Seguir
Qiben Yan
Qiben Yan
Computer Science and Engineering, Michigan State University
Dirección de correo verificada de msu.edu - Página principal
Título
Citado por
Citado por
Año
Significant permission identification for machine-learning-based android malware detection
J Li, L Sun, Q Yan, Z Li, W Srisa-An, H Ye
IEEE Transactions on Industrial Informatics 14 (7), 3216-3225, 2018
6292018
A comprehensive survey on pretrained foundation models: A history from bert to chatgpt
C Zhou, Q Li, C Li, J Yu, Y Liu, G Wang, K Zhang, C Ji, Q Yan, L He, ...
arXiv preprint arXiv:2302.09419, 2023
3232023
Machine learning based mobile malware detection using highly imbalanced network traffic
Z Chen, Q Yan, H Han, S Wang, L Peng, L Wang, B Yang
Information Sciences 433, 346-364, 2018
1852018
Detecting android malware leveraging text semantics of network flows
S Wang, Q Yan, Z Chen, B Yang, C Zhao, M Conti
IEEE Transactions on Information Forensics and Security 13 (5), 1096-1109, 2017
1462017
Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks
Q Yan, M Li, T Jiang, W Lou, YT Hou
2012 Proceedings IEEE INFOCOM, 900-908, 2012
1332012
A mobile malware detection method using behavior features in network traffic
S Wang, Z Chen, Q Yan, B Yang, L Peng, Z Jia
Journal of Network and Computer Applications 133, 15-25, 2019
1272019
Proximity-based security techniques for mobile users in wireless networks
L Xiao, Q Yan, W Lou, G Chen, YT Hou
IEEE Transactions on Information Forensics and Security 8 (12), 2089-2100, 2013
1102013
Surfingattack: Interactive hidden attack on voice assistants using ultrasonic guided waves
Q Yan, K Liu, Q Zhou, H Guo, N Zhang
Network and Distributed Systems Security (NDSS) Symposium, 2020
1092020
Jamming resilient communication using MIMO interference cancellation
Q Yan, H Zeng, T Jiang, M Li, W Lou, YT Hou
IEEE Transactions on Information Forensics and Security 11 (7), 1486-1499, 2016
1052016
TIMiner: Automatically extracting and analyzing categorized cyber threat intelligence from social data
J Zhao, Q Yan, J Li, M Shao, Z He, B Li
Computers & Security 95, 101867, 2020
992020
SigPID: significant permission identification for android malware detection
L Sun, Z Li, Q Yan, W Srisa-an, Y Pan
2016 11th international conference on malicious and unwanted software …, 2016
942016
Throughput analysis of cooperative mobile content distribution in vehicular network using symbol level network coding
Q Yan, M Li, Z Yang, W Lou, H Zhai
IEEE Journal on Selected Areas in Communications 30 (2), 484-492, 2012
932012
Efficient signature generation for classifying cross-architecture IoT malware
M Alhanahnah, Q Lin, Q Yan, N Zhang, Z Chen
2018 IEEE conference on communications and network security (CNS), 1-9, 2018
892018
Identity management using blockchain for cognitive cellular networks
S Raju, S Boddepalli, S Gampa, Q Yan, JS Deogun
2017 IEEE International Conference on Communications (ICC), 1-6, 2017
832017
Trafficav: An effective and explainable detection of mobile malware behavior using network traffic
S Wang, Z Chen, L Zhang, Q Yan, B Yang, L Peng, Z Jia
2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS), 1-6, 2016
822016
MIMO-based jamming resilient communication in wireless networks
Q Yan, H Zeng, T Jiang, M Li, W Lou, YT Hou
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 2697-2706, 2014
772014
Multi-attributed heterogeneous graph convolutional network for bot detection
J Zhao, X Liu, Q Yan, B Li, M Shao, H Peng
Information Sciences 537, 380-393, 2020
722020
Nelora: Towards ultra-low snr lora communication with neural-enhanced demodulation
C Li, H Guo, S Tong, X Zeng, Z Cao, M Zhang, Q Yan, L Xiao, J Wang, ...
Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems …, 2021
662021
Deep and broad URL feature mining for android malware detection
S Wang, Z Chen, Q Yan, K Ji, L Peng, B Yang, M Conti
Information Sciences 513, 600-613, 2020
612020
Cyber threat intelligence modeling based on heterogeneous graph convolutional network
J Zhao, Q Yan, X Liu, B Li, G Zuo
23rd international symposium on research in attacks, intrusions and defenses …, 2020
582020
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20