Yubo Song

ORCID: 0000-0002-1347-6126
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Internet Traffic Analysis and Secure E-voting
  • IPv6, Mobility, Handover, Networks, Security
  • User Authentication and Security Systems
  • Cryptography and Data Security
  • Advanced Authentication Protocols Security
  • Privacy-Preserving Technologies in Data
  • Access Control and Trust
  • Wireless Communication Security Techniques
  • Advanced Algorithms and Applications
  • Embedded Systems and FPGA Design
  • Cryptographic Implementations and Security
  • Chaos-based Image/Signal Encryption
  • IoT and Edge/Fog Computing
  • Bluetooth and Wireless Communication Technologies
  • Software-Defined Networks and 5G
  • Mobile and Web Applications
  • Traffic control and management
  • Wireless Networks and Protocols
  • Spam and Phishing Detection
  • Mobile Agent-Based Network Management
  • Cloud Data Security Solutions
  • Context-Aware Activity Recognition Systems
  • Digital and Cyber Forensics

Southeast University
2013-2025

Purple Mountain Laboratories
2020-2025

Wuhan University of Technology
2025

Southeast University
2008-2024

Lanzhou Jiaotong University
2017-2022

Qufu Normal University
2021

Hong Kong Polytechnic University
2016-2017

Qingdao Municipal Hospital
2012

Qingdao University
2012

Northeast Petroleum University
2011

The introduction of software-defined networking (SDN) has emerged as a new network paradigm for innovations. By decoupling the control plane from data in traditional networks, SDN provides high programmability to and manage networks. However, communication between two planes can be bottleneck whole network. SDN-aimed DoS attacks cause long packet delay loss rate by using massive table-miss packets jam links planes. To detect mitigate attacks, this paper presents FloodDefender, an efficient...

10.1109/tnet.2020.2983976 article EN IEEE/ACM Transactions on Networking 2020-04-15

Many efforts have been devoted to the development of efficient Network Intrusion Detection System (NIDS) using machine learning approaches in Software-defined (SDN). Unfortunately, existing solutions failed detect real-time and zero-day attacks due their limited throughput prior knowledge-based detection. To this end, we propose Griffin, a NIDS that uses unsupervised expertise both known intrusion with high accuracy. Specifically, Griffin an feature extraction framework capture sequential...

10.1109/tnsm.2022.3175710 article EN IEEE Transactions on Network and Service Management 2022-05-17

Data immutability, transparency and decentralization of blockchain make it widely used in various fields, such as Internet things, finance, energy healthcare. With the advent Big era, companies organizations urgently need data from other parties for analysis mining to provide better services. Therefore, sharing exchange have become an enormous industry. Traditional centralized platforms face many problems, privacy leakage, high transaction costs lack interoperability. Introducing into this...

10.1109/tbdata.2023.3293279 article EN IEEE Transactions on Big Data 2023-07-07

As mass devices access to network in the era of Internet Things (IoT), control becomes more important. Traditional authentication mechanisms are no longer suitable for IoT with limited physical and computational resources because their complexity. This problem can be solved by device fingerprinting, which identify only traffic characteristics. However, existing fingerprinting technologies cannot accurately devices' type from same manufacturer equips these similar hardwares softwares....

10.1145/3321408.3326671 article EN Proceedings of the ACM Turing Celebration Conference - China 2019-05-17

White-box cryptography plays a vital role in untrusted environments where attackers can fully access the execution process and potentially expose cryptographic keys. It secures keys by embedding them within complex obfuscated transformations, such as lookup tables algebraic manipulations. However, existing white-box protection schemes for SM2 signatures face vulnerabilities, notably random number leakage, which compromises key security diminishes overall effectiveness. This paper proposes an...

10.3390/electronics14020301 article EN Electronics 2025-01-13

Shared energy storage (SES) and some photovoltaic prosumers (PVPs) are difficult to aggregate by the virtual power plant (VPP) in short term. In order realize optimal operation of VPP incomplete resource aggregation environment promote mutual benefit multiple market entities, trading strategy based on hybrid game SES–VPP–PVP is proposed. Firstly, whole system configuration with proposed, as well preconfigured rules general problem for VPP. Secondly, novel theory-based optimization proposed...

10.3390/app15042100 article EN cc-by Applied Sciences 2025-02-17

The Network Intrusion Detection Systems (NIDS) with machine learning in SDN become increasingly popular solutions. NIDS uses abnormal traffic detection to identify unknown network attacks. Most of today's systems are supposed continuously update the recognition model time based on features from newly collected packets accurately attack behaviors. However, those existing solutions always require a large number train offline. That means it is impossible detect emergence new cyber-attacks...

10.1109/globecom42002.2020.9322187 article EN GLOBECOM 2022 - 2022 IEEE Global Communications Conference 2020-12-01

Wi-Fi device authentication is crucial for defending against impersonation attacks and information forgery attacks. Most of the existing technologies rely on complex cryptographic algorithms. However, they cannot be supported well devices with limited hardware resources. A fine-grained technology based channel state (CSI) provides a noncryptographic method, which uses CSI fingerprints since can uniquely identify devices. But long-term challenging work. First, are environment-sensitive, means...

10.1155/2021/2993019 article EN cc-by Wireless Communications and Mobile Computing 2021-01-01

Utilizing browsers to identify and track users has become a routine on the Web in recent years. It is easy for browser collect sensitive information construct comprehensive user profiles while are still unaware. As problem mentioned above, several anti-fingerprint mechanisms have been adopted protect privacy. However, our research finds novel method based localization fingerprints that may threaten The location fingerprint obtains response delay of data transmission over link between...

10.1109/icc42927.2021.9500556 article EN ICC 2022 - IEEE International Conference on Communications 2021-06-01

Aiming at the problem of depression recognition, this paper proposes a computer-aided recognition framework based on decision-level multimodal fusion. In Song Dynasty China, idea fusion was contained in "one gets different impressions mountain when viewing it from front or sideways, close range afar" poetry. Objective and comprehensive analysis can more accurately restore its essence, represent information about compared to single modal. Linear electroencephalography (EEG) features adaptive...

10.1109/jbhi.2022.3165640 article EN IEEE Journal of Biomedical and Health Informatics 2022-04-07

Internet of Things (IoT) devices deployed in publicly accessible locations increasingly encounter security threats from device replacement and impersonation attacks. Unfortunately, the limited memory poor computing capability on such make solutions involving complex algorithms or enhanced authentication protocols untenable. To address this issue, identification technologies based traffic characteristics finger-printing have been proposed to prevent illegal intrusion impersonation. However,...

10.1109/globecom46510.2021.9685693 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2021-12-01

Since a growing number of malicious applications attempt to steal users’ private data by illegally invoking permissions, application stores have carried out many malware detection methods based on permissions. However, most them ignore specific permission combinations and categories that affect the accuracy. The features they extracted are neither representative enough distinguish benign applications. For these problems, an Android method sensitivity is proposed. First, for each kind...

10.1155/2021/6689486 article EN cc-by Security and Communication Networks 2021-07-28

Non-cryptographic mobile wireless device authentication based on channel signature has aroused extensive attention. This technology uses the device's physical characteristics to mark and verify its identity, can be used detect impersonation attacks information forgery attacks. Channel State Information (CSI) been generate fine-grained signatures. However, there are two sticking points in using CSI-based for association phase. The first is that state will change as moves, which means local...

10.1109/dsn-w52860.2021.00024 article EN 2021-06-01

Unauthorized voice recording via smartphones can leak the talking content stealthily. This would be a serious security threat to those individuals, enterprises and government who need keep conversation confidential. Furthermore, due size miniaturization of smartphones, it is hard find covert from malicious attendees. Existing solutions usually jam with audible noise or electromagnetic emitting. However, will seriously interfere effect emitting limited by distance. In this paper, we propose...

10.1109/icc42927.2021.9500456 article EN ICC 2022 - IEEE International Conference on Communications 2021-06-01

In an era marked by rapid advancements in information technology, the task of risk assessment for data security within complex infrastructure power grid has become increasingly vital. This paper introduces a novel methodology dynamic, scenario-adaptive assessment, specifically designed to address entire lifecycle data. Integrating hierarchical analysis with fuzzy comprehensive evaluation, our approach provides flexible and robust framework assessing managing risks various scenarios. method...

10.3390/electronics13030631 article EN Electronics 2024-02-02

The 2G GSM communication system only provides one-way authentication mechanism which just authenticate the identities of mobile users. As we know, this is not resistant to fake BTS attack. But for huge cost building a before, kind attack were really implemented before. This paper presents an implement based on software radio technologies. Furthermore, discusses two types attacks our platform. first IMSI/IMEI catch attack, can get phone’s IMSI and IMEI. With information, attacker got track...

10.4304/jnw.7.2.275-281 article EN Journal of Networks 2012-02-01

In recent years, various sensors have been integrated into smartphones to sense the slight motions of human body. However, security researchers found that these can not only be used in motion detection, but also as side-channel reveal users' privacy data by inferring keystrokes. What is worse, defined W3C specifications, mobile web applications get sensor readings silently without permissions from users. Therefore, when cross-site scripting vulnerabilities are a application, attackers...

10.1109/wcsp.2017.8171036 article EN 2021 13th International Conference on Wireless Communications and Signal Processing (WCSP) 2017-10-01

Smartphone sensors have been applied to record the movement of users for healthy use. However, motion sensor readings recorded by malicious applications can be utilized as a side-channel leak user privacy keystroke inference. Most existing approaches use time-domain statistical characteristics Their systems are poor show subtle changes in short time period, since time- domain features only reflect long-time interval. In this paper, we propose novel framework perform inference on smartphones....

10.1109/glocom.2018.8647385 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2018-12-01

Advertising income depends on the amount of clicks by users websites and mobile applications. However, emergence click fraud greatly reduces real benefits advertisement. Most existing researches focus detecting analyzing properties patterns data streams, but attackers can construct that looks legitimate replaying former streams. In this paper, we propose a novel system called ClickGuard to detect attacks. takes advantage motion sensor signals from devices, since pattern is completely...

10.1109/icc40277.2020.9149420 article EN 2020-06-01

We innovatively propose a honeypot monitoring system for mobile communication to decrease the possibility of smart phones being attacked by viruses. The applies idea active theory and combines with protection. initially clarify high safety protection performance our in following steps: we simulates wireless access environment then capture phones; after that, can search potential attacks, as well analyze monitor their behaviors. discuss feasibility efficiency testing an Android phone which...

10.1109/mines.2012.31 article EN 2012-11-01
Coming Soon ...