Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Yunchuan Guo
@article{DBLP:journals/concurrency/ChenWWGLL23, author = {Lili Chen and Zhen Wang and Jintao Wu and Yunchuan Guo and Fenghua Li and Zifu Li}, title = {Dynamic threshold strategy optimization for security protection in Internet of Things: An adversarial deep learning-based game-theoretical approach}, journal = {Concurr. Comput. Pract. Exp.}, volume = {35}, number = {20}, year = {2023}, url = {https://doi.org/10.1002/cpe.6944}, doi = {10.1002/CPE.6944}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/ChenWWGLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bdcloud/ZhangGLLLF23, author = {Lin Zhang and Yunchuan Guo and Siyuan Leng and Zifu Li and Fenghua Li and Liang Fang}, title = {A Moving Target Defense Approach for the Distributed Dynamic Network}, booktitle = {{IEEE} Intl Conf on Parallel {\&} Distributed Processing with Applications, Big Data {\&} Cloud Computing, Sustainable Computing {\&} Communications, Social Computing {\&} Networking, ISPA/BDCloud/SocialCom/SustainCom, 2023, Wuhan, China, December 21-24, 2023}, pages = {336--343}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom59178.2023.00076}, doi = {10.1109/ISPA-BDCLOUD-SOCIALCOM-SUSTAINCOM59178.2023.00076}, timestamp = {Thu, 18 Apr 2024 16:12:26 +0200}, biburl = {https://dblp.org/rec/conf/bdcloud/ZhangGLLLF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bdcloud/LengLZWGF23, author = {Siyuan Leng and Fenghua Li and Lin Zhang and Yitong Wen and Yunchuan Guo and Liang Fang}, title = {ProMD: {A} Proactive Intrusion Response System for Enterprise Network with Multi-Domain}, booktitle = {{IEEE} Intl Conf on Parallel {\&} Distributed Processing with Applications, Big Data {\&} Cloud Computing, Sustainable Computing {\&} Communications, Social Computing {\&} Networking, ISPA/BDCloud/SocialCom/SustainCom, 2023, Wuhan, China, December 21-24, 2023}, pages = {402--409}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom59178.2023.00085}, doi = {10.1109/ISPA-BDCLOUD-SOCIALCOM-SUSTAINCOM59178.2023.00085}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bdcloud/LengLZWGF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/LuanLZCG23, author = {Shijie Luan and Xiang Lu and Zhuangzhuang Zhang and Guangsheng Chang and Yunchuan Guo}, title = {Efficient and Privacy-Preserving Byzantine-Robust Federated Learning}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2023, Kuala Lumpur, Malaysia, December 4-8, 2023}, pages = {2202--2208}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/GLOBECOM54140.2023.10437426}, doi = {10.1109/GLOBECOM54140.2023.10437426}, timestamp = {Sun, 10 Mar 2024 10:39:12 +0100}, biburl = {https://dblp.org/rec/conf/globecom/LuanLZCG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcan/YuLYWG22, author = {Mingjie Yu and Fenghua Li and Nenghai Yu and Xiao Wang and Yunchuan Guo}, title = {Detecting conflict of heterogeneous access control policies}, journal = {Digit. Commun. Networks}, volume = {8}, number = {5}, pages = {664--679}, year = {2022}, url = {https://doi.org/10.1016/j.dcan.2022.09.002}, doi = {10.1016/J.DCAN.2022.09.002}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcan/YuLYWG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/LiLYGWL22, author = {Chaoyang Li and Fenghua Li and Mingjie Yu and Yunchuan Guo and Yitong Wen and Zifu Li}, title = {Insider Threat Detection Using Generative Adversarial Graph Attention Networks}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2022, Rio de Janeiro, Brazil, December 4-8, 2022}, pages = {2680--2685}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/GLOBECOM48099.2022.10001207}, doi = {10.1109/GLOBECOM48099.2022.10001207}, timestamp = {Tue, 17 Jan 2023 08:56:31 +0100}, biburl = {https://dblp.org/rec/conf/globecom/LiLYGWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/LengXZGFL22, author = {Siyuan Leng and Yingke Xie and Yifan Zhang and Yunchuan Guo and Liang Fang and Fenghua Li}, title = {{DICOF:} {A} Distributed and Collaborative Framework for Hybrid DDoS Attack Detection}, booktitle = {{IEEE} Symposium on Computers and Communications, {ISCC} 2022, Rhodes, Greece, June 30 - July 3, 2022}, pages = {1--7}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ISCC55528.2022.9912872}, doi = {10.1109/ISCC55528.2022.9912872}, timestamp = {Tue, 25 Oct 2022 21:20:50 +0200}, biburl = {https://dblp.org/rec/conf/iscc/LengXZGFL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangGYZ22, author = {Chunlei Yang and Yunchuan Guo and Mingjie Yu and Lingcui Zhang}, title = {Truthfully Negotiating Usage Policy for Data Sovereignty}, booktitle = {{IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022}, pages = {20--27}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00014}, doi = {10.1109/TRUSTCOM56396.2022.00014}, timestamp = {Mon, 27 Mar 2023 16:44:39 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YangGYZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiCGFGL22, author = {Fenghua Li and Cao Chen and Yunchuan Guo and Liang Fang and Chao Guo and Zifu Li}, title = {Efficiently Constructing Topology of Dynamic Networks}, booktitle = {{IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022}, pages = {44--51}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00017}, doi = {10.1109/TRUSTCOM56396.2022.00017}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiCGFGL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangHGLW22, author = {Fayao Wang and Yuanyuan He and Yunchuan Guo and Peizhi Li and Xinyu Wei}, title = {Privacy-Preserving Robust Federated Learning with Distributed Differential Privacy}, booktitle = {{IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022}, pages = {598--605}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00087}, doi = {10.1109/TRUSTCOM56396.2022.00087}, timestamp = {Fri, 01 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangHGLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/XieLSGNS21, author = {Rongna Xie and Hui Li and Guozhen Shi and Yunchuan Guo and Ben Niu and Mang Su}, title = {Provenance-based data flow control mechanism for Internet of things}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {32}, number = {5}, year = {2021}, url = {https://doi.org/10.1002/ett.3934}, doi = {10.1002/ETT.3934}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/XieLSGNS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/JinGYGL21, author = {Wei Jin and Kui Geng and Mingjie Yu and Yunchuan Guo and Fenghua Li}, title = {Efficiently Managing Large-Scale Keys in {HDFS}}, booktitle = {2021 {IEEE} 23rd Int Conf on High Performance Computing {\&} Communications; 7th Int Conf on Data Science {\&} Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud {\&} Big Data Systems {\&} Application (HPCC/DSS/SmartCity/DependSys), Haikou, Hainan, China, December 20-22, 2021}, pages = {353--360}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/HPCC-DSS-SmartCity-DependSys53884.2021.00071}, doi = {10.1109/HPCC-DSS-SMARTCITY-DEPENDSYS53884.2021.00071}, timestamp = {Thu, 09 Jun 2022 16:39:42 +0200}, biburl = {https://dblp.org/rec/conf/hpcc/JinGYGL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccS/GuoSYLGL21, author = {Yunchuan Guo and Xiyang Sun and Mingjie Yu and Fenghua Li and Kui Geng and Zifu Li}, editor = {Maciej Paszynski and Dieter Kranzlm{\"{u}}ller and Valeria V. Krzhizhanovskaya and Jack J. Dongarra and Peter M. A. Sloot}, title = {Resolving Policy Conflicts for Cross-Domain Access Control: {A} Double Auction Approach}, booktitle = {Computational Science - {ICCS} 2021 - 21st International Conference, Krakow, Poland, June 16-18, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12742}, pages = {525--539}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77961-0\_43}, doi = {10.1007/978-3-030-77961-0\_43}, timestamp = {Fri, 11 Jun 2021 16:12:41 +0200}, biburl = {https://dblp.org/rec/conf/iccS/GuoSYLGL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhangQLGZZX20, author = {Huibing Zhang and Longfei Qin and Jun Li and Yunchuan Guo and Ya Zhou and Jingwei Zhang and Zhi Xu}, title = {Real-Time Detection Method for Small Traffic Signs Based on Yolov3}, journal = {{IEEE} Access}, volume = {8}, pages = {64145--64156}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2984554}, doi = {10.1109/ACCESS.2020.2984554}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhangQLGZZX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiLLGGWF20, author = {Fenghua Li and Yongjun Li and Siyuan Leng and Yunchuan Guo and Kui Geng and Zhen Wang and Liang Fang}, title = {Dynamic countermeasures selection for multi-path attacks}, journal = {Comput. Secur.}, volume = {97}, pages = {101927}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101927}, doi = {10.1016/J.COSE.2020.101927}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiLLGGWF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/XieSGL20, author = {Rongna Xie and Guozhen Shi and Yunchuan Guo and Fenghua Li}, title = {A topic-centric access control model for the publish/subscribe paradigm}, journal = {Concurr. Comput. Pract. Exp.}, volume = {32}, number = {9}, year = {2020}, url = {https://doi.org/10.1002/cpe.5614}, doi = {10.1002/CPE.5614}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/XieSGL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/YinFGST20, author = {Lihua Yin and Binxing Fang and Yunchuan Guo and Zhe Sun and Zhihong Tian}, title = {Hierarchically defining Internet of Things security: From {CIA} to {CACA}}, journal = {Int. J. Distributed Sens. Networks}, volume = {16}, number = {1}, year = {2020}, url = {https://doi.org/10.1177/1550147719899374}, doi = {10.1177/1550147719899374}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/YinFGST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/FangSWLXG20, author = {Liang Fang and Guozhen Shi and Lianhai Wang and Yongjun Li and Shujiang Xu and Yunchuan Guo}, title = {Incentive mechanism for cooperative authentication: An evolutionary game approach}, journal = {Inf. Sci.}, volume = {527}, pages = {369--381}, year = {2020}, url = {https://doi.org/10.1016/j.ins.2019.07.030}, doi = {10.1016/J.INS.2019.07.030}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/FangSWLXG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/LiLFLXG20, author = {Fenghua Li and Zifu Li and Liang Fang and Yongjun Li and Yaobing Xu and Yunchuan Guo}, title = {Securing instruction interaction for hierarchical management}, journal = {J. Parallel Distributed Comput.}, volume = {137}, pages = {91--103}, year = {2020}, url = {https://doi.org/10.1016/j.jpdc.2019.10.010}, doi = {10.1016/J.JPDC.2019.10.010}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpdc/LiLFLXG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/ChenWLGG20, author = {Lili Chen and Zhen Wang and Fenghua Li and Yunchuan Guo and Kui Geng}, title = {A Stackelberg Security Game for Adversarial Outbreak Detection in the Internet of Things}, journal = {Sensors}, volume = {20}, number = {3}, pages = {804}, year = {2020}, url = {https://doi.org/10.3390/s20030804}, doi = {10.3390/S20030804}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/ChenWLGG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccoms/DongHGZ20, author = {Junchao Dong and Feijuan He and Yunchuan Guo and Huibing Zhang}, title = {A Commodity Review Sentiment Analysis Based on {BERT-CNN} Model}, booktitle = {5th International Conference on Computer and Communication Systems, {ICCCS} 2020, Shanghai, China, May 15-18, 2020}, pages = {143--147}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICCCS49078.2020.9118434}, doi = {10.1109/ICCCS49078.2020.9118434}, timestamp = {Mon, 02 Aug 2021 08:40:32 +0200}, biburl = {https://dblp.org/rec/conf/ccoms/DongHGZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexa/ChenLZGF20, author = {Tianzhu Chen and Fenghua Li and Fuzhen Zhuang and Yunchuan Guo and Liang Fang}, editor = {Sven Hartmann and Josef K{\"{u}}ng and Gabriele Kotsis and A Min Tjoa and Ismail Khalil}, title = {The Linear Geometry Structure of Label Matrix for Multi-label Learning}, booktitle = {Database and Expert Systems Applications - 31st International Conference, {DEXA} 2020, Bratislava, Slovakia, September 14-17, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12392}, pages = {229--244}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59051-2\_15}, doi = {10.1007/978-3-030-59051-2\_15}, timestamp = {Tue, 29 Dec 2020 18:31:18 +0100}, biburl = {https://dblp.org/rec/conf/dexa/ChenLZGF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/GuoZLLFYC20, author = {Yunchuan Guo and Han Zhang and Zifu Li and Fenghua Li and Liang Fang and Lihua Yin and Jin Cao}, title = {Decision-Making for Intrusion Response: Which, Where, in What Order, and How Long?}, booktitle = {2020 {IEEE} International Conference on Communications, {ICC} 2020, Dublin, Ireland, June 7-11, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICC40277.2020.9149083}, doi = {10.1109/ICC40277.2020.9149083}, timestamp = {Tue, 04 Aug 2020 10:37:23 +0200}, biburl = {https://dblp.org/rec/conf/icc/GuoZLLFYC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijitwe/ShanLLGX19, author = {Fangfang Shan and Hui Li and Fenghua Li and Yunchuan Guo and Jinbo Xiong}, title = {An Attribute-Based Assured Deletion Scheme in Cloud Computing}, journal = {Int. J. Inf. Technol. Web Eng.}, volume = {14}, number = {2}, pages = {74--91}, year = {2019}, url = {https://doi.org/10.4018/IJITWE.2019040105}, doi = {10.4018/IJITWE.2019040105}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijitwe/ShanLLGX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LiLHWCGC19, author = {Fenghua Li and Zifu Li and Weili Han and Ting Wu and Lihua Chen and Yunchuan Guo and Jinjun Chen}, title = {Cyberspace-Oriented Access Control: {A} Cyberspace Characteristics-Based Model and its Policies}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {2}, pages = {1471--1483}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2018.2839065}, doi = {10.1109/JIOT.2018.2839065}, timestamp = {Tue, 19 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/LiLHWCGC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocs/GuoZZFL19, author = {Yunchuan Guo and Han Zhang and Lingcui Zhang and Liang Fang and Fenghua Li}, title = {A game theoretic approach to cooperative intrusion detection}, journal = {J. Comput. Sci.}, volume = {30}, pages = {118--126}, year = {2019}, url = {https://doi.org/10.1016/j.jocs.2018.11.003}, doi = {10.1016/J.JOCS.2018.11.003}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocs/GuoZZFL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/DongGLDK19, author = {Xiuze Dong and Yunchuan Guo and Fenghua Li and Liju Dong and Arshad Khan}, title = {Combination Model of Heterogeneous Data for Security Measurement}, journal = {J. Univers. Comput. Sci.}, volume = {25}, number = {3}, pages = {270--281}, year = {2019}, url = {http://www.jucs.org/jucs\_25\_3/combination\_model\_of\_heterogeneous}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jucs/DongGLDK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/SunCYGMZ19, author = {Yanwei Sun and Li Chen and Lihua Yin and Yunchuan Guo and Xiangjie Meng and Peng Zhang}, title = {Construction of Situation Assessment Indicator System Based on Latitude and Longitude Lines of Information Security}, booktitle = {Fourth {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2019, Hangzhou, China, June 23-25, 2019}, pages = {100--105}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC.2019.00023}, doi = {10.1109/DSC.2019.00023}, timestamp = {Thu, 30 Jan 2020 15:32:06 +0100}, biburl = {https://dblp.org/rec/conf/dsc/SunCYGMZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccS/GuoWFLLG19, author = {Yunchuan Guo and Xiao Wang and Liang Fang and Yongjun Li and Fenghua Li and Kui Geng}, editor = {Jo{\~{a}}o M. F. Rodrigues and Pedro J. S. Cardoso and J{\^{a}}nio M. Monteiro and Roberto Lam and Valeria V. Krzhizhanovskaya and Michael Harold Lees and Jack J. Dongarra and Peter M. A. Sloot}, title = {Incentive Mechanism for Cooperative Intrusion Response: {A} Dynamic Game Approach}, booktitle = {Computational Science - {ICCS} 2019 - 19th International Conference, Faro, Portugal, June 12-14, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11536}, pages = {590--603}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-22734-0\_43}, doi = {10.1007/978-3-030-22734-0\_43}, timestamp = {Tue, 11 Jun 2019 12:12:08 +0200}, biburl = {https://dblp.org/rec/conf/iccS/GuoWFLLG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ShanLLGN18, author = {Fangfang Shan and Hui Li and Fenghua Li and Yunchuan Guo and Ben Niu}, title = {{HAC:} Hybrid Access Control for Online Social Networks}, journal = {Secur. Commun. Networks}, volume = {2018}, pages = {7384194:1--7384194:11}, year = {2018}, url = {https://doi.org/10.1155/2018/7384194}, doi = {10.1155/2018/7384194}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/ShanLLGN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YinSWGLF18, author = {Lihua Yin and Yanwei Sun and Zhen Wang and Yunchuan Guo and Fenghua Li and Binxing Fang}, title = {Security Measurement for Unknown Threats Based on Attack Preferences}, journal = {Secur. Commun. Networks}, volume = {2018}, pages = {7412627:1--7412627:13}, year = {2018}, url = {https://doi.org/10.1155/2018/7412627}, doi = {10.1155/2018/7412627}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YinSWGLF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/www/YinGLSQV18, author = {Lihua Yin and Yunchuan Guo and Fenghua Li and Yanwei Sun and Junyan Qian and Athanasios V. Vasilakos}, title = {A game-theoretic approach to advertisement dissemination in ephemeral networks}, journal = {World Wide Web}, volume = {21}, number = {2}, pages = {241--260}, year = {2018}, url = {https://doi.org/10.1007/s11280-017-0432-6}, doi = {10.1007/S11280-017-0432-6}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/www/YinGLSQV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/GuoFGYLC18, author = {Yunchuan Guo and Liang Fang and Kui Geng and Lihua Yin and Fenghua Li and Lihua Chen}, title = {Real-Time Data Incentives for IoT Searches}, booktitle = {2018 {IEEE} International Conference on Communications, {ICC} 2018, Kansas City, MO, USA, May 20-24, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICC.2018.8422897}, doi = {10.1109/ICC.2018.8422897}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/GuoFGYLC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccS/GuoZZFL18, author = {Yunchuan Guo and Han Zhang and Lingcui Zhang and Liang Fang and Fenghua Li}, editor = {Yong Shi and Haohuan Fu and Yingjie Tian and Valeria V. Krzhizhanovskaya and Michael Harold Lees and Jack J. Dongarra and Peter M. A. Sloot}, title = {Incentive Mechanism for Cooperative Intrusion Detection: An Evolutionary Game Approach}, booktitle = {Computational Science - {ICCS} 2018 - 18th International Conference, Wuxi, China, June 11-13, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10860}, pages = {83--97}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93698-7\_7}, doi = {10.1007/978-3-319-93698-7\_7}, timestamp = {Mon, 08 May 2023 14:38:37 +0200}, biburl = {https://dblp.org/rec/conf/iccS/GuoZZFL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccS/SunYWGF18, author = {Yanwei Sun and Lihua Yin and Zhen Wang and Yunchuan Guo and Binxing Fang}, editor = {Yong Shi and Haohuan Fu and Yingjie Tian and Valeria V. Krzhizhanovskaya and Michael Harold Lees and Jack J. Dongarra and Peter M. A. Sloot}, title = {Identifying the Propagation Sources of Stealth Worms}, booktitle = {Computational Science - {ICCS} 2018 - 18th International Conference, Wuxi, China, June 11-13, 2018 Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10862}, pages = {811--817}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93713-7\_79}, doi = {10.1007/978-3-319-93713-7\_79}, timestamp = {Mon, 08 May 2023 14:38:37 +0200}, biburl = {https://dblp.org/rec/conf/iccS/SunYWGF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/LiLYGYW18, author = {Fenghua Li and Yongjun Li and Zhengkun Yang and Yunchuan Guo and Lihua Yin and Zhen Wang}, title = {Selecting Combined Countermeasures for Multi-Attack Paths in Intrusion Response System}, booktitle = {27th International Conference on Computer Communication and Networks, {ICCCN} 2018, Hangzhou, China, July 30 - August 2, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICCCN.2018.8487417}, doi = {10.1109/ICCCN.2018.8487417}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/icccn/LiLYGYW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iiki/DingLGYZ18, author = {Jingquan Ding and Xiao Li and Yunchuan Guo and Lihua Yin and Huibing Zhang}, editor = {Rongfang Bie and Yunchuan Sun and Jiguo Yu}, title = {Process Calculus for Modeling and Quantifying Location Privacy}, booktitle = {2018 International Conference on Identification, Information and Knowledge in the Internet of Things, {IIKI} 2018, Beijing, China, October 19-21, 2018}, series = {Procedia Computer Science}, volume = {147}, pages = {407--415}, publisher = {Elsevier}, year = {2018}, url = {https://doi.org/10.1016/j.procs.2019.01.257}, doi = {10.1016/J.PROCS.2019.01.257}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iiki/DingLGYZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/FangYGWL18, author = {Liang Fang and Lihua Yin and Yunchuan Guo and Zhen Wang and Fenghua Li}, title = {Resolving Access Conflicts: An Auction-Based Incentive Approach}, booktitle = {2018 {IEEE} Military Communications Conference, {MILCOM} 2018, Los Angeles, CA, USA, October 29-31, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/MILCOM.2018.8599819}, doi = {10.1109/MILCOM.2018.8599819}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/milcom/FangYGWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceee/WangZLYCZG17, author = {Lei Wang and Tiedi Zhang and Oupeng Li and Manfei Yang and Qing Chen and Mingzhou Zan and Yunchuan Guo}, title = {A D-band divide-by-6 injection-locked frequency divider with Lange-coupler feedback architecture in 0.13 {\(\mathrm{\mu}\)}m SiGe {HBT}}, journal = {{IEICE} Electron. Express}, volume = {14}, number = {17}, pages = {20170328}, year = {2017}, url = {https://doi.org/10.1587/elex.14.20170328}, doi = {10.1587/ELEX.14.20170328}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieiceee/WangZLYCZG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceee/GuoSLWLXZ17, author = {Yunchuan Guo and Chengwei Shang and Kun Liu and Lei Wang and Xiansuo Liu and Yuehang Xu and Tiedi Zhang}, title = {A true-time-delay transmit/receive module for X-band subarray phased arrays}, journal = {{IEICE} Electron. Express}, volume = {14}, number = {22}, pages = {20171039}, year = {2017}, url = {https://doi.org/10.1587/elex.14.20171039}, doi = {10.1587/ELEX.14.20171039}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieiceee/GuoSLWLXZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/LiLHWCG17, author = {Fenghua Li and Zifu Li and Weili Han and Ting Wu and Lihua Chen and Yunchuan Guo}, title = {Cyberspace-Oriented Access Control: Model and Policies}, booktitle = {Second {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2017, Shenzhen, China, June 26-29, 2017}, pages = {261--266}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/DSC.2017.100}, doi = {10.1109/DSC.2017.100}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsc/LiLHWCG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/SunYGLF17, author = {Yanwei Sun and Lihua Yin and Yunchuan Guo and Fenghua Li and Binxing Fang}, editor = {Shadi Ibrahim and Kim{-}Kwang Raymond Choo and Zheng Yan and Witold Pedrycz}, title = {Optimally Selecting the Timing of Zero-Day Attack via Spatial Evolutionary Game}, booktitle = {Algorithms and Architectures for Parallel Processing - 17th International Conference, {ICA3PP} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10393}, pages = {313--327}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-65482-9\_21}, doi = {10.1007/978-3-319-65482-9\_21}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/SunYGLF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/LiYGLLC17, author = {Jing Li and Lihua Yin and Yunchuan Guo and Chao Li and Fenghua Li and Lihua Chen}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {A Novel Threat-Driven Data Collection Method for Resource-Constrained Networks}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {486--496}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_36}, doi = {10.1007/978-3-319-64701-2\_36}, timestamp = {Wed, 23 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/LiYGLLC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spaccs/LiuFYGL17, author = {Ziwen Liu and Liang Fang and Lihua Yin and Yunchuan Guo and Fenghua Li}, editor = {Guojun Wang and Mohammed Atiquzzaman and Zheng Yan and Kim{-}Kwang Raymond Choo}, title = {Research on Similarity Record Detection of Device Status Information Based on Multiple Encoding Field}, booktitle = {Security, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10658}, pages = {54--63}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72395-2\_6}, doi = {10.1007/978-3-319-72395-2\_6}, timestamp = {Tue, 03 Mar 2020 16:31:00 +0100}, biburl = {https://dblp.org/rec/conf/spaccs/LiuFYGL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/LeeWG16, author = {Chao Lee and Wei Wang and Yunchuan Guo}, title = {A Fine-Grained Multiparty Access Control Model for Photo Sharing in OSNs}, booktitle = {{IEEE} First International Conference on Data Science in Cyberspace, {DSC} 2016, Changsha, China, June 13-16, 2016}, pages = {440--445}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/DSC.2016.113}, doi = {10.1109/DSC.2016.113}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsc/LeeWG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apweb/YinGSQV15, author = {Lihua Yin and Yunchuan Guo and Yanwei Sun and Junyan Qian and Athanasios V. Vasilakos}, editor = {Reynold Cheng and Bin Cui and Zhenjie Zhang and Ruichu Cai and Jia Xu}, title = {Ad Dissemination Game in Ephemeral Networks}, booktitle = {Web Technologies and Applications - 17th Asia-PacificWeb Conference, APWeb 2015, Guangzhou, China, September 18-20, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9313}, pages = {610--622}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25255-1\_50}, doi = {10.1007/978-3-319-25255-1\_50}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/apweb/YinGSQV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/QuanYG15, author = {Daiyong Quan and Lihua Yin and Yunchuan Guo}, editor = {Dongdai Lin and XiaoFeng Wang and Moti Yung}, title = {Assessing the Disclosure of User Profile in Mobile-Aware Services}, booktitle = {Information Security and Cryptology - 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9589}, pages = {451--467}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-38898-4\_26}, doi = {10.1007/978-3-319-38898-4\_26}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/QuanYG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QuanYG15, author = {Daiyong Quan and Lihua Yin and Yunchuan Guo}, title = {Enhancing the Trajectory Privacy with Laplace Mechanism}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {1218--1223}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.508}, doi = {10.1109/TRUSTCOM.2015.508}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/QuanYG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apweb/FangG14, author = {Liang Fang and Yunchuan Guo}, editor = {Weihong Han and Zi Huang and Changjun Hu and Hongli Zhang and Li Guo}, title = {A Survey of Role Mining Methods in Role-Based Access Control System}, booktitle = {Web Technologies and Applications - APWeb 2014 Workshops, SNA, NIS, and IoTS, Changsha, China, September 5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8710}, pages = {291--300}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11119-3\_27}, doi = {10.1007/978-3-319-11119-3\_27}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/apweb/FangG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyberc/LiuYGF14, author = {Licai Liu and Lihua Yin and Yunchuan Guo and Bingxing Fang}, title = {{EAC:} {A} Framework of Authentication Property for the IOTs}, booktitle = {2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2014, Shanghai, China, October 13-15, 2014}, pages = {102--105}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CyberC.2014.25}, doi = {10.1109/CYBERC.2014.25}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyberc/LiuYGF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/GuoYC14, author = {Yunchuan Guo and Lihua Yin and Li Chao}, title = {Automatically verifying {STRAC} policy}, booktitle = {2014 Proceedings {IEEE} {INFOCOM} Workshops, Toronto, ON, Canada, April 27 - May 2, 2014}, pages = {141--142}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/INFCOMW.2014.6849195}, doi = {10.1109/INFCOMW.2014.6849195}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/GuoYC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/LiuGY14, author = {Licai Liu and Yunchuan Guo and Lihua Yin}, title = {Analyzing asking/bidding price in dynamic game for cooperative authentication}, booktitle = {2014 Proceedings {IEEE} {INFOCOM} Workshops, Toronto, ON, Canada, April 27 - May 2, 2014}, pages = {165--166}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/INFCOMW.2014.6849207}, doi = {10.1109/INFCOMW.2014.6849207}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/LiuGY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/GuoYLF14, author = {Yunchuan Guo and Lihua Yin and Licai Liu and Binxing Fang}, title = {Utility-based cooperative decision in cooperative authentication}, booktitle = {2014 {IEEE} Conference on Computer Communications, {INFOCOM} 2014, Toronto, Canada, April 27 - May 2, 2014}, pages = {1006--1014}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/INFOCOM.2014.6848030}, doi = {10.1109/INFOCOM.2014.6848030}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/GuoYLF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuYGF14, author = {Licai Liu and Lihua Yin and Yunchuan Guo and Bingxing Fang}, title = {Bargaining-Based Dynamic Decision for Cooperative Authentication in MANETs}, booktitle = {13th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, Beijing, China, September 24-26, 2014}, pages = {212--220}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/TrustCom.2014.32}, doi = {10.1109/TRUSTCOM.2014.32}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuYGF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ancs/LiuGYS13, author = {Licai Liu and Yunchuan Guo and Lihua Yin and Yan Sun}, title = {Balancing authentication and location privacy in cooperative authentication}, booktitle = {Symposium on Architecture for Networking and Communications Systems, {ANCS} '13, San Jose, CA, USA, October 21-22, 2013}, pages = {107--108}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ANCS.2013.6665181}, doi = {10.1109/ANCS.2013.6665181}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ancs/LiuGYS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itqm/LeeGY13, author = {Chao Lee and Yunchuan Guo and Lihua Yin}, editor = {Yong Shi and Youmin Xi and Peter Wolcott and Yingjie Tian and Jianping Li and Daniel Berg and Zhengxin Chen and Enrique Herrera{-}Viedma and Gang Kou and Heeseok Lee and Yi Peng and Lean Yu}, title = {A Framework of Evaluation Location Privacy in Mobile Network}, booktitle = {Proceedings of the First International Conference on Information Technology and Quantitative Management, {ITQM} 2013, Dushu Lake Hotel, Sushou, China, 16-18 May, 2013}, series = {Procedia Computer Science}, volume = {17}, pages = {879--887}, publisher = {Elsevier}, year = {2013}, url = {https://doi.org/10.1016/j.procs.2013.05.112}, doi = {10.1016/J.PROCS.2013.05.112}, timestamp = {Mon, 08 May 2023 14:38:37 +0200}, biburl = {https://dblp.org/rec/conf/itqm/LeeGY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/WuYG12, author = {Jinyu Wu and Lihua Yin and Yunchuan Guo}, title = {Cyber Attacks Prediction Model Based on Bayesian Network}, booktitle = {18th {IEEE} International Conference on Parallel and Distributed Systems, {ICPADS} 2012, Singapore, December 17-19, 2012}, pages = {730--731}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ICPADS.2012.117}, doi = {10.1109/ICPADS.2012.117}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpads/WuYG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip12/LeeYG12, author = {Chao Lee and Lihua Yin and Yunchuan Guo}, editor = {Zhongzhi Shi and David B. Leake and Sunil Vadera}, title = {A Cluster-Based Multilevel Security Model for Wireless Sensor Networks}, booktitle = {Intelligent Information Processing {VI} - 7th {IFIP} {TC} 12 International Conference, {IIP} 2012, Guilin, China, October 12-15, 2012. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {385}, pages = {320--330}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32891-6\_40}, doi = {10.1007/978-3-642-32891-6\_40}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip12/LeeYG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/FangGZ10, author = {Binxing Fang and Yunchuan Guo and Yuan Zhou}, title = {Information content security on the Internet: the control model and its evaluation}, journal = {Sci. China Inf. Sci.}, volume = {53}, number = {1}, pages = {30--49}, year = {2010}, url = {https://doi.org/10.1007/s11432-010-0014-z}, doi = {10.1007/S11432-010-0014-Z}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/FangGZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwa/YinFGH10, author = {Lihua Yin and Binxing Fang and Yunchuan Guo and Hui He}, title = {Formalization and Quantitative Analysis of Controllability on Internet Information Security}, journal = {Int. J. Web Appl.}, volume = {2}, number = {2}, pages = {109--120}, year = {2010}, url = {http://dline.info/ijwa/fulltext/v2n2/4.pdf}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwa/YinFGH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/GuoYZF10, author = {Yunchuan Guo and Lihua Yin and Yuan Zhou and Binxing Fang}, title = {Quantifying Information Leakage for Fully Probabilistic Systems}, booktitle = {10th {IEEE} International Conference on Computer and Information Technology, {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010}, pages = {589--595}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CIT.2010.122}, doi = {10.1109/CIT.2010.122}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcit/GuoYZF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/YinG09, author = {Lihua Yin and Yunchuan Guo}, title = {Research on Quantitative Evaluation for Integrity}, booktitle = {Proceedings of the Fifth International Conference on Information Assurance and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009}, pages = {689--692}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/IAS.2009.105}, doi = {10.1109/IAS.2009.105}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/YinG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nas/GuoYZLG09, author = {Yunchuan Guo and Lihua Yin and Yuan Zhou and Chao Li and Li Guo}, title = {Simulation Analysis of Probabilistic Timing Covert Channels}, booktitle = {International Conference on Networking, Architecture, and Storage, {NAS} 2009, 9-11 July 2009, Zhang Jia Jie, Hunan, China}, pages = {325--332}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/NAS.2009.61}, doi = {10.1109/NAS.2009.61}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nas/GuoYZLG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.