Yang Xiang
Swinburne University of Technology
H-index: 78
Oceania-Australia
Top articles of Yang Xiang
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Robust Backdoor Detection for Deep Learning via Topological Evolution Dynamics | Xiaoxing Mo Yechao Zhang Leo Yu Zhang Wei Luo Nan Sun | 2024/2/1 | |
Privacy Enhanced Authentication for Online Learning Healthcare Systems | IEEE Transactions on Services Computing | Jianghua Liu Jian Yang Xinyi Huang Lei Xu Yang Xiang | 2024/1/1 |
SigA: rPPG-based Authentication for Virtual Reality Head-mounted Display | Lin Li Chao Chen Lei Pan Leo Yu Zhang Jun Zhang | 2023/10/16 | |
Dynalogue: A transformer-based dialogue system with dynamic attention | Rongjunchen Zhang Tingmin Wu Xiao Chen Sheng Wen Surya Nepal | 2023/4/30 | |
A Survey of PPG's Application in Authentication | Lin Li Chao Chen Lei Pan Leo Yu Zhang Zhifeng Wang | 2023/9/21 | |
Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection | IEEE Transactions on Dependable and Secure Computing | Chuer Yu Xuhong Zhang Yuxuan Duan Senbo Yan Zonghui Wang | 2024/2/21 |
SemDiff: Binary Similarity Detection by Diffing Key-Semantics Graphs | arXiv preprint arXiv:2308.01463 | Zian Liu Zhi Zhang Siqi Ma Dongxi Liu Jun Zhang | 2023/8/2 |
Public Proofs of Data Replication and Retrievability with User-friendly Replication | IEEE Transactions on Dependable and Secure Computing | Jun Shen Xiaofeng Chen Xinyi Huang Yang Xiang | 2023/7/28 |
SigD: A Cross-Session Dataset for PPG-based User Authentication in Different Demographic Groups | Lin Li Chao Chen Lei Pan Jun Zhang Yang Xiang | 2023/6/18 | |
Demystifying the Evolution of Android Malware Variants | IEEE Transactions on Dependable and Secure Computing | Lihong Tang Xiao Chen Sheng Wen Li Li Marthie Grobler | 2023/10/23 |
The" code''of Ethics: A Holistic Audit of AI Code Generators | arXiv preprint arXiv:2305.12747 | Wanlun Ma Yiliao Song Minhui Xue Sheng Wen Yang Xiang | 2023/5/22 |
A Hybrid Incentive Mechanism for Decentralized Federated Learning | Distributed Ledger Technologies: Research and Practice | Minfeng Qi Ziyuan Wang Shiping Chen Yang Xiang | 2022/9/10 |
SoK: An Overview of PPG's Application in Authentication | Lin Li Chao Chen Lei Pan Jun Zhang Yang Xiang | 2022/1/27 | |
A survey on privacy inference attacks and defenses in cloud-based Deep Neural Network | Xiaoyu Zhang Chao Chen Yi Xie Xiaofeng Chen Jun Zhang | 2023/1/1 | |
Event detection in online social network: Methodologies, state-of-art, and evolution | Xiangyu Hu Wanlun Ma Chao Chen Sheng Wen Jun Zhang | 2022/11/1 | |
How does Visualisation Help App Practitioners Analyse Android Apps? | IEEE Transactions on Dependable and Secure Computing | Lihong Tang Tingmin Wu Xiao Chen Sheng Wen Li Li | 2022/5/27 |
Explainable machine learning in cybersecurity: A survey | International Journal of Intelligent Systems | Feixue Yan Sheng Wen Surya Nepal Cecile Paris Yang Xiang | 2022/12 |
Social Media Event Prediction using DNN with Feedback Mechanism | ACM Transactions on Management Information Systems (TMIS) | Wanlun Ma Xiangyu Hu Chao Chen Sheng Wen Kkwang Raymond Choo | 2022/5/14 |
A Retrospective and futurespective of Rowhammer attacks and defenses on DRAM | arXiv preprint arXiv:2201.02986 | Zhi Zhang Jiahao Qi Yueqiang Cheng Shijie Jiang Yiyang Lin | 2022/1/9 |
The" Beatrix''Resurrections: Robust Backdoor Detection via Gram Matrices | arXiv preprint arXiv:2209.11715 | Wanlun Ma Derui Wang Ruoxi Sun Minhui Xue Sheng Wen | 2022/9/23 |