default search action
Lihong Yao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j6]Xiaopeng Kan, Zhihong Zhou, Lihong Yao, Yuxin Zuo:
Research on Anomaly Detection in Vehicular CAN Based on Bi-LSTM. J. Cyber Secur. Mobil. 12(5): 629-652 (2023) - 2022
- [j5]Zhihong Zhou, Hu Bin, Jianhua Li, Ying Yin, Xiuzhen Chen, Jin Ma, Lihong Yao:
Malicious encrypted traffic features extraction model based on unsupervised feature adaptive learning. J. Comput. Virol. Hacking Tech. 18(4): 453-463 (2022) - 2021
- [c6]Chaoyang Peng, Lihong Yao, Tanfeng Sun, Xinghao Jiang, Zhongjie Mi:
SE_EDNet: A Robust Manipulated Faces Detection Algorithm. CGI 2021: 80-88
2010 – 2019
- 2019
- [c5]Jie Hu, Tanfeng Sun, Xinghao Jiang, Lihong Yao, Ke Xu:
Natural Language Inference Based on the LIC Architecture with DCAE Feature. CCL 2019: 587-599 - [c4]Jiajie Du, Li Pan, Huijuan Li, Lihong Yao:
Understanding Acdamic Impact Development by Predicting the G-index In Collaboration Networks. DSC 2019: 662-667 - 2018
- [c3]Fang Liu, Li Pan, Lihong Yao:
Evolutionary Game Based Analysis for User Privacy Protection Behaviors in Social Networks. DSC 2018: 274-279 - [c2]Zhihong Zhou, Lihong Yao, Jianhua Li, Bin Hu, Chen Wang, Zhenglong Wang:
Classification of botnet families based on features self-learning under Network Traffic Censorship. SSIC 2018: 1-7 - 2017
- [j4]Lihong Yao, Junmin Li:
Input-output finite-time stabilization of a class of nonlinear hybrid systems based on FSM with MDADT. J. Frankl. Inst. 354(9): 3797-3812 (2017) - 2012
- [c1]Yetian Xia, Xiaochao Zi, Lihong Yao, Li Pan, Jianhua Li:
Constructing the On/Off Covert Channel on Xen. CIS 2012: 568-572 - 2011
- [j3]Xiaochao Zi, Lihong Yao, Xinghao Jiang, Li Pan, Jianhua Li:
Evaluating the transmission rate of covert timing channels in a network. Comput. Networks 55(12): 2760-2771 (2011) - 2010
- [j2]Xiaochao Zi, Lihong Yao, Li Pan, Jianhua Li:
Implementing a passive network covert timing channel. Comput. Secur. 29(6): 686-696 (2010)
2000 – 2009
- 2009
- [j1]Lihong Yao, Xiaochao Zi, Li Pan, Jianhua Li:
A study of on/off timing channel based on packet delay distribution. Comput. Secur. 28(8): 785-794 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 20:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint