Следене
Yu-an Tan
Yu-an Tan
Потвърден имейл адрес: bit.edu.cn
Заглавие
Позовавания
Позовавания
Година
Search pattern leakage in searchable encryption: Attacks and new construction
C Liu, L Zhu, M Wang, Y Tan
Information Sciences 265, 176-188, 2014
2992014
The security of machine learning in an adversarial setting: A survey
X Wang, J Li, X Kuang, Y Tan, J Li
Journal of Parallel and Distributed Computing 130, 12-23, 2019
2362019
A covert channel over volte via adjusting silence periods
X Zhang, YA Tan, C Liang, Y Li, J Li
IEEE Access 6, 9292-9302, 2018
1192018
Deep learning feature exploration for android malware detection
N Zhang, Y Tan, C Yang, Y Li
Applied Soft Computing 102, 107069, 2021
942021
Towards a physical-world adversarial patch for blinding object detection models
Y Wang, H Lv, X Kuang, G Zhao, Y Tan, Q Zhang, J Hu
Information Sciences 556, 459-471, 2021
772021
A dynamic and cross-domain authentication asymmetric group key agreement in telemedicine application
Z Qikun, G Yong, Z Quanxin, W Ruifang, T Yu-An
IEEE Access 6, 24064-24074, 2018
722018
A root privilege management scheme with revocable authorization for Android devices
Y Tan, Y Xue, C Liang, J Zheng, Q Zhang, J Zheng, Y Li
Journal of Network and Computer Applications 107, 69-82, 2018
712018
An adversarial attack on DNN-based black-box object detectors
Y Wang, Y Tan, W Zhang, Y Zhao, X Kuang
Journal of Network and Computer Applications 161, 102634, 2020
652020
Building covert timing channels by packet rearrangement over mobile networks
X Zhang, C Liang, Q Zhang, Y Li, J Zheng, Y Tan
Information Sciences 445, 66-78, 2018
652018
Hybrid sequence‐based Android malware detection using natural language processing
N Zhang, J Xue, Y Ma, R Zhang, T Liang, Y Tan
International Journal of Intelligent Systems 36 (10), 5770-5784, 2021
642021
DPPDL: a dynamic partial-parallel data layout for green video surveillance storage
Z Sun, Q Zhang, Y Li, Y Tan
IEEE Transactions on Circuits and Systems for Video Technology 28 (1), 193-205, 2016
592016
Detecting adversarial examples via prediction difference for deep neural networks
F Guo, Q Zhao, X Li, X Kuang, J Zhang, Y Han, Y Tan
Information Sciences 501, 182-192, 2019
572019
A feature-vector generative adversarial network for evading PDF malware classifiers
Y Li, Y Wang, Y Wang, L Ke, Y Tan
Information Sciences 523, 38-48, 2020
562020
RootAgency: A digital signature-based root privilege management agency for cloud terminal devices
Y Xue, Y Tan, C Liang, Y Li, J Zheng, Q Zhang
Information Sciences 444, 36-50, 2018
562018
A high-imperceptibility and histogram-shifting data hiding scheme for JPEG images
Y Li, S Yao, K Yang, YA Tan, Q Zhang
IEEE Access 7, 73573-73582, 2019
542019
A packet-reordering covert channel over VoLTE voice and video traffics
X Zhang, L Zhu, X Wang, C Zhang, H Zhu, Y Tan
Journal of Network and Computer Applications 126, 29-38, 2019
542019
Covert timing channels for IoT over mobile networks
Y Tan, X Zhang, K Sharif, C Liang, Q Zhang, Y Li
IEEE Wireless Communications 25 (6), 38-44, 2018
532018
Data security sharing model based on privacy protection for blockchain‐enabled industrial Internet of Things
Q Zhang, Y Li, R Wang, L Liu, Y Tan, J Hu
International Journal of Intelligent Systems 36 (1), 94-111, 2021
512021
A payload-dependent packet rearranging covert channel for mobile VoIP traffic
C Liang, X Wang, X Zhang, Y Zhang, K Sharif, Y Tan
Information Sciences 465, 162-173, 2018
512018
Building packet length covert channel over mobile VoIP traffics
C Liang, Y Tan, X Zhang, X Wang, J Zheng, Q Zhang
Journal of Network and Computer Applications 118, 144-153, 2018
472018
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–20