Skip to main content

and
  1. No Access

    Article

    Android malware adversarial attacks based on feature importance prediction

    In the last decade, malicious Android applications have increased rapidly because of the popularity of Android mobile devices. In particular, some Android malware starts to use the adversarial examples generat...

    Yan** Guo, Qiao Yan in International Journal of Machine Learning and Cybernetics (2023)

  2. No Access

    Chapter and Conference Paper

    Design of Brake Disc Dust Cover Based on Multidisciplinary Optimization Method

    Modal, stiffness, vibration durability and other multidisciplinary properties need to be considered in the structural design of brake disc dust cover

    Qiao Yan, Wu **aoLong, Shi ChaoLiang in Proceedings of China SAE Congress 2021: Se… (2023)

  3. No Access

    Article

    ECC-based lightweight authentication and access control scheme for IoT E-healthcare

    The E-healthcare system has a complex architecture, diverse business types, and sensitive data security. To meet the secure communication and access control requirements in the user–medical server, user–patien...

    Hailong Yao, Qiao Yan, **ngbing Fu, Zhibin Zhang, Caihui Lan in Soft Computing (2022)

  4. No Access

    Article

    Synchrotron-Based Temperature-Dependent Terahertz and Far-Infrared Spectroscopy of Aerographite and Single-Walled Carbon Nanotube Aerogel

    Synchrotron-based terahertz and far-infrared spectra of aerographite and single-walled carbon nanotube aerogel were acquired using the terahertz/far-infrared beamline at the Australian Synchrotron in the frequ...

    Hao Zhang, Qiao Yan in Journal of Infrared, Millimeter, and Terahertz Waves (2022)

  5. No Access

    Article

    The impact of propagation delay to different selfish miners in proof-of-work blockchains

    Selfish mining is an attack on the integrity of a blockchain network. Inspired by J. Göbel’s selfish mining model in the presence of propagation delay, we propose a competition model based on spatial Poisson p...

    Heli Wang, Qiao Yan, Victor C. M. Leung in Peer-to-Peer Networking and Applications (2021)

  6. No Access

    Article

    An actor-critic reinforcement learning-based resource management in mobile edge computing systems

    Reinforcement learning (RL) as an effective tool has attracted great attention in wireless communication field nowadays. In this paper, we investigate the offloading decision and resource allocation problem in...

    Fang Fu, Zhicai Zhang, Fei Richard Yu in International Journal of Machine Learning … (2020)

  7. No Access

    Article

    Automatically synthesizing DoS attack traces using generative adversarial networks

    Artificial intelligence (AI) technology ruling people is still the scene in the science fiction film, but hackers using AI technology against existing security measures is an inescapable trend. Network intrusi...

    Qiao Yan, Mingde Wang, Wenyao Huang in International Journal of Machine Learning … (2019)

  8. No Access

    Chapter and Conference Paper

    A Facial Modeling and Animation System Based on Single Image

    In this paper, a facial modeling and animation system based on single image is proposed to generate the natural modeling and animation. First, a Mophable Model has been established offline. Then in the facial ...

    Zhang Mandun, Qiao Yan, Wang Yangsheng in Mechanical Engineering and Technology (2012)