Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Xiaohong Yuan
@article{DBLP:journals/access/LiuHLRYX23, author = {Zhipeng Liu and Junyi Hu and Yang Liu and Kaushik Roy and Xiaohong Yuan and Jinsheng Xu}, title = {Anomaly-Based Intrusion on IoT Networks Using AIGAN-a Generative Adversarial Network}, journal = {{IEEE} Access}, volume = {11}, pages = {91116--91132}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3307463}, doi = {10.1109/ACCESS.2023.3307463}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/LiuHLRYX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jfi/LiWSGHLYW23, author = {Xueyun Li and Yiping Wang and Chuqi Su and Xinle Gong and Jin Huang and Xun Liu and Xiaohong Yuan and Shixuan Wang}, title = {Driver and automation cooperation approach for share steering control system}, journal = {J. Frankl. Inst.}, volume = {360}, number = {11}, pages = {7269--7293}, year = {2023}, url = {https://doi.org/10.1016/j.jfranklin.2023.05.019}, doi = {10.1016/J.JFRANKLIN.2023.05.019}, timestamp = {Thu, 03 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jfi/LiWSGHLYW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/remotesensing/YuZCHSMSYWZ23, author = {Zhifeng Yu and Jun Zhang and Zheyu Chen and Yuekai Hu and C. K. Shum and Chaofei Ma and Qingjun Song and Xiaohong Yuan and Ben Wang and Bin Zhou}, title = {Spatiotemporal Evolutions of the Suspended Particulate Matter in the Yellow River Estuary, Bohai Sea and Characterized by Gaofen Imagery}, journal = {Remote. Sens.}, volume = {15}, number = {19}, pages = {4769}, year = {2023}, url = {https://doi.org/10.3390/rs15194769}, doi = {10.3390/RS15194769}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/remotesensing/YuZCHSMSYWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csr2/MachookaYE23, author = {Daniel Machooka and Xiaohong Yuan and Albert C. Esterline}, title = {A Survey of Attacks and Defenses for Deep Neural Networks}, booktitle = {{IEEE} International Conference on Cyber Security and Resilience, {CSR} 2023, Venice, Italy, July 31 - Aug. 2, 2023}, pages = {254--261}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CSR57506.2023.10224947}, doi = {10.1109/CSR57506.2023.10224947}, timestamp = {Wed, 06 Sep 2023 08:09:39 +0200}, biburl = {https://dblp.org/rec/conf/csr2/MachookaYE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsie/GilmoreMYHV23, author = {Jairen Gilmore and Uriah Vendell Moore and Xiaohong Yuan and Taylor Headen and Mounika Vanamala}, title = {Visualization Dashboard for Recommending Attack Patterns Using Topic Modeling}, booktitle = {Proceedings of the 2023 12th International Conference on Software and Information Engineering, {ICSIE} 2023, Sharm El-Sheikh, Egypt, November 21-23, 2023}, pages = {46--51}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3634848.3634862}, doi = {10.1145/3634848.3634862}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icsie/GilmoreMYHV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssci/UdeORY23, author = {Bassey Ude and Olusola Tolulope Odeyomi and Kaushik Roy and Xiaohong Yuan}, title = {A Survey on Bias Mitigation in Federated Learning}, booktitle = {{IEEE} Symposium Series on Computational Intelligence, {SSCI} 2023, Mexico City, Mexico, December 5-8, 2023}, pages = {1170--1175}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SSCI52147.2023.10372031}, doi = {10.1109/SSCI52147.2023.10372031}, timestamp = {Mon, 15 Jan 2024 21:26:31 +0100}, biburl = {https://dblp.org/rec/conf/ssci/UdeORY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-00040, author = {Prosenjit Chatterjee and Alex Yalchin and Joseph Shelton and Kaushik Roy and Xiaohong Yuan and Kossi D. Edoh}, title = {Presentation Attack detection using Wavelet Transform and Deep Residual Neural Net}, journal = {CoRR}, volume = {abs/2312.00040}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.00040}, doi = {10.48550/ARXIV.2312.00040}, eprinttype = {arXiv}, eprint = {2312.00040}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-00040.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ase/WilliamsYAM22, author = {Imano Williams and Xiaohong Yuan and Mohd Anwar and Jeffrey Todd McDonald}, title = {An Automated Security Concerns Recommender Based on Use Case Specification Ontology}, journal = {Autom. Softw. Eng.}, volume = {29}, number = {2}, pages = {42}, year = {2022}, url = {https://doi.org/10.1007/s10515-022-00334-0}, doi = {10.1007/S10515-022-00334-0}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ase/WilliamsYAM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/SumnerYAM22, author = {Alex Sumner and Xiaohong Yuan and Mohd Anwar and Maranda E. McBride}, title = {Examining Factors Impacting the Effectiveness of Anti-Phishing Trainings}, journal = {J. Comput. Inf. Syst.}, volume = {62}, number = {5}, pages = {975--997}, year = {2022}, url = {https://doi.org/10.1080/08874417.2021.1955638}, doi = {10.1080/08874417.2021.1955638}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/SumnerYAM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/YuHPLAZYFW22, author = {Zhifeng Yu and Qiyu Huang and Xiaoxue Peng and Haijian Liu and Qin Ai and Bin Zhou and Xiaohong Yuan and Meihong Fang and Ben Wang}, title = {Comparative Study on Recognition Models of Black-Odorous Water in Hangzhou Based on {GF-2} Satellite Data}, journal = {Sensors}, volume = {22}, number = {12}, pages = {4593}, year = {2022}, url = {https://doi.org/10.3390/s22124593}, doi = {10.3390/S22124593}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/YuHPLAZYFW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fie/XuYNHZ22, author = {Jinsheng Xu and Xiaohong Yuan and Swathi Nallela and Kevin Hillard and Jinghua Zhang}, title = {Learn {ARP} Spoofing Attack in a Game}, booktitle = {{IEEE} Frontiers in Education Conference, {FIE} 2022, Uppsala, Sweden, October 8-11, 2022}, pages = {1--5}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/FIE56618.2022.9962649}, doi = {10.1109/FIE56618.2022.9962649}, timestamp = {Sat, 03 Dec 2022 16:36:40 +0100}, biburl = {https://dblp.org/rec/conf/fie/XuYNHZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/FarrellY022, author = {Richard Farrell and Xiaohong Yuan and Kaushik Roy}, title = {IoT to Structured Data (IoT2SD): {A} Big Data Information Extraction Framework}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9897030}, doi = {10.1109/ICAIC53980.2022.9897030}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/FarrellY022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/ShahYT22, author = {Sandeep Shah and Xiaohong Yuan and Zanetta Tyler}, title = {An Analysis of {COVID-19} related Twitter Data for Asian Hate Speech Using Machine Learning Algorithms}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9896967}, doi = {10.1109/ICAIC53980.2022.9896967}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/ShahYT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/SumnerXY22, author = {Alex Sumner and Jinsheng Xu and Xiaohong Yuan}, title = {Determining Phishing Emails using {URL} Domain Features}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--5}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9897038}, doi = {10.1109/ICAIC53980.2022.9897038}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/SumnerXY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmla/RichardsonSY22, author = {Caitlin Richardson and Sandeep Shah and Xiaohong Yuan}, editor = {M. Arif Wani and Mehmed M. Kantardzic and Vasile Palade and Daniel Neagu and Longzhi Yang and Kit Yan Chan}, title = {Semi-Supervised Machine Learning for Analyzing {COVID-19} Related Twitter Data for Asian Hate Speech}, booktitle = {21st {IEEE} International Conference on Machine Learning and Applications, {ICMLA} 2022, Nassau, Bahamas, December 12-14, 2022}, pages = {1643--1648}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICMLA55696.2022.00252}, doi = {10.1109/ICMLA55696.2022.00252}, timestamp = {Wed, 29 Mar 2023 19:23:50 +0200}, biburl = {https://dblp.org/rec/conf/icmla/RichardsonSY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictai/ZhuSLQYF22, author = {Binhai Zhu and Jordan Sturtz and Xiaowen Liu and Letu Qingge and Xiaohong Yuan and Xingang Fu}, editor = {Marek Z. Reformat and Du Zhang and Nikolaos G. Bourbakis}, title = {Deep Learning Approaches for the Protein Scaffold Filling Problem}, booktitle = {34th {IEEE} International Conference on Tools with Artificial Intelligence, {ICTAI} 2022, Macao, China, October 31 - November 2, 2022}, pages = {1055--1061}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICTAI56018.2022.00161}, doi = {10.1109/ICTAI56018.2022.00161}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ictai/ZhuSLQYF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ieaaie/VDNGYR22, author = {Jeffrey J. Hernandez V. and Rodney Dejournett and Udayasri Nannuri and Tony Gwyn and Xiaohong Yuan and Kaushik Roy}, editor = {Hamido Fujita and Philippe Fournier{-}Viger and Moonis Ali and Yinglin Wang}, title = {Face Authentication from Masked Face Images Using Deep Learning on Periocular Biometrics}, booktitle = {Advances and Trends in Artificial Intelligence. Theory and Practices in Artificial Intelligence - 35th International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, {IEA/AIE} 2022, Kitakyushu, Japan, July 19-22, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13343}, pages = {452--459}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-08530-7\_38}, doi = {10.1007/978-3-031-08530-7\_38}, timestamp = {Fri, 02 Sep 2022 18:51:53 +0200}, biburl = {https://dblp.org/rec/conf/ieaaie/VDNGYR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/AlshareefYRA21, author = {Norah Alshareef and Xiaohong Yuan and Kaushik Roy and Mustafa Atay}, title = {A Study of Gender Bias in Face Presentation Attack and Its Mitigation}, journal = {Future Internet}, volume = {13}, number = {9}, pages = {234}, year = {2021}, url = {https://doi.org/10.3390/fi13090234}, doi = {10.3390/FI13090234}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fi/AlshareefYRA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmihi/WangYCY21, author = {Xiaolan Wang and Fan Yang and Wenjuan Chen and Xiaohong Yuan}, title = {Ultrasonic Diagnosis and Analysis of the Effect of Labor Analgesia on Early Pelvic Floor Function and Pelvic Floor Dysfunction}, journal = {J. Medical Imaging Health Informatics}, volume = {11}, number = {7}, pages = {1903--1910}, year = {2021}, url = {https://doi.org/10.1166/jmihi.2021.3585}, doi = {10.1166/JMIHI.2021.3585}, timestamp = {Tue, 30 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmihi/WangYCY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/LiuTSRSYY21, author = {Zhipeng Liu and Niraj Thapa and Addison Shaver and Kaushik Roy and Madhuri Siddula and Xiaohong Yuan and Anna Yu}, title = {Using Embedded Feature Selection and {CNN} for Classification on {CCD-INID-V1} - {A} New IoT Dataset}, journal = {Sensors}, volume = {21}, number = {14}, pages = {4834}, year = {2021}, url = {https://doi.org/10.3390/s21144834}, doi = {10.3390/S21144834}, timestamp = {Mon, 10 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/LiuTSRSYY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ACMse/ShahMY0C21, author = {Sandeep Shah and Pramita Sree Muhuri and Xiaohong Yuan and Kaushik Roy and Prosenjit Chatterjee}, editor = {Kazi Rahman and Eric Gamess}, title = {Implementing a network intrusion detection system using semi-supervised support vector machine and random forest}, booktitle = {{ACM} {SE} '21: 2021 {ACM} Southeast Conference, Virtual Event, USA, April 15-17, 2021}, pages = {180--184}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3409334.3452073}, doi = {10.1145/3409334.3452073}, timestamp = {Mon, 10 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ACMse/ShahMY0C21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fie/WeanquoiZYXJ21, author = {Patrickson Weanquoi and Jinghua Zhang and Xiaohong Yuan and Jinsheng Xu and Elva J. Jones}, title = {Learn Access Control Concepts in a Game}, booktitle = {{IEEE} Frontiers in Education Conference, {FIE} 2021, Lincoln, NE, USA, October 13-16, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/FIE49875.2021.9637228}, doi = {10.1109/FIE49875.2021.9637228}, timestamp = {Wed, 29 Dec 2021 09:45:46 +0100}, biburl = {https://dblp.org/rec/conf/fie/WeanquoiZYXJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imspa/FanuelYKQR21, author = {Mesafint Fanuel and Xiaohong Yuan and Hyung Nam Kim and Letu Qingge and Kaushik Roy}, editor = {Tomislav Petkovic and Davor Petrinovic and Sven Loncaric}, title = {A Survey on Skeleton-Based Activity Recognition using Graph Convolutional Networks {(GCN)}}, booktitle = {12th International Symposium on Image and Signal Processing and Analysis, {ISPA} 2021, Zagreb, Croatia, September 13-15, 2021}, pages = {177--182}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISPA52656.2021.9552064}, doi = {10.1109/ISPA52656.2021.9552064}, timestamp = {Mon, 06 Nov 2023 15:50:05 +0100}, biburl = {https://dblp.org/rec/conf/imspa/FanuelYKQR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/GaoSAYQ021, author = {Leyu Gao and Sandeep Shah and Nasser Assery and Xiaohong Yuan and Xiuli Qu and Kaushik Roy}, title = {Semi-Supervised Self Training to Assess the Credibility of Tweets}, booktitle = {2021 {IEEE} Intl Conf on Parallel {\&} Distributed Processing with Applications, Big Data {\&} Cloud Computing, Sustainable Computing {\&} Communications, Social Computing {\&} Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30 - Oct. 3, 2021}, pages = {1532--1537}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00206}, doi = {10.1109/ISPA-BDCLOUD-SOCIALCOM-SUSTAINCOM52081.2021.00206}, timestamp = {Mon, 10 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispa/GaoSAYQ021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/MuhuriCYRE20, author = {Pramita Sree Muhuri and Prosenjit Chatterjee and Xiaohong Yuan and Kaushik Roy and Albert C. Esterline}, title = {Using a Long Short-Term Memory Recurrent Neural Network {(LSTM-RNN)} to Classify Network Attacks}, journal = {Inf.}, volume = {11}, number = {5}, pages = {243}, year = {2020}, url = {https://doi.org/10.3390/info11050243}, doi = {10.3390/INFO11050243}, timestamp = {Mon, 10 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/information/MuhuriCYRE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aipr/ShaverLT0GY20, author = {Addison Shaver and Zhipeng Liu and Niraj Thapa and Kaushik Roy and Balakrishna Gokaraju and Xiaohong Yuan}, title = {Anomaly Based Intrusion Detection for IoT with Machine Learning}, booktitle = {49th {IEEE} Applied Imagery Pattern Recognition Workshop, {AIPR} 2020, Washington, DC, USA, October 13-15, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/AIPR50011.2020.9425199}, doi = {10.1109/AIPR50011.2020.9425199}, timestamp = {Mon, 10 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aipr/ShaverLT0GY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csedu/YuXYY20, author = {Qinrui Yu and Jinsheng Xu and Huiming Yu and Xiaohong Yuan}, editor = {H. Chad Lane and Susan Zvacek and James Uhomoibhi}, title = {The Design and Implementation of Secure Program Design Education Tool}, booktitle = {Proceedings of the 12th International Conference on Computer Supported Education, {CSEDU} 2020, Prague, Czech Republic, May 2-4, 2020, Volume 1}, pages = {319--324}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0009184003190324}, doi = {10.5220/0009184003190324}, timestamp = {Thu, 04 Jun 2020 16:56:38 +0200}, biburl = {https://dblp.org/rec/conf/csedu/YuXYY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fie/ZhangYJXV20, author = {Jinghua Zhang and Xiaohong Yuan and Jaris Johnson and Jinsheng Xu and Mounika Vanamala}, title = {Developing and Assessing a Web-Based Interactive Visualization Tool to Teach Buffer Overflow Concepts}, booktitle = {{IEEE} Frontiers in Education Conference, {FIE} 2020, Uppsala, Sweden, October 21-24, 2020}, pages = {1--7}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/FIE44824.2020.9274239}, doi = {10.1109/FIE44824.2020.9274239}, timestamp = {Mon, 14 Dec 2020 09:13:16 +0100}, biburl = {https://dblp.org/rec/conf/fie/ZhangYJXV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icer/WeanquoiZXYJ20, author = {Patrickson Boan Weanquoi and Jinghua Zhang and Jinsheng Xu and Xiaohong Yuan and Elva J. Jones}, editor = {Anthony V. Robins and Adon Moskal and Amy J. Ko and Ren{\'{e}}e McCauley}, title = {Developing and Assessing an Educational Game for Teaching Access Control}, booktitle = {{ICER} 2020: International Computing Education Research Conference, Virtual Event, New Zealand, August 10-12, 2020}, pages = {312}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372782.3408119}, doi = {10.1145/3372782.3408119}, timestamp = {Thu, 13 Aug 2020 15:49:08 +0200}, biburl = {https://dblp.org/rec/conf/icer/WeanquoiZXYJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intellisys/Brown0Y20, author = {W. Shannon Brown and Kaushik Roy and Xiaohong Yuan}, editor = {Kohei Arai and Supriya Kapoor and Rahul Bhatia}, title = {{US} Traffic Sign Recognition Using CNNs}, booktitle = {Intelligent Systems and Applications - Proceedings of the 2020 Intelligent Systems Conference, IntelliSys 2020, London, UK, 3-4 September, 2020, Volume 3}, series = {Advances in Intelligent Systems and Computing}, volume = {1252}, pages = {657--661}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55190-2\_50}, doi = {10.1007/978-3-030-55190-2\_50}, timestamp = {Mon, 10 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intellisys/Brown0Y20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/AsseryYQA020, author = {Nasser Assery and Xiaohong Yuan and Xiuli Qu and Sultan Almalki and Kaushik Roy}, editor = {Jia Hu and Geyong Min and Nektarios Georgalas and Zhiwei Zhao and Fei Hao and Wang Miao}, title = {Identifying Panic Triggers from Disaster-Related Tweets}, booktitle = {{IEEE} International Conference on Parallel {\&} Distributed Processing with Applications, Big Data {\&} Cloud Computing, Sustainable Computing {\&} Communications, Social Computing {\&} Networking, ISPA/BDCloud/SocialCom/SustainCom 2020, Exeter, United Kingdom, December 17-19, 2020}, pages = {827--836}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom51426.2020.00129}, doi = {10.1109/ISPA-BDCLOUD-SOCIALCOM-SUSTAINCOM51426.2020.00129}, timestamp = {Mon, 10 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispa/AsseryYQA020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seke/WilliamsY20, author = {Imano Williams and Xiaohong Yuan}, editor = {Ra{\'{u}}l Garc{\'{\i}}a{-}Castro}, title = {Identifying Security Concerns Based on a Use Case Ontology Framework}, booktitle = {The 32nd International Conference on Software Engineering and Knowledge Engineering, {SEKE} 2020, {KSIR} Virtual Conference Center, USA, July 9-19, 2020}, pages = {83--88}, publisher = {{KSI} Research Inc.}, year = {2020}, url = {https://doi.org/10.18293/SEKE2020-136}, doi = {10.18293/SEKE2020-136}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/seke/WilliamsY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigite/AlshaherYK20, author = {Hanan Alshaher and Xiaohong Yuan and Sajad Khorsandroo}, editor = {Deepak Khazanchi and Harvey P. Siy and George Grispos and Tenace Kwaku Setor}, title = {Teaching Flooding Attack to the {SDN} Data Plane with {POGIL}}, booktitle = {{SIGITE} '20: The 21st Annual Conference on Information Technology Education, Virtual Event, USA, October 7-9, 2020}, pages = {194--199}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3368308.3415406}, doi = {10.1145/3368308.3415406}, timestamp = {Thu, 15 Oct 2020 11:30:02 +0200}, biburl = {https://dblp.org/rec/conf/sigite/AlshaherYK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcia/GunnLDYR19, author = {Dylan J. Gunn and Zhipeng Liu and Rushit Dave and Xiaohong Yuan and Kaushik Roy}, title = {Touch-Based Active Cloud Authentication Using Traditional Machine Learning and {LSTM} on a Distributed Tensorflow Framework}, journal = {Int. J. Comput. Intell. Appl.}, volume = {18}, number = {4}, pages = {1950022:1--1950022:16}, year = {2019}, url = {https://doi.org/10.1142/S1469026819500226}, doi = {10.1142/S1469026819500226}, timestamp = {Mon, 10 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcia/GunnLDYR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijinfoman/LiHXAAY19, author = {Ling Li and Wu He and Li Xu and Ivan K. Ash and Mohd Anwar and Xiaohong Yuan}, title = {Investigating the impact of cybersecurity policy awareness on employees' cybersecurity behavior}, journal = {Int. J. Inf. Manag.}, volume = {45}, pages = {13--24}, year = {2019}, url = {https://doi.org/10.1016/j.ijinfomgt.2018.10.017}, doi = {10.1016/J.IJINFOMGT.2018.10.017}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijinfoman/LiHXAAY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ACMse/SumnerY19, author = {Alex Sumner and Xiaohong Yuan}, editor = {Dan Lo and Donghyun Kim and Eric Gamess}, title = {Mitigating Phishing Attacks: An Overview}, booktitle = {Proceedings of the 2019 {ACM} Southeast Conference, {ACM} {SE} '19, Kennesaw, GA, USA, April 18-20, 2019}, pages = {72--77}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3299815.3314437}, doi = {10.1145/3299815.3314437}, timestamp = {Thu, 10 Jun 2021 00:49:56 +0200}, biburl = {https://dblp.org/rec/conf/ACMse/SumnerY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/HeAALYXT19, author = {Wu He and Mohd Anwar and Ivan K. Ash and Ling Li and Xiaohong Yuan and Li Xu and Xin Tian}, title = {Effects of Evidence-Based Malware Cybersecurity Training on Employees}, booktitle = {25th Americas Conference on Information Systems, {AMCIS} 2019, Canc{\'{u}}n, Mexico, August 15-17, 2019}, publisher = {Association for Information Systems}, year = {2019}, url = {https://aisel.aisnet.org/amcis2019/info\_security\_privacy/info\_security\_privacy/11}, timestamp = {Wed, 13 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/amcis/HeAALYXT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/comped/ZhangYXJ19, author = {Jinghua Zhang and Xiaohong Yuan and Jinsheng Xu and Elva J. Jones}, editor = {Ming Zhang and Bo Yang and Steve Cooper and Andrew Luxton{-}Reilly}, title = {Developing and Assessing Educational Games to Enhance Cyber Security Learning in Computer Science}, booktitle = {Proceedings of the {ACM} Conference on Global Computing Education, CompEd 2019, Chengdu,Sichuan, China, May 17-19, 2019}, pages = {241}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3300115.3312511}, doi = {10.1145/3300115.3312511}, timestamp = {Sun, 05 May 2019 13:58:12 +0200}, biburl = {https://dblp.org/rec/conf/comped/ZhangYXJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fie/YuanZSX0EHW19, author = {Xiaohong Yuan and Tian Zhang and Ali Albu Shama and Jinsheng Xu and Li Yang and Jennifer T. Ellis and Wu He and Cynthia Waters}, title = {Teaching Cybersecurity Using Guided Inquiry Collaborative Learning}, booktitle = {{IEEE} Frontiers in Education Conference, {FIE} 2019, Cincinnati, OH, USA, October 16-19, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/FIE43999.2019.9028408}, doi = {10.1109/FIE43999.2019.9028408}, timestamp = {Thu, 25 Feb 2021 10:40:41 +0100}, biburl = {https://dblp.org/rec/conf/fie/YuanZSX0EHW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdlt/Nuakoh0YE19, author = {Emmanuel Borkor Nuakoh and Kaushik Roy and Xiaohong Yuan and Albert C. Esterline}, title = {Deep Learning Approach for {U.S.} Traffic Sign Recognition}, booktitle = {Proceedings of the 2019 3rd International Conference on Deep Learning Technologies, {ICDLT} 2019, Xiamen, China, July 05-07, 2019}, pages = {47--50}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3342999.3343016}, doi = {10.1145/3342999.3343016}, timestamp = {Mon, 10 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdlt/Nuakoh0YE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmla/AsseryYARX19, author = {Nasser Assery and Xiaohong Yuan and Sultan Almalki and Kaushik Roy and Xiuli Qu}, editor = {M. Arif Wani and Taghi M. Khoshgoftaar and Dingding Wang and Huanjing Wang and Naeem Seliya}, title = {Comparing Learning-Based Methods for Identifying Disaster-Related Tweets}, booktitle = {18th {IEEE} International Conference On Machine Learning And Applications, {ICMLA} 2019, Boca Raton, FL, USA, December 16-19, 2019}, pages = {1829--1836}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICMLA.2019.00295}, doi = {10.1109/ICMLA.2019.00295}, timestamp = {Tue, 08 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icmla/AsseryYARX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/ParkHY20, author = {Younghee Park and Hongxin Hu and Xiaohong Yuan}, editor = {Elizabeth K. Hawthorne and Manuel A. P{\'{e}}rez{-}Qui{\~{n}}ones and Sarah Heckman and Jian Zhang}, title = {Security Labs for Software Defined Networks in CloudLab}, booktitle = {Proceedings of the 50th {ACM} Technical Symposium on Computer Science Education, {SIGCSE} 2019, Minneapolis, MN, USA, February 27 - March 02, 2019}, pages = {1235}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3287324.3287538}, doi = {10.1145/3287324.3287538}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigcse/ParkHY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spaccs/ChatterjeeYSRYE19, author = {Prosenjit Chatterjee and Alex Yalchin and Joseph Shelton and Kaushik Roy and Xiaohong Yuan and Kossi D. Edoh}, editor = {Guojun Wang and Jun Feng and Md. Zakirul Alam Bhuiyan and Rongxing Lu}, title = {Presentation Attack Detection Using Wavelet Transform and Deep Residual Neural Net}, booktitle = {Security, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2019 International Workshops, Atlanta, GA, USA, July 14-17, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11637}, pages = {86--94}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24900-7\_7}, doi = {10.1007/978-3-030-24900-7\_7}, timestamp = {Mon, 10 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spaccs/ChatterjeeYSRYE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataservice/HooksYREH18, author = {Daniel Hooks and Xiaohong Yuan and Kaushik Roy and Albert C. Esterline and Joaquin Hernandez}, title = {Applying Artificial Immune System for Intrusion Detection}, booktitle = {Fourth {IEEE} International Conference on Big Data Computing Service and Applications, BigDataService 2018, Bamberg, Germany, March 26-29, 2018}, pages = {287--292}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/BigDataService.2018.00051}, doi = {10.1109/BIGDATASERVICE.2018.00051}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdataservice/HooksYREH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisa/WilliamsY18, author = {Imano Williams and Xiaohong Yuan}, editor = {Kuinam J. Kim and Nakhoon Baek}, title = {A User Study: Abuse Cases Derived from Use Case Description and {CAPEC} Attack Patterns}, booktitle = {Information Science and Applications 2018 - {ICISA} 2018, Hong Kong, China, June 25-27th, 2018}, series = {Lecture Notes in Electrical Engineering}, volume = {514}, pages = {239--249}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-1056-0\_25}, doi = {10.1007/978-981-13-1056-0\_25}, timestamp = {Fri, 08 Mar 2019 12:36:23 +0100}, biburl = {https://dblp.org/rec/conf/icisa/WilliamsY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itnac/DobsonRYX18, author = {Anthony Dobson and Kaushik Roy and Xiaohong Yuan and Jinsheng Xu}, title = {Performance Evaluation of Machine Learning Algorithms in Apache Spark for Intrusion Detection}, booktitle = {28th International Telecommunication Networks and Applications Conference, {ITNAC} 2018, Sydney, Australia, November 21-23, 2018}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/ATNAC.2018.8615314}, doi = {10.1109/ATNAC.2018.8615314}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itnac/DobsonRYX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/ParkHYL18, author = {Younghee Park and Hongxin Hu and Xiaohong Yuan and Hongda Li}, editor = {Tiffany Barnes and Daniel D. Garcia and Elizabeth K. Hawthorne and Manuel A. P{\'{e}}rez{-}Qui{\~{n}}ones}, title = {Enhancing Security Education Through Designing {SDN} Security Labs in CloudLab}, booktitle = {Proceedings of the 49th {ACM} Technical Symposium on Computer Science Education, {SIGCSE} 2018, Baltimore, MD, USA, February 21-24, 2018}, pages = {185--190}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3159450.3159514}, doi = {10.1145/3159450.3159514}, timestamp = {Mon, 12 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcse/ParkHYL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chb/AnwarHAYLX17, author = {Mohd Anwar and Wu He and Ivan K. Ash and Xiaohong Yuan and Ling Li and Li Xu}, title = {Gender difference and employees' cybersecurity behaviors}, journal = {Comput. Hum. Behav.}, volume = {69}, pages = {437--443}, year = {2017}, url = {https://doi.org/10.1016/j.chb.2016.12.040}, doi = {10.1016/J.CHB.2016.12.040}, timestamp = {Wed, 13 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chb/AnwarHAYLX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisedu/YuanWYRC0WK17, author = {Xiaohong Yuan and Kenneth Williams and Huiming Yu and Audrey Rorrer and Bei{-}Tseng Chu and Li Yang and Kathy Winters and Joseph M. Kizza}, title = {Faculty Workshops for Teaching Information Assurance through Hands-On Exercises and Case Studies}, journal = {J. Inf. Syst. Educ.}, volume = {28}, number = {1}, pages = {11--20}, year = {2017}, url = {https://jise.org/Volume28/n1/JISEv28n1p11.html}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisedu/YuanWYRC0WK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fie/KumariYPY17, author = {Shilpa Kumari and Xiaohong Yuan and Joshua Patterson and Huiming Yu}, title = {Demystifying ad fraud}, booktitle = {2017 {IEEE} Frontiers in Education Conference, {FIE} 2017, Indianapolis, IN, USA, October 18-21, 2017}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/FIE.2017.8190714}, doi = {10.1109/FIE.2017.8190714}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fie/KumariYPY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fie/ScottXZBCYYW17, author = {Brandon Scott and Jinsheng Xu and Jinghua Zhang and Ariana Brown and Erica Clark and Xiaohong Yuan and Anna Yu and Kenneth Williams}, title = {An interactive visualization tool for teaching {ARP} spoofing attack}, booktitle = {2017 {IEEE} Frontiers in Education Conference, {FIE} 2017, Indianapolis, IN, USA, October 18-21, 2017}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/FIE.2017.8190531}, doi = {10.1109/FIE.2017.8190531}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fie/ScottXZBCYYW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/maics/ShiYN17, author = {Ningxin Shi and Xiaohong Yuan and William Nick}, editor = {John Licato and Aleshia T. Hayes and Michael Glass}, title = {Semi-supervised Random Forest for Intrusion Detection Network}, booktitle = {Proceedings of the 28th Modern Artificial Intelligence and Cognitive Science Conference 2017, Fort Wayne, IN, USA, April 28-29, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {1964}, pages = {181--185}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-1964/S4.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:18 +0100}, biburl = {https://dblp.org/rec/conf/maics/ShiYN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/WilliamsY17, author = {Imano Williams and Xiaohong Yuan}, title = {Creating Abuse Cases Based on Attack Patterns: {A} User Study}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, September 24-26, 2017}, pages = {85--86}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SecDev.2017.27}, doi = {10.1109/SECDEV.2017.27}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/WilliamsY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/YuanYHEXW17, author = {Xiaohong Yuan and Li Yang and Wu He and Jennifer T. Ellis and Jinsheng Xu and Cynthia K. Waters}, editor = {Michael E. Caspersen and Stephen H. Edwards and Tiffany Barnes and Daniel D. Garcia}, title = {Enhancing Cybersecurity Education Using {POGIL} (Abstract Only)}, booktitle = {Proceedings of the 2017 {ACM} {SIGCSE} Technical Symposium on Computer Science Education, {SIGCSE} 2017, Seattle, WA, USA, March 8-11, 2017}, pages = {719}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3017680.3022423}, doi = {10.1145/3017680.3022423}, timestamp = {Tue, 23 Mar 2021 10:54:19 +0100}, biburl = {https://dblp.org/rec/conf/sigcse/YuanYHEXW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/WilliamsYMA16, author = {Imano Williams and Xiaohong Yuan and Jeffrey Todd McDonald and Mohd Anwar}, title = {A Method for Developing Abuse Cases and Its Evaluation}, journal = {J. Softw.}, volume = {11}, number = {5}, pages = {520--527}, year = {2016}, url = {https://doi.org/10.17706/jsw.11.5.520-527}, doi = {10.17706/JSW.11.5.520-527}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/WilliamsYMA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/besc/AnwarHY16, author = {Mohd Anwar and Wu He and Xiaohong Yuan}, editor = {Gang Li and Yves Demazeau and Guandong Xu and Paul Wang and Leon S. L. Wang and Guanfeng Liu}, title = {Employment status and cybersecurity behaviors}, booktitle = {2016 International Conference on Behavioral, Economic and Socio-cultural Computing, {BESC} 2016, Durham, NC, USA, November 11-13, 2016}, pages = {1--2}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/BESC.2016.7804493}, doi = {10.1109/BESC.2016.7804493}, timestamp = {Thu, 05 Jan 2023 22:22:55 +0100}, biburl = {https://dblp.org/rec/conf/besc/AnwarHY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fie/XuYYKKZ16, author = {Jinsheng Xu and Xiaohong Yuan and Anna Yu and Jung Hee Kim and Taehee Kim and Jinghua Zhang}, title = {Developing and evaluating a hands-on lab for teaching local area network vulnerabilities}, booktitle = {2016 {IEEE} Frontiers in Education Conference, {FIE} 2015, Eire, PA, USA, October 12-15, 2016}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/FIE.2016.7757364}, doi = {10.1109/FIE.2016.7757364}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fie/XuYYKKZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fie/YuanWMHLBXELMR16, author = {Xiaohong Yuan and Kenneth Williams and D. Scott McCrickard and Charles Hardnett and Litany H. Lineberry and Kelvin S. Bryant and Jinsheng Xu and Albert C. Esterline and Anyi Liu and Selvarajah Mohanarajah and Rachel Rutledge}, title = {Teaching mobile computing and mobile security}, booktitle = {2016 {IEEE} Frontiers in Education Conference, {FIE} 2015, Eire, PA, USA, October 12-15, 2016}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/FIE.2016.7757365}, doi = {10.1109/FIE.2016.7757365}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fie/YuanWMHLBXELMR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/XuYV16, author = {Jinsheng Xu and Xiaohong Yuan and Ashrith Velma}, editor = {Carl Alphonce and Jodi L. Tims and Michael E. Caspersen and Stephen H. Edwards}, title = {Design and Evaluation of a Course Module on Android Cipher Programming (Abstract Only)}, booktitle = {Proceedings of the 47th {ACM} Technical Symposium on Computing Science Education, {SIGCSE} 2016, Memphis, TN, USA, March 02 - 05, 2016}, pages = {689--690}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2839509.2850546}, doi = {10.1145/2839509.2850546}, timestamp = {Mon, 13 Dec 2021 09:32:31 +0100}, biburl = {https://dblp.org/rec/conf/sigcse/XuYV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/YuanXYKK16, author = {Xiaohong Yuan and Jinsheng Xu and Huiming Yu and Junghee Kim and Taehee Kim}, editor = {Carl Alphonce and Jodi L. Tims and Michael E. Caspersen and Stephen H. Edwards}, title = {Assessing the Effectiveness of Experiential-Learning-Based Teaching Tools in Cybersecurity Courses (Abstract Only)}, booktitle = {Proceedings of the 47th {ACM} Technical Symposium on Computing Science Education, {SIGCSE} 2016, Memphis, TN, USA, March 02 - 05, 2016}, pages = {693}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2839509.2850550}, doi = {10.1145/2839509.2850550}, timestamp = {Thu, 10 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcse/YuanXYKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigite/YuanHYS16, author = {Xiaohong Yuan and Wu He and Li Yang and Lindsay Simpkins}, editor = {Deborah Boisvert and Stephen J. Zilora}, title = {Teaching Security Management for Mobile Devices}, booktitle = {Proceedings of the 17th Annual Conference on Information Technology Education and the 5th Annual Conference on Research in Information Technology, {SIGITE/RIIT} 2016, Boston, MA, USA, September 28 - October 1, 2016}, pages = {14--19}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2978192.2978227}, doi = {10.1145/2978192.2978227}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigite/YuanHYS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/YuanNWY15, author = {Xiaohong Yuan and Emmanuel Borkor Nuakoh and Imano Williams and Huiming Yu}, title = {Developing Abuse Cases Based on Threat Modeling and Attack Patterns}, journal = {J. Softw.}, volume = {10}, number = {4}, pages = {491--498}, year = {2015}, url = {https://doi.org/10.17706/jsw.10.4.491-498}, doi = {10.17706/JSW.10.4.491-498}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/YuanNWY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/AnwarAHLXY15, author = {Mohd Anwar and Ivan K. Ash and Wu He and Ling Li and Li Xu and Xiaohong Yuan}, title = {A Security Behavior Model of Employees in Cyberspace}, booktitle = {21st Americas Conference on Information Systems, {AMCIS} 2015, Puerto Rico, August 13-15, 2015}, publisher = {Association for Information Systems}, year = {2015}, url = {http://aisel.aisnet.org/amcis2015/ISSecurity/GeneralPresentations/6}, timestamp = {Wed, 13 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/amcis/AnwarAHLXY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fie/SimpkinsYYW15, author = {Lindsay Simpkins and Xiaohong Yuan and Huiming Yu and Kenneth Williams}, title = {Using a case study to teach students about finding and fixing logic flaws in software}, booktitle = {2015 {IEEE} Frontiers in Education Conference, {FIE} 2015, El Paso, TX, USA, October 21-24, 2015}, pages = {1--7}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/FIE.2015.7344155}, doi = {10.1109/FIE.2015.7344155}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fie/SimpkinsYYW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fie/XuY15, author = {Jinsheng Xu and Xiaohong Yuan}, title = {Developing a course module for teaching cryptography programming on Android}, booktitle = {2015 {IEEE} Frontiers in Education Conference, {FIE} 2015, El Paso, TX, USA, October 21-24, 2015}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/FIE.2015.7344086}, doi = {10.1109/FIE.2015.7344086}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fie/XuY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/YuWY15, author = {Huiming Yu and Kenneth Williams and Xiaohong Yuan}, editor = {Guojun Wang and Albert Y. Zomaya and Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Kenli Li}, title = {Cloud Computing Threats and Provider Security Assessment}, booktitle = {Algorithms and Architectures for Parallel Processing - {ICA3PP} International Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9532}, pages = {238--250}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27161-3\_21}, doi = {10.1007/978-3-319-27161-3\_21}, timestamp = {Sat, 06 Aug 2022 22:05:44 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/YuWY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/WilliamsY15, author = {Imano Williams and Xiaohong Yuan}, editor = {Michael E. Whitman and Humayun Zafar}, title = {Evaluating the effectiveness of Microsoft threat modeling tool}, booktitle = {Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015}, pages = {9:1--9:6}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2885990.2885999}, doi = {10.1145/2885990.2885999}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/WilliamsY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/SimpkinsYMZY15, author = {Lindsay Simpkins and Xiaohong Yuan and Jwalit Modi and Justin Zhan and Li Yang}, editor = {Michael E. Whitman and Humayun Zafar}, title = {A course module on web tracking and privacy}, booktitle = {Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015}, pages = {10:1--10:7}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2885990.2886000}, doi = {10.1145/2885990.2886000}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/SimpkinsYMZY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/YuanBWX15, author = {Xiaohong Yuan and Kelvin S. Bryant and Kenneth Williams and Jinsheng Xu}, editor = {Adrienne Decker and Kurt Eiselt and Carl Alphonce and Jodi L. Tims}, title = {Integrating Mobile Computing and Security into a Computer Science Curriculum (Abstract Only)}, booktitle = {Proceedings of the 46th {ACM} Technical Symposium on Computer Science Education, {SIGCSE} 2015, Kansas City, MO, USA, March 4-7, 2015}, pages = {686}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2676723.2691902}, doi = {10.1145/2676723.2691902}, timestamp = {Mon, 13 Dec 2021 09:32:31 +0100}, biburl = {https://dblp.org/rec/conf/sigcse/YuanBWX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/YuanNBY14, author = {Xiaohong Yuan and Emmanuel Borkor Nuakoh and Jodria S. Beal and Huiming Yu}, editor = {Robert K. Abercrombie and Jeffrey Todd McDonald}, title = {Retrieving relevant {CAPEC} attack patterns for secure software development}, booktitle = {Cyber and Information Security Research Conference, {CISR} '14, Oak Ridge, TN, USA, April 8-10, 2014}, pages = {33--36}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2602087.2602092}, doi = {10.1145/2602087.2602092}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/YuanNBY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/es/HeYT14, author = {Wu He and Xiaohong Yuan and Xin Tian}, title = {The Self-Efficacy Variable in Behavioral Information Security Research}, booktitle = {Enterprise Systems Conference, {ES} 2014, Shangai, China, August 2-3, 2014}, pages = {28--32}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ES.2014.52}, doi = {10.1109/ES.2014.52}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/es/HeYT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/es/LiHXAAY14, author = {Ling Li and Wu He and Li Xu and Ivan K. Ash and Mohd Anwar and Xiaohong Yuan}, title = {Does Explicit Information Security Policy Affect Employees' Cyber Security Behavior? {A} Pilot Study}, booktitle = {Enterprise Systems Conference, {ES} 2014, Shangai, China, August 2-3, 2014}, pages = {169--173}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ES.2014.66}, doi = {10.1109/ES.2014.66}, timestamp = {Wed, 13 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/es/LiHXAAY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/YuanWYCRYWK14, author = {Xiaohong Yuan and Kenneth Williams and Huiming Yu and Bei{-}tseng Chu and Audrey Rorrer and Li Yang and Kathy Winters and Joseph M. Kizza}, title = {Developing Faculty Expertise in Information Assurance through Case Studies and Hands-On Experiences}, booktitle = {47th Hawaii International Conference on System Sciences, {HICSS} 2014, Waikoloa, HI, USA, January 6-9, 2014}, pages = {4938--4945}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HICSS.2014.606}, doi = {10.1109/HICSS.2014.606}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/YuanWYCRYWK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/SimpkinsYK14, author = {Lindsay Simpkins and Xiaohong Yuan and Jung Hee Kim}, editor = {Michael E. Whitman and Humayun Zafar}, title = {A course module on clickjacking}, booktitle = {Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014}, pages = {2:1}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2670739.2670750}, doi = {10.1145/2670739.2670750}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/SimpkinsYK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/JohnsonHHYY14, author = {Perron Johnson and Philip Harris and Keheira Henderson and Xiaohong Yuan and Li Yang}, editor = {Michael E. Whitman and Humayun Zafar}, title = {A course module on mobile malware}, booktitle = {Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014}, pages = {10:1}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2670739.2670752}, doi = {10.1145/2670739.2670752}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/JohnsonHHYY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/BrownY14, author = {Shearon Brown and Xiaohong Yuan}, editor = {J. D. Dougherty and Kris Nagel and Adrienne Decker and Kurt Eiselt}, title = {Techniques for retaining low performing students: high-need student mentoring program (abstract only)}, booktitle = {The 45th {ACM} Technical Symposium on Computer Science Education, {SIGCSE} 2014, Atlanta, GA, USA, March 5-8, 2014}, pages = {708}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2538862.2544271}, doi = {10.1145/2538862.2544271}, timestamp = {Tue, 23 Mar 2021 10:54:19 +0100}, biburl = {https://dblp.org/rec/conf/sigcse/BrownY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/DuYKY14, author = {Wenliang Du and Li Yang and Joseph Migga Kizza and Xiaohong Yuan}, editor = {J. D. Dougherty and Kris Nagel and Adrienne Decker and Kurt Eiselt}, title = {New hands-on labs on browser security (abstract only)}, booktitle = {The 45th {ACM} Technical Symposium on Computer Science Education, {SIGCSE} 2014, Atlanta, GA, USA, March 5-8, 2014}, pages = {717}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2538862.2544266}, doi = {10.1145/2538862.2544266}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigcse/DuYKY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/AkowuahYXW13, author = {Francis Akowuah and Xiaohong Yuan and Jinsheng Xu and Hong Wang}, title = {A Survey of Security Standards Applicable to Health Information Systems}, journal = {Int. J. Inf. Secur. Priv.}, volume = {7}, number = {4}, pages = {22--36}, year = {2013}, url = {https://doi.org/10.4018/ijisp.2013100103}, doi = {10.4018/IJISP.2013100103}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/AkowuahYXW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisedu/HeY013, author = {Wu He and Xiaohong Yuan and Li Yang}, title = {Supporting Case-Based Learning in Information Security with Web-Based Technology}, journal = {J. Inf. Syst. Educ.}, volume = {24}, number = {1}, pages = {31--40}, year = {2013}, url = {https://jise.org/Volume24/n1/JISEv24n1p31.html}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisedu/HeY013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fie/YuanXWE13, author = {Xiaohong Yuan and Jinsheng Xu and Hong Wang and Kossi D. Edoh}, editor = {Randa L. Shehab and James J. Sluss and Deborah Anne Trytten}, title = {Developing an interdisciplinary Health Informatics Security and privacy program}, booktitle = {{IEEE} Frontiers in Education Conference, {FIE} 2013, Oklahoma City, Oklahoma, USA, October 23-26, 2013}, pages = {1618--1622}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/FIE.2013.6685111}, doi = {10.1109/FIE.2013.6685111}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fie/YuanXWE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/AkowuahYXW12, author = {Francis Akowuah and Xiaohong Yuan and Jinsheng Xu and Hong Wang}, title = {A Survey of {U.S.} Laws for Health Information Security {\&} Privacy}, journal = {Int. J. Inf. Secur. Priv.}, volume = {6}, number = {4}, pages = {40--54}, year = {2012}, url = {https://doi.org/10.4018/jisp.2012100102}, doi = {10.4018/JISP.2012100102}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/AkowuahYXW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ACMse/YuPSY12, author = {Huiming Yu and Nakia Powell and Dexter Stembridge and Xiaohong Yuan}, editor = {Randy K. Smith and Susan V. Vrbsky}, title = {Cloud computing and security challenges}, booktitle = {Proceedings of the 50th Annual Southeast Regional Conference, 2012, Tuscaloosa, AL, USA, March 29-31, 2012}, pages = {298--302}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2184512.2184581}, doi = {10.1145/2184512.2184581}, timestamp = {Fri, 12 Mar 2021 15:27:48 +0100}, biburl = {https://dblp.org/rec/conf/ACMse/YuPSY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/YuanXEW12, author = {Xiaohong Yuan and Jinsheng Xu and Kossi D. Edoh and Hong Wang}, editor = {Laurie A. Smith King and David R. Musicant and Tracy Camp and Paul T. Tymann}, title = {Developing an interdisciplinary health informatics security and privacy program (abstract only)}, booktitle = {Proceedings of the 43rd {ACM} technical symposium on Computer science education, {SIGCSE} 2012, Raleigh, NC, USA, February 29 - March 3, 2012}, pages = {666}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2157136.2157373}, doi = {10.1145/2157136.2157373}, timestamp = {Wed, 10 Mar 2021 13:17:16 +0100}, biburl = {https://dblp.org/rec/conf/sigcse/YuanXEW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ACMse/EvansY11, author = {Nathaniel Evans and Xiaohong Yuan}, editor = {Victor A. Clincy and Kenneth E. Hoganson and Jose Garrido and Venu Dasigi}, title = {Observation of recent Microsoft Zero-Day vulnerabilities}, booktitle = {Proceedings of the 49th Annual Southeast Regional Conference, 2011, Kennesaw, GA, USA, March 24-26, 2011}, pages = {328--329}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2016039.2016131}, doi = {10.1145/2016039.2016131}, timestamp = {Fri, 12 Mar 2021 15:27:48 +0100}, biburl = {https://dblp.org/rec/conf/ACMse/EvansY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csedu/AbuzaidYYC11, author = {Abdrah Abuzaid and Xiaohong Yuan and Huiming Yu and Bill Chu}, editor = {Alexander Verbraeck and Markus Helfert and Jos{\'{e}} Cordeiro and Boris Shishkov}, title = {The Design and Implementation of a Cryptographic Education Tool}, booktitle = {{CSEDU} 2011 - Proceedings of the 3rd International Conference on Computer Supported Education, Volume 1, Noordwijkerhout, Netherlands, 6-8 May, 2011}, pages = {193--198}, publisher = {SciTePress}, year = {2011}, timestamp = {Fri, 30 Sep 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csedu/AbuzaidYYC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imagapp/TerryYWYC11, author = {Tom Terry Jr. and Huiming Yu and Kenneth Williams and Xiaohong Yuan and Bill Chu}, editor = {Gabriela Csurka and Martin Kraus and Jos{\'{e}} Braz}, title = {A Visualization based Simulator for {SYN} Flood Attacks}, booktitle = {{IMAGAPP} {\&} {IVAPP} 2011 - Proceedings of the International Conference on Imaging Theory and Applications and International Conference on Information Visualization Theory and Applications, Vilamoura, Algarve, Portugal, March 5-7, 2011}, pages = {251--255}, publisher = {SciTePress}, year = {2011}, timestamp = {Tue, 05 Mar 2024 11:15:19 +0100}, biburl = {https://dblp.org/rec/conf/imagapp/TerryYWYC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1108-3342, author = {Xiaohong Yuan and Eduardo B. Fern{\'{a}}ndez}, title = {Patterns for Business-to-consumer E-Commerce Applications}, journal = {CoRR}, volume = {abs/1108.3342}, year = {2011}, url = {http://arxiv.org/abs/1108.3342}, eprinttype = {arXiv}, eprint = {1108.3342}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1108-3342.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jeric/YuanVQAYX10, author = {Xiaohong Yuan and Percy Vega and Yaseen Qadah and Ricky Archer and Huiming Yu and Jinsheng Xu}, title = {Visualization Tools for Teaching Computer Security}, journal = {{ACM} Trans. Comput. Educ.}, volume = {9}, number = {4}, pages = {20:1--20:28}, year = {2010}, url = {https://doi.org/10.1145/1656255.1656258}, doi = {10.1145/1656255.1656258}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jeric/YuanVQAYX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/YuanMXY10, author = {Xiaohong Yuan and Sahana Murthy and Jinsheng Xu and Huiming Yu}, editor = {Michael E. Whitman and Herbert J. Mattord}, title = {Case studies for teaching physical security and security policy}, booktitle = {Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010}, pages = {21--26}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1940941.1940947}, doi = {10.1145/1940941.1940947}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/YuanMXY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/serp/AbegazY10, author = {Tamirat Abegaz and Xiaohong Yuan}, editor = {Hamid R. Arabnia and Hassan Reza and Leonidas Deligiannidis and Juan Jose Cuadrado{-}Gallego and Vincent Schmidt and Ashu M. G. Solo}, title = {Designing an SOA-Based Earthquake Forewarning System using {BPMN}}, booktitle = {Proceedings of the 2010 International Conference on Software Engineering Research {\&} Practice, {SERP} 2010, July 12-15, 2010, Las Vegas, Nevada, USA, 2 Volumes}, pages = {593--598}, publisher = {{CSREA} Press}, year = {2010}, timestamp = {Fri, 10 Dec 2010 13:15:53 +0100}, biburl = {https://dblp.org/rec/conf/serp/AbegazY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fecs/MatthewsYEY09, author = {David Matthews and Xiaohong Yuan and Edmundson Effort and Huiming Yu}, editor = {Hamid R. Arabnia and Azita Bahrami and Victor A. Clincy}, title = {Laboratory Design For Demonstrating Phishing}, booktitle = {Proceedings of the 2009 International Conference on Frontiers in Education: Computer Science {\&} Computer Engineering, {FECS} 2009, July 13-16, 2009, Las Vegas, Nevada, {USA}}, pages = {399--404}, publisher = {{CSREA} Press}, year = {2009}, timestamp = {Wed, 08 Dec 2010 08:14:49 +0100}, biburl = {https://dblp.org/rec/conf/fecs/MatthewsYEY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fecs/YuCYMB09, author = {Huiming Yu and Bill Chu and Xiaohong Yuan and Janelle C. Mason and Monica Barnette}, editor = {Hamid R. Arabnia and Azita Bahrami and Victor A. Clincy}, title = {Using a Practice Oriented Approach to Teach Web Security Course}, booktitle = {Proceedings of the 2009 International Conference on Frontiers in Education: Computer Science {\&} Computer Engineering, {FECS} 2009, July 13-16, 2009, Las Vegas, Nevada, {USA}}, pages = {405--409}, publisher = {{CSREA} Press}, year = {2009}, timestamp = {Fri, 15 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fecs/YuCYMB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/springer/YuanPAL08, author = {Xiaohong Yuan and Barbara Pioro and Ricky Archer and Yaohang Li}, editor = {Magued Iskander}, title = {Teaching Operating Systems Using Visualization: {A} Comparative Study}, booktitle = {Innovative Techniques in Instruction Technology, E-learning, E-assessment, and Education, Proceedings of the 2007 International Conference on Engineering Education, Instructional Technology, Assessment, and E-learning {(EIAE} 2007), part of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering {(CISSE} 2007), Bridgeport, CT, USA, December 3-12, 2007}, pages = {576--580}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-1-4020-8739-4\_102}, doi = {10.1007/978-1-4020-8739-4\_102}, timestamp = {Tue, 16 May 2017 14:24:38 +0200}, biburl = {https://dblp.org/rec/series/springer/YuanPAL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/inffus/BasirY07, author = {Otman Basir and Xiaohong Yuan}, title = {Engine fault diagnosis based on multi-sensor information fusion using Dempster-Shafer evidence theory}, journal = {Inf. Fusion}, volume = {8}, number = {4}, pages = {379--386}, year = {2007}, url = {https://doi.org/10.1016/j.inffus.2005.07.003}, doi = {10.1016/J.INFFUS.2005.07.003}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/inffus/BasirY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/LiCY07, author = {Yaohang Li and Daniel Chen and Xiaohong Yuan}, title = {Trustworthy remote compiling services for grid-based scientific applications}, journal = {J. Supercomput.}, volume = {41}, number = {2}, pages = {119--131}, year = {2007}, url = {https://doi.org/10.1007/s11227-006-0029-9}, doi = {10.1007/S11227-006-0029-9}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/LiCY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ACISicis/YuYXPCG07, author = {Huiming Yu and Xiaohong Yuan and Jinsheng Xu and Stephen Providence and Bill Chu and Dechang Gu}, title = {Bridge Information Assurance Education Gap between the Majority and Minority Universities through Collaboration}, booktitle = {6th Annual {IEEE/ACIS} International Conference on Computer and Information Science {(ICIS} 2007), 11-13 July 2007, Melbourne, Australia}, pages = {1030--1035}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICIS.2007.70}, doi = {10.1109/ICIS.2007.70}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ACISicis/YuYXPCG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ACMse/YuanVXYL07, author = {Xiaohong Yuan and Percy Vega and Jinsheng Xu and Huiming Yu and Yaohang Li}, editor = {David John and Sandria N. Kerr}, title = {Using packet sniffer simulator in the class: experience and evaluation}, booktitle = {Proceedings of the 45th Annual Southeast Regional Conference, 2007, Winston-Salem, North Carolina, USA, March 23-24, 2007}, pages = {116--121}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1233341.1233363}, doi = {10.1145/1233341.1233363}, timestamp = {Fri, 12 Mar 2021 15:27:48 +0100}, biburl = {https://dblp.org/rec/conf/ACMse/YuanVXYL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ACMse/FernandezY07, author = {Eduardo B. Fern{\'{a}}ndez and Xiaohong Yuan}, editor = {David John and Sandria N. Kerr}, title = {Securing analysis patterns}, booktitle = {Proceedings of the 45th Annual Southeast Regional Conference, 2007, Winston-Salem, North Carolina, USA, March 23-24, 2007}, pages = {288--293}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1233341.1233393}, doi = {10.1145/1233341.1233393}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ACMse/FernandezY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/KurtzFEYSJ07, author = {Barry L. Kurtz and James B. Fenwick Jr. and Christopher C. Ellsworth and Xiaohong Yuan and Adam Steele and Xiaoping Jia}, editor = {Ingrid Russell and Susan M. Haller and J. D. Dougherty and Susan H. Rodger}, title = {Inter-University software engineering using web services}, booktitle = {Proceedings of the 38th {SIGCSE} Technical Symposium on Computer Science Education, {SIGCSE} 2007, Covington, Kentucky, USA, March 7-11, 2007}, pages = {464--468}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1227310.1227467}, doi = {10.1145/1227310.1227467}, timestamp = {Wed, 10 Mar 2021 13:17:16 +0100}, biburl = {https://dblp.org/rec/conf/sigcse/KurtzFEYSJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/grc/LiDZSY06, author = {Yaohang Li and Tao Dong and Xinyu Zhang and Yong{-}Duan Song and Xiaohong Yuan}, title = {Large-scale software unit testing on the grid}, booktitle = {2006 {IEEE} International Conference on Granular Computing, GrC 2006, Atlanta, Georgia, USA, May 10-12, 2006}, pages = {596--599}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/GRC.2006.1635873}, doi = {10.1109/GRC.2006.1635873}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/grc/LiDZSY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/BaxleyXYZYB06, author = {Thomas Baxley and Jinsheng Xu and Huiming Yu and Jinghua Zhang and Xiaohong Yuan and Joseph Brickhouse}, title = {{LAN} attacker: a visual education tool}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {118--123}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231072}, doi = {10.1145/1231047.1231072}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/BaxleyXYZYB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/YuLYX06, author = {Huiming Yu and W. Liao and Xiaohong Yuan and Jinsheng Xu}, editor = {Doug Baldwin and Paul T. Tymann and Susan M. Haller and Ingrid Russell}, title = {Teaching a web security course to practice information assurance}, booktitle = {Proceedings of the 37th {SIGCSE} Technical Symposium on Computer Science Education, {SIGCSE} 2006, Houston, Texas, USA, March 3-5, 2006}, pages = {12--16}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1121341.1121348}, doi = {10.1145/1121341.1121348}, timestamp = {Thu, 10 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcse/YuLYX06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdpta/LiCYYE05, author = {Yaohang Li and Daniel Tsu{-}Tang Chen and Xiaohong Yuan and Huiming Yu and Albert C. Esterline}, editor = {Hamid R. Arabnia}, title = {Secure Remote Compiling Services on the Grid}, booktitle = {Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, {PDPTA} 2005, Las Vegas, Nevada, USA, June 27-30, 2005, Volume 1}, pages = {373--378}, publisher = {{CSREA} Press}, year = {2005}, timestamp = {Wed, 25 Jan 2006 09:49:27 +0100}, biburl = {https://dblp.org/rec/conf/pdpta/LiCYYE05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/serp/YuanVYL05, author = {Xiaohong Yuan and Percy Vega and Huiming Yu and Yaohang Li}, editor = {Hamid R. Arabnia and Hassan Reza}, title = {A Personal Software Process Tool for Eclipse Environment}, booktitle = {Proceedings of the International Conference on Software Engineering Research and Practice, {SERP} 2005, Las Vegas, Nevada, USA, June 27-29, 2005, Volume 2}, pages = {717--723}, publisher = {{CSREA} Press}, year = {2005}, timestamp = {Tue, 31 Jan 2006 11:58:14 +0100}, biburl = {https://dblp.org/rec/conf/serp/YuanVYL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europlop/YuanF03, author = {Xiaohong Yuan and Eduardo B. Fern{\'{a}}ndez}, editor = {Kevlin Henney and Dietmar Sch{\"{u}}tz}, title = {An Analysis Pattern for Course Management}, booktitle = {Proceedings of the 8th European Conference on Pattern Languages of Programms (EuroPLoP '2003), Irsee, Germany, June 25-29, 2003}, pages = {899--912}, publisher = {{UVK} - Universitaetsverlag Konstanz}, year = {2003}, url = {http://hillside.net/europlop/HillsideEurope/Papers/EuroPLoP2003/2003\_YuanEtAl\_AnAnalysisPatternForCourseManagement.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/europlop/YuanF03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/serp/Yuan03, author = {Xiaohong Yuan}, editor = {Ban Al{-}Ani and Hamid R. Arabnia and Youngsong Mun}, title = {An Experience Report on Teaching the Personal Software Process}, booktitle = {Proceedings of the International Conference on Software Engineering Research and Practice, {SERP} '03, June 23 - 26, 2003, Las Vegas, Nevada, USA, Volume 2}, pages = {810--815}, publisher = {{CSREA} Press}, year = {2003}, timestamp = {Tue, 14 Oct 2003 13:56:57 +0200}, biburl = {https://dblp.org/rec/conf/serp/Yuan03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icn/YuanI01, author = {Xiaohong Yuan and Mohammad Ilyas}, editor = {Pascal Lorenz}, title = {Threshold-Based Connection Admission Control Scheme in {ATM} Networks: {A} Simulation Study}, booktitle = {Networking - {ICN} 2001, First International Conference, Colmar, France, July 9-13, 2001 Proceedings, Part 2}, series = {Lecture Notes in Computer Science}, volume = {2094}, pages = {677--686}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47734-9\_67}, doi = {10.1007/3-540-47734-9\_67}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/icn/YuanI01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/er/FernandezY00, author = {Eduardo B. Fern{\'{a}}ndez and Xiaohong Yuan}, editor = {Alberto H. F. Laender and Stephen W. Liddle and Veda C. Storey}, title = {Semantic Analysis Patterns}, booktitle = {Conceptual Modeling - {ER} 2000, 19th International Conference on Conceptual Modeling, Salt Lake City, Utah, USA, October 9-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1920}, pages = {183--195}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45393-8\_14}, doi = {10.1007/3-540-45393-8\_14}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/er/FernandezY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scai/YuanZW95, author = {Xiaohong Yuan and Kai Zhao and Jue Wang}, editor = {Agnar Aamodt and Jan Komorowski}, title = {Visualization in Mechanical Geometry Theorem Proving}, booktitle = {Fifth Scandinavian Conference on Artificial Intelligence, {SCAI} 1995, Trondheim, Norway, 29-31 May, 1995}, series = {Frontiers in Artificial Intelligence and Applications}, volume = {28}, pages = {478--482}, publisher = {{IOS} Press}, year = {1995}, timestamp = {Thu, 01 Aug 2019 12:07:35 +0200}, biburl = {https://dblp.org/rec/conf/scai/YuanZW95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.