Folgen
Bin Yuan
Bin Yuan
Associate Professor of School of Cyber Science and Engineering, Huazhong University of Science and
Bestätigte E-Mail-Adresse bei hust.edu.cn
Titel
Zitiert von
Zitiert von
Jahr
Defending against flow table overloading attack in software-defined networks
B Yuan, D Zou, S Yu, H Jin, W Qiang, J Shen
IEEE Transactions on Services Computing 12 (2), 231-246, 2016
1122016
Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation
B Yuan, Y Jia, L Xing, D Zhao, XF Wang, D Zou, H Jin, Y Zhang
752020
Exploring New Opportunities to Defeat Low-rate DDoS Attack in Container-based Cloud Environment
Z Li, HJ Jin, D Zou, B Yuan
IEEE Transactions on Parallel and Distributed Systems 31 (3), 695-706, 2020
742020
Dseom: A framework for dynamic security evaluation and optimization of mtd in container-based cloud
H Jin, Z Li, D Zou, B Yuan
IEEE Transactions on Dependable and Secure Computing 18 (3), 1125-1136, 2019
662019
Deployment of robust security scheme in SDN based 5G network over NFV enabled cloud environment
IH Abdulqadder, D Zou, IT Aziz, B Yuan, W Dai
IEEE Transactions on Emerging Topics in Computing 9 (2), 866-877, 2018
542018
Towards effective detection of recent DDoS attacks: A deep learning approach
I Ortet Lopes, D Zou, FA Ruambo, S Akbar, B Yuan
Security and Communication Networks 2021 (1), 5710028, 2021
452021
SecSDN-cloud: defeating vulnerable attacks through secure software-defined networks
IH Abdulqadder, D Zou, IT Aziz, B Yuan, W Li
IEEE Access 6, 8292-8301, 2018
372018
Who's in control? On security risks of disjointed IoT device management channels
Y Jia, B Yuan, L Xing, D Zhao, Y Zhang, XF Wang, Y Liu, K Zheng, ...
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
302021
A practical byzantine-based approach for faulty switch tolerance in software-defined networks
B Yuan, H Jin, D Zou, LT Yang, S Yu
IEEE Transactions on Network and Service Management 15 (2), 825-839, 2018
272018
Secure Data Transportation With Software-Defined Networking and k-n Secret Sharing for High-Confidence IoT Services
B Yuan, C Lin, H Zhao, D Zou, LT Yang, H Jin, C Rong
IEEE Internet of Things Journal 7 (9), 7967-7981, 2020
242020
Fine-grained Code Clone Detection with Block-based Splitting of Abstract Syntax Tree
HJ Tiancheng Hu, Zijing Xu, Yilin Fang, Yueming Wu*, Bin Yuan*, Deqing Zou
32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
162023
P-verifier: Understanding and mitigating security risks in cloud-based iot access policies
Z Jin, L Xing, Y Fang, Y Jia, B Yuan, Q Liu
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
162022
Smartpatch: Verifying the authenticity of the trigger-event in the IoT platform
B Yuan, Y Wu, M Yang, L Xing, X Wang, D Zou, H Jin
IEEE Transactions on Dependable and Secure Computing 20 (2), 1656-1674, 2022
162022
HostWatcher: Protecting hosts in cloud data centers through software-defined networking
B Yuan, D Zou, H Jin, S Yu, LT Yang
Future Generation Computer Systems 105, 964-972, 2020
132020
Enhancing Deep Learning-Based Vulnerability Detection by Building Behavior Graph Model
HJ Bin Yuan,Yifan Lu,Yilin Fang, Yueming Wu*, Deqing Zou, Zhen Li, Zhi Li
45th International Conference on Software Engineering, 2023
12*2023
Validating user flows to protect software defined network environments
IH Abdulqadder, D Zou, IT Aziz, B Yuan
Security and Communication Networks 2018 (1), 1308678, 2018
112018
A domain-divided configurable security model for cloud computing-based telecommunication services
J Shen, D Zou, H Jin, B Yuan, W Dai
The Journal of Supercomputing 75, 109-122, 2019
102019
MQTTactic: Security analysis and verification for logic flaws in MQTT implementations
B Yuan, Z Song, Y Jia, Z Lu, D Zou, H Jin, L Xing
2024 IEEE Symposium on Security and Privacy (SP), 2385-2403, 2024
82024
Solving anomalies in NFV-SDN based service function chaining composition for IoT network
D Zou, Z Huang, B Yuan, H Chen, H Jin
IEEE Access 6, 62286-62295, 2018
82018
Enhanced attack aware security provisioning scheme in SDN/NFV enabled over 5G network
IH Abdulqadder, D Zou, IT Aziz, B Yuan
2018 27th International Conference on Computer Communication and Networks …, 2018
82018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20