default search action
Jing Yang 0032
Person information
- affiliation: Chinese Academy of Sciences, Institute of Information Engineering, State Key Laboratory of Information Security, Beijing, China
- affiliation: University of Chinese Academy of Sciences, School of Cyber Security, Beijing, China
Other persons with the same name
- Jing Yang — disambiguation page
- Jing Yang 0001 — University of North Carolina at Charlotte (UNCC), Department of Computer Science, NC, USA (and 1 more)
- Jing Yang 0002 — Pennsylvania State University, University Park, PA, USA (and 3 more)
- Jing Yang 0003 — University of Virginia, Charlottesville, VA, USA
- Jing Yang 0004 — University of California at Berkeley, CA, USA
- Jing Yang 0005 — Yale University
- Jing Yang 0006 — The University of Sheffield, UK
- Jing Yang 0007 — Samsung Advanced Institute of Technology
- Jing Yang 0008 — Hefei University of Technology, School of Computer and Information, China
- Jing Yang 0009 — Chinese Academy of Sciences, Shanghai Institutes for Biological Sciences, China (and 1 more)
- Jing Yang 0010 — Harbin Engineering University, College of Computer Science and Technology, China
- Jing Yang 0012 — Chongqing Institute of Technology, Department of Electrical Information Engineering, China
- Jing Yang 0013 — Taiyuan University of Technology, College of Information Engineering / Information Center, China
- Jing Yang 0014 — Xi'an Jiaotong University, Institute of Control Engineering, China
- Jing Yang 0015 — Yangzhou University, School of Information Engineering, China (and 2 more)
- Jing Yang 0016 — École Polytechnique, Palaiseau, France
- Jing Yang 0017 — Guizhou University, MoE Key Laboratory of Advanced Manufacturing Technology, Guiyang, China
- Jing Yang 0018 — Harbin Institute of Technology, Experimental and Innovation Practice Center, Shenzhen, China (and 1 more)
- Jing Yang 0019 — Henan University of Technology, College of Information Science and Engineering, Zhengzhou, China (and 1 more)
- Jing Yang 0020 — Central South University, School of Information Science and Engineering, Changsha, China
- Jing Yang 0021 — Dongbei University of Finance and Economics, School of Management Science and Engineering, Dalian, China
- Jing Yang 0022 — ETH Zurich, Institute for Pervasive Computing, Switzerland
- Jing Yang 0023 — East China Normal University, School of Computer Science and Technology, Shanghai, China
- Jing Yang 0024 — Huazhong University of Science and Technology, School of Electronic Information and Communications, Wuhan, China
- Jing Yang 0025 — Lund University, Department of Electrical and Information Technology, Sweden
- Jing Yang 0026 — Northwestern Polytechnical University, Shaanxi Provincial Key Laboratory of Speech and Image Information Processing, Xi'an, China (and 1 more)
- Jing Yang 0027 — China University of Mining and Technology, Xuzhou, China
- Jing Yang 0028 — Beijing Normal University, School of Management, Zhuhai Campus, China (and 1 more)
- Jing Yang 0029 — Chongqing University of Posts and Telecommunications, School of Communication and Information Engineering, China
- Jing Yang 0030 — Northwestern Polytechnical University, School of Power and Energy, Xi'an, China
- Jing Yang 0031 — State University of Campinas, Institute of Computing, SP, Brazil (and 1 more)
- Jing Yang 0033 — Zhengzhou University, School of Electrical and Information Engineering, China (and 1 more)
- Jing Yang 0034 — Nanjing Normal University, School of Geography, Key Laboratory of Virtual Geographic Environment, China
- Jing Yang 0035 — Nankai University, Chern Institute of Mathematics and LPMC / Tianjin Key Laboratory of Network and Data Security Technology, Tianjin, China
- Jing Yang 0036 — Wuhan University, Electronic Information School, Radar and Signal Processing Laboratory, China
- Jing Yang 0037 — Anhui University of Science and Technology, School of Mathematics and Big Data, Huainan, China
- Jing Yang 0038 — University of Cambridge, Core LAB, UK (and 3 more)
- Jing Yang 0039 — Guangxi University for Nationalities, College of Information Science and Engineering, Nanning, China (and 2 more)
- Jing Yang 0040 (aka: Jing (Roy) Yang) — Queensland University of Technology, Australia
- Jing Yang 0041 — Hefei University, School of Artificial Intelligence and Big Data, China (and 2 more)
- Jing Yang 0042 — Guizhou University, Department of Electrical Engineering, Guiyang, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Yao Pan, Zheng Chao, He Wang, Jing Yang, Hongjia Li, Liming Wang:
FedSHE: privacy preserving and efficient federated learning with adaptive segmented CKKS homomorphic encryption. Cybersecur. 7(1): 40 (2024) - 2023
- [c14]Pengwei Zhan, Jing Yang, Xiao Huang, Chunlei Jing, Jingying Li, Liming Wang:
Contrastive Learning with Adversarial Examples for Alleviating Pathology of Language Model. ACL (1) 2023: 6493-6508 - [c13]Pengwei Zhan, Jing Yang, He Wang, Chao Zheng, Xiao Huang, Liming Wang:
Similarizing the Influence of Words with Contrastive Learning to Defend Word-level Adversarial Text Attack. ACL (Findings) 2023: 7891-7906 - [c12]Benyu Li, Jing Yang, Yuxiang Wang, Xiao Huang, Junshuai Ren, Liming Wang:
A Blockchain-Based Privacy-Preserving Data Sharing Scheme with Security-Enhanced Access Control. CSCWD 2023: 825-830 - [c11]Ru Xie, Jing Yang, Jingying Li, Liming Wang:
ImpactTracer: Root Cause Localization in Microservices Based on Fault Propagation Modeling. DATE 2023: 1-6 - 2022
- [c10]Pengwei Zhan, Chao Zheng, Jing Yang, Yuxiang Wang, Liming Wang, Yang Wu, Yunjian Zhang:
PARSE: An Efficient Search Method for Black-box Adversarial Text Attacks. COLING 2022: 4776-4787 - [c9]Shaolei Zhou, Liming Wang, Jing Yang, Pengwei Zhan:
SITD: Insider Threat Detection Using Siamese Architecture on Imbalanced Data. CSCWD 2022: 245-250 - [c8]Pengwei Zhan, Yang Wu, Yunjian Zhang, Liming Wang, Chao Zheng, Jing Yang:
Crafting Textual Adversarial Examples through Second-Order Enhanced Word Saliency. IJCNN 2022: 1-8 - 2020
- [j5]Na Lv, Tianyu Chen, Shuangyi Zhu, Jing Yang, Yuan Ma, Jiwu Jing, Jingqiang Lin:
Erratum to "High-Efficiency Min-Entropy Estimation Based on Neural Network for Random Number Generators". Secur. Commun. Networks 2020: 3451823:1-3451823:1 (2020) - [j4]Na Lv, Tianyu Chen, Shuangyi Zhu, Jing Yang, Yuan Ma, Jiwu Jing, Jingqiang Lin:
High-Efficiency Min-Entropy Estimation Based on Neural Network for Random Number Generators. Secur. Commun. Networks 2020: 4241713:1-4241713:18 (2020) - [j3]Yixin Li, Liming Wang, Jing Yang, Zhen Xu, Xi Luo:
deMSF: a Method for Detecting Malicious Server Flocks for Same Campaign. EAI Endorsed Trans. Security Safety 7(26): e1 (2020) - [j2]Shuangyi Zhu, Yuan Ma, Xusheng Li, Jing Yang, Jingqiang Lin, Jiwu Jing:
On the Analysis and Improvement of Min-Entropy Estimation on Time-Varying Data. IEEE Trans. Inf. Forensics Secur. 15: 1696-1708 (2020) - [c7]Yixin Li, Xi Luo, Liming Wang, Jing Yang, Zhen Xu:
SiegeCannon: Detecting Malicious Infrastructures by Analyzing Integral Characteristics of Involved Server Flocks. HPCC/DSS/SmartCity 2020: 491-498
2010 – 2019
- 2019
- [j1]Yuan Ma, Tianyu Chen, Jingqiang Lin, Jing Yang, Jiwu Jing:
Entropy Estimation for ADC Sampling-Based True Random Number Generators. IEEE Trans. Inf. Forensics Secur. 14(11): 2887-2900 (2019) - [c6]Mingli Zhang, Liming Wang, Jing Yang:
A Blockchain-Based Authentication Method with One-Time Password. IPCCC 2019: 1-9 - [c5]Xin Wang, Liming Wang, Fabiao Miao, Jing Yang:
SVMDF: A Secure Virtual Machine Deployment Framework to Mitigate Co-Resident Threat in Cloud. ISCC 2019: 1-7 - [c4]Xinying Wu, Yuan Ma, Jing Yang, Tianyu Chen, Jingqiang Lin:
On the Security of TRNGs Based on Multiple Ring Oscillators. SecureComm (2) 2019: 89-107 - 2018
- [c3]Jing Yang, Shuangyi Zhu, Tianyu Chen, Yuan Ma, Na Lv, Jingqiang Lin:
Neural Network Based Min-entropy Estimation for Random Number Generators. SecureComm (2) 2018: 231-250 - 2017
- [c2]Jing Yang, Liming Wang, Zhen Xu:
A Novel Semantic-Aware Approach for Detecting Malicious Web Traffic. ICICS 2017: 633-645 - 2016
- [c1]Jing Yang, Yuan Ma, Tianyu Chen, Jingqiang Lin, Jiwu Jing:
Extracting More Entropy for TRNGs Based on Coherent Sampling. SecureComm 2016: 694-709
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 21:06 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint