
Lu-Xing Yang
Person information
- affiliation: Delft University of Technology, Delft, GA, The Netherlands
- affiliation (PhD 2015): Chongqing University, Chongqing, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j27]Kaifan Huang, Lu-Xing Yang
, Xiaofan Yang
, Yong Xiang
, Yuan Yan Tang:
A Low-Cost Distributed Denial-of-Service Attack Architecture. IEEE Access 8: 42111-42119 (2020) - [j26]Hong Peng, Kaifan Huang
, Lu-Xing Yang
, Xiaofan Yang
, Yuan Yan Tang:
Dynamic Maintenance Strategy for Word-of-Mouth Marketing. IEEE Access 8: 126496-126503 (2020) - [j25]Da-Wen Huang
, Lu-Xing Yang
, Xiaofan Yang
, Xiang Zhong, Yuan Yan Tang
:
Evaluating the Performance of a Static Patching Strategy against Computer Viruses. Complex. 2020: 9408942:1-9408942:10 (2020) - [j24]Lu-Xing Yang
, Pengdeng Li
, Xiaofan Yang
, Yong Xiang
, Yuan Yan Tang:
Simultaneous Benefit Maximization of Conflicting Opinions: Modeling and Analysis. IEEE Syst. J. 14(2): 1623-1634 (2020) - [j23]Lu-Xing Yang
, Pengdeng Li
, Xiaofan Yang
, Yuan Yan Tang:
A Risk Management Approach to Defending Against the Advanced Persistent Threat. IEEE Trans. Dependable Secur. Comput. 17(6): 1163-1172 (2020) - [j22]Yushu Zhang
, Xiangli Xiao
, Lu-Xing Yang
, Yong Xiang
, Sheng Zhong:
Secure and Efficient Outsourcing of PCA-Based Face Recognition. IEEE Trans. Inf. Forensics Secur. 15: 1683-1695 (2020)
2010 – 2019
- 2019
- [j21]Jian Chen, Lu-Xing Yang
, Da-Wen Huang
, Xiaofan Yang
, Yuan Yan Tang:
Dynamic Discount Pricing in Competitive Marketing. IEEE Access 7: 145340-145347 (2019) - [j20]Tianrui Zhang, Pengdeng Li, Lu-Xing Yang
, Xiaofan Yang
, Yuan Yan Tang, Yingbo Wu:
A discount strategy in word-of-mouth marketing. Commun. Nonlinear Sci. Numer. Simul. 74: 167-179 (2019) - [j19]Mohammad Belayet Hossain
, Iynkaran Natgunanathan
, Yong Xiang
, Lu-Xing Yang
, Guangyan Huang
:
Enhanced Smart Meter Privacy Protection Using Rechargeable Batteries. IEEE Internet Things J. 6(4): 7079-7092 (2019) - [j18]Yushu Zhang, Yong Xiang
, Leo Yu Zhang
, Lu-Xing Yang
, Jiantao Zhou:
Efficiently and securely outsourcing compressed sensing reconstruction to a cloud. Inf. Sci. 496: 150-160 (2019) - [j17]Yushu Zhang, Hui Huang, Lu-Xing Yang
, Yong Xiang, Ming Li:
Serious Challenges and Potential Solutions for the Industrial Internet of Things with Edge Intelligence. IEEE Netw. 33(5): 41-45 (2019) - [j16]Kaifan Huang
, Pengdeng Li, Lu-Xing Yang
, Xiaofan Yang
, Yuan Yan Tang
:
Seeking Best-Balanced Patch-Injecting Strategies through Optimal Control Approach. Secur. Commun. Networks 2019: 2315627:1-2315627:12 (2019) - [j15]Ángel Martín del Rey
, Lu-Xing Yang
, Vasileios Karyotis
:
Mathematical Models for Malware Propagation. Secur. Commun. Networks 2019: 6046353:1-6046353:2 (2019) - [j14]Pengdeng Li, Lu-Xing Yang
, Xiaofan Yang, Xiang Zhong, Junhao Wen, Qingyu Xiong:
Energy-Efficient Patching Strategy for Wireless Sensor Networks. Sensors 19(2): 262 (2019) - [j13]Lu-Xing Yang
, Pengdeng Li, Yushu Zhang
, Xiaofan Yang
, Yong Xiang
, Wanlei Zhou:
Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach. IEEE Trans. Inf. Forensics Secur. 14(7): 1713-1728 (2019) - 2018
- [j12]Luxing Yang
, Pengdeng Li, Xiaofan Yang
, Yong Xiang, Wanlei Zhou:
A Differential Game Approach to Patch Injection. IEEE Access 6: 58924-58938 (2018) - [j11]Luxing Yang
, Tianrui Zhang, Xiaofan Yang
, Yingbo Wu, Yuan Yan Tang:
Effectiveness analysis of a mixed rumor-quelling strategy. J. Frankl. Inst. 355(16): 8079-8105 (2018) - [j10]Luxing Yang
, Xiaofan Yang
, Yuan Yan Tang:
A Bi-Virus Competing Spreading Model with Generic Infection Rates. IEEE Trans. Netw. Sci. Eng. 5(1): 2-13 (2018) - [c1]Xiang Zhong, Luxing Yang, Xiaofan Yang, Qingyu Xiong, Junhao Wen, Yuan Yan Tang:
Defending Against Advanced Persistent Threat: A Risk Management Perspective. SciSec 2018: 207-215 - 2017
- [j9]Luxing Yang
, Pengdeng Li, Xiaofan Yang
, Yuan Yan Tang:
Security Evaluation of the Cyber Networks Under Advanced Persistent Threats. IEEE Access 5: 20111-20123 (2017) - [j8]Luxing Yang
, Xiaofan Yang:
The effect of network topology on the spread of computer viruses: a modelling study. Int. J. Comput. Math. 94(8): 1591-1608 (2017) - [i10]Tianrui Zhang, Xiaofan Yang, Luxing Yang, Yuan Yan Tang, Yingbo Wu:
A discount strategy in word-of-mouth marketing and its assessment. CoRR abs/1704.06910 (2017) - [i9]Pengdeng Li, Xiaofan Yang, Luxing Yang, Qingyu Xiong, Yingbo Wu, Yuan Yan Tang:
Maximizing the overall profit of a word-of-mouth marketing campaign: A modeling study. CoRR abs/1704.06920 (2017) - [i8]Luxing Yang, Pengdeng Li, Xiaofan Yang, Yuan Yan Tang:
Distributed interaction between computer virus and patch: A modeling study. CoRR abs/1705.04818 (2017) - [i7]Luxing Yang, Pengdeng Li, Xiaofan Yang, Yingbo Wu, Yuan Yan Tang:
Analysis of the effectiveness of the truth-spreading strategy for inhibiting rumors. CoRR abs/1705.06604 (2017) - [i6]Luxing Yang, Tianrui Zhang, Xiaofan Yang, Yingbo Wu, Yuan Yan Tang:
On the effectiveness of the truth-spreading/rumor-blocking strategy for restraining rumors. CoRR abs/1705.10618 (2017) - [i5]Jichao Bi, Luxing Yang, Xiaofan Yang, Yingbo Wu, Yuan Yan Tang:
The damage inflicted by a computer virus: A new estimation method. CoRR abs/1706.02035 (2017) - [i4]Xiaofan Yang, Tianrui Zhang, Luxing Yang, Luosheng Wen, Yuan Yan Tang:
Maximizing the effectiveness of an advanced persistent threat. CoRR abs/1707.02437 (2017) - [i3]Luxing Yang, Pengdeng Li, Xiaofan Yang, Luosheng Wen, Yingbo Wu, Yuan Yan Tang:
Security evaluation of cyber networks under advanced persistent threats. CoRR abs/1707.03611 (2017) - [i2]Cheng Pan, Luxing Yang, Xiaofan Yang, Yingbo Wu, Yuan Yan Tang:
A cost-effective rumor-containing strategy. CoRR abs/1709.02767 (2017) - [i1]Pengdeng Li, Luxing Yang, Xiaofan Yang, Qingyu Xiong, Junhao Wen, Yuan Yan Tang:
Defend against advanced persistent threats: An optimal control approach. CoRR abs/1709.02891 (2017) - 2014
- [j7]Lu-Xing Yang
, Xiaofan Yang:
A new epidemic model of computer viruses. Commun. Nonlinear Sci. Numer. Simul. 19(6): 1935-1944 (2014) - 2013
- [j6]Luxing Yang
, Xiaofan Yang, Jiming Liu, Qingyi Zhu
, Chenquan Gan
:
Epidemics of computer viruses: A complex-network approach. Appl. Math. Comput. 219(16): 8705-8717 (2013) - 2012
- [j5]Qingyi Zhu
, Xiaofan Yang, Luxing Yang
, Chunming Zhang:
Optimal control of computer virus under a delayed model. Appl. Math. Comput. 218(23): 11613-11619 (2012) - [j4]Luxing Yang
, Xiaofan Yang:
The spread of computer viruses under the influence of removable storage devices. Appl. Math. Comput. 219(8): 3914-3922 (2012) - [j3]Luxing Yang
, Xiaofan Yang, Luosheng Wen, Jiming Liu:
A novel computer virus propagation model and its dynamics. Int. J. Comput. Math. 89(17): 2307-2314 (2012) - [j2]Xiaofan Yang, Lei Wang, Luxing Yang
:
Optimal broadcasting for locally twisted cubes. Inf. Process. Lett. 112(4): 129-134 (2012) - [j1]Cui Yu, Xiaofan Yang, Luxing Yang
, Jing Zhang:
Routing and wavelength assignment for 3-ary n-cube in array-based optical network. Inf. Process. Lett. 112(6): 252-256 (2012)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-02-12 21:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint