BibTeX records: Hanbing Yan

download as .bib file

@inproceedings{DBLP:conf/icc/PanYQQ23,
  author       = {Quanbo Pan and
                  Hanbing Yan and
                  Zhipeng Qin and
                  Bingzhi Qi},
  title        = {{PACLASS:} {A} Lightweight Classification Framework on DNS-Over-HTTPS},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2023, Rome,
                  Italy, May 28 - June 1, 2023},
  pages        = {3805--3810},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICC45041.2023.10279398},
  doi          = {10.1109/ICC45041.2023.10279398},
  timestamp    = {Thu, 02 Nov 2023 17:09:41 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/PanYQQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/LvYLZJ22,
  author       = {Haohui Lv and
                  Hanbing Yan and
                  Keyang Liu and
                  Zhenwu Zhou and
                  Junjie Jing},
  title        = {YOLOv5-AC: Attention Mechanism-Based Lightweight YOLOv5 for Track
                  Pedestrian Detection},
  journal      = {Sensors},
  volume       = {22},
  number       = {15},
  pages        = {5903},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22155903},
  doi          = {10.3390/S22155903},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/LvYLZJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cncert/MeiYHWZW22,
  author       = {Rui Mei and
                  Han{-}Bing Yan and
                  Yongqiang He and
                  Qinqin Wang and
                  Shengqiang Zhu and
                  Weiping Wen},
  editor       = {Wei Lu and
                  Yuqing Zhang and
                  Weiping Wen and
                  Hanbing Yan and
                  Chao Li},
  title        = {Considerations on Evaluation of Practical Cloud Data Protection},
  booktitle    = {Cyber Security - 19th China Annual Conference, {CNCERT} 2022, Beijing,
                  China, August 16-17, 2022, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1699},
  pages        = {51--69},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-981-19-8285-9\_4},
  doi          = {10.1007/978-981-19-8285-9\_4},
  timestamp    = {Thu, 05 Jan 2023 17:08:54 +0100},
  biburl       = {https://dblp.org/rec/conf/cncert/MeiYHWZW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangYZMHZ22,
  author       = {Qinqin Wang and
                  Hanbing Yan and
                  Chang Zhao and
                  Rui Mei and
                  Zhihui Han and
                  Yu Zhou},
  title        = {{APT} Attribution for Malware Based on Time Series Shapelets},
  booktitle    = {{IEEE} International Conference on Trust, Security and Privacy in
                  Computing and Communications, TrustCom 2022, Wuhan, China, December
                  9-11, 2022},
  pages        = {769--777},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00108},
  doi          = {10.1109/TRUSTCOM56396.2022.00108},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangYZMHZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangYZMHZ22a,
  author       = {Qinqin Wang and
                  Hanbing Yan and
                  Chang Zhao and
                  Rui Mei and
                  Zhihui Han and
                  Yu Zhou},
  title        = {Measurement of Malware Family Classification on a Large-Scale Real-World
                  Dataset},
  booktitle    = {{IEEE} International Conference on Trust, Security and Privacy in
                  Computing and Communications, TrustCom 2022, Wuhan, China, December
                  9-11, 2022},
  pages        = {1390--1397},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00196},
  doi          = {10.1109/TRUSTCOM56396.2022.00196},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangYZMHZ22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cncert/2021,
  editor       = {Wei Lu and
                  Yuqing Zhang and
                  Weiping Wen and
                  Hanbing Yan and
                  Chao Li},
  title        = {Cyber Security - 18th China Annual Conference, {CNCERT} 2021, Beijing,
                  China, July 20-21, 2021, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1506},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-981-16-9229-1},
  doi          = {10.1007/978-981-16-9229-1},
  isbn         = {978-981-16-9228-4},
  timestamp    = {Thu, 15 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cncert/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cncert/2022,
  editor       = {Wei Lu and
                  Yuqing Zhang and
                  Weiping Wen and
                  Hanbing Yan and
                  Chao Li},
  title        = {Cyber Security - 19th China Annual Conference, {CNCERT} 2022, Beijing,
                  China, August 16-17, 2022, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1699},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-981-19-8285-9},
  doi          = {10.1007/978-981-19-8285-9},
  isbn         = {978-981-19-8284-2},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cncert/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/LinZYWSGW21,
  author       = {Hao Lin and
                  Hua Zhang and
                  Hanbing Yan and
                  Huawei Wang and
                  Yijie Shi and
                  Fei Gao and
                  Qiaoyan Wen},
  title        = {A Secure Online Treatment Blockchain Service},
  journal      = {Wirel. Pers. Commun.},
  volume       = {117},
  number       = {3},
  pages        = {1773--1795},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11277-020-07945-4},
  doi          = {10.1007/S11277-020-07945-4},
  timestamp    = {Mon, 04 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wpc/LinZYWSGW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/MeiYHJ21,
  author       = {Rui Mei and
                  Han{-}Bing Yan and
                  Zhihui Han and
                  Jian{-}Chun Jiang},
  title        = {{CTSCOPY:} Hunting Cyber Threats within Enterprise via Provenance
                  Graph-based Analysis},
  booktitle    = {21st {IEEE} International Conference on Software Quality, Reliability
                  and Security, {QRS} 2021, Hainan, China, December 6-10, 2021},
  pages        = {28--39},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/QRS54544.2021.00014},
  doi          = {10.1109/QRS54544.2021.00014},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/qrs/MeiYHJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/WangYH21,
  author       = {Qinqin Wang and
                  Hanbing Yan and
                  Zhihui Han},
  title        = {Explainable {APT} Attribution for Malware Using {NLP} Techniques},
  booktitle    = {21st {IEEE} International Conference on Software Quality, Reliability
                  and Security, {QRS} 2021, Hainan, China, December 6-10, 2021},
  pages        = {70--80},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/QRS54544.2021.00018},
  doi          = {10.1109/QRS54544.2021.00018},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/qrs/WangYH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/MeiYH21,
  author       = {Rui Mei and
                  Han{-}Bing Yan and
                  Zhihui Han},
  editor       = {Wenlian Lu and
                  Kun Sun and
                  Moti Yung and
                  Feng Liu},
  title        = {RansomLens: Understanding Ransomware via Causality Analysis on System
                  Provenance Graph},
  booktitle    = {Science of Cyber Security - Third International Conference, SciSec
                  2021, Virtual Event, August 13-15, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13005},
  pages        = {252--267},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89137-4\_18},
  doi          = {10.1007/978-3-030-89137-4\_18},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/MeiYH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/ZhangQZYGGWH20,
  author       = {Hua Zhang and
                  Jiawei Qin and
                  Boan Zhang and
                  Hanbing Yan and
                  Jing Guo and
                  Fei Gao and
                  Senmiao Wang and
                  Yangye Hu},
  title        = {A Multiclass Detection System for Android Malicious Apps Based on
                  Color Image Features},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2020},
  pages        = {8882295:1--8882295:21},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/8882295},
  doi          = {10.1155/2020/8882295},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/ZhangQZYGGWH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cncert/YuYMZG20,
  author       = {Yuqi Yu and
                  Hanbing Yan and
                  Yuan Ma and
                  Hao Zhou and
                  Hongchao Guan},
  editor       = {Wei Lu and
                  Qiaoyan Wen and
                  Yuqing Zhang and
                  Bo Lang and
                  Weiping Wen and
                  Hanbing Yan and
                  Chao Li and
                  Li Ding and
                  Ruiguang Li and
                  Yu Zhou},
  title        = {DeepHTTP: Anomalous {HTTP} Traffic Detection and Malicious Pattern
                  Mining Based on Deep Learning},
  booktitle    = {Cyber Security - 17th China Annual Conference, {CNCERT} 2020, Beijing,
                  China, August 12, 2020, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1299},
  pages        = {141--161},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-981-33-4922-3\_11},
  doi          = {10.1007/978-981-33-4922-3\_11},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cncert/YuYMZG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cncert/2020,
  editor       = {Wei Lu and
                  Qiaoyan Wen and
                  Yuqing Zhang and
                  Bo Lang and
                  Weiping Wen and
                  Hanbing Yan and
                  Chao Li and
                  Li Ding and
                  Ruiguang Li and
                  Yu Zhou},
  title        = {Cyber Security - 17th China Annual Conference, {CNCERT} 2020, Beijing,
                  China, August 12, 2020, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1299},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-981-33-4922-3},
  doi          = {10.1007/978-981-33-4922-3},
  isbn         = {978-981-33-4921-6},
  timestamp    = {Thu, 15 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cncert/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiuLWY19,
  author       = {Ya{-}Shu Liu and
                  Yu{-}Kun Lai and
                  Zhi{-}Hai Wang and
                  Han{-}Bing Yan},
  title        = {A New Learning Approach to Malware Classification Using Discriminative
                  Feature Extraction},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {13015--13023},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2892500},
  doi          = {10.1109/ACCESS.2019.2892500},
  timestamp    = {Wed, 27 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/LiuLWY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/LiuLLY19,
  author       = {Hongyu Liu and
                  Bo Lang and
                  Ming Liu and
                  Hanbing Yan},
  title        = {{CNN} and {RNN} based payload classification methods for attack detection},
  journal      = {Knowl. Based Syst.},
  volume       = {163},
  pages        = {332--341},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.knosys.2018.08.036},
  doi          = {10.1016/J.KNOSYS.2018.08.036},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/kbs/LiuLLY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict/LiuSY19,
  author       = {Jieran Liu and
                  Yuan Shen and
                  Hanbing Yan},
  title        = {Functions-based {CFG} Embedding for Malware Homology Analysis},
  booktitle    = {26th International Conference on Telecommunications, {ICT} 2019, Hanoi,
                  Vietnam, April 8-10, 2019},
  pages        = {220--226},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICT.2019.8798769},
  doi          = {10.1109/ICT.2019.8798769},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/ict/LiuSY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cncert/2018,
  editor       = {Xiaochun Yun and
                  Weiping Wen and
                  Bo Lang and
                  Hanbing Yan and
                  Li Ding and
                  Jia Li and
                  Yu Zhou},
  title        = {Cyber Security - 15th International Annual Conference, {CNCERT} 2018,
                  Beijing, China, August 14-16, 2018, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {970},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-981-13-6621-5},
  doi          = {10.1007/978-981-13-6621-5},
  isbn         = {978-981-13-6620-8},
  timestamp    = {Fri, 16 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cncert/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YinWLZCYZ18,
  author       = {Wei Yin and
                  Qiaoyan Wen and
                  Kaitai Liang and
                  Zhenfei Zhang and
                  Liqun Chen and
                  Hanbing Yan and
                  Hua Zhang},
  title        = {Delegation of Decryption Rights With Revocability From Learning With
                  Errors},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {61163--61175},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2875069},
  doi          = {10.1109/ACCESS.2018.2875069},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/YinWLZCYZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhangGYLYZZ18,
  author       = {Hua Zhang and
                  Hongchao Guan and
                  Hanbing Yan and
                  Wenmin Li and
                  Yuqi Yu and
                  Hao Zhou and
                  Xingyu Zeng},
  title        = {Webshell Traffic Detection With Character-Level Features Based on
                  Deep Learning},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {75268--75277},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2882517},
  doi          = {10.1109/ACCESS.2018.2882517},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhangGYLYZZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiccc/HeWCYJ18,
  author       = {Nengqiang He and
                  Tianqi Wang and
                  Pingyang Chen and
                  Hanbing Yan and
                  Zhengping Jin},
  title        = {An Android Malware Detection Method Based on Deep AutoEncoder},
  booktitle    = {Proceedings of the 2018 Artificial Intelligence and Cloud Computing
                  Conference, {AICCC} 2018, Tokyo, Japan, December 21-23, 2018},
  pages        = {88--93},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3299819.3299834},
  doi          = {10.1145/3299819.3299834},
  timestamp    = {Tue, 02 Apr 2019 17:49:21 +0200},
  biburl       = {https://dblp.org/rec/conf/aiccc/HeWCYJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cncert/LvYM18,
  author       = {Zhuo{-}Hang Lv and
                  Han{-}Bing Yan and
                  Rui Mei},
  editor       = {Xiaochun Yun and
                  Weiping Wen and
                  Bo Lang and
                  Hanbing Yan and
                  Li Ding and
                  Jia Li and
                  Yu Zhou},
  title        = {Automatic and Accurate Detection of Webshell Based on Convolutional
                  Neural Network},
  booktitle    = {Cyber Security - 15th International Annual Conference, {CNCERT} 2018,
                  Beijing, China, August 14-16, 2018, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {970},
  pages        = {73--85},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-981-13-6621-5\_6},
  doi          = {10.1007/978-981-13-6621-5\_6},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cncert/LvYM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/WenZY18,
  author       = {Senhao Wen and
                  Zhiyuan Zhao and
                  Hanbing Yan},
  title        = {Detecting Malicious Websites in Depth through Analyzing Topics and
                  Web-pages},
  booktitle    = {Proceedings of the 2nd International Conference on Cryptography, Security
                  and Privacy, {ICCSP} 2018, Guiyang, China, March 16-19, 2018},
  pages        = {128--133},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3199478.3199500},
  doi          = {10.1145/3199478.3199500},
  timestamp    = {Sun, 14 Apr 2019 17:40:32 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/WenZY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ieea/WenRY18,
  author       = {Senhao Wen and
                  Yu Rao and
                  Hanbing Yan},
  title        = {Information Protecting against {APT} Based on the Study of Cyber Kill
                  Chain with Weighted Bayesian Classification with Correction Factor},
  booktitle    = {Proceedings of the 7th International Conference on Informatics, Environment,
                  Energy and Applications, {IEEA} 2018, Beijing, China, March 28-31,
                  2018},
  pages        = {231--235},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3208854.3208893},
  doi          = {10.1145/3208854.3208893},
  timestamp    = {Mon, 03 Jul 2023 15:16:23 +0200},
  biburl       = {https://dblp.org/rec/conf/ieea/WenRY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-12751,
  author       = {Yuqi Yu and
                  Hanbing Yan and
                  Hongchao Guan and
                  Hao Zhou},
  title        = {DeepHTTP: Semantics-Structure Model with Attention for Anomalous {HTTP}
                  Traffic Detection and Pattern Mining},
  journal      = {CoRR},
  volume       = {abs/1810.12751},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.12751},
  eprinttype    = {arXiv},
  eprint       = {1810.12751},
  timestamp    = {Thu, 08 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-12751.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YinWLZCYZ18,
  author       = {Wei Yin and
                  Qiaoyan Wen and
                  Kaitai Liang and
                  Zhenfei Zhang and
                  Liqun Chen and
                  Hanbing Yan and
                  Hua Zhang},
  title        = {Delegation of Decryption Rights with Revocability from Learning with
                  Errors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {777},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/777},
  timestamp    = {Fri, 04 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/YinWLZCYZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icncc/WenHY17,
  author       = {Senhao Wen and
                  Nengqiang He and
                  Hanbing Yan},
  title        = {Detecting and Predicting {APT} Based on the Study of Cyber Kill Chain
                  with Hierarchical Knowledge Reasoning},
  booktitle    = {Proceedings of the {VI} International Conference on Network, Communication
                  and Computing, {ICNCC} 2017, Kunming, China, December 8-10, 2017},
  pages        = {115--119},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3171592.3171641},
  doi          = {10.1145/3171592.3171641},
  timestamp    = {Tue, 25 Apr 2023 15:28:14 +0200},
  biburl       = {https://dblp.org/rec/conf/icncc/WenHY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jam/XuYGZ14,
  author       = {Honglin Xu and
                  Han{-}Bing Yan and
                  Cui{-}Fang Gao and
                  Ping Zhu},
  title        = {Social Network Analysis Based on Network Motifs},
  journal      = {J. Appl. Math.},
  volume       = {2014},
  pages        = {874708:1--874708:6},
  year         = {2014},
  url          = {https://doi.org/10.1155/2014/874708},
  doi          = {10.1155/2014/874708},
  timestamp    = {Thu, 16 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jam/XuYGZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sose/WangYLXYX14,
  author       = {Yonggang Wang and
                  Shan Yao and
                  Jing Li and
                  Zhongfei Xia and
                  Hanbing Yan and
                  Junfeng Xu},
  title        = {ReSpam: {A} Novel Reputation Based Mechanism of Defending against
                  Tag Spam in Social Computing},
  booktitle    = {8th {IEEE} International Symposium on Service Oriented System Engineering,
                  {SOSE} 2014, Oxford, United Kingdom, April 7-11, 2014},
  pages        = {338--343},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SOSE.2014.49},
  doi          = {10.1109/SOSE.2014.49},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sose/WangYLXYX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rsfdgrc/YanT13,
  author       = {Han{-}Bing Yan and
                  Xu{-}Qing Tang},
  editor       = {Davide Ciucci and
                  Masahiro Inuiguchi and
                  Yiyu Yao and
                  Dominik Slezak and
                  Guoyin Wang},
  title        = {The Impacting Analysis on Multiple Species Competition},
  booktitle    = {Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing - 14th
                  International Conference, RSFDGrC 2013, Halifax, NS, Canada, October
                  11-14, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8170},
  pages        = {269--276},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41218-9\_29},
  doi          = {10.1007/978-3-642-41218-9\_29},
  timestamp    = {Mon, 16 Mar 2020 17:44:10 +0100},
  biburl       = {https://dblp.org/rec/conf/rsfdgrc/YanT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnidc/HouZZY12,
  author       = {Yixin Hou and
                  Bo Zhao and
                  Honggang Zhang and
                  Hanbing Yan},
  title        = {A fast image spam filter based on {ORB}},
  booktitle    = {3rd {IEEE} International Conference on Network Infrastructure and
                  Digital Content, {IC-NIDC} 2012, Beijing, China, September 21-23,
                  2012},
  pages        = {503--507},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICNIDC.2012.6418804},
  doi          = {10.1109/ICNIDC.2012.6418804},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/icnidc/HouZZY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/LiuYM11,
  author       = {Ya{-}Shu Liu and
                  Han{-}Bing Yan and
                  Ralph R. Martin},
  title        = {As-Rigid-As-Possible Surface Morphing},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {26},
  number       = {3},
  pages        = {548--557},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11390-011-1154-3},
  doi          = {10.1007/S11390-011-1154-3},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcst/LiuYM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvcg/YanHMY08,
  author       = {Han{-}Bing Yan and
                  Shi{-}Min Hu and
                  Ralph R. Martin and
                  Yong{-}Liang Yang},
  title        = {Shape Deformation Using a Skeleton to Drive Simplex Transformations},
  journal      = {{IEEE} Trans. Vis. Comput. Graph.},
  volume       = {14},
  number       = {3},
  pages        = {693--706},
  year         = {2008},
  url          = {https://doi.org/10.1109/TVCG.2008.28},
  doi          = {10.1109/TVCG.2008.28},
  timestamp    = {Mon, 14 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvcg/YanHMY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/YanHM07,
  author       = {Han{-}Bing Yan and
                  Shi{-}Min Hu and
                  Ralph R. Martin},
  title        = {3D Morphing Using Strain Field Interpolation},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {22},
  number       = {1},
  pages        = {147--155},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11390-007-9020-z},
  doi          = {10.1007/S11390-007-9020-Z},
  timestamp    = {Mon, 14 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcst/YanHM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cgi/YanHM06,
  author       = {Han{-}Bing Yan and
                  Shi{-}Min Hu and
                  Ralph Martin},
  editor       = {Tomoyuki Nishita and
                  Qunsheng Peng and
                  Hans{-}Peter Seidel},
  title        = {Skeleton-Based Shape Deformation Using Simplex Transformations},
  booktitle    = {Advances in Computer Graphics, 24th Computer Graphics International
                  Conference, {CGI} 2006, Hangzhou, China, June 26-28, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4035},
  pages        = {66--77},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11784203\_6},
  doi          = {10.1007/11784203\_6},
  timestamp    = {Mon, 01 Mar 2021 13:46:59 +0100},
  biburl       = {https://dblp.org/rec/conf/cgi/YanHM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvca/YanHM04,
  author       = {Han{-}Bing Yan and
                  Shi{-}Min Hu and
                  Ralph R. Martin},
  title        = {Morphing based on strain field interpolation},
  journal      = {Comput. Animat. Virtual Worlds},
  volume       = {15},
  number       = {3-4},
  pages        = {443--452},
  year         = {2004},
  url          = {https://doi.org/10.1002/cav.48},
  doi          = {10.1002/CAV.48},
  timestamp    = {Thu, 16 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jvca/YanHM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics