BibTeX records: Xiaohong Yuan

download as .bib file

@article{DBLP:journals/access/LiuHLRYX23,
  author       = {Zhipeng Liu and
                  Junyi Hu and
                  Yang Liu and
                  Kaushik Roy and
                  Xiaohong Yuan and
                  Jinsheng Xu},
  title        = {Anomaly-Based Intrusion on IoT Networks Using AIGAN-a Generative Adversarial
                  Network},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {91116--91132},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3307463},
  doi          = {10.1109/ACCESS.2023.3307463},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/LiuHLRYX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jfi/LiWSGHLYW23,
  author       = {Xueyun Li and
                  Yiping Wang and
                  Chuqi Su and
                  Xinle Gong and
                  Jin Huang and
                  Xun Liu and
                  Xiaohong Yuan and
                  Shixuan Wang},
  title        = {Driver and automation cooperation approach for share steering control
                  system},
  journal      = {J. Frankl. Inst.},
  volume       = {360},
  number       = {11},
  pages        = {7269--7293},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jfranklin.2023.05.019},
  doi          = {10.1016/J.JFRANKLIN.2023.05.019},
  timestamp    = {Thu, 03 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jfi/LiWSGHLYW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/remotesensing/YuZCHSMSYWZ23,
  author       = {Zhifeng Yu and
                  Jun Zhang and
                  Zheyu Chen and
                  Yuekai Hu and
                  C. K. Shum and
                  Chaofei Ma and
                  Qingjun Song and
                  Xiaohong Yuan and
                  Ben Wang and
                  Bin Zhou},
  title        = {Spatiotemporal Evolutions of the Suspended Particulate Matter in the
                  Yellow River Estuary, Bohai Sea and Characterized by Gaofen Imagery},
  journal      = {Remote. Sens.},
  volume       = {15},
  number       = {19},
  pages        = {4769},
  year         = {2023},
  url          = {https://doi.org/10.3390/rs15194769},
  doi          = {10.3390/RS15194769},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/remotesensing/YuZCHSMSYWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csr2/MachookaYE23,
  author       = {Daniel Machooka and
                  Xiaohong Yuan and
                  Albert C. Esterline},
  title        = {A Survey of Attacks and Defenses for Deep Neural Networks},
  booktitle    = {{IEEE} International Conference on Cyber Security and Resilience,
                  {CSR} 2023, Venice, Italy, July 31 - Aug. 2, 2023},
  pages        = {254--261},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CSR57506.2023.10224947},
  doi          = {10.1109/CSR57506.2023.10224947},
  timestamp    = {Wed, 06 Sep 2023 08:09:39 +0200},
  biburl       = {https://dblp.org/rec/conf/csr2/MachookaYE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsie/GilmoreMYHV23,
  author       = {Jairen Gilmore and
                  Uriah Vendell Moore and
                  Xiaohong Yuan and
                  Taylor Headen and
                  Mounika Vanamala},
  title        = {Visualization Dashboard for Recommending Attack Patterns Using Topic
                  Modeling},
  booktitle    = {Proceedings of the 2023 12th International Conference on Software
                  and Information Engineering, {ICSIE} 2023, Sharm El-Sheikh, Egypt,
                  November 21-23, 2023},
  pages        = {46--51},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3634848.3634862},
  doi          = {10.1145/3634848.3634862},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icsie/GilmoreMYHV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssci/UdeORY23,
  author       = {Bassey Ude and
                  Olusola Tolulope Odeyomi and
                  Kaushik Roy and
                  Xiaohong Yuan},
  title        = {A Survey on Bias Mitigation in Federated Learning},
  booktitle    = {{IEEE} Symposium Series on Computational Intelligence, {SSCI} 2023,
                  Mexico City, Mexico, December 5-8, 2023},
  pages        = {1170--1175},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SSCI52147.2023.10372031},
  doi          = {10.1109/SSCI52147.2023.10372031},
  timestamp    = {Mon, 15 Jan 2024 21:26:31 +0100},
  biburl       = {https://dblp.org/rec/conf/ssci/UdeORY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-00040,
  author       = {Prosenjit Chatterjee and
                  Alex Yalchin and
                  Joseph Shelton and
                  Kaushik Roy and
                  Xiaohong Yuan and
                  Kossi D. Edoh},
  title        = {Presentation Attack detection using Wavelet Transform and Deep Residual
                  Neural Net},
  journal      = {CoRR},
  volume       = {abs/2312.00040},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.00040},
  doi          = {10.48550/ARXIV.2312.00040},
  eprinttype    = {arXiv},
  eprint       = {2312.00040},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-00040.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ase/WilliamsYAM22,
  author       = {Imano Williams and
                  Xiaohong Yuan and
                  Mohd Anwar and
                  Jeffrey Todd McDonald},
  title        = {An Automated Security Concerns Recommender Based on Use Case Specification
                  Ontology},
  journal      = {Autom. Softw. Eng.},
  volume       = {29},
  number       = {2},
  pages        = {42},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10515-022-00334-0},
  doi          = {10.1007/S10515-022-00334-0},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ase/WilliamsYAM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/SumnerYAM22,
  author       = {Alex Sumner and
                  Xiaohong Yuan and
                  Mohd Anwar and
                  Maranda E. McBride},
  title        = {Examining Factors Impacting the Effectiveness of Anti-Phishing Trainings},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {62},
  number       = {5},
  pages        = {975--997},
  year         = {2022},
  url          = {https://doi.org/10.1080/08874417.2021.1955638},
  doi          = {10.1080/08874417.2021.1955638},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/SumnerYAM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/YuHPLAZYFW22,
  author       = {Zhifeng Yu and
                  Qiyu Huang and
                  Xiaoxue Peng and
                  Haijian Liu and
                  Qin Ai and
                  Bin Zhou and
                  Xiaohong Yuan and
                  Meihong Fang and
                  Ben Wang},
  title        = {Comparative Study on Recognition Models of Black-Odorous Water in
                  Hangzhou Based on {GF-2} Satellite Data},
  journal      = {Sensors},
  volume       = {22},
  number       = {12},
  pages        = {4593},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22124593},
  doi          = {10.3390/S22124593},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/YuHPLAZYFW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fie/XuYNHZ22,
  author       = {Jinsheng Xu and
                  Xiaohong Yuan and
                  Swathi Nallela and
                  Kevin Hillard and
                  Jinghua Zhang},
  title        = {Learn {ARP} Spoofing Attack in a Game},
  booktitle    = {{IEEE} Frontiers in Education Conference, {FIE} 2022, Uppsala, Sweden,
                  October 8-11, 2022},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/FIE56618.2022.9962649},
  doi          = {10.1109/FIE56618.2022.9962649},
  timestamp    = {Sat, 03 Dec 2022 16:36:40 +0100},
  biburl       = {https://dblp.org/rec/conf/fie/XuYNHZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/FarrellY022,
  author       = {Richard Farrell and
                  Xiaohong Yuan and
                  Kaushik Roy},
  title        = {IoT to Structured Data (IoT2SD): {A} Big Data Information Extraction
                  Framework},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9897030},
  doi          = {10.1109/ICAIC53980.2022.9897030},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/FarrellY022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/ShahYT22,
  author       = {Sandeep Shah and
                  Xiaohong Yuan and
                  Zanetta Tyler},
  title        = {An Analysis of {COVID-19} related Twitter Data for Asian Hate Speech
                  Using Machine Learning Algorithms},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9896967},
  doi          = {10.1109/ICAIC53980.2022.9896967},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/ShahYT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/SumnerXY22,
  author       = {Alex Sumner and
                  Jinsheng Xu and
                  Xiaohong Yuan},
  title        = {Determining Phishing Emails using {URL} Domain Features},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9897038},
  doi          = {10.1109/ICAIC53980.2022.9897038},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/SumnerXY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmla/RichardsonSY22,
  author       = {Caitlin Richardson and
                  Sandeep Shah and
                  Xiaohong Yuan},
  editor       = {M. Arif Wani and
                  Mehmed M. Kantardzic and
                  Vasile Palade and
                  Daniel Neagu and
                  Longzhi Yang and
                  Kit Yan Chan},
  title        = {Semi-Supervised Machine Learning for Analyzing {COVID-19} Related
                  Twitter Data for Asian Hate Speech},
  booktitle    = {21st {IEEE} International Conference on Machine Learning and Applications,
                  {ICMLA} 2022, Nassau, Bahamas, December 12-14, 2022},
  pages        = {1643--1648},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICMLA55696.2022.00252},
  doi          = {10.1109/ICMLA55696.2022.00252},
  timestamp    = {Wed, 29 Mar 2023 19:23:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icmla/RichardsonSY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ictai/ZhuSLQYF22,
  author       = {Binhai Zhu and
                  Jordan Sturtz and
                  Xiaowen Liu and
                  Letu Qingge and
                  Xiaohong Yuan and
                  Xingang Fu},
  editor       = {Marek Z. Reformat and
                  Du Zhang and
                  Nikolaos G. Bourbakis},
  title        = {Deep Learning Approaches for the Protein Scaffold Filling Problem},
  booktitle    = {34th {IEEE} International Conference on Tools with Artificial Intelligence,
                  {ICTAI} 2022, Macao, China, October 31 - November 2, 2022},
  pages        = {1055--1061},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICTAI56018.2022.00161},
  doi          = {10.1109/ICTAI56018.2022.00161},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ictai/ZhuSLQYF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ieaaie/VDNGYR22,
  author       = {Jeffrey J. Hernandez V. and
                  Rodney Dejournett and
                  Udayasri Nannuri and
                  Tony Gwyn and
                  Xiaohong Yuan and
                  Kaushik Roy},
  editor       = {Hamido Fujita and
                  Philippe Fournier{-}Viger and
                  Moonis Ali and
                  Yinglin Wang},
  title        = {Face Authentication from Masked Face Images Using Deep Learning on
                  Periocular Biometrics},
  booktitle    = {Advances and Trends in Artificial Intelligence. Theory and Practices
                  in Artificial Intelligence - 35th International Conference on Industrial,
                  Engineering and Other Applications of Applied Intelligent Systems,
                  {IEA/AIE} 2022, Kitakyushu, Japan, July 19-22, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13343},
  pages        = {452--459},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-08530-7\_38},
  doi          = {10.1007/978-3-031-08530-7\_38},
  timestamp    = {Fri, 02 Sep 2022 18:51:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ieaaie/VDNGYR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/AlshareefYRA21,
  author       = {Norah Alshareef and
                  Xiaohong Yuan and
                  Kaushik Roy and
                  Mustafa Atay},
  title        = {A Study of Gender Bias in Face Presentation Attack and Its Mitigation},
  journal      = {Future Internet},
  volume       = {13},
  number       = {9},
  pages        = {234},
  year         = {2021},
  url          = {https://doi.org/10.3390/fi13090234},
  doi          = {10.3390/FI13090234},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fi/AlshareefYRA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmihi/WangYCY21,
  author       = {Xiaolan Wang and
                  Fan Yang and
                  Wenjuan Chen and
                  Xiaohong Yuan},
  title        = {Ultrasonic Diagnosis and Analysis of the Effect of Labor Analgesia
                  on Early Pelvic Floor Function and Pelvic Floor Dysfunction},
  journal      = {J. Medical Imaging Health Informatics},
  volume       = {11},
  number       = {7},
  pages        = {1903--1910},
  year         = {2021},
  url          = {https://doi.org/10.1166/jmihi.2021.3585},
  doi          = {10.1166/JMIHI.2021.3585},
  timestamp    = {Tue, 30 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmihi/WangYCY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/LiuTSRSYY21,
  author       = {Zhipeng Liu and
                  Niraj Thapa and
                  Addison Shaver and
                  Kaushik Roy and
                  Madhuri Siddula and
                  Xiaohong Yuan and
                  Anna Yu},
  title        = {Using Embedded Feature Selection and {CNN} for Classification on {CCD-INID-V1}
                  - {A} New IoT Dataset},
  journal      = {Sensors},
  volume       = {21},
  number       = {14},
  pages        = {4834},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21144834},
  doi          = {10.3390/S21144834},
  timestamp    = {Mon, 10 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/LiuTSRSYY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ACMse/ShahMY0C21,
  author       = {Sandeep Shah and
                  Pramita Sree Muhuri and
                  Xiaohong Yuan and
                  Kaushik Roy and
                  Prosenjit Chatterjee},
  editor       = {Kazi Rahman and
                  Eric Gamess},
  title        = {Implementing a network intrusion detection system using semi-supervised
                  support vector machine and random forest},
  booktitle    = {{ACM} {SE} '21: 2021 {ACM} Southeast Conference, Virtual Event, USA,
                  April 15-17, 2021},
  pages        = {180--184},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3409334.3452073},
  doi          = {10.1145/3409334.3452073},
  timestamp    = {Mon, 10 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ACMse/ShahMY0C21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fie/WeanquoiZYXJ21,
  author       = {Patrickson Weanquoi and
                  Jinghua Zhang and
                  Xiaohong Yuan and
                  Jinsheng Xu and
                  Elva J. Jones},
  title        = {Learn Access Control Concepts in a Game},
  booktitle    = {{IEEE} Frontiers in Education Conference, {FIE} 2021, Lincoln, NE,
                  USA, October 13-16, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/FIE49875.2021.9637228},
  doi          = {10.1109/FIE49875.2021.9637228},
  timestamp    = {Wed, 29 Dec 2021 09:45:46 +0100},
  biburl       = {https://dblp.org/rec/conf/fie/WeanquoiZYXJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imspa/FanuelYKQR21,
  author       = {Mesafint Fanuel and
                  Xiaohong Yuan and
                  Hyung Nam Kim and
                  Letu Qingge and
                  Kaushik Roy},
  editor       = {Tomislav Petkovic and
                  Davor Petrinovic and
                  Sven Loncaric},
  title        = {A Survey on Skeleton-Based Activity Recognition using Graph Convolutional
                  Networks {(GCN)}},
  booktitle    = {12th International Symposium on Image and Signal Processing and Analysis,
                  {ISPA} 2021, Zagreb, Croatia, September 13-15, 2021},
  pages        = {177--182},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISPA52656.2021.9552064},
  doi          = {10.1109/ISPA52656.2021.9552064},
  timestamp    = {Mon, 06 Nov 2023 15:50:05 +0100},
  biburl       = {https://dblp.org/rec/conf/imspa/FanuelYKQR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/GaoSAYQ021,
  author       = {Leyu Gao and
                  Sandeep Shah and
                  Nasser Assery and
                  Xiaohong Yuan and
                  Xiuli Qu and
                  Kaushik Roy},
  title        = {Semi-Supervised Self Training to Assess the Credibility of Tweets},
  booktitle    = {2021 {IEEE} Intl Conf on Parallel {\&} Distributed Processing
                  with Applications, Big Data {\&} Cloud Computing, Sustainable
                  Computing {\&} Communications, Social Computing {\&} Networking
                  (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September
                  30 - Oct. 3, 2021},
  pages        = {1532--1537},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00206},
  doi          = {10.1109/ISPA-BDCLOUD-SOCIALCOM-SUSTAINCOM52081.2021.00206},
  timestamp    = {Mon, 10 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispa/GaoSAYQ021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/MuhuriCYRE20,
  author       = {Pramita Sree Muhuri and
                  Prosenjit Chatterjee and
                  Xiaohong Yuan and
                  Kaushik Roy and
                  Albert C. Esterline},
  title        = {Using a Long Short-Term Memory Recurrent Neural Network {(LSTM-RNN)}
                  to Classify Network Attacks},
  journal      = {Inf.},
  volume       = {11},
  number       = {5},
  pages        = {243},
  year         = {2020},
  url          = {https://doi.org/10.3390/info11050243},
  doi          = {10.3390/INFO11050243},
  timestamp    = {Mon, 10 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/information/MuhuriCYRE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aipr/ShaverLT0GY20,
  author       = {Addison Shaver and
                  Zhipeng Liu and
                  Niraj Thapa and
                  Kaushik Roy and
                  Balakrishna Gokaraju and
                  Xiaohong Yuan},
  title        = {Anomaly Based Intrusion Detection for IoT with Machine Learning},
  booktitle    = {49th {IEEE} Applied Imagery Pattern Recognition Workshop, {AIPR} 2020,
                  Washington, DC, USA, October 13-15, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/AIPR50011.2020.9425199},
  doi          = {10.1109/AIPR50011.2020.9425199},
  timestamp    = {Mon, 10 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aipr/ShaverLT0GY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csedu/YuXYY20,
  author       = {Qinrui Yu and
                  Jinsheng Xu and
                  Huiming Yu and
                  Xiaohong Yuan},
  editor       = {H. Chad Lane and
                  Susan Zvacek and
                  James Uhomoibhi},
  title        = {The Design and Implementation of Secure Program Design Education Tool},
  booktitle    = {Proceedings of the 12th International Conference on Computer Supported
                  Education, {CSEDU} 2020, Prague, Czech Republic, May 2-4, 2020, Volume
                  1},
  pages        = {319--324},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009184003190324},
  doi          = {10.5220/0009184003190324},
  timestamp    = {Thu, 04 Jun 2020 16:56:38 +0200},
  biburl       = {https://dblp.org/rec/conf/csedu/YuXYY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fie/ZhangYJXV20,
  author       = {Jinghua Zhang and
                  Xiaohong Yuan and
                  Jaris Johnson and
                  Jinsheng Xu and
                  Mounika Vanamala},
  title        = {Developing and Assessing a Web-Based Interactive Visualization Tool
                  to Teach Buffer Overflow Concepts},
  booktitle    = {{IEEE} Frontiers in Education Conference, {FIE} 2020, Uppsala, Sweden,
                  October 21-24, 2020},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/FIE44824.2020.9274239},
  doi          = {10.1109/FIE44824.2020.9274239},
