default search action
Yi Xie 0002
Person information
- affiliation: Sun Yat-Sen University, Guangzhou, China
Other persons with the same name
- Yi Xie — disambiguation page
- Yi Xie 0001 — Rutgers University, New Brunswick, NJ, USA (and 1 more)
- Yi Xie 0003 — Fudan University, Shanghai, China
- Yi Xie 0004 — Xiamen University, Xiamen, China
- Yi Xie 0005 — Wuhan University, Wuhan, China
- Yi Xie 0006 — Beijing Institute of Technology, Beijing, China
- Yi Xie 0007 — National University of Defense Technology, Changsha, China
- Yi Xie 0008 — Boise State University, Boise, ID, USA
- Yi Xie 0009 — Zhejiang Gongshang University, Hangzhou, China
- Yi Xie 0010 — Henan University, Kaifeng, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Zihui Wu, Yi Xie, Shensheng Tang, Xingcheng Liu:
Estimating the composition ratios of network services carried in mixed traffic. Comput. Commun. 222: 1-12 (2024) - [c22]Yi Xie, Jie Zhang, Shiqian Zhao, Tianwei Zhang, Xiaofeng Chen:
SAME: Sample Reconstruction against Model Extraction Attacks. AAAI 2024: 19974-19982 - [c21]Rujia Chen, Yi Xie:
Identifying the Fraudulent Users for E-commerce Applications Based on the Access Behaviors. ICIC (LNAI 1) 2024: 25-36 - 2023
- [j31]Xiaoyu Zhang, Chao Chen, Yi Xie, Xiaofeng Chen, Jun Zhang, Yang Xiang:
A survey on privacy inference attacks and defenses in cloud-based Deep Neural Network. Comput. Stand. Interfaces 83: 103672 (2023) - [j30]Qiang Tu, Xingcheng Liu, Yi Xie, Guangjie Han:
Range-Free Localization Using Extreme Learning Machine and Ring-Shaped Salp Swarm Algorithm in Anisotropic Networks. IEEE Internet Things J. 10(9, May 1): 8228-8244 (2023) - [j29]Yu Liang, Yi Xie, Shensheng Tang, Shunzheng Yu, Xingcheng Liu, Jiankun Hu:
Network Traffic Content Identification Based on Time-Scale Signal Modeling. IEEE Trans. Dependable Secur. Comput. 20(3): 2607-2624 (2023) - [c20]Mengdie Huang, Yi Xie, Xiaofeng Chen, Jin Li, Changyu Dong, Zheli Liu, Willy Susilo:
Boost Off/On-Manifold Adversarial Robustness for Deep Learning with Latent Representation Mixup. AsiaCCS 2023: 716-730 - [c19]Yuting Li, Yitong Liu, Xingcheng Liu, Qiang Tu, Yi Xie:
Mobile-Aware Online Task Offloading Based on Deep Reinforcement Learning in Mobile Edge Computing Networks. PIMRC 2023: 1-6 - [i3]Yi Xie, Jie Zhang, Shiqian Zhao, Tianwei Zhang, Xiaofeng Chen:
SAME: Sample Reconstruction against Model Extraction Attacks. CoRR abs/2312.10578 (2023) - 2022
- [j28]Shensheng Tang, Monali Sinare, Yi Xie:
FPGA-based DFT system design, optimisation and implementation using high-level synthesis. Int. J. Comput. Appl. Technol. 69(1): 47-61 (2022) - [j27]Zhengqiang Yan, Xingcheng Liu, Wenjie Ji, Yitong Liu, Guangjie Han, Yi Xie:
Stacked Autoencoders-Based Localization Without Ranging Over Internet of Things. IEEE Internet Things J. 9(10): 7826-7841 (2022) - [j26]Xuefei Yin, Yanming Zhu, Yi Xie, Jiankun Hu:
PowerFDNet: Deep Learning-Based Stealthy False Data Injection Attack Detection for AC-Model Transmission Systems. IEEE Open J. Comput. Soc. 3: 149-161 (2022) - [j25]Haishou Ma, Yi Xie, Shensheng Tang, Jiankun Hu, Xingcheng Liu:
Threat-Event Detection for Distributed Networks Based on Spatiotemporal Markov Random Field. IEEE Trans. Dependable Secur. Comput. 19(3): 1735-1752 (2022) - [c18]Yi Xie, Mengdie Huang, Xiaoyu Zhang, Changyu Dong, Willy Susilo, Xiaofeng Chen:
GAME: Generative-Based Adaptive Model Extraction Attack. ESORICS (1) 2022: 570-588 - [c17]Ziyang Wu, Yi Xie:
Application Identification under Multi-Service Integration Platform. MSN 2022: 859-864 - [i2]Xuefei Yin, Yanming Zhu, Yi Xie, Jiankun Hu:
PowerFDNet: Deep Learning-Based Stealthy False Data Injection Attack Detection for AC-model Transmission Systems. CoRR abs/2207.10805 (2022) - 2021
- [j24]Qiang Tu, Yitong Liu, Feng Han, Xingcheng Liu, Yi Xie:
Range-free localization using Reliable Anchor Pair Selection and Quantum-behaved Salp Swarm Algorithm for anisotropic Wireless Sensor Networks. Ad Hoc Networks 113: 102406 (2021) - [j23]Shensheng Tang, Yi Xie:
Performance analysis of a healthcare internet of things system subject to wireless cloud connection failure. Int. J. Wirel. Mob. Comput. 21(2): 161-169 (2021) - [j22]Xingrui Fei, Yi Xie, Shensheng Tang, Jiankun Hu:
Identifying click-requests for the network-side through traffic behavior. J. Netw. Comput. Appl. 173: 102872 (2021) - [c16]Siqi Yin, Caihong Liu, Yi Xie, Shui Yu:
A Review on the Research of Producer Services Supply Chain in China. HCI (35) 2021: 126-137 - [c15]Zihui Wu, Yi Xie, Ziyang Wu:
A Light-Weight Scheme for Detecting Component Structure of Network Traffic. PDCAT 2021: 27-35 - [i1]Xiaoyu Zhang, Chao Chen, Yi Xie, Xiaofeng Chen, Jun Zhang, Yang Xiang:
Privacy Inference Attacks and Defenses in Cloud-based Deep Neural Network: A Survey. CoRR abs/2105.06300 (2021) - 2020
- [j21]Yinyou Mao, Dong Yang, Xingcheng Liu, Yi Xie:
Serially concatenated scheme of polar codes and the improved belief propagation decoding algorithm. IET Commun. 14(14): 2309-2318 (2020) - [j20]Xingcheng Liu, Feng Han, Wenjie Ji, Yitong Liu, Yi Xie:
A Novel Range-Free Localization Scheme Based on Anchor Pairs Condition Decision in Wireless Sensor Networks. IEEE Trans. Commun. 68(12): 7882-7895 (2020)
2010 – 2019
- 2019
- [j19]Xincheng Tan, Yi Xie, Haishou Ma, Shunzheng Yu, Jiankun Hu:
Recognizing the content types of network traffic based on a hybrid DNN-HMM model. J. Netw. Comput. Appl. 142: 51-62 (2019) - [j18]Xincheng Tan, Yi Xie, Haishou Ma, Shunzheng Yu, Jiankun Hu:
Corrigendum to "Recognizing the content types of network traffic based on a hybrid DNN-HMM model" [J. Netw. Comput. Appl. 142 (2019) 51-62]. J. Netw. Comput. Appl. 145 (2019) - [j17]Waqas Haider, Jiankun Hu, Yi Xie, Xinghuo Yu, Qianhong Wu:
Detecting Anomalous Behavior in Cloud Servers by Nested-Arc Hidden SEMI-Markov Model with State Summarization. IEEE Trans. Big Data 5(3): 305-316 (2019) - [c14]Yu Liang, Yi Xie, Xingrui Fei, Xincheng Tan, Haishou Ma:
Content Recognition of Network Traffic Using Wavelet Transform and CNN. ML4CS 2019: 224-238 - 2018
- [c13]Xincheng Tan, Yi Xie:
Hybrid Deep Neural Network - Hidden Markov Model Based Network Traffic Classification. ChinaCom 2018: 604-614 - [c12]Haishou Ma, Yi Xie, Zhen Wang:
Detecting Network Events by Analyzing Dynamic Behavior of Distributed Network. ChinaCom 2018: 645-655 - 2017
- [j16]Waqas Haider, Jiankun Hu, Jill Slay, Benjamin P. Turnbull, Yi Xie:
Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling. J. Netw. Comput. Appl. 87: 185-192 (2017) - 2016
- [j15]Waqas Haider, Gideon Creech, Yi Xie, Jiankun Hu:
Windows Based Data Sets for Evaluation of Robustness of Host Based Intrusion Detection Systems (IDS) to Zero-Day and Stealth Attacks. Future Internet 8(3): 29 (2016) - [j14]Shensheng Tang, Rong Yu, Xiaojiang Chen, Chenghua Tang, Yi Xie:
Impact of sensing errors on the performance of an unreliable opportunistic spectrum sharing system. Int. J. Wirel. Mob. Comput. 10(3): 197-204 (2016) - [j13]Chao Chen, Jun Zhang, Yi Xie, Yang Xiang, Wanlei Zhou, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi:
Comments and Corrections. IEEE Trans. Comput. Soc. Syst. 3(1): 42 (2016) - [j12]Yi Xie, Yu Wang, Haitao He, Yang Xiang, Shunzheng Yu, Xincheng Liu:
A General Collaborative Framework for Modeling and Perceiving Distributed Network Behavior. IEEE/ACM Trans. Netw. 24(5): 3162-3176 (2016) - 2015
- [j11]Chao Chen, Jun Zhang, Yi Xie, Yang Xiang, Wanlei Zhou, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi, Majed A. AlRubaian:
A Performance Evaluation of Machine Learning-Based Streaming Spam Tweets Detection. IEEE Trans. Comput. Soc. Syst. 2(3): 65-76 (2015) - [c11]Waqas Haider, Jiankun Hu, Xinghuo Yu, Yi Xie:
Integer Data Zero-Watermark Assisted System Calls Abstraction and Normalization for Host Based Anomaly Detection Systems. CSCloud 2015: 349-355 - 2013
- [j10]Yi Xie, Jiankun Hu, S. Tang, X. Huang:
A Forward-Backward Algorithm for Nested Hidden semi-Markov Model and Application to Network Traffic. Comput. J. 56(2): 229-238 (2013) - [j9]Shensheng Tang, Yi Xie, Liqiang Zhang, Chenghua Tang:
Analysis of TDOA based radar target positioning in LOS and NLOS environments. Int. J. Wirel. Mob. Comput. 6(4): 313-320 (2013) - [j8]Yi Xie, Shensheng Tang, Xiangnong Huang, Chenghua Tang:
Modeling Web Session for Detecting Pseudo HTTP Traffic. J. Comput. 8(2): 341-348 (2013) - [j7]Yi Xie, Shensheng Tang, Yang Xiang, Jiankun Hu:
Resisting Web Proxy-Based HTTP Attacks by Temporal and Spatial Locality Behavior. IEEE Trans. Parallel Distributed Syst. 24(7): 1401-1410 (2013) - [j6]Yi Xie, Jiankun Hu, Yang Xiang, Shui Yu, Shensheng Tang, Yu Wang:
Modeling Oscillation Behavior of Network Traffic by Nested Hidden Markov Model with Variable State-Duration. IEEE Trans. Parallel Distributed Syst. 24(9): 1807-1817 (2013) - 2012
- [j5]Shensheng Tang, Yi Xie, Chenghua Tang, Jinwen Zhu:
A Comparative Study of Power Line Communication Networks With and Without Buffer. Int. J. Commun. Networks Inf. Secur. 4(2) (2012) - [j4]Yi Xie, Jiankun Hu, S. Tang, X. Huang:
A structural approach for modelling the hierarchical dynamic process of Web workload in a large-scale campus network. J. Netw. Comput. Appl. 35(6): 2081-2091 (2012) - [c10]Yi Xie, Shensheng Tang, Xiangnong Huang:
A Periodic Structural Model for Characterizing Network Traffic. ICIC (2) 2012: 545-552 - [c9]Yi Xie, Shensheng Tang:
Online Anomaly Detection Based on Web Usage Mining. IPDPS Workshops 2012: 1177-1182 - 2011
- [j3]Shensheng Tang, Yi Xie:
Performance Analysis of Unreliable Sensing for an Opportunistic Spectrum Sharing System. Int. J. Commun. Networks Inf. Secur. 3(3) (2011) - [c8]Yi Xie, Shensheng Tang, Xiangnong Huang:
A new model for generating burst traffic based on hierarchical HMM. FSKD 2011: 2212-2216 - [c7]Shensheng Tang, Yi Xie:
Modeling and Analysis of a Power Line Communication Network Subject to Channel Failure. ICEIS (3) 2011: 184-189 - [c6]Chenghua Tang, Xin Wang, Reixia Zhang, Yi Xie:
Modeling and Analysis of Network Security Situation Prediction Based on Covariance Likelihood Neural. ICIC (3) 2011: 71-78 - [c5]Yi Xie, Shun-Zheng Yu, Shensheng Tang, Xiangnong Huang:
A Two-Layer Hidden Markov Model for the Arrival Process of Web Traffic. MASCOTS 2011: 469-471
2000 – 2009
- 2009
- [j2]Yi Xie, Shun-Zheng Yu:
Monitoring the application-layer DDoS attacks for popular websites. IEEE/ACM Trans. Netw. 17(1): 15-25 (2009) - [j1]Yi Xie, Shun-Zheng Yu:
A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors. IEEE/ACM Trans. Netw. 17(1): 54-65 (2009) - 2008
- [c4]Yi Xie, Shun-Zheng Yu:
Measuring the Normality of Web Proxies' Behavior Based on Locality Principles. NPC 2008: 61-73 - 2007
- [c3]Yi Xie, Shun-Zheng Yu:
Detecting Shrew HTTP Flood Attacks for Flash Crowds. International Conference on Computational Science (1) 2007: 640-647 - 2006
- [c2]Yi Xie, Shun-Zheng Yu:
A Dynamic Anomaly Detection Model for Web User Behavior Based on HsMM. CSCWD 2006: 811-821 - [c1]Yi Xie, Shun-Zheng Yu:
A Novel Model for Detecting Application Layer DDoS Attacks. IMSCCS (2) 2006: 56-63
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint