Significant permission identification for machine-learning-based android malware detection J Li, L Sun, Q Yan, Z Li, W Srisa-An, H Ye IEEE Transactions on Industrial Informatics 14 (7), 3216-3225, 2018 | 514 | 2018 |
Machine learning based mobile malware detection using highly imbalanced network traffic Z Chen, Q Yan, H Han, S Wang, L Peng, L Wang, B Yang Information Sciences 433, 346-364, 2018 | 152 | 2018 |
Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks Q Yan, M Li, T Jiang, W Lou, YT Hou 2012 Proceedings IEEE INFOCOM, 900-908, 2012 | 126 | 2012 |
Detecting android malware leveraging text semantics of network flows S Wang, Q Yan, Z Chen, B Yang, C Zhao, M Conti IEEE Transactions on Information Forensics and Security 13 (5), 1096-1109, 2017 | 111 | 2017 |
Proximity-based security techniques for mobile users in wireless networks L Xiao, Q Yan, W Lou, G Chen, YT Hou IEEE Transactions on Information Forensics and Security 8 (12), 2089-2100, 2013 | 94 | 2013 |
A mobile malware detection method using behavior features in network traffic S Wang, Z Chen, Q Yan, B Yang, L Peng, Z Jia Journal of Network and Computer Applications 133, 15-25, 2019 | 92 | 2019 |
Throughput analysis of cooperative mobile content distribution in vehicular network using symbol level network coding Q Yan, M Li, Z Yang, W Lou, H Zhai IEEE Journal on Selected Areas in Communications 30 (2), 484-492, 2012 | 88 | 2012 |
Jamming resilient communication using MIMO interference cancellation Q Yan, H Zeng, T Jiang, M Li, W Lou, YT Hou IEEE Transactions on Information Forensics and Security 11 (7), 1486-1499, 2016 | 83 | 2016 |
SigPID: significant permission identification for android malware detection L Sun, Z Li, Q Yan, W Srisa-an, Y Pan 2016 11th international conference on malicious and unwanted software …, 2016 | 82 | 2016 |
Trafficav: An effective and explainable detection of mobile malware behavior using network traffic S Wang, Z Chen, L Zhang, Q Yan, B Yang, L Peng, Z Jia 2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS), 1-6, 2016 | 74 | 2016 |
Efficient signature generation for classifying cross-architecture IoT malware M Alhanahnah, Q Lin, Q Yan, N Zhang, Z Chen 2018 IEEE conference on communications and network security (CNS), 1-9, 2018 | 71 | 2018 |
Identity management using blockchain for cognitive cellular networks S Raju, S Boddepalli, S Gampa, Q Yan, JS Deogun 2017 IEEE International Conference on Communications (ICC), 1-6, 2017 | 70 | 2017 |
Surfingattack: Interactive hidden attack on voice assistants using ultrasonic guided waves Q Yan, K Liu, Q Zhou, H Guo, N Zhang Network and Distributed Systems Security (NDSS) Symposium, 2020 | 66 | 2020 |
MIMO-based jamming resilient communication in wireless networks Q Yan, H Zeng, T Jiang, M Li, W Lou, YT Hou IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 2697-2706, 2014 | 63 | 2014 |
TIMiner: Automatically extracting and analyzing categorized cyber threat intelligence from social data J Zhao, Q Yan, J Li, M Shao, Z He, B Li Computers & Security 95, 101867, 2020 | 52 | 2020 |
Security analysis of Internet-of-Things: A case study of august smart lock M Ye, N Jiang, H Yang, Q Yan 2017 IEEE conference on computer communications workshops (INFOCOM WKSHPS …, 2017 | 49 | 2017 |
Droidclassifier: Efficient adaptive mining of application-layer header for classifying android malware Z Li, L Sun, Q Yan, W Srisa-an, Z Chen Security and Privacy in Communication Networks: 12th International …, 2017 | 48 | 2017 |
Deep and broad URL feature mining for android malware detection S Wang, Z Chen, Q Yan, K Ji, L Peng, B Yang, M Conti Information Sciences 513, 600-613, 2020 | 47 | 2020 |
Multi-attributed heterogeneous graph convolutional network for bot detection J Zhao, X Liu, Q Yan, B Li, M Shao, H Peng Information Sciences 537, 380-393, 2020 | 38 | 2020 |
Peerclean: Unveiling peer-to-peer botnets through dynamic group behavior analysis Q Yan, Y Zheng, T Jiang, W Lou, YT Hou 2015 IEEE Conference on Computer Communications (INFOCOM), 316-324, 2015 | 37 | 2015 |