default search action
Yinhao Xiao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Chunchi Liu, Minghui Xu, Hechuan Guo, Xiuzhen Cheng, Yinhao Xiao, Dongxiao Yu, Bei Gong, Arkady Yerukhimovich, Shengling Wang, Weifeng Lyu:
TBAC: A Tokoin-Based Accountable Access Control Scheme for the Internet of Things. IEEE Trans. Mob. Comput. 23(5): 6133-6148 (2024) - [i9]Fengting Mo, Shanshan Yan, Yinhao Xiao:
Background-aware Multi-source Fusion Financial Trend Forecasting Mechanism. CoRR abs/2407.00904 (2024) - [i8]Shengjie Li, Yinhao Xiao:
A Depression Detection Method Based on Multi-Modal Feature Fusion Using Cross-Attention. CoRR abs/2407.12825 (2024) - 2023
- [j15]Jin Wang, Hui Xiao, Shuwen Zhong, Yinhao Xiao:
DeepVulSeeker: A novel vulnerability identification framework via code graph structure and pre-training mechanism. Future Gener. Comput. Syst. 148: 15-26 (2023) - [j14]Yinhao Xiao, Yizhen Jia, Xiuzhen Cheng, Shengling Wang, Jian Mao, Zhenkai Liang:
I Know Your Social Network Accounts: A Novel Attack Architecture for Device-Identity Association. IEEE Trans. Dependable Secur. Comput. 20(2): 1017-1030 (2023) - [j13]Yinhao Xiao, Yizhen Jia, Qin Hu, Xiuzhen Cheng, Bei Gong, Jiguo Yu:
CommandFence: A Novel Digital-Twin-Based Preventive Framework for Securing Smart Home Systems. IEEE Trans. Dependable Secur. Comput. 20(3): 2450-2465 (2023) - [i7]Jin Wang, Zishan Huang, Hui Xiao, Yinhao Xiao:
JFinder: A Novel Architecture for Java Vulnerability Identification Based Quad Self-Attention and Pre-training Mechanism. CoRR abs/2307.15915 (2023) - [i6]Jin Wang, Zishan Huang, Hengli Liu, Nianyi Yang, Yinhao Xiao:
DefectHunter: A Novel LLM-Driven Boosted-Conformer-based Code Vulnerability Detection Mechanism. CoRR abs/2309.15324 (2023) - 2022
- [j12]Qin Hu, Feng Li, Xukai Zou, Yinhao Xiao:
Solving the Federated Edge Learning Participation Dilemma: A Truthful and Correlated Perspective. IEEE Trans. Veh. Technol. 71(7): 7680-7690 (2022) - [c9]Xianxian Cao, Xiaoling Li, Yinhao Xiao, Yumin Yao, Shuang Tan, Ping Wang:
BDTwins: Blockchain-based Digital Twins Lifecycle Management. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 2003-2010 - [c8]Xuxiang Jiang, Yinhao Xiao, Jun Wang, Wei Zhang:
Multi-view Pre-trained Model for Code Vulnerability Identification. WASA (3) 2022: 127-135 - [i5]Qin Hu, Feng Li, Xukai Zou, Yinhao Xiao:
Solving the Federated Edge Learning Participation Dilemma: A Truthful and Correlated Perspective. CoRR abs/2203.12430 (2022) - [i4]Huixi Li, Yinhao Xiao, Yongluo Shen:
A Combination of Host Overloading Detection and Virtual Machine Selection in Cloud Server Consolidation based on Learning Method. CoRR abs/2206.13717 (2022) - [i3]Xuxiang Jiang, Yinhao Xiao, Jun Wang, Wei Zhang:
Multi-View Pre-Trained Model for Code Vulnerability Identification. CoRR abs/2208.05227 (2022) - [i2]Jin Wang, Hui Xiao, Shuwen Zhong, Yinhao Xiao:
DeepVulSeeker: A Novel Vulnerability Identification Framework via Code Graph Structure and Pre-training Mechanism. CoRR abs/2211.13097 (2022) - 2021
- [j11]Shengling Wang, Yu Pu, Hongwei Shi, Jianhui Huang, Yinhao Xiao:
A differential game view of antagonistic dynamics for cybersecurity. Comput. Networks 200: 108494 (2021) - [j10]Su Hu, Yinhao Xiao:
Design of cloud computing task offloading algorithm based on dynamic multi-objective evolution. Future Gener. Comput. Syst. 122: 144-148 (2021) - 2020
- [j9]Suhui Liu, Jiguo Yu, Yinhao Xiao, Zhiguo Wan, Shengling Wang, Biwei Yan:
BC-SABE: Blockchain-Aided Searchable Attribute-Based Encryption for Cloud-IoT. IEEE Internet Things J. 7(9): 7851-7867 (2020) - [j8]Yinhao Xiao, Yizhen Jia, Chun-Chi Liu, Arwa Alrawais, Molka Rekik, Zhiguang Shan:
HomeShield: A Credential-Less Authentication Framework for Smart Home Systems. IEEE Internet Things J. 7(9): 7903-7918 (2020) - [j7]Hongwei Shi, Shengling Wang, Yinhao Xiao:
Queuing Without Patience: A Novel Transaction Selection Mechanism in Blockchain for IoT Enhancement. IEEE Internet Things J. 7(9): 7941-7948 (2020) - [j6]Bo Mei, Yinhao Xiao, Ruinian Li, Hong Li, Xiuzhen Cheng, Yunchuan Sun:
Image and Attribute Based Convolutional Neural Network Inference Attacks in Social Networks. IEEE Trans. Netw. Sci. Eng. 7(2): 869-879 (2020) - [c7]Qin Hu, Feng Li, Xukai Zou, Yinhao Xiao:
Correlated Participation Decision Making for Federated Edge Learning. GLOBECOM 2020: 1-6 - [c6]Qin Hu, Yash Nigam, Zhilin Wang, Yawei Wang, Yinhao Xiao:
A Correlated Equilibrium based Transaction Pricing Mechanism in Blockchain. IEEE ICBC 2020: 1-7 - [i1]Chun-Chi Liu, Minghui Xu, Hechuan Guo, Xiuzhen Cheng, Yinhao Xiao, Dongxiao Yu, Bei Gong, Arkady Yerukhimovich, Shengling Wang, Weifeng Lv:
Tokoin: A Coin-Based Accountable Access Control Scheme for Internet of Things. CoRR abs/2011.04919 (2020)
2010 – 2019
- 2019
- [j5]Chun-Chi Liu, Yinhao Xiao, Vishesh Javangula, Qin Hu, Shengling Wang, Xiuzhen Cheng:
NormaChain: A Blockchain-Based Normalized Autonomous Transaction Settlement System for IoT-Based E-Commerce. IEEE Internet Things J. 6(3): 4680-4693 (2019) - [j4]Yinhao Xiao, Yizhen Jia, Xiuzhen Cheng, Jiguo Yu, Zhenkai Liang, Zhi Tian:
I Can See Your Brain: Investigating Home-Use Electroencephalography System Security. IEEE Internet Things J. 6(4): 6681-6691 (2019) - [j3]Yinhao Xiao, Yizhen Jia, Chun-Chi Liu, Xiuzhen Cheng, Jiguo Yu, Weifeng Lv:
Edge Computing Security: State of the Art and Challenges. Proc. IEEE 107(8): 1608-1631 (2019) - 2018
- [j2]Jian Mao, Jingdong Bian, Guangdong Bai, Ruilong Wang, Yue Chen, Yinhao Xiao, Zhenkai Liang:
Detecting Malicious Behaviors in JavaScript Applications. IEEE Access 6: 12284-12294 (2018) - [j1]Ruinian Li, Yinhao Xiao, Cheng Zhang, Tianyi Song, Chunqiang Hu:
Cryptographic algorithms for privacy-preserving online applications. Math. Found. Comput. 1(4): 311-330 (2018) - [c5]Yizhen Jia, Yinhao Xiao, Jiguo Yu, Xiuzhen Cheng, Zhenkai Liang, Zhiguo Wan:
A Novel Graph-based Mechanism for Identifying Traffic Vulnerabilities in Smart Home IoT. INFOCOM 2018: 1493-1501 - 2017
- [c4]Bo Mei, Yinhao Xiao, Hong Li, Xiuzhen Cheng, Yunchuan Sun:
Inference attacks based on neural networks in social networks. HotWeb 2017: 10:1-10:6 - [c3]Yinhao Xiao, Guangdong Bai, Jian Mao, Zhenkai Liang, Wei Cheng:
Privilege Leakage and Information Stealing through the Android Task Mechanism. PAC 2017: 152-163 - [c2]Bo Mei, Yinhao Xiao, Xiuzhen Cheng, Hong Li, Yunchuan Sun:
Personal Information Inference in Social Networks. PAC 2017: 196-197 - 2016
- [c1]Jian Mao, Ruilong Wang, Yue Chen, Yinhao Xiao, Yaoqi Jia, Zhenkai Liang:
A Function-Level Behavior Model for Anomalous Behavior Detection in Hybrid Mobile Applications. IIKI 2016: 497-505
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 18:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint