Edge computing security: State of the art and challenges Y Xiao, Y Jia, C Liu, X Cheng, J Yu, W Lv Proceedings of the IEEE 107 (8), 1608-1631, 2019 | 537 | 2019 |
NormaChain: A blockchain-based normalized autonomous transaction settlement system for IoT-based E-commerce C Liu, Y Xiao, V Javangula, Q Hu, S Wang, X Cheng IEEE Internet of Things Journal 6 (3), 4680-4693, 2018 | 143 | 2018 |
BC-SABE: Blockchain-aided searchable attribute-based encryption for cloud-IoT S Liu, J Yu, Y Xiao, Z Wan, S Wang, B Yan IEEE Internet of Things Journal 7 (9), 7851-7867, 2020 | 132 | 2020 |
A novel graph-based mechanism for identifying traffic vulnerabilities in smart home IoT Y Jia, Y Xiao, J Yu, X Cheng, Z Liang, Z Wan IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 1493-1501, 2018 | 71 | 2018 |
LH-ABSC: A lightweight hybrid attribute-based signcryption scheme for cloud-fog-assisted IoT J Yu, S Liu, S Wang, Y Xiao, B Yan IEEE Internet of Things Journal 7 (9), 7949-7966, 2020 | 60 | 2020 |
Image and attribute based convolutional neural network inference attacks in social networks B Mei, Y Xiao, R Li, H Li, X Cheng, Y Sun IEEE Transactions on Network Science and Engineering 7 (2), 869-879, 2018 | 41 | 2018 |
I can see your brain: Investigating home-use electroencephalography system security Y Xiao, Y Jia, X Cheng, J Yu, Z Liang, Z Tian IEEE Internet of Things Journal 6 (4), 6681-6691, 2019 | 38 | 2019 |
Detecting malicious behaviors in javascript applications J Mao, J Bian, G Bai, R Wang, Y Chen, Y Xiao, Z Liang Ieee Access 6, 12284-12294, 2018 | 33 | 2018 |
HomeShield: A credential-less authentication framework for smart home systems Y Xiao, Y Jia, C Liu, A Alrawais, M Rekik, Z Shan IEEE Internet of Things Journal 7 (9), 7903-7918, 2020 | 29 | 2020 |
Tbac: A tokoin-based accountable access control scheme for the internet of things C Liu, M Xu, H Guo, X Cheng, Y Xiao, D Yu, B Gong, A Yerukhimovich, ... IEEE Transactions on Mobile Computing 23 (5), 6133-6148, 2023 | 25 | 2023 |
Design of cloud computing task offloading algorithm based on dynamic multi-objective evolution S Hu, Y Xiao Future Generation Computer Systems 122, 144-148, 2021 | 23 | 2021 |
Queuing without patience: A novel transaction selection mechanism in blockchain for IoT enhancement H Shi, S Wang, Y Xiao IEEE Internet of Things Journal 7 (9), 7941-7948, 2020 | 19 | 2020 |
DeepVulSeeker: A novel vulnerability identification framework via code graph structure and pre-training mechanism J Wang, H Xiao, S Zhong, Y Xiao Future Generation Computer Systems 148, 15-26, 2023 | 18 | 2023 |
Defecthunter: A novel llm-driven boosted-conformer-based code vulnerability detection mechanism J Wang, Z Huang, H Liu, N Yang, Y Xiao arXiv preprint arXiv:2309.15324, 2023 | 16 | 2023 |
Cryptographic algorithms for privacy-preserving online applications. R Li, Y Xiao, C Zhang, T Song, C Hu Math. Found. Comput. 1 (4), 311-330, 2018 | 16 | 2018 |
Commandfence: A novel digital-twin-based preventive framework for securing smart home systems Y Xiao, Y Jia, Q Hu, X Cheng, B Gong, J Yu IEEE Transactions on Dependable and Secure Computing 20 (3), 2450-2465, 2022 | 15 | 2022 |
I know your social network accounts: A novel attack architecture for device-identity association Y Xiao, Y Jia, X Cheng, S Wang, J Mao, Z Liang IEEE Transactions on Dependable and Secure Computing 20 (2), 1017-1030, 2022 | 11 | 2022 |
Inference attacks based on neural networks in social networks B Mei, Y Xiao, H Li, X Cheng, Y Sun Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and …, 2017 | 10 | 2017 |
Privilege leakage and information stealing through the android task mechanism Y Xiao, G Bai, J Mao, Z Liang, W Cheng 2017 IEEE Symposium on Privacy-Aware Computing (PAC), 152-163, 2017 | 8 | 2017 |
A correlated equilibrium based transaction pricing mechanism in blockchain Q Hu, Y Nigam, Z Wang, Y Wang, Y Xiao 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 1-7, 2020 | 7 | 2020 |