  timestamp    = {Mon, 14 Dec 2020 09:13:16 +0100},
  biburl       = {https://dblp.org/rec/conf/fie/ZhangYJXV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icer/WeanquoiZXYJ20,
  author       = {Patrickson Boan Weanquoi and
                  Jinghua Zhang and
                  Jinsheng Xu and
                  Xiaohong Yuan and
                  Elva J. Jones},
  editor       = {Anthony V. Robins and
                  Adon Moskal and
                  Amy J. Ko and
                  Ren{\'{e}}e McCauley},
  title        = {Developing and Assessing an Educational Game for Teaching Access Control},
  booktitle    = {{ICER} 2020: International Computing Education Research Conference,
                  Virtual Event, New Zealand, August 10-12, 2020},
  pages        = {312},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372782.3408119},
  doi          = {10.1145/3372782.3408119},
  timestamp    = {Thu, 13 Aug 2020 15:49:08 +0200},
  biburl       = {https://dblp.org/rec/conf/icer/WeanquoiZXYJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intellisys/Brown0Y20,
  author       = {W. Shannon Brown and
                  Kaushik Roy and
                  Xiaohong Yuan},
  editor       = {Kohei Arai and
                  Supriya Kapoor and
                  Rahul Bhatia},
  title        = {{US} Traffic Sign Recognition Using CNNs},
  booktitle    = {Intelligent Systems and Applications - Proceedings of the 2020 Intelligent
                  Systems Conference, IntelliSys 2020, London, UK, 3-4 September, 2020,
                  Volume 3},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1252},
  pages        = {657--661},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55190-2\_50},
  doi          = {10.1007/978-3-030-55190-2\_50},
  timestamp    = {Mon, 10 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intellisys/Brown0Y20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/AsseryYQA020,
  author       = {Nasser Assery and
                  Xiaohong Yuan and
                  Xiuli Qu and
                  Sultan Almalki and
                  Kaushik Roy},
  editor       = {Jia Hu and
                  Geyong Min and
                  Nektarios Georgalas and
                  Zhiwei Zhao and
                  Fei Hao and
                  Wang Miao},
  title        = {Identifying Panic Triggers from Disaster-Related Tweets},
  booktitle    = {{IEEE} International Conference on Parallel {\&} Distributed Processing
                  with Applications, Big Data {\&} Cloud Computing, Sustainable
                  Computing {\&} Communications, Social Computing {\&} Networking,
                  ISPA/BDCloud/SocialCom/SustainCom 2020, Exeter, United Kingdom, December
                  17-19, 2020},
  pages        = {827--836},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom51426.2020.00129},
  doi          = {10.1109/ISPA-BDCLOUD-SOCIALCOM-SUSTAINCOM51426.2020.00129},
  timestamp    = {Mon, 10 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispa/AsseryYQA020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seke/WilliamsY20,
  author       = {Imano Williams and
                  Xiaohong Yuan},
  editor       = {Ra{\'{u}}l Garc{\'{\i}}a{-}Castro},
  title        = {Identifying Security Concerns Based on a Use Case Ontology Framework},
  booktitle    = {The 32nd International Conference on Software Engineering and Knowledge
                  Engineering, {SEKE} 2020, {KSIR} Virtual Conference Center, USA, July
                  9-19, 2020},
  pages        = {83--88},
  publisher    = {{KSI} Research Inc.},
  year         = {2020},
  url          = {https://doi.org/10.18293/SEKE2020-136},
  doi          = {10.18293/SEKE2020-136},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/seke/WilliamsY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigite/AlshaherYK20,
  author       = {Hanan Alshaher and
                  Xiaohong Yuan and
                  Sajad Khorsandroo},
  editor       = {Deepak Khazanchi and
                  Harvey P. Siy and
                  George Grispos and
                  Tenace Kwaku Setor},
  title        = {Teaching Flooding Attack to the {SDN} Data Plane with {POGIL}},
  booktitle    = {{SIGITE} '20: The 21st Annual Conference on Information Technology
                  Education, Virtual Event, USA, October 7-9, 2020},
  pages        = {194--199},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3368308.3415406},
  doi          = {10.1145/3368308.3415406},
  timestamp    = {Thu, 15 Oct 2020 11:30:02 +0200},
  biburl       = {https://dblp.org/rec/conf/sigite/AlshaherYK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcia/GunnLDYR19,
  author       = {Dylan J. Gunn and
                  Zhipeng Liu and
                  Rushit Dave and
                  Xiaohong Yuan and
                  Kaushik Roy},
  title        = {Touch-Based Active Cloud Authentication Using Traditional Machine
                  Learning and {LSTM} on a Distributed Tensorflow Framework},
  journal      = {Int. J. Comput. Intell. Appl.},
  volume       = {18},
  number       = {4},
  pages        = {1950022:1--1950022:16},
  year         = {2019},
  url          = {https://doi.org/10.1142/S1469026819500226},
  doi          = {10.1142/S1469026819500226},
  timestamp    = {Mon, 10 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcia/GunnLDYR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijinfoman/LiHXAAY19,
  author       = {Ling Li and
                  Wu He and
                  Li Xu and
                  Ivan K. Ash and
                  Mohd Anwar and
                  Xiaohong Yuan},
  title        = {Investigating the impact of cybersecurity policy awareness on employees'
                  cybersecurity behavior},
  journal      = {Int. J. Inf. Manag.},
  volume       = {45},
  pages        = {13--24},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijinfomgt.2018.10.017},
  doi          = {10.1016/J.IJINFOMGT.2018.10.017},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijinfoman/LiHXAAY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ACMse/SumnerY19,
  author       = {Alex Sumner and
                  Xiaohong Yuan},
  editor       = {Dan Lo and
                  Donghyun Kim and
                  Eric Gamess},
  title        = {Mitigating Phishing Attacks: An Overview},
  booktitle    = {Proceedings of the 2019 {ACM} Southeast Conference, {ACM} {SE} '19,
                  Kennesaw, GA, USA, April 18-20, 2019},
  pages        = {72--77},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3299815.3314437},
  doi          = {10.1145/3299815.3314437},
  timestamp    = {Thu, 10 Jun 2021 00:49:56 +0200},
  biburl       = {https://dblp.org/rec/conf/ACMse/SumnerY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/HeAALYXT19,
  author       = {Wu He and
                  Mohd Anwar and
                  Ivan K. Ash and
                  Ling Li and
                  Xiaohong Yuan and
                  Li Xu and
                  Xin Tian},
  title        = {Effects of Evidence-Based Malware Cybersecurity Training on Employees},
  booktitle    = {25th Americas Conference on Information Systems, {AMCIS} 2019, Canc{\'{u}}n,
                  Mexico, August 15-17, 2019},
  publisher    = {Association for Information Systems},
  year         = {2019},
  url          = {https://aisel.aisnet.org/amcis2019/info\_security\_privacy/info\_security\_privacy/11},
  timestamp    = {Wed, 13 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/amcis/HeAALYXT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/comped/ZhangYXJ19,
  author       = {Jinghua Zhang and
                  Xiaohong Yuan and
                  Jinsheng Xu and
                  Elva J. Jones},
  editor       = {Ming Zhang and
                  Bo Yang and
                  Steve Cooper and
                  Andrew Luxton{-}Reilly},
  title        = {Developing and Assessing Educational Games to Enhance Cyber Security
                  Learning in Computer Science},
  booktitle    = {Proceedings of the {ACM} Conference on Global Computing Education,
                  CompEd 2019, Chengdu,Sichuan, China, May 17-19, 2019},
  pages        = {241},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3300115.3312511},
  doi          = {10.1145/3300115.3312511},
  timestamp    = {Sun, 05 May 2019 13:58:12 +0200},
  biburl       = {https://dblp.org/rec/conf/comped/ZhangYXJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fie/YuanZSX0EHW19,
  author       = {Xiaohong Yuan and
                  Tian Zhang and
                  Ali Albu Shama and
                  Jinsheng Xu and
                  Li Yang and
                  Jennifer T. Ellis and
                  Wu He and
                  Cynthia Waters},
  title        = {Teaching Cybersecurity Using Guided Inquiry Collaborative Learning},
  booktitle    = {{IEEE} Frontiers in Education Conference, {FIE} 2019, Cincinnati,
                  OH, USA, October 16-19, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/FIE43999.2019.9028408},
  doi          = {10.1109/FIE43999.2019.9028408},
  timestamp    = {Thu, 25 Feb 2021 10:40:41 +0100},
  biburl       = {https://dblp.org/rec/conf/fie/YuanZSX0EHW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdlt/Nuakoh0YE19,
  author       = {Emmanuel Borkor Nuakoh and
                  Kaushik Roy and
                  Xiaohong Yuan and
                  Albert C. Esterline},
  title        = {Deep Learning Approach for {U.S.} Traffic Sign Recognition},
  booktitle    = {Proceedings of the 2019 3rd International Conference on Deep Learning
                  Technologies, {ICDLT} 2019, Xiamen, China, July 05-07, 2019},
  pages        = {47--50},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3342999.3343016},
  doi          = {10.1145/3342999.3343016},
  timestamp    = {Mon, 10 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdlt/Nuakoh0YE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmla/AsseryYARX19,
  author       = {Nasser Assery and
                  Xiaohong Yuan and
                  Sultan Almalki and
                  Kaushik Roy and
                  Xiuli Qu},
  editor       = {M. Arif Wani and
                  Taghi M. Khoshgoftaar and
                  Dingding Wang and
                  Huanjing Wang and
                  Naeem Seliya},
  title        = {Comparing Learning-Based Methods for Identifying Disaster-Related
                  Tweets},
  booktitle    = {18th {IEEE} International Conference On Machine Learning And Applications,
                  {ICMLA} 2019, Boca Raton, FL, USA, December 16-19, 2019},
  pages        = {1829--1836},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICMLA.2019.00295},
  doi          = {10.1109/ICMLA.2019.00295},
  timestamp    = {Tue, 08 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icmla/AsseryYARX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/ParkHY20,
  author       = {Younghee Park and
                  Hongxin Hu and
                  Xiaohong Yuan},
  editor       = {Elizabeth K. Hawthorne and
                  Manuel A. P{\'{e}}rez{-}Qui{\~{n}}ones and
                  Sarah Heckman and
                  Jian Zhang},
  title        = {Security Labs for Software Defined Networks in CloudLab},
  booktitle    = {Proceedings of the 50th {ACM} Technical Symposium on Computer Science
                  Education, {SIGCSE} 2019, Minneapolis, MN, USA, February 27 - March
                  02, 2019},
  pages        = {1235},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3287324.3287538},
  doi          = {10.1145/3287324.3287538},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcse/ParkHY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spaccs/ChatterjeeYSRYE19,
  author       = {Prosenjit Chatterjee and
                  Alex Yalchin and
                  Joseph Shelton and
                  Kaushik Roy and
                  Xiaohong Yuan and
                  Kossi D. Edoh},
  editor       = {Guojun Wang and
                  Jun Feng and
                  Md. Zakirul Alam Bhuiyan and
                  Rongxing Lu},
  title        = {Presentation Attack Detection Using Wavelet Transform and Deep Residual
                  Neural Net},
  booktitle    = {Security, Privacy, and Anonymity in Computation, Communication, and
                  Storage - SpaCCS 2019 International Workshops, Atlanta, GA, USA, July
                  14-17, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11637},
  pages        = {86--94},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-24900-7\_7},
  doi          = {10.1007/978-3-030-24900-7\_7},
  timestamp    = {Mon, 10 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spaccs/ChatterjeeYSRYE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataservice/HooksYREH18,
  author       = {Daniel Hooks and
                  Xiaohong Yuan and
                  Kaushik Roy and
                  Albert C. Esterline and
                  Joaquin Hernandez},
  title        = {Applying Artificial Immune System for Intrusion Detection},
  booktitle    = {Fourth {IEEE} International Conference on Big Data Computing Service
                  and Applications, BigDataService 2018, Bamberg, Germany, March 26-29,
                  2018},
  pages        = {287--292},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/BigDataService.2018.00051},
  doi          = {10.1109/BIGDATASERVICE.2018.00051},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdataservice/HooksYREH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisa/WilliamsY18,
  author       = {Imano Williams and
                  Xiaohong Yuan},
  editor       = {Kuinam J. Kim and
                  Nakhoon Baek},
  title        = {A User Study: Abuse Cases Derived from Use Case Description and {CAPEC}
                  Attack Patterns},
  booktitle    = {Information Science and Applications 2018 - {ICISA} 2018, Hong Kong,
                  China, June 25-27th, 2018},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {514},
  pages        = {239--249},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-981-13-1056-0\_25},
  doi          = {10.1007/978-981-13-1056-0\_25},
  timestamp    = {Fri, 08 Mar 2019 12:36:23 +0100},
  biburl       = {https://dblp.org/rec/conf/icisa/WilliamsY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itnac/DobsonRYX18,
  author       = {Anthony Dobson and
                  Kaushik Roy and
                  Xiaohong Yuan and
                  Jinsheng Xu},
  title        = {Performance Evaluation of Machine Learning Algorithms in Apache Spark
                  for Intrusion Detection},
  booktitle    = {28th International Telecommunication Networks and Applications Conference,
                  {ITNAC} 2018, Sydney, Australia, November 21-23, 2018},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/ATNAC.2018.8615314},
  doi          = {10.1109/ATNAC.2018.8615314},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itnac/DobsonRYX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/ParkHYL18,
  author       = {Younghee Park and
                  Hongxin Hu and
                  Xiaohong Yuan and
                  Hongda Li},
  editor       = {Tiffany Barnes and
                  Daniel D. Garcia and
                  Elizabeth K. Hawthorne and
                  Manuel A. P{\'{e}}rez{-}Qui{\~{n}}ones},
  title        = {Enhancing Security Education Through Designing {SDN} Security Labs
                  in CloudLab},
  booktitle    = {Proceedings of the 49th {ACM} Technical Symposium on Computer Science
                  Education, {SIGCSE} 2018, Baltimore, MD, USA, February 21-24, 2018},
  pages        = {185--190},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3159450.3159514},
  doi          = {10.1145/3159450.3159514},
  timestamp    = {Mon, 12 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcse/ParkHYL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chb/AnwarHAYLX17,
  author       = {Mohd Anwar and
                  Wu He and
                  Ivan K. Ash and
                  Xiaohong Yuan and
                  Ling Li and
                  Li Xu},
  title        = {Gender difference and employees' cybersecurity behaviors},
  journal      = {Comput. Hum. Behav.},
  volume       = {69},
  pages        = {437--443},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.chb.2016.12.040},
  doi          = {10.1016/J.CHB.2016.12.040},
  timestamp    = {Wed, 13 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chb/AnwarHAYLX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisedu/YuanWYRC0WK17,
  author       = {Xiaohong Yuan and
                  Kenneth Williams and
                  Huiming Yu and
                  Audrey Rorrer and
                  Bei{-}Tseng Chu and
                  Li Yang and
                  Kathy Winters and
                  Joseph M. Kizza},
  title        = {Faculty Workshops for Teaching Information Assurance through Hands-On
                  Exercises and Case Studies},
  journal      = {J. Inf. Syst. Educ.},
  volume       = {28},
  number       = {1},
  pages        = {11--20},
  year         = {2017},
  url          = {https://jise.org/Volume28/n1/JISEv28n1p11.html},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisedu/YuanWYRC0WK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fie/KumariYPY17,
  author       = {Shilpa Kumari and
                  Xiaohong Yuan and
                  Joshua Patterson and
                  Huiming Yu},
  title        = {Demystifying ad fraud},
  booktitle    = {2017 {IEEE} Frontiers in Education Conference, {FIE} 2017, Indianapolis,
                  IN, USA, October 18-21, 2017},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/FIE.2017.8190714},
  doi          = {10.1109/FIE.2017.8190714},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fie/KumariYPY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fie/ScottXZBCYYW17,
  author       = {Brandon Scott and
                  Jinsheng Xu and
                  Jinghua Zhang and
                  Ariana Brown and
                  Erica Clark and
                  Xiaohong Yuan and
                  Anna Yu and
                  Kenneth Williams},
  title        = {An interactive visualization tool for teaching {ARP} spoofing attack},
  booktitle    = {2017 {IEEE} Frontiers in Education Conference, {FIE} 2017, Indianapolis,
                  IN, USA, October 18-21, 2017},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/FIE.2017.8190531},
  doi          = {10.1109/FIE.2017.8190531},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fie/ScottXZBCYYW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/maics/ShiYN17,
  author       = {Ningxin Shi and
                  Xiaohong Yuan and
                  William Nick},
  editor       = {John Licato and
                  Aleshia T. Hayes and
                  Michael Glass},
  title        = {Semi-supervised Random Forest for Intrusion Detection Network},
  booktitle    = {Proceedings of the 28th Modern Artificial Intelligence and Cognitive
                  Science Conference 2017, Fort Wayne, IN, USA, April 28-29, 2017},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1964},
  pages        = {181--185},
  publisher    = {CEUR-WS.org},
  year         = {2017},
  url          = {https://ceur-ws.org/Vol-1964/S4.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:18 +0100},
  biburl       = {https://dblp.org/rec/conf/maics/ShiYN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/WilliamsY17,
  author       = {Imano Williams and
                  Xiaohong Yuan},
  title        = {Creating Abuse Cases Based on Attack Patterns: {A} User Study},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  pages        = {85--86},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SecDev.2017.27},
  doi          = {10.1109/SECDEV.2017.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/WilliamsY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/YuanYHEXW17,
  author       = {Xiaohong Yuan and
                  Li Yang and
                  Wu He and
                  Jennifer T. Ellis and
                  Jinsheng Xu and
                  Cynthia K. Waters},
  editor       = {Michael E. Caspersen and
                  Stephen H. Edwards and
                  Tiffany Barnes and
                  Daniel D. Garcia},
  title        = {Enhancing Cybersecurity Education Using {POGIL} (Abstract Only)},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGCSE} Technical Symposium on Computer
                  Science Education, {SIGCSE} 2017, Seattle, WA, USA, March 8-11, 2017},
  pages        = {719},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3017680.3022423},
  doi          = {10.1145/3017680.3022423},
  timestamp    = {Tue, 23 Mar 2021 10:54:19 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcse/YuanYHEXW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsw/WilliamsYMA16,
  author       = {Imano Williams and
                  Xiaohong Yuan and
                  Jeffrey Todd McDonald and
                  Mohd Anwar},
  title        = {A Method for Developing Abuse Cases and Its Evaluation},
  journal      = {J. Softw.},
  volume       = {11},
  number       = {5},
  pages        = {520--527},
  year         = {2016},
  url          = {https://doi.org/10.17706/jsw.11.5.520-527},
  doi          = {10.17706/JSW.11.5.520-527},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsw/WilliamsYMA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/besc/AnwarHY16,
  author       = {Mohd Anwar and
                  Wu He and
                  Xiaohong Yuan},
  editor       = {Gang Li and
                  Yves Demazeau and
                  Guandong Xu and
                  Paul Wang and
                  Leon S. L. Wang and
                  Guanfeng Liu},
  title        = {Employment status and cybersecurity behaviors},
  booktitle    = {2016 International Conference on Behavioral, Economic and Socio-cultural
                  Computing, {BESC} 2016, Durham, NC, USA, November 11-13, 2016},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/BESC.2016.7804493},
  doi          = {10.1109/BESC.2016.7804493},
  timestamp    = {Thu, 05 Jan 2023 22:22:55 +0100},
  biburl       = {https://dblp.org/rec/conf/besc/AnwarHY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fie/XuYYKKZ16,
  author       = {Jinsheng Xu and
                  Xiaohong Yuan and
                  Anna Yu and
                  Jung Hee Kim and
                  Taehee Kim and
                  Jinghua Zhang},
  title        = {Developing and evaluating a hands-on lab for teaching local area network
                  vulnerabilities},
  booktitle    = {2016 {IEEE} Frontiers in Education Conference, {FIE} 2015, Eire, PA,
                  USA, October 12-15, 2016},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/FIE.2016.7757364},
  doi          = {10.1109/FIE.2016.7757364},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fie/XuYYKKZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fie/YuanWMHLBXELMR16,
  author       = {Xiaohong Yuan and
                  Kenneth Williams and
                  D. Scott McCrickard and
                  Charles Hardnett and
                  Litany H. Lineberry and
                  Kelvin S. Bryant and
                  Jinsheng Xu and
                  Albert C. Esterline and
                  Anyi Liu and
                  Selvarajah Mohanarajah and
                  Rachel Rutledge},
  title        = {Teaching mobile computing and mobile security},
  booktitle    = {2016 {IEEE} Frontiers in Education Conference, {FIE} 2015, Eire, PA,
                  USA, October 12-15, 2016},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/FIE.2016.7757365},
  doi          = {10.1109/FIE.2016.7757365},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fie/YuanWMHLBXELMR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/XuYV16,
  author       = {Jinsheng Xu and
                  Xiaohong Yuan and
                  Ashrith Velma},
  editor       = {Carl Alphonce and
                  Jodi L. Tims and
                  Michael E. Caspersen and
                  Stephen H. Edwards},
  title        = {Design and Evaluation of a Course Module on Android Cipher Programming
                  (Abstract Only)},
  booktitle    = {Proceedings of the 47th {ACM} Technical Symposium on Computing Science
                  Education, {SIGCSE} 2016, Memphis, TN, USA, March 02 - 05, 2016},
  pages        = {689--690},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2839509.2850546},
  doi          = {10.1145/2839509.2850546},
  timestamp    = {Mon, 13 Dec 2021 09:32:31 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcse/XuYV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/YuanXYKK16,
  author       = {Xiaohong Yuan and
                  Jinsheng Xu and
                  Huiming Yu and
                  Junghee Kim and
                  Taehee Kim},
  editor       = {Carl Alphonce and
                  Jodi L. Tims and
                  Michael E. Caspersen and
                  Stephen H. Edwards},
  title        = {Assessing the Effectiveness of Experiential-Learning-Based Teaching
                  Tools in Cybersecurity Courses (Abstract Only)},
  booktitle    = {Proceedings of the 47th {ACM} Technical Symposium on Computing Science
                  Education, {SIGCSE} 2016, Memphis, TN, USA, March 02 - 05, 2016},
  pages        = {693},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2839509.2850550},
  doi          = {10.1145/2839509.2850550},
  timestamp    = {Thu, 10 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcse/YuanXYKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigite/YuanHYS16,
  author       = {Xiaohong Yuan and
                  Wu He and
                  Li Yang and
                  Lindsay Simpkins},
  editor       = {Deborah Boisvert and
                  Stephen J. Zilora},
  title        = {Teaching Security Management for Mobile Devices},
  booktitle    = {Proceedings of the 17th Annual Conference on Information Technology
                  Education and the 5th Annual Conference on Research in Information
                  Technology, {SIGITE/RIIT} 2016, Boston, MA, USA, September 28 - October
                  1, 2016},
  pages        = {14--19},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2978192.2978227},
  doi          = {10.1145/2978192.2978227},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigite/YuanHYS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsw/YuanNWY15,
  author       = {Xiaohong Yuan and
                  Emmanuel Borkor Nuakoh and
                  Imano Williams and
                  Huiming Yu},
  title        = {Developing Abuse Cases Based on Threat Modeling and Attack Patterns},
  journal      = {J. Softw.},
  volume       = {10},
  number       = {4},
  pages        = {491--498},
  year         = {2015},
  url          = {https://doi.org/10.17706/jsw.10.4.491-498},
  doi          = {10.17706/JSW.10.4.491-498},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsw/YuanNWY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/AnwarAHLXY15,
  author       = {Mohd Anwar and
                  Ivan K. Ash and
                  Wu He and
                  Ling Li and
                  Li Xu and
                  Xiaohong Yuan},
  title        = {A Security Behavior Model of Employees in Cyberspace},
  booktitle    = {21st Americas Conference on Information Systems, {AMCIS} 2015, Puerto
                  Rico, August 13-15, 2015},
  publisher    = {Association for Information Systems},
  year         = {2015},
  url          = {http://aisel.aisnet.org/amcis2015/ISSecurity/GeneralPresentations/6},
  timestamp    = {Wed, 13 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/amcis/AnwarAHLXY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fie/SimpkinsYYW15,
  author       = {Lindsay Simpkins and
                  Xiaohong Yuan and
                  Huiming Yu and
                  Kenneth Williams},
  title        = {Using a case study to teach students about finding and fixing logic
                  flaws in software},
  booktitle    = {2015 {IEEE} Frontiers in Education Conference, {FIE} 2015, El Paso,
                  TX, USA, October 21-24, 2015},
  pages        = {1--7},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/FIE.2015.7344155},
  doi          = {10.1109/FIE.2015.7344155},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fie/SimpkinsYYW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fie/XuY15,
  author       = {Jinsheng Xu and
                  Xiaohong Yuan},
  title        = {Developing a course module for teaching cryptography programming on
                  Android},
  booktitle    = {2015 {IEEE} Frontiers in Education Conference, {FIE} 2015, El Paso,
                  TX, USA, October 21-24, 2015},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/FIE.2015.7344086},
  doi          = {10.1109/FIE.2015.7344086},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fie/XuY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/YuWY15,
  author       = {Huiming Yu and
                  Kenneth Williams and
                  Xiaohong Yuan},
  editor       = {Guojun Wang and
                  Albert Y. Zomaya and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Kenli Li},
  title        = {Cloud Computing Threats and Provider Security Assessment},
  booktitle    = {Algorithms and Architectures for Parallel Processing - {ICA3PP} International
                  Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9532},
  pages        = {238--250},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27161-3\_21},
  doi          = {10.1007/978-3-319-27161-3\_21},
  timestamp    = {Sat, 06 Aug 2022 22:05:44 +0200},
  biburl       = {https://dblp.org/rec/conf/ica3pp/YuWY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/WilliamsY15,
  author       = {Imano Williams and
                  Xiaohong Yuan},
  editor       = {Michael E. Whitman and
                  Humayun Zafar},
  title        = {Evaluating the effectiveness of Microsoft threat modeling tool},
  booktitle    = {Proceedings of the 2015 Information Security Curriculum Development
                  Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015},
  pages        = {9:1--9:6},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2885990.2885999},
  doi          = {10.1145/2885990.2885999},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/WilliamsY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/SimpkinsYMZY15,
  author       = {Lindsay Simpkins and
                  Xiaohong Yuan and
                  Jwalit Modi and
                  Justin Zhan and
                  Li Yang},
  editor       = {Michael E. Whitman and
                  Humayun Zafar},
  title        = {A course module on web tracking and privacy},
  booktitle    = {Proceedings of the 2015 Information Security Curriculum Development
                  Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015},
  pages        = {10:1--10:7},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2885990.2886000},
  doi          = {10.1145/2885990.2886000},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/SimpkinsYMZY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/YuanBWX15,
  author       = {Xiaohong Yuan and
                  Kelvin S. Bryant and
                  Kenneth Williams and
                  Jinsheng Xu},
  editor       = {Adrienne Decker and
                  Kurt Eiselt and
                  Carl Alphonce and
                  Jodi L. Tims},
  title        = {Integrating Mobile Computing and Security into a Computer Science
                  Curriculum (Abstract Only)},
  booktitle    = {Proceedings of the 46th {ACM} Technical Symposium on Computer Science
                  Education, {SIGCSE} 2015, Kansas City, MO, USA, March 4-7, 2015},
  pages        = {686},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2676723.2691902},
  doi          = {10.1145/2676723.2691902},
  timestamp    = {Mon, 13 Dec 2021 09:32:31 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcse/YuanBWX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/YuanNBY14,
  author       = {Xiaohong Yuan and
                  Emmanuel Borkor Nuakoh and
                  Jodria S. Beal and
                  Huiming Yu},
  editor       = {Robert K. Abercrombie and
                  Jeffrey Todd McDonald},
  title        = {Retrieving relevant {CAPEC} attack patterns for secure software development},
  booktitle    = {Cyber and Information Security Research Conference, {CISR} '14, Oak
                  Ridge, TN, USA, April 8-10, 2014},
  pages        = {33--36},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2602087.2602092},
  doi          = {10.1145/2602087.2602092},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/YuanNBY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/es/HeYT14,
  author       = {Wu He and
                  Xiaohong Yuan and
                  Xin Tian},
  title        = {The Self-Efficacy Variable in Behavioral Information Security Research},
  booktitle    = {Enterprise Systems Conference, {ES} 2014, Shangai, China, August 2-3,
                  2014},
  pages        = {28--32},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ES.2014.52},
  doi          = {10.1109/ES.2014.52},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/es/HeYT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/es/LiHXAAY14,
  author       = {Ling Li and
                  Wu He and
                  Li Xu and
                  Ivan K. Ash and
                  Mohd Anwar and
                  Xiaohong Yuan},
  title        = {Does Explicit Information Security Policy Affect Employees' Cyber
                  Security Behavior? {A} Pilot Study},
  booktitle    = {Enterprise Systems Conference, {ES} 2014, Shangai, China, August 2-3,
                  2014},
  pages        = {169--173},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ES.2014.66},
  doi          = {10.1109/ES.2014.66},
  timestamp    = {Wed, 13 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/es/LiHXAAY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/YuanWYCRYWK14,
  author       = {Xiaohong Yuan and
                  Kenneth Williams and
                  Huiming Yu and
                  Bei{-}tseng Chu and
                  Audrey Rorrer and
                  Li Yang and
                  Kathy Winters and
                  Joseph M. Kizza},
  title        = {Developing Faculty Expertise in Information Assurance through Case
                  Studies and Hands-On Experiences},
  booktitle    = {47th Hawaii International Conference on System Sciences, {HICSS} 2014,
                  Waikoloa, HI, USA, January 6-9, 2014},
  pages        = {4938--4945},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HICSS.2014.606},
  doi          = {10.1109/HICSS.2014.606},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/YuanWYCRYWK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/SimpkinsYK14,
  author       = {Lindsay Simpkins and
                  Xiaohong Yuan and
                  Jung Hee Kim},
  editor       = {Michael E. Whitman and
                  Humayun Zafar},
  title        = {A course module on clickjacking},
  booktitle    = {Proceedings of the 2014 Information Security Curriculum Development
                  Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014},
  pages        = {2:1},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2670739.2670750},
  doi          = {10.1145/2670739.2670750},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/SimpkinsYK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/JohnsonHHYY14,
  author       = {Perron Johnson and
                  Philip Harris and
                  Keheira Henderson and
                  Xiaohong Yuan and
                  Li Yang},
  editor       = {Michael E. Whitman and
                  Humayun Zafar},
  title        = {A course module on mobile malware},
  booktitle    = {Proceedings of the 2014 Information Security Curriculum Development
                  Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014},
  pages        = {10:1},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2670739.2670752},
  doi          = {10.1145/2670739.2670752},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/JohnsonHHYY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/BrownY14,
  author       = {Shearon Brown and
                  Xiaohong Yuan},
  editor       = {J. D. Dougherty and
                  Kris Nagel and
                  Adrienne Decker and
                  Kurt Eiselt},
  title        = {Techniques for retaining low performing students: high-need student
                  mentoring program (abstract only)},
  booktitle    = {The 45th {ACM} Technical Symposium on Computer Science Education,
                  {SIGCSE} 2014, Atlanta, GA, USA, March 5-8, 2014},
  pages        = {708},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2538862.2544271},
  doi          = {10.1145/2538862.2544271},
  timestamp    = {Tue, 23 Mar 2021 10:54:19 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcse/BrownY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/DuYKY14,
  author       = {Wenliang Du and
                  Li Yang and
                  Joseph Migga Kizza and
                  Xiaohong Yuan},
  editor       = {J. D. Dougherty and
                  Kris Nagel and
                  Adrienne Decker and
                  Kurt Eiselt},
  title        = {New hands-on labs on browser security (abstract only)},
  booktitle    = {The 45th {ACM} Technical Symposium on Computer Science Education,
                  {SIGCSE} 2014, Atlanta, GA, USA, March 5-8, 2014},
  pages        = {717},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2538862.2544266},
  doi          = {10.1145/2538862.2544266},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcse/DuYKY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/AkowuahYXW13,
  author       = {Francis Akowuah and
                  Xiaohong Yuan and
                  Jinsheng Xu and
                  Hong Wang},
  title        = {A Survey of Security Standards Applicable to Health Information Systems},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {7},
  number       = {4},
  pages        = {22--36},
  year         = {2013},
  url          = {https://doi.org/10.4018/ijisp.2013100103},
  doi          = {10.4018/IJISP.2013100103},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/AkowuahYXW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisedu/HeY013,
  author       = {Wu He and
                  Xiaohong Yuan and
                  Li Yang},
  title        = {Supporting Case-Based Learning in Information Security with Web-Based
                  Technology},
  journal      = {J. Inf. Syst. Educ.},
  volume       = {24},
  number       = {1},
  pages        = {31--40},
  year         = {2013},
  url          = {https://jise.org/Volume24/n1/JISEv24n1p31.html},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisedu/HeY013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fie/YuanXWE13,
  author       = {Xiaohong Yuan and
                  Jinsheng Xu and
                  Hong Wang and
                  Kossi D. Edoh},
  editor       = {Randa L. Shehab and
                  James J. Sluss and
                  Deborah Anne Trytten},
  title        = {Developing an interdisciplinary Health Informatics Security and privacy
                  program},
  booktitle    = {{IEEE} Frontiers in Education Conference, {FIE} 2013, Oklahoma City,
                  Oklahoma, USA, October 23-26, 2013},
  pages        = {1618--1622},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/FIE.2013.6685111},
  doi          = {10.1109/FIE.2013.6685111},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fie/YuanXWE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/AkowuahYXW12,
  author       = {Francis Akowuah and
                  Xiaohong Yuan and
                  Jinsheng Xu and
                  Hong Wang},
  title        = {A Survey of {U.S.} Laws for Health Information Security {\&} Privacy},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {6},
  number       = {4},
  pages        = {40--54},
  year         = {2012},
  url          = {https://doi.org/10.4018/jisp.2012100102},
  doi          = {10.4018/JISP.2012100102},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/AkowuahYXW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ACMse/YuPSY12,
  author       = {Huiming Yu and
                  Nakia Powell and
                  Dexter Stembridge and
                  Xiaohong Yuan},
  editor       = {Randy K. Smith and
                  Susan V. Vrbsky},
  title        = {Cloud computing and security challenges},
  booktitle    = {Proceedings of the 50th Annual Southeast Regional Conference, 2012,
                  Tuscaloosa, AL, USA, March 29-31, 2012},
  pages        = {298--302},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2184512.2184581},
  doi          = {10.1145/2184512.2184581},
  timestamp    = {Fri, 12 Mar 2021 15:27:48 +0100},
  biburl       = {https://dblp.org/rec/conf/ACMse/YuPSY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/YuanXEW12,
  author       = {Xiaohong Yuan and
                  Jinsheng Xu and
                  Kossi D. Edoh and
                  Hong Wang},
  editor       = {Laurie A. Smith King and
                  David R. Musicant and
                  Tracy Camp and
                  Paul T. Tymann},
  title        = {Developing an interdisciplinary health informatics security and privacy
                  program (abstract only)},
  booktitle    = {Proceedings of the 43rd {ACM} technical symposium on Computer science
                  education, {SIGCSE} 2012, Raleigh, NC, USA, February 29 - March 3,
                  2012},
  pages        = {666},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2157136.2157373},
  doi          = {10.1145/2157136.2157373},
  timestamp    = {Wed, 10 Mar 2021 13:17:16 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcse/YuanXEW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ACMse/EvansY11,
  author       = {Nathaniel Evans and
                  Xiaohong Yuan},
  editor       = {Victor A. Clincy and
                  Kenneth E. Hoganson and
                  Jose Garrido and
                  Venu Dasigi},
  title        = {Observation of recent Microsoft Zero-Day vulnerabilities},
  booktitle    = {Proceedings of the 49th Annual Southeast Regional Conference, 2011,
                  Kennesaw, GA, USA, March 24-26, 2011},
  pages        = {328--329},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2016039.2016131},
  doi          = {10.1145/2016039.2016131},
  timestamp    = {Fri, 12 Mar 2021 15:27:48 +0100},
  biburl       = {https://dblp.org/rec/conf/ACMse/EvansY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csedu/AbuzaidYYC11,
  author       = {Abdrah Abuzaid and
                  Xiaohong Yuan and
                  Huiming Yu and
                  Bill Chu},
  editor       = {Alexander Verbraeck and
                  Markus Helfert and
                  Jos{\'{e}} Cordeiro and
                  Boris Shishkov},
  title        = {The Design and Implementation of a Cryptographic Education Tool},
  booktitle    = {{CSEDU} 2011 - Proceedings of the 3rd International Conference on
                  Computer Supported Education, Volume 1, Noordwijkerhout, Netherlands,
                  6-8 May, 2011},
  pages        = {193--198},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Fri, 30 Sep 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csedu/AbuzaidYYC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imagapp/TerryYWYC11,
  author       = {Tom Terry Jr. and
                  Huiming Yu and
                  Kenneth Williams and
                  Xiaohong Yuan and
                  Bill Chu},
  editor       = {Gabriela Csurka and
                  Martin Kraus and
                  Jos{\'{e}} Braz},
  title        = {A Visualization based Simulator for {SYN} Flood Attacks},
  booktitle    = {{IMAGAPP} {\&} {IVAPP} 2011 - Proceedings of the International
                  Conference on Imaging Theory and Applications and International Conference
                  on Information Visualization Theory and Applications, Vilamoura, Algarve,
                  Portugal, March 5-7, 2011},
  pages        = {251--255},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Tue, 05 Mar 2024 11:15:19 +0100},
  biburl       = {https://dblp.org/rec/conf/imagapp/TerryYWYC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1108-3342,
  author       = {Xiaohong Yuan and
                  Eduardo B. Fern{\'{a}}ndez},
  title        = {Patterns for Business-to-consumer E-Commerce Applications},
  journal      = {CoRR},
  volume       = {abs/1108.3342},
  year         = {2011},
  url          = {http://arxiv.org/abs/1108.3342},
  eprinttype    = {arXiv},
  eprint       = {1108.3342},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1108-3342.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jeric/YuanVQAYX10,
  author       = {Xiaohong Yuan and
                  Percy Vega and
                  Yaseen Qadah and
                  Ricky Archer and
                  Huiming Yu and
                  Jinsheng Xu},
  title        = {Visualization Tools for Teaching Computer Security},
  journal      = {{ACM} Trans. Comput. Educ.},
  volume       = {9},
  number       = {4},
  pages        = {20:1--20:28},
  year         = {2010},
  url          = {https://doi.org/10.1145/1656255.1656258},
  doi          = {10.1145/1656255.1656258},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jeric/YuanVQAYX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/YuanMXY10,
  author       = {Xiaohong Yuan and
                  Sahana Murthy and
                  Jinsheng Xu and
                  Huiming Yu},
  editor       = {Michael E. Whitman and
                  Herbert J. Mattord},
  title        = {Case studies for teaching physical security and security policy},
  booktitle    = {Information Security Curriculum Development Conference, InfoSecCD
                  2010, Kennesaw, GA, USA, October 1-3, 2010},
  pages        = {21--26},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1940941.1940947},
  doi          = {10.1145/1940941.1940947},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/YuanMXY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/serp/AbegazY10,
  author       = {Tamirat Abegaz and
                  Xiaohong Yuan},
  editor       = {Hamid R. Arabnia and
                  Hassan Reza and
                  Leonidas Deligiannidis and
                  Juan Jose Cuadrado{-}Gallego and
                  Vincent Schmidt and
                  Ashu M. G. Solo},
  title        = {Designing an SOA-Based Earthquake Forewarning System using {BPMN}},
  booktitle    = {Proceedings of the 2010 International Conference on Software Engineering
                  Research {\&} Practice, {SERP} 2010, July 12-15, 2010, Las Vegas,
                  Nevada, USA, 2 Volumes},
  pages        = {593--598},
  publisher    = {{CSREA} Press},
  year         = {2010},
  timestamp    = {Fri, 10 Dec 2010 13:15:53 +0100},
  biburl       = {https://dblp.org/rec/conf/serp/AbegazY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fecs/MatthewsYEY09,
  author       = {David Matthews and
                  Xiaohong Yuan and
                  Edmundson Effort and
                  Huiming Yu},
  editor       = {Hamid R. Arabnia and
                  Azita Bahrami and
                  Victor A. Clincy},
  title        = {Laboratory Design For Demonstrating Phishing},
  booktitle    = {Proceedings of the 2009 International Conference on Frontiers in Education:
                  Computer Science {\&} Computer Engineering, {FECS} 2009, July
                  13-16, 2009, Las Vegas, Nevada, {USA}},
  pages        = {399--404},
  publisher    = {{CSREA} Press},
  year         = {2009},
  timestamp    = {Wed, 08 Dec 2010 08:14:49 +0100},
  biburl       = {https://dblp.org/rec/conf/fecs/MatthewsYEY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fecs/YuCYMB09,
  author       = {Huiming Yu and
                  Bill Chu and
                  Xiaohong Yuan and
                  Janelle C. Mason and
                  Monica Barnette},
  editor       = {Hamid R. Arabnia and
                  Azita Bahrami and
                  Victor A. Clincy},
  title        = {Using a Practice Oriented Approach to Teach Web Security Course},
  booktitle    = {Proceedings of the 2009 International Conference on Frontiers in Education:
                  Computer Science {\&} Computer Engineering, {FECS} 2009, July
                  13-16, 2009, Las Vegas, Nevada, {USA}},
  pages        = {405--409},
  publisher    = {{CSREA} Press},
  year         = {2009},
  timestamp    = {Fri, 15 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fecs/YuCYMB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/springer/YuanPAL08,
  author       = {Xiaohong Yuan and
                  Barbara Pioro and
                  Ricky Archer and
                  Yaohang Li},
  editor       = {Magued Iskander},
  title        = {Teaching Operating Systems Using Visualization: {A} Comparative Study},
  booktitle    = {Innovative Techniques in Instruction Technology, E-learning, E-assessment,
                  and Education, Proceedings of the 2007 International Conference on
                  Engineering Education, Instructional Technology, Assessment, and E-learning
                  {(EIAE} 2007), part of the International Joint Conferences on Computer,
                  Information, and Systems Sciences, and Engineering {(CISSE} 2007),
                  Bridgeport, CT, USA, December 3-12, 2007},
  pages        = {576--580},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-1-4020-8739-4\_102},
  doi          = {10.1007/978-1-4020-8739-4\_102},
  timestamp    = {Tue, 16 May 2017 14:24:38 +0200},
  biburl       = {https://dblp.org/rec/series/springer/YuanPAL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/inffus/BasirY07,
  author       = {Otman Basir and
                  Xiaohong Yuan},
  title        = {Engine fault diagnosis based on multi-sensor information fusion using
                  Dempster-Shafer evidence theory},
  journal      = {Inf. Fusion},
  volume       = {8},
  number       = {4},
  pages        = {379--386},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.inffus.2005.07.003},
  doi          = {10.1016/J.INFFUS.2005.07.003},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/inffus/BasirY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/LiCY07,
  author       = {Yaohang Li and
                  Daniel Chen and
                  Xiaohong Yuan},
  title        = {Trustworthy remote compiling services for grid-based scientific applications},
  journal      = {J. Supercomput.},
  volume       = {41},
  number       = {2},
  pages        = {119--131},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11227-006-0029-9},
  doi          = {10.1007/S11227-006-0029-9},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/LiCY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ACISicis/YuYXPCG07,
  author       = {Huiming Yu and
                  Xiaohong Yuan and
                  Jinsheng Xu and
                  Stephen Providence and
                  Bill Chu and
                  Dechang Gu},
  title        = {Bridge Information Assurance Education Gap between the Majority and
                  Minority Universities through Collaboration},
  booktitle    = {6th Annual {IEEE/ACIS} International Conference on Computer and Information
                  Science {(ICIS} 2007), 11-13 July 2007, Melbourne, Australia},
  pages        = {1030--1035},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICIS.2007.70},
  doi          = {10.1109/ICIS.2007.70},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ACISicis/YuYXPCG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ACMse/YuanVXYL07,
  author       = {Xiaohong Yuan and
                  Percy Vega and
                  Jinsheng Xu and
                  Huiming Yu and
                  Yaohang Li},
  editor       = {David John and
                  Sandria N. Kerr},
  title        = {Using packet sniffer simulator in the class: experience and evaluation},
  booktitle    = {Proceedings of the 45th Annual Southeast Regional Conference, 2007,
                  Winston-Salem, North Carolina, USA, March 23-24, 2007},
  pages        = {116--121},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1233341.1233363},
  doi          = {10.1145/1233341.1233363},
  timestamp    = {Fri, 12 Mar 2021 15:27:48 +0100},
  biburl       = {https://dblp.org/rec/conf/ACMse/YuanVXYL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ACMse/FernandezY07,
  author       = {Eduardo B. Fern{\'{a}}ndez and
                  Xiaohong Yuan},
  editor       = {David John and
                  Sandria N. Kerr},
  title        = {Securing analysis patterns},
  booktitle    = {Proceedings of the 45th Annual Southeast Regional Conference, 2007,
                  Winston-Salem, North Carolina, USA, March 23-24, 2007},
  pages        = {288--293},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1233341.1233393},
  doi          = {10.1145/1233341.1233393},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ACMse/FernandezY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/KurtzFEYSJ07,
  author       = {Barry L. Kurtz and
                  James B. Fenwick Jr. and
                  Christopher C. Ellsworth and
                  Xiaohong Yuan and
                  Adam Steele and
                  Xiaoping Jia},
  editor       = {Ingrid Russell and
                  Susan M. Haller and
                  J. D. Dougherty and
                  Susan H. Rodger},
  title        = {Inter-University software engineering using web services},
  booktitle    = {Proceedings of the 38th {SIGCSE} Technical Symposium on Computer Science
                  Education, {SIGCSE} 2007, Covington, Kentucky, USA, March 7-11, 2007},
  pages        = {464--468},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1227310.1227467},
  doi          = {10.1145/1227310.1227467},
  timestamp    = {Wed, 10 Mar 2021 13:17:16 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcse/KurtzFEYSJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/grc/LiDZSY06,
  author       = {Yaohang Li and
                  Tao Dong and
                  Xinyu Zhang and
                  Yong{-}Duan Song and
                  Xiaohong Yuan},
  title        = {Large-scale software unit testing on the grid},
  booktitle    = {2006 {IEEE} International Conference on Granular Computing, GrC 2006,
                  Atlanta, Georgia, USA, May 10-12, 2006},
  pages        = {596--599},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/GRC.2006.1635873},
  doi          = {10.1109/GRC.2006.1635873},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/grc/LiDZSY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/BaxleyXYZYB06,
  author       = {Thomas Baxley and
                  Jinsheng Xu and
                  Huiming Yu and
                  Jinghua Zhang and
                  Xiaohong Yuan and
                  Joseph Brickhouse},
  title        = {{LAN} attacker: a visual education tool},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {118--123},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231072},
  doi          = {10.1145/1231047.1231072},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/BaxleyXYZYB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/YuLYX06,
  author       = {Huiming Yu and
                  W. Liao and
                  Xiaohong Yuan and
                  Jinsheng Xu},
  editor       = {Doug Baldwin and
                  Paul T. Tymann and
                  Susan M. Haller and
                  Ingrid Russell},
  title        = {Teaching a web security course to practice information assurance},
  booktitle    = {Proceedings of the 37th {SIGCSE} Technical Symposium on Computer Science
                  Education, {SIGCSE} 2006, Houston, Texas, USA, March 3-5, 2006},
  pages        = {12--16},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1121341.1121348},
  doi          = {10.1145/1121341.1121348},
  timestamp    = {Thu, 10 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcse/YuLYX06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdpta/LiCYYE05,
  author       = {Yaohang Li and
                  Daniel Tsu{-}Tang Chen and
                  Xiaohong Yuan and
                  Huiming Yu and
                  Albert C. Esterline},
  editor       = {Hamid R. Arabnia},
  title        = {Secure Remote Compiling Services on the Grid},
  booktitle    = {Proceedings of the International Conference on Parallel and Distributed
                  Processing Techniques and Applications, {PDPTA} 2005, Las Vegas, Nevada,
                  USA, June 27-30, 2005, Volume 1},
  pages        = {373--378},
  publisher    = {{CSREA} Press},
  year         = {2005},
  timestamp    = {Wed, 25 Jan 2006 09:49:27 +0100},
  biburl       = {https://dblp.org/rec/conf/pdpta/LiCYYE05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/serp/YuanVYL05,
  author       = {Xiaohong Yuan and
                  Percy Vega and
                  Huiming Yu and
                  Yaohang Li},
  editor       = {Hamid R. Arabnia and
                  Hassan Reza},
  title        = {A Personal Software Process Tool for Eclipse Environment},
  booktitle    = {Proceedings of the International Conference on Software Engineering
                  Research and Practice, {SERP} 2005, Las Vegas, Nevada, USA, June 27-29,
                  2005, Volume 2},
  pages        = {717--723},
  publisher    = {{CSREA} Press},
  year         = {2005},
  timestamp    = {Tue, 31 Jan 2006 11:58:14 +0100},
  biburl       = {https://dblp.org/rec/conf/serp/YuanVYL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europlop/YuanF03,
  author       = {Xiaohong Yuan and
                  Eduardo B. Fern{\'{a}}ndez},
  editor       = {Kevlin Henney and
                  Dietmar Sch{\"{u}}tz},
  title        = {An Analysis Pattern for Course Management},
  booktitle    = {Proceedings of the 8th European Conference on Pattern Languages of
                  Programms (EuroPLoP '2003), Irsee, Germany, June 25-29, 2003},
  pages        = {899--912},
  publisher    = {{UVK} - Universitaetsverlag Konstanz},
  year         = {2003},
  url          = {http://hillside.net/europlop/HillsideEurope/Papers/EuroPLoP2003/2003\_YuanEtAl\_AnAnalysisPatternForCourseManagement.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/europlop/YuanF03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/serp/Yuan03,
  author       = {Xiaohong Yuan},
  editor       = {Ban Al{-}Ani and
                  Hamid R. Arabnia and
                  Youngsong Mun},
  title        = {An Experience Report on Teaching the Personal Software Process},
  booktitle    = {Proceedings of the International Conference on Software Engineering
                  Research and Practice, {SERP} '03, June 23 - 26, 2003, Las Vegas,
                  Nevada, USA, Volume 2},
  pages        = {810--815},
  publisher    = {{CSREA} Press},
  year         = {2003},
  timestamp    = {Tue, 14 Oct 2003 13:56:57 +0200},
  biburl       = {https://dblp.org/rec/conf/serp/Yuan03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icn/YuanI01,
  author       = {Xiaohong Yuan and
                  Mohammad Ilyas},
  editor       = {Pascal Lorenz},
  title        = {Threshold-Based Connection Admission Control Scheme in {ATM} Networks:
                  {A} Simulation Study},
  booktitle    = {Networking - {ICN} 2001, First International Conference, Colmar, France,
                  July 9-13, 2001 Proceedings, Part 2},
  series       = {Lecture Notes in Computer Science},
  volume       = {2094},
  pages        = {677--686},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47734-9\_67},
  doi          = {10.1007/3-540-47734-9\_67},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/icn/YuanI01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/er/FernandezY00,
  author       = {Eduardo B. Fern{\'{a}}ndez and
                  Xiaohong Yuan},
  editor       = {Alberto H. F. Laender and
                  Stephen W. Liddle and
                  Veda C. Storey},
  title        = {Semantic Analysis Patterns},
  booktitle    = {Conceptual Modeling - {ER} 2000, 19th International Conference on
                  Conceptual Modeling, Salt Lake City, Utah, USA, October 9-12, 2000,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1920},
  pages        = {183--195},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45393-8\_14},
  doi          = {10.1007/3-540-45393-8\_14},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/er/FernandezY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scai/YuanZW95,
  author       = {Xiaohong Yuan and
                  Kai Zhao and
                  Jue Wang},
  editor       = {Agnar Aamodt and
                  Jan Komorowski},
  title        = {Visualization in Mechanical Geometry Theorem Proving},
  booktitle    = {Fifth Scandinavian Conference on Artificial Intelligence, {SCAI} 1995,
                  Trondheim, Norway, 29-31 May, 1995},
  series       = {Frontiers in Artificial Intelligence and Applications},
  volume       = {28},
  pages        = {478--482},
  publisher    = {{IOS} Press},
  year         = {1995},
  timestamp    = {Thu, 01 Aug 2019 12:07:35 +0200},
  biburl       = {https://dblp.org/rec/conf/scai/YuanZW95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics