Follow
Yinhao Xiao
Yinhao Xiao
Guangdong University of Finance and Economics
Verified email at gdufe.edu.cn - Homepage
Title
Cited by
Cited by
Year
Edge computing security: State of the art and challenges
Y Xiao, Y Jia, C Liu, X Cheng, J Yu, W Lv
Proceedings of the IEEE 107 (8), 1608-1631, 2019
4432019
NormaChain: A blockchain-based normalized autonomous transaction settlement system for IoT-based E-commerce
C Liu, Y Xiao, V Javangula, Q Hu, S Wang, X Cheng
IEEE Internet of Things Journal 6 (3), 4680-4693, 2018
1172018
BC-SABE: Blockchain-aided searchable attribute-based encryption for cloud-IoT
S Liu, J Yu, Y Xiao, Z Wan, S Wang, B Yan
IEEE Internet of Things Journal 7 (9), 7851-7867, 2020
992020
A novel graph-based mechanism for identifying traffic vulnerabilities in smart home IoT
Y Jia, Y Xiao, J Yu, X Cheng, Z Liang, Z Wan
IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 1493-1501, 2018
662018
LH-ABSC: A lightweight hybrid attribute-based signcryption scheme for cloud-fog-assisted IoT
J Yu, S Liu, S Wang, Y Xiao, B Yan
IEEE Internet of Things Journal 7 (9), 7949-7966, 2020
512020
Image and attribute based convolutional neural network inference attacks in social networks
B Mei, Y Xiao, R Li, H Li, X Cheng, Y Sun
IEEE Transactions on Network Science and Engineering 7 (2), 869-879, 2018
342018
I can see your brain: Investigating home-use electroencephalography system security
Y Xiao, Y Jia, X Cheng, J Yu, Z Liang, Z Tian
IEEE Internet of Things Journal 6 (4), 6681-6691, 2019
332019
Detecting malicious behaviors in javascript applications
J Mao, J Bian, G Bai, R Wang, Y Chen, Y Xiao, Z Liang
Ieee Access 6, 12284-12294, 2018
292018
HomeShield: A credential-less authentication framework for smart home systems
Y Xiao, Y Jia, C Liu, A Alrawais, M Rekik, Z Shan
IEEE Internet of Things Journal 7 (9), 7903-7918, 2020
242020
Design of cloud computing task offloading algorithm based on dynamic multi-objective evolution
S Hu, Y Xiao
Future Generation Computer Systems 122, 144-148, 2021
182021
TBAC: A Tokoin-based Accountable Access Control Scheme for the Internet of Things
C Liu, M Xu, H Guo, X Cheng, Y Xiao, D Yu, B Gong, A Yerukhimovich, ...
IEEE Transactions on Mobile Computing, 2023
152023
Queuing without patience: A novel transaction selection mechanism in blockchain for iot enhancement
H Shi, S Wang, Y Xiao
IEEE Internet of Things Journal 7 (9), 7941-7948, 2020
152020
Cryptographic algorithms for privacy-preserving online applications.
R Li, Y Xiao, C Zhang, T Song, C Hu
Math. Found. Comput. 1 (4), 311-330, 2018
122018
Inference attacks based on neural networks in social networks
B Mei, Y Xiao, H Li, X Cheng, Y Sun
Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and …, 2017
112017
DeepVulSeeker: A novel vulnerability identification framework via code graph structure and pre-training mechanism
J Wang, H Xiao, S Zhong, Y Xiao
Future Generation Computer Systems 148, 15-26, 2023
82023
Commandfence: A novel digital-twin-based preventive framework for securing smart home systems
Y Xiao, Y Jia, Q Hu, X Cheng, B Gong, J Yu
IEEE Transactions on Dependable and Secure Computing, 2022
82022
Privilege leakage and information stealing through the android task mechanism
Y Xiao, G Bai, J Mao, Z Liang, W Cheng
2017 IEEE Symposium on Privacy-Aware Computing (PAC), 152-163, 2017
82017
I know your social network accounts: A novel attack architecture for device-identity association
Y Xiao, Y Jia, X Cheng, S Wang, J Mao, Z Liang
IEEE Transactions on Dependable and Secure Computing 20 (2), 1017-1030, 2022
62022
Correlated participation decision making for federated edge learning
Q Hu, F Li, X Zou, Y Xiao
GLOBECOM 2020-2020 IEEE Global Communications Conference, 1-6, 2020
62020
A correlated equilibrium based transaction pricing mechanism in blockchain
Q Hu, Y Nigam, Z Wang, Y Wang, Y Xiao
2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 1-7, 2020
62020
The system can't perform the operation now. Try again later.
Articles 1–20