default search action
Qiao Yan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Longwen Zhang, Qiao Yan:
Detect malicious websites by building a neural network to capture global and local features of websites. Comput. Secur. 137: 103641 (2024) - [j28]Zisheng Xu, Qiao Yan:
Boosting the transferability of adversarial CAPTCHAs. Comput. Secur. 145: 104000 (2024) - [c24]Zirong Xu, Weimin Lai, Qiao Yan:
FedPGT: Prototype-based Federated Global Adversarial Training against Adversarial Attack. CSCWD 2024: 864-869 - [c23]Weimin Lai, Zirong Xu, Qiao Yan:
Clustered Federated Learning Based on Client's Prototypes. CSCWD 2024: 909-914 - [c22]Xinhao Liu, Hao Yang, Qiao Yan:
Generating Black-box Audio Adversarial CAPTCHAs based on Differential Evolution Algorithm. CSCWD 2024: 1509-1514 - 2023
- [j27]Yanping Guo, Qiao Yan:
Android malware adversarial attacks based on feature importance prediction. Int. J. Mach. Learn. Cybern. 14(6): 2087-2097 (2023) - [c21]Yihan Wang, Qiao Yan:
RPF3D: Range-Pillar Feature Deep Fusion 3D Detector for Autonomous Driving. ICONIP (3) 2023: 125-146 - [c20]Qiao Yan, Yihan Wang:
MVFAN: Multi-view Feature Assisted Network for 4D Radar Object Detection. ICONIP (4) 2023: 493-511 - [c19]Jun Zhang, Qiao Yan, Mingxing Wen, Qiyang Lyu, Guohao Peng, Zhenyu Wu, Danwei Wang:
LB-L2L-Calib 2.0: A Novel Online Extrinsic Calibration Method for Multiple Long Baseline 3D LiDARs Using Objects. IROS 2023: 9354-9359 - [i4]Yihan Wang, Qiao Yan:
Redemption from Range-view for Accurate 3D Object Detection. CoRR abs/2307.11482 (2023) - [i3]Qiao Yan, Yihan Wang:
MVFAN: Multi-View Feature Assisted Network for 4D Radar Object Detection. CoRR abs/2310.16389 (2023) - [i2]Zisheng Xu, Qiao Yan, F. Richard Yu, Victor C. M. Leung:
A Survey of Adversarial CAPTCHAs on its History, Classification and Generation. CoRR abs/2311.13233 (2023) - 2022
- [j26]Faan Zheng, Qiao Yan, Victor C. M. Leung, F. Richard Yu, Zhong Ming:
HDP-CNN: Highway deep pyramid convolution neural network combining word-level and character-level representations for phishing website detection. Comput. Secur. 114: 102584 (2022) - [j25]Hailong Yao, Qiao Yan, Xingbing Fu, Zhibin Zhang, Caihui Lan:
ECC-based lightweight authentication and access control scheme for IoT E-healthcare. Soft Comput. 26(9): 4441-4461 (2022) - [j24]Sen Jia, Xiaomei Liu, Meng Xu, Qiao Yan, Jun Zhou, Xiuping Jia, Qingquan Li:
Gradient Feature-Oriented 3-D Domain Adaptation for Hyperspectral Image Classification. IEEE Trans. Geosci. Remote. Sens. 60: 1-17 (2022) - [c18]Qian Zhang, Lishen Chen, Qiao Yan:
Adversarial Attack and Defense for Webshell Detection on Machine Learning Models. CyberC 2022: 33-41 - [c17]Jun Zhang, Qiyang Lyu, Guohao Peng, Zhenyu Wu, Qiao Yan, Danwei Wang:
LB-L2L-Calib: Accurate and Robust Extrinsic Calibration for Multiple 3D LiDARs with Long Baseline and Large Viewpoint Difference. ICRA 2022: 926-932 - 2021
- [j23]Heli Wang, Qiao Yan, Victor C. M. Leung:
The impact of propagation delay to different selfish miners in proof-of-work blockchains. Peer-to-Peer Netw. Appl. 14(5): 2735-2742 (2021) - [c16]Qiao Yan, Yujing Wang, Jiaru Chen:
The Study of the User Preferences of the Request Channel on Taking Over During Level-3 Automated Vehicles' Driving Process. HCI (12) 2021: 267-280 - [c15]Qiao Yan, Weimin Lai, Zhiqiang Wang:
Online Experiments Based on the CTF Model for Information Security MOOC Courses. ICCSE 2021: 783-788 - 2020
- [j22]Qiao Yan, Xiaoqian Liu, Xiaoping Deng, Wei Peng, Guiqing Zhang:
Markov Chain Monte Carlo Based Energy Use Behaviors Prediction of Office Occupants. Algorithms 13(1): 21 (2020) - [j21]Fang Fu, Zhicai Zhang, Fei Richard Yu, Qiao Yan:
An actor-critic reinforcement learning-based resource management in mobile edge computing systems. Int. J. Mach. Learn. Cybern. 11(8): 1875-1889 (2020) - [j20]Qiao Yan, Wei Peng, Guiqing Zhang:
Optimal Energy Consumption Tasks Scheduling Strategy for Multi-Radio WSNs. Sensors 20(3): 881 (2020) - [c14]Yinxue Yuan, Qiao Yan, Guiqing Zhang, Hao Chen, Mingyuan Wang:
Design of Automated Demand Response Management System on User Side for Office Buildings. CSAE 2020: 70:1-70:7
2010 – 2019
- 2019
- [j19]Qiao Yan, Mingde Wang, Wenyao Huang, Xupeng Luo, F. Richard Yu:
Automatically synthesizing DoS attack traces using generative adversarial networks. Int. J. Mach. Learn. Cybern. 10(12): 3387-3396 (2019) - [j18]Zhicai Zhang, Ru Wang, F. Richard Yu, Fang Fu, Qiao Yan:
QoS Aware Transcoding for Live Streaming in Edge-Clouds Aided HetNets: An Enhanced Actor-Critic Approach. IEEE Trans. Veh. Technol. 68(11): 11295-11308 (2019) - [c13]Ho Yin Yuen, Feijie Wu, Wei Cai, Henry C. B. Chan, Qiao Yan, Victor C. M. Leung:
Proof-of-Play: A Novel Consensus Model for Blockchain-based Peer-to-Peer Gaming System. BSCI 2019: 19-28 - [c12]Xupeng Luo, Qiao Yan, Mingde Wang, Wenyao Huang:
Using MTD and SDN-based Honeypots to Defend DDoS Attacks in IoT. ComComAP 2019: 392-395 - [c11]Jinlan Zhang, Qiao Yan, Mingde Wang:
Evasion Attacks Based on Wasserstein Generative Adversarial Network. ComComAP 2019: 454-459 - [c10]Zhicai Zhang, Ru Wang, F. Richard Yu, Fang Fu, Qiao Yan, Qi Jiao:
QoE Aware Transcoding for Live Streaming in SDN-Based Cloud-Aided HetNets: An Actor-Critic Approach. ICC Workshops 2019: 1-6 - [c9]Qiao Yan, Chunyue Zhou, Baitong Zhong, Hui Tian:
An Improved MCB Localization Algorithm Based on Received Signal Strength Indicator. PDCAT 2019: 421-426 - 2018
- [j17]Qiao Yan, Wenyao Huang, Xupeng Luo, Qingxiang Gong, F. Richard Yu:
A Multi-Level DDoS Mitigation Framework for the Industrial Internet of Things. IEEE Commun. Mag. 56(2): 30-36 (2018) - [j16]Laizhong Cui, Wenyuan Huang, Qiao Yan, F. Richard Yu, Zhenkun Wen, Nan Lu:
A novel context-aware recommendation algorithm with two-level SVD in social networks. Future Gener. Comput. Syst. 86: 1459-1470 (2018) - [j15]Laizhong Cui, Huaixiong Hu, Shui Yu, Qiao Yan, Zhong Ming, Zhenkun Wen, Nan Lu:
DDSE: A novel evolutionary algorithm based on degree-descending search strategy for influence maximization in social networks. J. Netw. Comput. Appl. 103: 119-130 (2018) - [c8]Zhicai Zhang, F. Richard Yu, Fang Fu, Qiao Yan, Zhouyang Wang:
Joint Offloading and Resource Allocation in Mobile Edge Computing Systems: An Actor-Critic Approach. GLOBECOM 2018: 1-6 - 2017
- [j14]Lihua Liu, Shangping Wang, Qiao Yan:
A Multi-Authority Key-Policy ABE Scheme from Lattices in Mobile Ad Hoc Networks. Ad Hoc Sens. Wirel. Networks 37(1-4): 117-143 (2017) - [j13]Junwei Zhou, Hui Duan, Kaitai Liang, Qiao Yan, Fei Chen, F. Richard Yu, Jieming Wu, Jianyong Chen:
Securing Outsourced Data in the Multi-Authority Cloud with Fine-Grained Access Control and Efficient Attribute Revocation. Comput. J. 60(8): 1210-1222 (2017) - [j12]Jian-Qiang Li, F. Richard Yu, Genqiang Deng, Chengwen Luo, Zhong Ming, Qiao Yan:
Industrial Internet: A Survey on the Enabling Technologies, Applications, and Challenges. IEEE Commun. Surv. Tutorials 19(3): 1504-1526 (2017) - [c7]Laizhong Cui, Lei-Gen Cheng, Yong Jiang, Qiao Yan:
A Multi-Objective Evolutionary Cloud Leasing Algorithm for Cloud and Peer Assisted VoD Systems. GLOBECOM 2017: 1-7 - 2016
- [j11]Qiao Yan, Qingxiang Gong, Fang'an Deng:
Detection of DDoS Attacks Against Wireless SDN Controllers Based on the Fuzzy Synthetic Evaluation Decision-making Model. Ad Hoc Sens. Wirel. Networks 33(1-4): 275-299 (2016) - [j10]Nan Zhao, F. Richard Yu, Ming Li, Qiao Yan, Victor C. M. Leung:
Physical layer security issues in interference- alignment-based wireless networks. IEEE Commun. Mag. 54(8): 162-168 (2016) - [j9]Qiao Yan, F. Richard Yu, Qingxiang Gong, Jianqiang Li:
Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges. IEEE Commun. Surv. Tutorials 18(1): 602-622 (2016) - [j8]Nan Zhao, F. Richard Yu, Minglu Jin, Qiao Yan, Victor C. M. Leung:
Interference Alignment and Its Applications: A Survey, Research Issues, and Challenges. IEEE Commun. Surv. Tutorials 18(3): 1779-1803 (2016) - [j7]Qiuzhen Lin, Zhiwang Liu, Qiao Yan, Zhihua Du, Carlos A. Coello Coello, Zhengping Liang, Wenjun Wang, Jianyong Chen:
Adaptive composite operator selection and parameter control for multiobjective evolutionary algorithm. Inf. Sci. 339: 332-352 (2016) - [j6]Laizhong Cui, F. Richard Yu, Qiao Yan:
When big data meets software-defined networking: SDN for big data and big data for SDN. IEEE Netw. 30(1): 58-65 (2016) - [j5]Yegui Cai, F. Richard Yu, Chengchao Liang, Bo Sun, Qiao Yan:
Software-Defined Device-to-Device (D2D) Communications in Virtual Wireless Networks With Imperfect Network State Information (NSI). IEEE Trans. Veh. Technol. 65(9): 7349-7360 (2016) - [j4]Jianqiang Li, Genqiang Deng, Chengwen Luo, Qiuzhen Lin, Qiao Yan, Zhong Ming:
A Hybrid Path Planning Method in Unmanned Air/Ground Vehicle (UAV/UGV) Cooperative Systems. IEEE Trans. Veh. Technol. 65(12): 9585-9596 (2016) - [c6]Zhexiong Wei, F. Richard Yu, Helen Tang, Chengehao Liang, Qiao Yan:
Securing cognitive radio vehicular Ad hoc networks with trusted lightweight cloud computing. CNS 2016: 450-456 - [c5]Qiao Yan, Wenyao Huang:
A DDoS Detection and Mitigation System Framework Based on Spark and SDN. SmartCom 2016: 350-358 - [i1]Zhexiong Wei, F. Richard Yu, Helen Tang, Chengchao Liang, Qiao Yan:
Security Schemes in Vehicular Ad hoc Networks with Cognitive Radios. CoRR abs/1611.06905 (2016) - 2015
- [j3]Qiao Yan, F. Richard Yu:
Distributed denial of service attacks in software-defined networking with cloud computing. IEEE Commun. Mag. 53(4): 52-59 (2015) - [c4]Kevin E. Dow, Qiao Yan, Ulf H. Richter, Jie Yu:
Toward an Understanding of the Impact of Organizational Climate and Organizational Justice on the Implementation of Enterprise Resource Planning Systems. PACIS 2015: 88 - 2014
- [c3]Qiao Yan, Nan Lu, Tu-Wen Ning, Xi-Yan Yao, Bao-Guang Li:
IP Traceback Algorithm Based on Deterministic Linear Network Coding. CIS 2014: 397-401 - 2011
- [c2]Shun-an Wu, Qiao Yan, Xuesong Qiu, Yanjie Ren:
A probe prediction approach to overlay network monitoring. CNSM 2011: 1-5
2000 – 2009
- 2008
- [j2]Zhi-Hua Hu, Yong-Sheng Ding, Wen-Bin Zhang, Qiao Yan:
An interactive co-evolutionary CAD system for garment pattern design. Comput. Aided Des. 40(12): 1094-1104 (2008) - [j1]Rongping Mu, Zhongbao Ren, Sida Yuan, Qiao Yan:
'Technology foresight towards 2020 in China': the practice and its impacts. Technol. Anal. Strateg. Manag. 20(3): 287-307 (2008) - 2006
- [c1]Qiao Yan, Jianping Yu:
AINIDS: an immune-based network intrusion detection system. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006: 62410U
Coauthor Index
aka: Fei Richard Yu
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 19:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint