BibTeX records: Yunchuan Guo

download as .bib file

@article{DBLP:journals/concurrency/ChenWWGLL23,
  author       = {Lili Chen and
                  Zhen Wang and
                  Jintao Wu and
                  Yunchuan Guo and
                  Fenghua Li and
                  Zifu Li},
  title        = {Dynamic threshold strategy optimization for security protection in
                  Internet of Things: An adversarial deep learning-based game-theoretical
                  approach},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {35},
  number       = {20},
  year         = {2023},
  url          = {https://doi.org/10.1002/cpe.6944},
  doi          = {10.1002/CPE.6944},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/ChenWWGLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bdcloud/ZhangGLLLF23,
  author       = {Lin Zhang and
                  Yunchuan Guo and
                  Siyuan Leng and
                  Zifu Li and
                  Fenghua Li and
                  Liang Fang},
  title        = {A Moving Target Defense Approach for the Distributed Dynamic Network},
  booktitle    = {{IEEE} Intl Conf on Parallel {\&} Distributed Processing with
                  Applications, Big Data {\&} Cloud Computing, Sustainable Computing
                  {\&} Communications, Social Computing {\&} Networking, ISPA/BDCloud/SocialCom/SustainCom,
                  2023, Wuhan, China, December 21-24, 2023},
  pages        = {336--343},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom59178.2023.00076},
  doi          = {10.1109/ISPA-BDCLOUD-SOCIALCOM-SUSTAINCOM59178.2023.00076},
  timestamp    = {Thu, 18 Apr 2024 16:12:26 +0200},
  biburl       = {https://dblp.org/rec/conf/bdcloud/ZhangGLLLF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bdcloud/LengLZWGF23,
  author       = {Siyuan Leng and
                  Fenghua Li and
                  Lin Zhang and
                  Yitong Wen and
                  Yunchuan Guo and
                  Liang Fang},
  title        = {ProMD: {A} Proactive Intrusion Response System for Enterprise Network
                  with Multi-Domain},
  booktitle    = {{IEEE} Intl Conf on Parallel {\&} Distributed Processing with
                  Applications, Big Data {\&} Cloud Computing, Sustainable Computing
                  {\&} Communications, Social Computing {\&} Networking, ISPA/BDCloud/SocialCom/SustainCom,
                  2023, Wuhan, China, December 21-24, 2023},
  pages        = {402--409},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom59178.2023.00085},
  doi          = {10.1109/ISPA-BDCLOUD-SOCIALCOM-SUSTAINCOM59178.2023.00085},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bdcloud/LengLZWGF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/LuanLZCG23,
  author       = {Shijie Luan and
                  Xiang Lu and
                  Zhuangzhuang Zhang and
                  Guangsheng Chang and
                  Yunchuan Guo},
  title        = {Efficient and Privacy-Preserving Byzantine-Robust Federated Learning},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2023, Kuala Lumpur,
                  Malaysia, December 4-8, 2023},
  pages        = {2202--2208},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/GLOBECOM54140.2023.10437426},
  doi          = {10.1109/GLOBECOM54140.2023.10437426},
  timestamp    = {Sun, 10 Mar 2024 10:39:12 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/LuanLZCG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcan/YuLYWG22,
  author       = {Mingjie Yu and
                  Fenghua Li and
                  Nenghai Yu and
                  Xiao Wang and
                  Yunchuan Guo},
  title        = {Detecting conflict of heterogeneous access control policies},
  journal      = {Digit. Commun. Networks},
  volume       = {8},
  number       = {5},
  pages        = {664--679},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.dcan.2022.09.002},
  doi          = {10.1016/J.DCAN.2022.09.002},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcan/YuLYWG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/LiLYGWL22,
  author       = {Chaoyang Li and
                  Fenghua Li and
                  Mingjie Yu and
                  Yunchuan Guo and
                  Yitong Wen and
                  Zifu Li},
  title        = {Insider Threat Detection Using Generative Adversarial Graph Attention
                  Networks},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2022, Rio de Janeiro,
                  Brazil, December 4-8, 2022},
  pages        = {2680--2685},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/GLOBECOM48099.2022.10001207},
  doi          = {10.1109/GLOBECOM48099.2022.10001207},
  timestamp    = {Tue, 17 Jan 2023 08:56:31 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/LiLYGWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/LengXZGFL22,
  author       = {Siyuan Leng and
                  Yingke Xie and
                  Yifan Zhang and
                  Yunchuan Guo and
                  Liang Fang and
                  Fenghua Li},
  title        = {{DICOF:} {A} Distributed and Collaborative Framework for Hybrid DDoS
                  Attack Detection},
  booktitle    = {{IEEE} Symposium on Computers and Communications, {ISCC} 2022, Rhodes,
                  Greece, June 30 - July 3, 2022},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ISCC55528.2022.9912872},
  doi          = {10.1109/ISCC55528.2022.9912872},
  timestamp    = {Tue, 25 Oct 2022 21:20:50 +0200},
  biburl       = {https://dblp.org/rec/conf/iscc/LengXZGFL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangGYZ22,
  author       = {Chunlei Yang and
                  Yunchuan Guo and
                  Mingjie Yu and
                  Lingcui Zhang},
  title        = {Truthfully Negotiating Usage Policy for Data Sovereignty},
  booktitle    = {{IEEE} International Conference on Trust, Security and Privacy in
                  Computing and Communications, TrustCom 2022, Wuhan, China, December
                  9-11, 2022},
  pages        = {20--27},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00014},
  doi          = {10.1109/TRUSTCOM56396.2022.00014},
  timestamp    = {Mon, 27 Mar 2023 16:44:39 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangGYZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiCGFGL22,
  author       = {Fenghua Li and
                  Cao Chen and
                  Yunchuan Guo and
                  Liang Fang and
                  Chao Guo and
                  Zifu Li},
  title        = {Efficiently Constructing Topology of Dynamic Networks},
  booktitle    = {{IEEE} International Conference on Trust, Security and Privacy in
                  Computing and Communications, TrustCom 2022, Wuhan, China, December
                  9-11, 2022},
  pages        = {44--51},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00017},
  doi          = {10.1109/TRUSTCOM56396.2022.00017},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiCGFGL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangHGLW22,
  author       = {Fayao Wang and
                  Yuanyuan He and
                  Yunchuan Guo and
                  Peizhi Li and
                  Xinyu Wei},
  title        = {Privacy-Preserving Robust Federated Learning with Distributed Differential
                  Privacy},
  booktitle    = {{IEEE} International Conference on Trust, Security and Privacy in
                  Computing and Communications, TrustCom 2022, Wuhan, China, December
                  9-11, 2022},
  pages        = {598--605},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00087},
  doi          = {10.1109/TRUSTCOM56396.2022.00087},
  timestamp    = {Fri, 01 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangHGLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/XieLSGNS21,
  author       = {Rongna Xie and
                  Hui Li and
                  Guozhen Shi and
                  Yunchuan Guo and
                  Ben Niu and
                  Mang Su},
  title        = {Provenance-based data flow control mechanism for Internet of things},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {32},
  number       = {5},
  year         = {2021},
  url          = {https://doi.org/10.1002/ett.3934},
  doi          = {10.1002/ETT.3934},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/XieLSGNS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/JinGYGL21,
  author       = {Wei Jin and
                  Kui Geng and
                  Mingjie Yu and
                  Yunchuan Guo and
                  Fenghua Li},
  title        = {Efficiently Managing Large-Scale Keys in {HDFS}},
  booktitle    = {2021 {IEEE} 23rd Int Conf on High Performance Computing {\&} Communications;
                  7th Int Conf on Data Science {\&} Systems; 19th Int Conf on Smart
                  City; 7th Int Conf on Dependability in Sensor, Cloud {\&} Big
                  Data Systems {\&} Application (HPCC/DSS/SmartCity/DependSys),
                  Haikou, Hainan, China, December 20-22, 2021},
  pages        = {353--360},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/HPCC-DSS-SmartCity-DependSys53884.2021.00071},
  doi          = {10.1109/HPCC-DSS-SMARTCITY-DEPENDSYS53884.2021.00071},
  timestamp    = {Thu, 09 Jun 2022 16:39:42 +0200},
  biburl       = {https://dblp.org/rec/conf/hpcc/JinGYGL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccS/GuoSYLGL21,
  author       = {Yunchuan Guo and
                  Xiyang Sun and
                  Mingjie Yu and
                  Fenghua Li and
                  Kui Geng and
                  Zifu Li},
  editor       = {Maciej Paszynski and
                  Dieter Kranzlm{\"{u}}ller and
                  Valeria V. Krzhizhanovskaya and
                  Jack J. Dongarra and
                  Peter M. A. Sloot},
  title        = {Resolving Policy Conflicts for Cross-Domain Access Control: {A} Double
                  Auction Approach},
  booktitle    = {Computational Science - {ICCS} 2021 - 21st International Conference,
                  Krakow, Poland, June 16-18, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12742},
  pages        = {525--539},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-77961-0\_43},
  doi          = {10.1007/978-3-030-77961-0\_43},
  timestamp    = {Fri, 11 Jun 2021 16:12:41 +0200},
  biburl       = {https://dblp.org/rec/conf/iccS/GuoSYLGL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhangQLGZZX20,
  author       = {Huibing Zhang and
                  Longfei Qin and
                  Jun Li and
                  Yunchuan Guo and
                  Ya Zhou and
                  Jingwei Zhang and
                  Zhi Xu},
  title        = {Real-Time Detection Method for Small Traffic Signs Based on Yolov3},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {64145--64156},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2984554},
  doi          = {10.1109/ACCESS.2020.2984554},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhangQLGZZX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiLLGGWF20,
  author       = {Fenghua Li and
                  Yongjun Li and
                  Siyuan Leng and
                  Yunchuan Guo and
                  Kui Geng and
                  Zhen Wang and
                  Liang Fang},
  title        = {Dynamic countermeasures selection for multi-path attacks},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101927},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101927},
  doi          = {10.1016/J.COSE.2020.101927},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiLLGGWF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/XieSGL20,
  author       = {Rongna Xie and
                  Guozhen Shi and
                  Yunchuan Guo and
                  Fenghua Li},
  title        = {A topic-centric access control model for the publish/subscribe paradigm},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {32},
  number       = {9},
  year         = {2020},
  url          = {https://doi.org/10.1002/cpe.5614},
  doi          = {10.1002/CPE.5614},
  timestamp    = {Mon, 04 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/XieSGL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/YinFGST20,
  author       = {Lihua Yin and
                  Binxing Fang and
                  Yunchuan Guo and
                  Zhe Sun and
                  Zhihong Tian},
  title        = {Hierarchically defining Internet of Things security: From {CIA} to
                  {CACA}},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {16},
  number       = {1},
  year         = {2020},
  url          = {https://doi.org/10.1177/1550147719899374},
  doi          = {10.1177/1550147719899374},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/YinFGST20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/FangSWLXG20,
  author       = {Liang Fang and
                  Guozhen Shi and
                  Lianhai Wang and
                  Yongjun Li and
                  Shujiang Xu and
                  Yunchuan Guo},
  title        = {Incentive mechanism for cooperative authentication: An evolutionary
                  game approach},
  journal      = {Inf. Sci.},
  volume       = {527},
  pages        = {369--381},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ins.2019.07.030},
  doi          = {10.1016/J.INS.2019.07.030},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/FangSWLXG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/LiLFLXG20,
  author       = {Fenghua Li and
                  Zifu Li and
                  Liang Fang and
                  Yongjun Li and
                  Yaobing Xu and
                  Yunchuan Guo},
  title        = {Securing instruction interaction for hierarchical management},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {137},
  pages        = {91--103},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jpdc.2019.10.010},
  doi          = {10.1016/J.JPDC.2019.10.010},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpdc/LiLFLXG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/ChenWLGG20,
  author       = {Lili Chen and
                  Zhen Wang and
                  Fenghua Li and
                  Yunchuan Guo and
                  Kui Geng},
  title        = {A Stackelberg Security Game for Adversarial Outbreak Detection in
                  the Internet of Things},
  journal      = {Sensors},
  volume       = {20},
  number       = {3},
  pages        = {804},
  year         = {2020},
  url          = {https://doi.org/10.3390/s20030804},
  doi          = {10.3390/S20030804},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/ChenWLGG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccoms/DongHGZ20,
  author       = {Junchao Dong and
                  Feijuan He and
                  Yunchuan Guo and
                  Huibing Zhang},
  title        = {A Commodity Review Sentiment Analysis Based on {BERT-CNN} Model},
  booktitle    = {5th International Conference on Computer and Communication Systems,
                  {ICCCS} 2020, Shanghai, China, May 15-18, 2020},
  pages        = {143--147},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICCCS49078.2020.9118434},
  doi          = {10.1109/ICCCS49078.2020.9118434},
  timestamp    = {Mon, 02 Aug 2021 08:40:32 +0200},
  biburl       = {https://dblp.org/rec/conf/ccoms/DongHGZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexa/ChenLZGF20,
  author       = {Tianzhu Chen and
                  Fenghua Li and
                  Fuzhen Zhuang and
                  Yunchuan Guo and
                  Liang Fang},
  editor       = {Sven Hartmann and
                  Josef K{\"{u}}ng and
                  Gabriele Kotsis and
                  A Min Tjoa and
                  Ismail Khalil},
  title        = {The Linear Geometry Structure of Label Matrix for Multi-label Learning},
  booktitle    = {Database and Expert Systems Applications - 31st International Conference,
                  {DEXA} 2020, Bratislava, Slovakia, September 14-17, 2020, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12392},
  pages        = {229--244},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-59051-2\_15},
  doi          = {10.1007/978-3-030-59051-2\_15},
  timestamp    = {Tue, 29 Dec 2020 18:31:18 +0100},
  biburl       = {https://dblp.org/rec/conf/dexa/ChenLZGF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/GuoZLLFYC20,
  author       = {Yunchuan Guo and
                  Han Zhang and
                  Zifu Li and
                  Fenghua Li and
                  Liang Fang and
                  Lihua Yin and
                  Jin Cao},
  title        = {Decision-Making for Intrusion Response: Which, Where, in What Order,
                  and How Long?},
  booktitle    = {2020 {IEEE} International Conference on Communications, {ICC} 2020,
                  Dublin, Ireland, June 7-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICC40277.2020.9149083},
  doi          = {10.1109/ICC40277.2020.9149083},
  timestamp    = {Tue, 04 Aug 2020 10:37:23 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/GuoZLLFYC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijitwe/ShanLLGX19,
  author       = {Fangfang Shan and
                  Hui Li and
                  Fenghua Li and
                  Yunchuan Guo and
                  Jinbo Xiong},
  title        = {An Attribute-Based Assured Deletion Scheme in Cloud Computing},
  journal      = {Int. J. Inf. Technol. Web Eng.},
  volume       = {14},
  number       = {2},
  pages        = {74--91},
  year         = {2019},
  url          = {https://doi.org/10.4018/IJITWE.2019040105},
  doi          = {10.4018/IJITWE.2019040105},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijitwe/ShanLLGX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiLHWCGC19,
  author       = {Fenghua Li and
                  Zifu Li and
                  Weili Han and
                  Ting Wu and
                  Lihua Chen and
                  Yunchuan Guo and
                  Jinjun Chen},
  title        = {Cyberspace-Oriented Access Control: {A} Cyberspace Characteristics-Based
                  Model and its Policies},
  journal      = {{IEEE} Internet Things J.},
  volume       = {6},
  number       = {2},
  pages        = {1471--1483},
  year         = {2019},
  url          = {https://doi.org/10.1109/JIOT.2018.2839065},
  doi          = {10.1109/JIOT.2018.2839065},
  timestamp    = {Tue, 19 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/LiLHWCGC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocs/GuoZZFL19,
  author       = {Yunchuan Guo and
                  Han Zhang and
                  Lingcui Zhang and
                  Liang Fang and
                  Fenghua Li},
  title        = {A game theoretic approach to cooperative intrusion detection},
  journal      = {J. Comput. Sci.},
  volume       = {30},
  pages        = {118--126},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jocs.2018.11.003},
  doi          = {10.1016/J.JOCS.2018.11.003},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocs/GuoZZFL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/DongGLDK19,
  author       = {Xiuze Dong and
                  Yunchuan Guo and
                  Fenghua Li and
                  Liju Dong and
                  Arshad Khan},
  title        = {Combination Model of Heterogeneous Data for Security Measurement},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {25},
  number       = {3},
  pages        = {270--281},
  year         = {2019},
  url          = {http://www.jucs.org/jucs\_25\_3/combination\_model\_of\_heterogeneous},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jucs/DongGLDK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/SunCYGMZ19,
  author       = {Yanwei Sun and
                  Li Chen and
                  Lihua Yin and
                  Yunchuan Guo and
                  Xiangjie Meng and
                  Peng Zhang},
  title        = {Construction of Situation Assessment Indicator System Based on Latitude
                  and Longitude Lines of Information Security},
  booktitle    = {Fourth {IEEE} International Conference on Data Science in Cyberspace,
                  {DSC} 2019, Hangzhou, China, June 23-25, 2019},
  pages        = {100--105},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/DSC.2019.00023},
  doi          = {10.1109/DSC.2019.00023},
  timestamp    = {Thu, 30 Jan 2020 15:32:06 +0100},
  biburl       = {https://dblp.org/rec/conf/dsc/SunCYGMZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccS/GuoWFLLG19,
  author       = {Yunchuan Guo and
                  Xiao Wang and
                  Liang Fang and
                  Yongjun Li and
                  Fenghua Li and
                  Kui Geng},
  editor       = {Jo{\~{a}}o M. F. Rodrigues and
                  Pedro J. S. Cardoso and
                  J{\^{a}}nio M. Monteiro and
                  Roberto Lam and
                  Valeria V. Krzhizhanovskaya and
                  Michael Harold Lees and
                  Jack J. Dongarra and
                  Peter M. A. Sloot},
  title        = {Incentive Mechanism for Cooperative Intrusion Response: {A} Dynamic
                  Game Approach},
  booktitle    = {Computational Science - {ICCS} 2019 - 19th International Conference,
                  Faro, Portugal, June 12-14, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11536},
  pages        = {590--603},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-22734-0\_43},
  doi          = {10.1007/978-3-030-22734-0\_43},
  timestamp    = {Tue, 11 Jun 2019 12:12:08 +0200},
  biburl       = {https://dblp.org/rec/conf/iccS/GuoWFLLG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ShanLLGN18,
  author       = {Fangfang Shan and
                  Hui Li and
                  Fenghua Li and
                  Yunchuan Guo and
                  Ben Niu},
  title        = {{HAC:} Hybrid Access Control for Online Social Networks},
  journal      = {Secur. Commun. Networks},
  volume       = {2018},
  pages        = {7384194:1--7384194:11},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/7384194},
  doi          = {10.1155/2018/7384194},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/ShanLLGN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YinSWGLF18,
  author       = {Lihua Yin and
                  Yanwei Sun and
                  Zhen Wang and
                  Yunchuan Guo and
                  Fenghua Li and
                  Binxing Fang},
  title        = {Security Measurement for Unknown Threats Based on Attack Preferences},
  journal      = {Secur. Commun. Networks},
  volume       = {2018},
  pages        = {7412627:1--7412627:13},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/7412627},
  doi          = {10.1155/2018/7412627},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YinSWGLF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/www/YinGLSQV18,
  author       = {Lihua Yin and
                  Yunchuan Guo and
                  Fenghua Li and
                  Yanwei Sun and
                  Junyan Qian and
                  Athanasios V. Vasilakos},
  title        = {A game-theoretic approach to advertisement dissemination in ephemeral
                  networks},
  journal      = {World Wide Web},
  volume       = {21},
  number       = {2},
  pages        = {241--260},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11280-017-0432-6},
  doi          = {10.1007/S11280-017-0432-6},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/www/YinGLSQV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/GuoFGYLC18,
  author       = {Yunchuan Guo and
                  Liang Fang and
                  Kui Geng and
                  Lihua Yin and
                  Fenghua Li and
                  Lihua Chen},
  title        = {Real-Time Data Incentives for IoT Searches},
  booktitle    = {2018 {IEEE} International Conference on Communications, {ICC} 2018,
                  Kansas City, MO, USA, May 20-24, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICC.2018.8422897},
  doi          = {10.1109/ICC.2018.8422897},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/GuoFGYLC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccS/GuoZZFL18,
  author       = {Yunchuan Guo and
                  Han Zhang and
                  Lingcui Zhang and
                  Liang Fang and
                  Fenghua Li},
  editor       = {Yong Shi and
                  Haohuan Fu and
                  Yingjie Tian and
                  Valeria V. Krzhizhanovskaya and
                  Michael Harold Lees and
                  Jack J. Dongarra and
                  Peter M. A. Sloot},
  title        = {Incentive Mechanism for Cooperative Intrusion Detection: An Evolutionary
                  Game Approach},
  booktitle    = {Computational Science - {ICCS} 2018 - 18th International Conference,
                  Wuxi, China, June 11-13, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10860},
  pages        = {83--97},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93698-7\_7},
  doi          = {10.1007/978-3-319-93698-7\_7},
  timestamp    = {Mon, 08 May 2023 14:38:37 +0200},
  biburl       = {https://dblp.org/rec/conf/iccS/GuoZZFL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccS/SunYWGF18,
  author       = {Yanwei Sun and
                  Lihua Yin and
                  Zhen Wang and
                  Yunchuan Guo and
                  Binxing Fang},
  editor       = {Yong Shi and
                  Haohuan Fu and
                  Yingjie Tian and
                  Valeria V. Krzhizhanovskaya and
                  Michael Harold Lees and
                  Jack J. Dongarra and
                  Peter M. A. Sloot},
  title        = {Identifying the Propagation Sources of Stealth Worms},
  booktitle    = {Computational Science - {ICCS} 2018 - 18th International Conference,
                  Wuxi, China, June 11-13, 2018 Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10862},
  pages        = {811--817},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93713-7\_79},
  doi          = {10.1007/978-3-319-93713-7\_79},
  timestamp    = {Mon, 08 May 2023 14:38:37 +0200},
  biburl       = {https://dblp.org/rec/conf/iccS/SunYWGF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/LiLYGYW18,
  author       = {Fenghua Li and
                  Yongjun Li and
                  Zhengkun Yang and
                  Yunchuan Guo and
                  Lihua Yin and
                  Zhen Wang},
  title        = {Selecting Combined Countermeasures for Multi-Attack Paths in Intrusion
                  Response System},
  booktitle    = {27th International Conference on Computer Communication and Networks,
                  {ICCCN} 2018, Hangzhou, China, July 30 - August 2, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICCCN.2018.8487417},
  doi          = {10.1109/ICCCN.2018.8487417},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/icccn/LiLYGYW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iiki/DingLGYZ18,
  author       = {Jingquan Ding and
                  Xiao Li and
                  Yunchuan Guo and
                  Lihua Yin and
                  Huibing Zhang},
  editor       = {Rongfang Bie and
                  Yunchuan Sun and
                  Jiguo Yu},
  title        = {Process Calculus for Modeling and Quantifying Location Privacy},
  booktitle    = {2018 International Conference on Identification, Information and Knowledge
                  in the Internet of Things, {IIKI} 2018, Beijing, China, October 19-21,
                  2018},
  series       = {Procedia Computer Science},
  volume       = {147},
  pages        = {407--415},
  publisher    = {Elsevier},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.procs.2019.01.257},
  doi          = {10.1016/J.PROCS.2019.01.257},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iiki/DingLGYZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/FangYGWL18,
  author       = {Liang Fang and
                  Lihua Yin and
                  Yunchuan Guo and
                  Zhen Wang and
                  Fenghua Li},
  title        = {Resolving Access Conflicts: An Auction-Based Incentive Approach},
  booktitle    = {2018 {IEEE} Military Communications Conference, {MILCOM} 2018, Los
                  Angeles, CA, USA, October 29-31, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/MILCOM.2018.8599819},
  doi          = {10.1109/MILCOM.2018.8599819},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/FangYGWL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceee/WangZLYCZG17,
  author       = {Lei Wang and
                  Tiedi Zhang and
                  Oupeng Li and
                  Manfei Yang and
                  Qing Chen and
                  Mingzhou Zan and
                  Yunchuan Guo},
  title        = {A D-band divide-by-6 injection-locked frequency divider with Lange-coupler
                  feedback architecture in 0.13 {\(\mathrm{\mu}\)}m SiGe {HBT}},
  journal      = {{IEICE} Electron. Express},
  volume       = {14},
  number       = {17},
  pages        = {20170328},
  year         = {2017},
  url          = {https://doi.org/10.1587/elex.14.20170328},
  doi          = {10.1587/ELEX.14.20170328},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieiceee/WangZLYCZG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceee/GuoSLWLXZ17,
  author       = {Yunchuan Guo and
                  Chengwei Shang and
                  Kun Liu and
                  Lei Wang and
                  Xiansuo Liu and
                  Yuehang Xu and
                  Tiedi Zhang},
  title        = {A true-time-delay transmit/receive module for X-band subarray phased
                  arrays},
  journal      = {{IEICE} Electron. Express},
  volume       = {14},
  number       = {22},
  pages        = {20171039},
  year         = {2017},
  url          = {https://doi.org/10.1587/elex.14.20171039},
  doi          = {10.1587/ELEX.14.20171039},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieiceee/GuoSLWLXZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/LiLHWCG17,
  author       = {Fenghua Li and
                  Zifu Li and
                  Weili Han and
                  Ting Wu and
                  Lihua Chen and
                  Yunchuan Guo},
  title        = {Cyberspace-Oriented Access Control: Model and Policies},
  booktitle    = {Second {IEEE} International Conference on Data Science in Cyberspace,
                  {DSC} 2017, Shenzhen, China, June 26-29, 2017},
  pages        = {261--266},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/DSC.2017.100},
  doi          = {10.1109/DSC.2017.100},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsc/LiLHWCG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/SunYGLF17,
  author       = {Yanwei Sun and
                  Lihua Yin and
                  Yunchuan Guo and
                  Fenghua Li and
                  Binxing Fang},
  editor       = {Shadi Ibrahim and
                  Kim{-}Kwang Raymond Choo and
                  Zheng Yan and
                  Witold Pedrycz},
  title        = {Optimally Selecting the Timing of Zero-Day Attack via Spatial Evolutionary
                  Game},
  booktitle    = {Algorithms and Architectures for Parallel Processing - 17th International
                  Conference, {ICA3PP} 2017, Helsinki, Finland, August 21-23, 2017,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10393},
  pages        = {313--327},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-65482-9\_21},
  doi          = {10.1007/978-3-319-65482-9\_21},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ica3pp/SunYGLF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/LiYGLLC17,
  author       = {Jing Li and
                  Lihua Yin and
                  Yunchuan Guo and
                  Chao Li and
                  Fenghua Li and
                  Lihua Chen},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {A Novel Threat-Driven Data Collection Method for Resource-Constrained
                  Networks},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {486--496},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_36},
  doi          = {10.1007/978-3-319-64701-2\_36},
  timestamp    = {Wed, 23 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/LiYGLLC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spaccs/LiuFYGL17,
  author       = {Ziwen Liu and
                  Liang Fang and
                  Lihua Yin and
                  Yunchuan Guo and
                  Fenghua Li},
  editor       = {Guojun Wang and
                  Mohammed Atiquzzaman and
                  Zheng Yan and
                  Kim{-}Kwang Raymond Choo},
  title        = {Research on Similarity Record Detection of Device Status Information
                  Based on Multiple Encoding Field},
  booktitle    = {Security, Privacy, and Anonymity in Computation, Communication, and
                  Storage - SpaCCS 2017 International Workshops, Guangzhou, China, December
                  12-15, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10658},
  pages        = {54--63},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72395-2\_6},
  doi          = {10.1007/978-3-319-72395-2\_6},
  timestamp    = {Tue, 03 Mar 2020 16:31:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spaccs/LiuFYGL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/LeeWG16,
  author       = {Chao Lee and
                  Wei Wang and
                  Yunchuan Guo},
  title        = {A Fine-Grained Multiparty Access Control Model for Photo Sharing in
                  OSNs},
  booktitle    = {{IEEE} First International Conference on Data Science in Cyberspace,
                  {DSC} 2016, Changsha, China, June 13-16, 2016},
  pages        = {440--445},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/DSC.2016.113},
  doi          = {10.1109/DSC.2016.113},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsc/LeeWG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apweb/YinGSQV15,
  author       = {Lihua Yin and
                  Yunchuan Guo and
                  Yanwei Sun and
                  Junyan Qian and
                  Athanasios V. Vasilakos},
  editor       = {Reynold Cheng and
                  Bin Cui and
                  Zhenjie Zhang and
                  Ruichu Cai and
                  Jia Xu},
  title        = {Ad Dissemination Game in Ephemeral Networks},
  booktitle    = {Web Technologies and Applications - 17th Asia-PacificWeb Conference,
                  APWeb 2015, Guangzhou, China, September 18-20, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9313},
  pages        = {610--622},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25255-1\_50},
  doi          = {10.1007/978-3-319-25255-1\_50},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/apweb/YinGSQV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/QuanYG15,
  author       = {Daiyong Quan and
                  Lihua Yin and
                  Yunchuan Guo},
  editor       = {Dongdai Lin and
                  XiaoFeng Wang and
                  Moti Yung},
  title        = {Assessing the Disclosure of User Profile in Mobile-Aware Services},
  booktitle    = {Information Security and Cryptology - 11th International Conference,
                  Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9589},
  pages        = {451--467},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-38898-4\_26},
  doi          = {10.1007/978-3-319-38898-4\_26},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/QuanYG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QuanYG15,
  author       = {Daiyong Quan and
                  Lihua Yin and
                  Yunchuan Guo},
  title        = {Enhancing the Trajectory Privacy with Laplace Mechanism},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {1218--1223},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.508},
  doi          = {10.1109/TRUSTCOM.2015.508},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/QuanYG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apweb/FangG14,
  author       = {Liang Fang and
                  Yunchuan Guo},
  editor       = {Weihong Han and
                  Zi Huang and
                  Changjun Hu and
                  Hongli Zhang and
                  Li Guo},
  title        = {A Survey of Role Mining Methods in Role-Based Access Control System},
  booktitle    = {Web Technologies and Applications - APWeb 2014 Workshops, SNA, NIS,
                  and IoTS, Changsha, China, September 5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8710},
  pages        = {291--300},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11119-3\_27},
  doi          = {10.1007/978-3-319-11119-3\_27},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/apweb/FangG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyberc/LiuYGF14,
  author       = {Licai Liu and
                  Lihua Yin and
                  Yunchuan Guo and
                  Bingxing Fang},
  title        = {{EAC:} {A} Framework of Authentication Property for the IOTs},
  booktitle    = {2014 International Conference on Cyber-Enabled Distributed Computing
                  and Knowledge Discovery, CyberC 2014, Shanghai, China, October 13-15,
                  2014},
  pages        = {102--105},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CyberC.2014.25},
  doi          = {10.1109/CYBERC.2014.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyberc/LiuYGF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/GuoYC14,
  author       = {Yunchuan Guo and
                  Lihua Yin and
                  Li Chao},
  title        = {Automatically verifying {STRAC} policy},
  booktitle    = {2014 Proceedings {IEEE} {INFOCOM} Workshops, Toronto, ON, Canada,
                  April 27 - May 2, 2014},
  pages        = {141--142},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/INFCOMW.2014.6849195},
  doi          = {10.1109/INFCOMW.2014.6849195},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/GuoYC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/LiuGY14,
  author       = {Licai Liu and
                  Yunchuan Guo and
                  Lihua Yin},
  title        = {Analyzing asking/bidding price in dynamic game for cooperative authentication},
  booktitle    = {2014 Proceedings {IEEE} {INFOCOM} Workshops, Toronto, ON, Canada,
                  April 27 - May 2, 2014},
  pages        = {165--166},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/INFCOMW.2014.6849207},
  doi          = {10.1109/INFCOMW.2014.6849207},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/LiuGY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/GuoYLF14,
  author       = {Yunchuan Guo and
                  Lihua Yin and
                  Licai Liu and
                  Binxing Fang},
  title        = {Utility-based cooperative decision in cooperative authentication},
  booktitle    = {2014 {IEEE} Conference on Computer Communications, {INFOCOM} 2014,
                  Toronto, Canada, April 27 - May 2, 2014},
  pages        = {1006--1014},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/INFOCOM.2014.6848030},
  doi          = {10.1109/INFOCOM.2014.6848030},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/GuoYLF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuYGF14,
  author       = {Licai Liu and
                  Lihua Yin and
                  Yunchuan Guo and
                  Bingxing Fang},
  title        = {Bargaining-Based Dynamic Decision for Cooperative Authentication in
                  MANETs},
  booktitle    = {13th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2014, Beijing, China, September
                  24-26, 2014},
  pages        = {212--220},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/TrustCom.2014.32},
  doi          = {10.1109/TRUSTCOM.2014.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuYGF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ancs/LiuGYS13,
  author       = {Licai Liu and
                  Yunchuan Guo and
                  Lihua Yin and
                  Yan Sun},
  title        = {Balancing authentication and location privacy in cooperative authentication},
  booktitle    = {Symposium on Architecture for Networking and Communications Systems,
                  {ANCS} '13, San Jose, CA, USA, October 21-22, 2013},
  pages        = {107--108},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ANCS.2013.6665181},
  doi          = {10.1109/ANCS.2013.6665181},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ancs/LiuGYS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itqm/LeeGY13,
  author       = {Chao Lee and
                  Yunchuan Guo and
                  Lihua Yin},
  editor       = {Yong Shi and
                  Youmin Xi and
                  Peter Wolcott and
                  Yingjie Tian and
                  Jianping Li and
                  Daniel Berg and
                  Zhengxin Chen and
                  Enrique Herrera{-}Viedma and
                  Gang Kou and
                  Heeseok Lee and
                  Yi Peng and
                  Lean Yu},
  title        = {A Framework of Evaluation Location Privacy in Mobile Network},
  booktitle    = {Proceedings of the First International Conference on Information Technology
                  and Quantitative Management, {ITQM} 2013, Dushu Lake Hotel, Sushou,
                  China, 16-18 May, 2013},
  series       = {Procedia Computer Science},
  volume       = {17},
  pages        = {879--887},
  publisher    = {Elsevier},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.procs.2013.05.112},
  doi          = {10.1016/J.PROCS.2013.05.112},
  timestamp    = {Mon, 08 May 2023 14:38:37 +0200},
  biburl       = {https://dblp.org/rec/conf/itqm/LeeGY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/WuYG12,
  author       = {Jinyu Wu and
                  Lihua Yin and
                  Yunchuan Guo},
  title        = {Cyber Attacks Prediction Model Based on Bayesian Network},
  booktitle    = {18th {IEEE} International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2012, Singapore, December 17-19, 2012},
  pages        = {730--731},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICPADS.2012.117},
  doi          = {10.1109/ICPADS.2012.117},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpads/WuYG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip12/LeeYG12,
  author       = {Chao Lee and
                  Lihua Yin and
                  Yunchuan Guo},
  editor       = {Zhongzhi Shi and
                  David B. Leake and
                  Sunil Vadera},
  title        = {A Cluster-Based Multilevel Security Model for Wireless Sensor Networks},
  booktitle    = {Intelligent Information Processing {VI} - 7th {IFIP} {TC} 12 International
                  Conference, {IIP} 2012, Guilin, China, October 12-15, 2012. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {385},
  pages        = {320--330},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32891-6\_40},
  doi          = {10.1007/978-3-642-32891-6\_40},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip12/LeeYG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/FangGZ10,
  author       = {Binxing Fang and
                  Yunchuan Guo and
                  Yuan Zhou},
  title        = {Information content security on the Internet: the control model and
                  its evaluation},
  journal      = {Sci. China Inf. Sci.},
  volume       = {53},
  number       = {1},
  pages        = {30--49},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11432-010-0014-z},
  doi          = {10.1007/S11432-010-0014-Z},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/FangGZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwa/YinFGH10,
  author       = {Lihua Yin and
                  Binxing Fang and
                  Yunchuan Guo and
                  Hui He},
  title        = {Formalization and Quantitative Analysis of Controllability on Internet
                  Information Security},
  journal      = {Int. J. Web Appl.},
  volume       = {2},
  number       = {2},
  pages        = {109--120},
  year         = {2010},
  url          = {http://dline.info/ijwa/fulltext/v2n2/4.pdf},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijwa/YinFGH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/GuoYZF10,
  author       = {Yunchuan Guo and
                  Lihua Yin and
                  Yuan Zhou and
                  Binxing Fang},
  title        = {Quantifying Information Leakage for Fully Probabilistic Systems},
  booktitle    = {10th {IEEE} International Conference on Computer and Information Technology,
                  {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010},
  pages        = {589--595},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIT.2010.122},
  doi          = {10.1109/CIT.2010.122},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/GuoYZF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/YinG09,
  author       = {Lihua Yin and
                  Yunchuan Guo},
  title        = {Research on Quantitative Evaluation for Integrity},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {689--692},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.105},
  doi          = {10.1109/IAS.2009.105},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/YinG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nas/GuoYZLG09,
  author       = {Yunchuan Guo and
                  Lihua Yin and
                  Yuan Zhou and
                  Chao Li and
                  Li Guo},
  title        = {Simulation Analysis of Probabilistic Timing Covert Channels},
  booktitle    = {International Conference on Networking, Architecture, and Storage,
                  {NAS} 2009, 9-11 July 2009, Zhang Jia Jie, Hunan, China},
  pages        = {325--332},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/NAS.2009.61},
  doi          = {10.1109/NAS.2009.61},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nas/GuoYZLG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics