


default search action
Lin Yang 0031
Person information
Other persons with the same name
- Lin Yang — disambiguation page
- Lin Yang 0001 — Alcatel-Lucent Bell Labs, Shanghai, China (and 1 more)
- Lin Yang 0002
— Westlake University, School of Engineering, Artificial Intelligence and Biomedical Image Analysis Lab, Hangzhou, China (and 5 more)
- Lin Yang 0003
— University of Notre Dame, IN, USA
- Lin Yang 0004
— University of Electronic Science and Technology of China, National Key Laboratory of Science and Technology on Communications, Chengdu, China
- Lin Yang 0005
— Wuhan University, School of Electrical Engineering and Automation, China
- Lin Yang 0006
— Xidian University, State Key Discipline Laboratory of Wide Bandgap Semiconductor Technology, Xian, China
- Lin Yang 0007
— China University of Geoscience, Faculty of Information Engineering, Wuhan, China
- Lin Yang 0008
— Wuhan University of Technology, School of Logistics Engineering, China
- Lin Yang 0009 — Huawei Noah's Ark Lab, China (and 1 more)
- Lin Yang 0010 — University of Minnesota, Department of Electrical and Computer Engineering, MN, USA
- Lin Yang 0011
(aka: Lin F. Yang) — University of California, Los Angeles, CA, USA
- Lin Yang 0013
— Nanjing University, School of Intelligence Science and Technology, Nanjing, China (and 3 more)
- Lin Yang 0014
— Lenovo Research, AI Lab, Beijing, China
- Lin Yang 0015 — Gyrfalcon Technology Inc., Milpitas, CA, USA
- Lin Yang 0016 — Chinese Academy of Sciences, Institute of Acoustics, Key Laboratory of Speech Acoustics and Content Understanding, Beijing, China
- Lin Yang 0017
— South China University of Technology, School of Electric Power, Guangzhou, China (and 1 more)
- Lin Yang 0018
— Nanjing University, School of Geography and Ocean Science, Nanjing, China (and 1 more)
- Lin Yang 0019 — University of Minnesota, Department of Biomedical Engineering, Minneapolis, MN, USA
- Lin Yang 0020
- Lin Yang 0021
- Lin Yang 0022
- Lin Yang 0023
- Lin Yang 0024
- Lin Yang 0025
- Lin Yang 0026
- Lin Yang 0027
- Lin Yang 0028
- Lin Yang 0029
- Lin Yang 0030
- Lin Yang 0032
- Lin Yang 0033
- Lin Yang 0034
- Lin Yang 0035
- Lin Yang 0036
- Lin Yang 0037
- Lin Yang 0038
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j15]Yixuan Wu
, Long Zhang
, Lin Yang
, Feng Yang, Linru Ma
, Zhoumin Lu
, Wen Jiang
:
Intrusion Detection for Internet of Things: An Anchor Graph Clustering Approach. IEEE Trans. Inf. Forensics Secur. 20: 1965-1980 (2025) - 2024
- [j14]Gaigai Tang, Lin Yang, Long Zhang, Hongyu Kuang
, Huiqiang Wang:
MRC-VulLoc: Software source code vulnerability localization based on multi-choice reading comprehension. Comput. Secur. 141: 103816 (2024) - [j13]Yixuan Wu
, Lin Yang
, Long Zhang, Laisen Nie
, Li Zheng:
Intrusion Detection for Unmanned Aerial Vehicles Security: A Tiny Machine Learning Model. IEEE Internet Things J. 11(12): 20970-20982 (2024) - [j12]Yixuan Wu
, Laisen Nie
, Xuanrui Xiong
, Balqies Sadoun, Lin Yang
, Zhaolong Ning
:
Incremental Update Intrusion Detection for Industry 5.0 Security: A Graph Attention Network-Enabled Approach. IEEE Trans. Consumer Electron. 70(1): 2004-2017 (2024) - [c10]Hongyu Kuang
, Jingjing Zhang, Feng Yang, Long Zhang, Zhijian Huang, Lin Yang:
VulCausal: Robust Vulnerability Detection Using Neural Network Models from a Causal Perspective. KSEM (3) 2024: 41-56 - 2023
- [j11]Gaigai Tang, Lin Yang, Long Zhang, Weipeng Cao, Lianxiao Meng, Hongbin He, Hongyu Kuang
, Feng Yang, Huiqiang Wang
:
An attention-based automatic vulnerability detection approach with GGNN. Int. J. Mach. Learn. Cybern. 14(9): 3113-3127 (2023) - [c9]Hongyu Kuang
, Feng Yang, Long Zhang, Gaigai Tang, Lin Yang:
Leveraging User-Defined Identifiers for Counterfactual Data Generation in Source Code Vulnerability Detection. SCAM 2023: 143-150 - 2022
- [j10]Lianxiao Meng
, Lin Yang, Wu Yang, Long Zhang
:
A Survey of GNSS Spoofing and Anti-Spoofing Technology. Remote. Sens. 14(19): 4826 (2022) - [j9]Zhining Xu, Long Zhang
, Xiaoshan Ma
, Yang Liu, Lin Yang, Feng Yang:
An Anti-Disturbance Resilience Enhanced Algorithm for UAV 3D Route Planning. Sensors 22(6): 2151 (2022) - [c8]Hongbin He, Hongyu Kuang
, Lin Yang, Feng Yang, Qiang Wang, Weipeng Cao:
Automated Reliability Analysis of Redundancy Architectures Using Statistical Model Checking. KSEM (3) 2022: 463-476 - 2021
- [j8]Jingjing Zhang
, Lin Yang
, Xianming Gao
, Gaigai Tang
, Jiyong Zhang
, Qiang Wang
:
Formal Analysis of QUIC Handshake Protocol Using Symbolic Model Checking. IEEE Access 9: 14836-14848 (2021) - [j7]Jingjing Zhang
, Xianming Gao
, Lin Yang
, Tao Feng
, Dongyang Li
, Qiang Wang
:
A Systematic Approach to Formal Analysis of QUIC Handshake Protocol Using Symbolic Model Checking. Secur. Commun. Networks 2021: 1630223:1-1630223:12 (2021) - [j6]Gaigai Tang, Lin Yang
, Shuangyin Ren
, Lianxiao Meng, Feng Yang, Huiqiang Wang
:
An Automatic Source Code Vulnerability Detection Approach Based on KELM. Secur. Commun. Networks 2021: 5566423:1-5566423:12 (2021) - [j5]Lianxiao Meng
, Lin Yang, Shuangyin Ren
, Gaigai Tang
, Long Zhang
, Feng Yang, Wu Yang
:
An Approach of Linear Regression-Based UAV GPS Spoofing Detection. Wirel. Commun. Mob. Comput. 2021: 5517500:1-5517500:16 (2021) - [c7]Zhining Xu, Lin Yang, Feng Yang, Long Zhang, Xiaoshan Ma, Yang Liu:
A 3D Flight Route Planning Algorithm for UAV Based on the Idea of Resilience. ICCPR 2021: 277-282 - [c6]Chun Liu, Lin Yang, LinRu Ma, LiuCheng Shi, Xuexian Hu, Weipeng Cao, JingJing Zhang:
PEBIID: Privacy-preserving and Efficient Biometric Identification for IoV DApp. ISPA/BDCloud/SocialCom/SustainCom 2021: 63-72 - [c5]Gaigai Tang, Long Zhang, Feng Yang, Lianxiao Meng, Weipeng Cao, Meikang Qiu, Shuangyin Ren, Lin Yang, Huiqiang Wang:
Interpretation of Learning-Based Automatic Source Code Vulnerability Detection Model Using LIME. KSEM 2021: 275-286 - [i2]Gaigai Tang, Lianxiao Meng, Shuangyin Ren, Weipeng Cao, Qiang Wang, Lin Yang:
A comparative study of neural network techniques for automatic software vulnerability detection. CoRR abs/2104.14978 (2021) - 2020
- [j4]Jingjing Zhang
, Lin Yang
, Weipeng Cao
, Qiang Wang
:
Formal Analysis of 5G EAP-TLS Authentication Protocol Using Proverif. IEEE Access 8: 23674-23688 (2020) - [c4]Jingjing Zhang
, Lin Yang, Xianming Gao, Qiang Wang:
Formal analysis of QUIC handshake protocol using ProVerif. CSCloud/EdgeCom 2020: 132-138 - [c3]Lianxiao Meng, Lin Yang, Gaigai Tang, Shuangyin Ren, Wu Yang:
An Optimization of Deep Sensor Fusion Based on Generalized Intersection over Union. ICA3PP (2) 2020: 552-562 - [c2]Gaigai Tang, Lianxiao Meng, Huiqiang Wang, Shuangyin Ren, Qiang Wang, Lin Yang, Weipeng Cao:
A Comparative Study of Neural Network Techniques for Automatic Software Vulnerability Detection. TASE 2020: 1-8
2010 – 2019
- 2019
- [j3]Zhiming Huang
, Lin Yang, Wen Jiang
:
Uncertainty measurement with belief entropy on the interference effect in the quantum-like Bayesian Networks. Appl. Math. Comput. 347: 417-428 (2019) - [c1]Jingjing Zhang, Qiang Wang, Lin Yang, Tao Feng:
Formal Verification of 5G-EAP-TLS Authentication Protocol. DSC 2019: 503-509 - 2018
- [j2]Shuang Liang, Xinyang Deng, Lin Yang, Wen Jiang:
An improvement to generalized regret based decision making method considering unreasonable alternatives. Int. J. Intell. Syst. 33(12): 2295-2313 (2018) - 2017
- [j1]Wen Jiang
, Ying Cao, Lin Yang, Zichang He:
A Time-Space Domain Information Fusion Method for Specific Emitter Identification Based on Dempster-Shafer Evidence Theory. Sensors 17(9): 1972 (2017) - [i1]Zhiming Huang, Lin Yang, Wen Jiang:
Uncertainty measurement with belief entropy on interference effect in Quantum-Like Bayesian Networks. CoRR abs/1709.02844 (2017)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-09-28 21:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint