321 (2019) - [j12]Craig Thomson, Isam Wadhaj, Zhiyuan Tan, Ahmed Al-Dubai:
Mobility Aware Duty Cycling Algorithm (MADCAL) A Dynamic Communication Threshold for Mobile Sink in Wireless Sensor Network. Sensors 19(22): 4930 (2019) - [c23]Kehinde O. Babaagba, Zhiyuan Tan, Emma Hart:
Nowhere Metamorphic Malware Can Hide - A Biological Evolution Inspired Detection Scheme. DependSys 2019: 369-382 - [c22]Na Lin, Feng Gao, Liang Zhao, Ahmed Al-Dubai, Zhiyuan Tan:
A 3D Smooth Random Walk Mobility Model for FANETs. HPCC/SmartCity/DSS 2019: 460-467 - [c21]Liang Zhao, Yufei Liu, Ahmed Al-Dubai, Zhiyuan Tan, Geyong Min, Lexi Xu:
A Learning-Based Vehicle-Trajectory Generation Method for Vehicular Networking. HPCC/SmartCity/DSS 2019: 519-526 - [c20]Wei Ou, Mingwei Deng, Entao Luo, Wei Shi, Zhiyuan Tan, Md. Zakirul Alam Bhuiyan:
Multi-Miner's Cooperative Evolution Method of Bitcoin Pool Based on Temporal Difference Leaning Method. iThings/GreenCom/CPSCom/SmartData 2019: 687-693 - [c19]Wei Ou, Entao Luo, Zhiyuan Tan, Lihong Xiang, Qin Yi, Chen Tian:
A Multi-attributes-Based Trust Model of Internet of Vehicle. NSS 2019: 706-713 - [c18]Craig Thomson, Isam Wadhaj, Zhiyuan Tan, Ahmed Al-Dubai:
Mobility Aware Duty Cycling Algorithm (MADCAL) in Wireless Sensor Network with Mobile Sink Node. SmartIoT 2019: 189-196 - [i3]Peter McLaren, Gordon Russell, William J. Buchanan, Zhiyuan Tan:
Decrypting live SSH traffic in virtual environments. CoRR abs/1907.10835 (2019) - [i2]Peter McLaren, William J. Buchanan, Gordon Russell, Zhiyuan Tan:
Deriving ChaCha20 Key Streams From Targeted Memory Analysis. CoRR abs/1907.11941 (2019) - [i1]Peter McLaren, William J. Buchanan, Gordon Russell, Zhiyuan Tan:
Discovering Encrypted Bot and Ransomware Payloads Through Memory Inspection Without A Priori Knowledge. CoRR abs/1907.11954 (2019) - 2018
- [j11]Rakesh Kumar Lenka, Amiya Kumar Rath, Zhiyuan Tan, Suraj Sharma, Deepak Puthal, N. V. R. Simha, Mukesh Prasad, Rohit Raja, Shankar Sharan Tripathi:
Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors. IEEE Access 6: 30162-30173 (2018) - [j10]Muhammad Babar, Fazlullah Khan, Mian Muhammad Waseem Iqbal, Abid Yahya, Fahim Arif, Zhiyuan Tan, Joseph Monamati Chuma:
A Secured Data Management Scheme for Smart Societies in Industrial Internet of Things Environment. IEEE Access 6: 43088-43099 (2018) - [j9]Mian Ahmad Jan, Zhiyuan Tan, Xiangjian He, Wei Ni:
Moving Towards Highly Reliable and Effective Sensor Networks. Ad Hoc Sens. Wirel. Networks 40(3-4): 163-168 (2018) - [j8]Fazlullah Khan, Ateeq Ur Rehman, Muhammad Usman, Zhiyuan Tan, Deepak Puthal:
Performance of Cognitive Radio Sensor Networks Using Hybrid Automatic Repeat ReQuest: Stop-and-Wait. Mob. Networks Appl. 23(3): 479-488 (2018) - [c17]Alekha Kumar Mishra, Asis Kumar Tripathy, Mohammad S. Obaidat, Zhiyuan Tan, Mukesh Prasad, Balqies Sadoun, Deepak Puthal:
A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors. ICETE (1) 2018: 255-264 - [c16]Haohui Lv, Guandi Chen, Mingbin Deng, Zhiyuan Tan, Wen Hu:
Power Consumption Interval Prediction Based on Quantile Regression Neural Network and Kernel Density Estimation. ISCID (2) 2018: 295-300 - 2017
- [c15]Upasana T. Nagar, Priyadarsi Nanda, Xiangjian He, Zhiyuan Thomas Tan:
A framework for data security in cloud using collaborative intrusion detection scheme. SIN 2017: 188-193 - [c14]Qingru Li, Zhiyuan Tan, Aruna Jamdagni, Priyadarsi Nanda, Xiangjian He, Wei Han:
An Intrusion Detection System Based on Polynomial Feature Correlation Analysis. TrustCom/BigDataSE/ICESS 2017: 978-983 - 2016
- [j7]Mohammed A. Ambusaidi, Xiangjian He, Priyadarsi Nanda, Zhiyuan Tan:
Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm. IEEE Trans. Computers 65(10): 2986-2998 (2016) - [c13]Thawatchai Chomsiri, Xiangjian He, Priyadarsi Nanda, Zhiyuan Tan:
An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay. Trustcom/BigDataSE/ISPA 2016: 178-184 - 2015
- [j6]Zhiyuan Tan, Aruna Jamdagni, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu, Jiankun Hu:
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques. IEEE Trans. Computers 64(9): 2519-2533 (2015) - 2014
- [j5]Zhiyuan Tan, Upasana T. Nagar, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu, Song Wang, Jiankun Hu:
Enhancing Big Data Security with Collaborative Intrusion Detection. IEEE Cloud Comput. 1(3): 27-33 (2014) - [j4]Xiangjian He, Thawatchai Chomsiri, Priyadarsi Nanda, Zhiyuan Tan:
Improving cloud network security using the Tree-Rule firewall. Future Gener. Comput. Syst. 30: 116-126 (2014) - [j3]Mohammed A. Ambusaidi, Zhiyuan Tan, Xiangjian He, Priyadarsi Nanda, Liang Fu Lu, Aruna Jamdagni:
Intrusion detection method based on nonlinear correlation measure. Int. J. Internet Protoc. Technol. 8(2/3): 77-86 (2014) - [j2]Zhiyuan Tan, Aruna Jamdagni, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu:
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis. IEEE Trans. Parallel Distributed Syst. 25(2): 447-456 (2014) - [c12]Mohammed A. Ambusaidi, Xiangjian He, Zhiyuan Tan, Priyadarsi Nanda, Liang Fu Lu, Upasana T. Nagar:
A Novel Feature Selection Approach for Intrusion Detection Data Classification. TrustCom 2014: 82-89 - [c11]Thawatchai Chomsiri, Xiangjian He, Priyadarsi Nanda, Zhiyuan Tan:
A Stateful Mechanism for the Tree-Rule Firewall. TrustCom 2014: 122-129 - [c10]Wenjuan Li, Weizhi Meng, Zhiyuan Tan, Yang Xiang:
Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning. TrustCom 2014: 174-181 - [c9]Mian Ahmad Jan, Priyadarsi Nanda, Xiangjian He, Zhiyuan Tan, Ren Ping Liu:
A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment. TrustCom 2014: 205-211 - 2013
- [b1]Zhiyuan Tan:
Detection of denial-of-service attacks based on computer vision techniques. University of Technology Sydney, Australia, 2013 - [j1]Aruna Jamdagni, Zhiyuan Tan, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu:
RePIDS: A multi tier Real-time Payload-based Intrusion Detection System. Comput. Networks 57(3): 811-824 (2013) - 2012
- [c8]Zhiyuan Tan, Aruna Jamdagni, Priyadarsi Nanda, Xiangjian He, Ren Ping Liu:
Evaluation on multivariate correlation analysis based denial-of-service attack detection system. SECURIT 2012: 160-164 - [c7]Zhiyuan Tan, Aruna Jamdagni, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu:
Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection. TrustCom 2012: 33-40 - 2011
- [c6]Zhiyuan Tan, Aruna Jamdagni, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu:
Multivariate Correlation Analysis Technique Based on Euclidean Distance Map for Network Traffic Characterization. ICICS 2011: 388-398 - [c5]Zhiyuan Tan, Aruna Jamdagni, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu:
Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis. ICONIP (3) 2011: 756-765 - 2010
- [c4]Zhiyuan Tan, Aruna Jamdagni, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu, Wenjing Jia, Wei-Chang Yeh:
A Two-Tier System for Web Attack Detection Using Linear Discriminant Method. ICICS 2010: 459-471 - [c3]Aruna Jamdagni, Zhiyuan Tan, Priyadarsi Nanda, Xiangjian He, Ren Ping Liu:
Intrusion detection using GSAD model for HTTP traffic on web services. IWCMC 2010: 1193-1197
2000 – 2009
- 2009
- [c2]Aruna Jamdagni, Zhiyuan Tan, Priyadarsi Nanda, Xiangjian He, Ren Liu:
Intrusion Detection Using Geometrical Structure. FCST 2009: 327-333 - [c1]Zhiyuan Tan, Xiangjian He, Priyadarsi Nanda:
Web Service Locating Unit in RFID-Centric Anti-counterfeit System. ISPA 2009: 389-393
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-13 02:06 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint