Bin Yuan

ORCID: 0000-0002-5365-904X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Software-Defined Networks and 5G
  • Advanced Malware Detection Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Security and Verification in Computing
  • Network Packet Processing and Optimization
  • Translation Studies and Practices
  • Wireless Body Area Networks
  • Software System Performance and Reliability
  • Mineralogy and Gemology Studies
  • Face and Expression Recognition
  • Cloud Data Security Solutions
  • Molecular Communication and Nanonetworks
  • Machine Learning and ELM
  • Advanced Sensor and Control Systems
  • IoT and Edge/Fog Computing
  • Domain Adaptation and Few-Shot Learning
  • Pigment Synthesis and Properties
  • Cultural Heritage Materials Analysis
  • Rough Sets and Fuzzy Logic
  • Geochemistry and Geologic Mapping
  • Advanced Neural Network Applications
  • Spacecraft and Cryogenic Technologies
  • Inertial Sensor and Navigation
  • Synthetic Aperture Radar (SAR) Applications and Techniques

Huazhong University of Science and Technology
2015-2024

Songshan Lake Materials Laboratory
2023-2024

Trine University
2024

Jinyintan Hospital
2024

Qujing Normal University
2021-2023

Data Assurance and Communication Security
2022

China University of Geosciences (Beijing)
2019-2022

University of Chinese Academy of Sciences
2018-2022

Chinese Academy of Sciences
2007-2022

Aerospace Information Research Institute
2022

The Software-Defined Network (SDN) is a new and promising network architecture. At the same time, SDN will surely become target of cyber attackers. In this paper, we point out one critical vulnerability in SDNs, size flow table, which most likely to be attacked. Due expensive power-hungry features Ternary Content Addressable Memory (TCAM), table usually has limited size, can easily disabled by overloading attack (a transformed DDoS attack). To provide security service SDN, proposed QoS-aware...

10.1109/tsc.2016.2602861 article EN IEEE Transactions on Services Computing 2016-08-25

Basketball is a sport that requires high athletes’ skills and physical fitness deeply loved by the people in our country. This paper studies application of neural network‐based motion sensors basketball technology evaluation system. The ideal effect system to scientifically analyze relevant data through intelligent algorithms provide more accurate diagnosis suggestions. Recognizing human movements collecting various body sensors. acquisition components this are based on considerations...

10.1155/2021/5562954 article EN cc-by Wireless Communications and Mobile Computing 2021-01-01

The development of deep learning technology provides new opportunities for the construction and application large language models. This paper systematically explores current status optimization strategies in introduces basic concepts principles models, focusing on representation methods, model architectures, cases. Addressing challenges faced by analyzes detail such as compression acceleration, transfer domain adaptation, data augmentation, unsupervised learning. Through experiments multiple...

10.53469/jtpes.2024.04(05).12 article EN cc-by-nc Journal of Theory and Practice of Engineering Science 2024-05-27

DDoS attacks are rampant in cloud environments and continually evolve into more sophisticated intelligent modalities, such as low-rate attacks. But meanwhile, the environment is also developing constant. Now container technology microservice architecture widely applied compose container-based environment. Comparing with traditional environments, lightweight virtualization flexible scaling service. Naturally, a question that arises whether these new features of will bring possibilities to...

10.1109/tpds.2019.2942591 article EN cc-by IEEE Transactions on Parallel and Distributed Systems 2019-09-20

Software-defined Network (SDN), presented to be a novel architecture of network because its separation data plane and control plane, brings centralization extensibility management as well new attacks that exploit the flexibility SDN. OpenFlow, which is protocol applied by majority SDN, leads widely used definition communication between controller switch resulting in similar implementations regardless different vendors. In this paper, we focus on mechanisms packet processing topology...

10.1109/tnsm.2024.3386404 article EN cc-by-nc-nd IEEE Transactions on Network and Service Management 2024-04-10

In this Modern era, Software Defined Network (SDN), Function Virtualization (NFV), and cloud computing participating of Fifth Generation (5G) network emergence. This paper presents a robust security scheme to provide fortification against major threats along with user privacy in 5G network, two additional entities are introduced. For mobile users, initial authentication is provided at access points by an inventive Highly Secured Authentication Handover Mechanism (HS-AOHM) which minimizes...

10.1109/tetc.2018.2879714 article EN IEEE Transactions on Emerging Topics in Computing 2018-11-05

Due to the lightweight features, combination of container technology and microservice architecture makes container-based cloud environment more efficient agile than VM-based environment. However, it also greatly amplifies dynamism complexity increases uncertainty security issues in system concurrently. In this case, effectiveness defense mechanisms with fixed strategies would fluctuate as updates occur We refer problem drift mechanisms, which is particularly acute proactive such moving...

10.1109/tdsc.2019.2916666 article EN IEEE Transactions on Dependable and Secure Computing 2019-01-01

Distributed Denial of Service (DDoS) is a predominant threat to the availability online services due their size and frequency. However, developing an effective security mechanism protect network from this big challenge because DDoS uses various attack approaches coupled with several possible combinations. Furthermore, most existing deep learning- (DL-) based models pose high processing overhead or may not perform well detect recently reported attacks as these use outdated datasets for...

10.1155/2021/5710028 article EN cc-by Security and Communication Networks 2021-11-30

Code clone detection aims to find similar code fragments and gains increasing importance in the field of software engineering. There are several types techniques for detecting clones. Text-based or token-based detectors scalable efficient but lack consideration syntax, thus resulting poor performance syntactic Although some tree-based methods have been proposed detect semantic clones with decent performance, they mostly time-consuming scalability. In addition, these can not realize...

10.1145/3597926.3598040 article EN 2023-07-12

Wireless Body Area Network (WBAN) is the most promising technology in e-health applications. Energy efficiency stands out as paramount issue for WBAN. In this paper, an energy efficient MAC protocol named Quasi-Sleep-Preempt-Supported (QS-PS) proposed. The mainly TDMA-based: nodes transmit packets allocated slots, while entering Q-Sleep mode other slots. Moreover, a node with emergency packet, it can broadcast special designed Awakening Message to wake up whole network and preempts right use...

10.1109/cc.2015.7084398 article EN China Communications 2015-02-01

A software-defined network (SDN) is a technology that supports computer administrators. However, the centralized control plane architecture of SDNs makes them vulnerable to harmful security threats. In this paper, we propose secure cloud (SecSDN-cloud) includes user authentication, routing, attack resistance, and third-party monitoring. The goal paper design an SDN-cloud environment with integrated can resist three different types: flow table overloading, saturation, Byzantine attacks. novel...

10.1109/access.2018.2797214 article EN cc-by-nc-nd IEEE Access 2018-01-01

Software vulnerabilities have posed huge threats to the cyberspace security, and there is an increasing demand for automated vulnerability detection (VD). In recent years, deep learning-based (DL-based) systems been proposed purpose of automatic feature extraction from source code. Although these methods can achieve ideal performance on synthetic datasets, accuracy drops a lot when detecting real-world datasets. Moreover, approaches limit their scopes within single function, being not able...

10.1109/icse48619.2023.00190 article EN 2023-05-01

Over the past few years, software-defined networking (SDN) has stimulated worldwide interests in both academia and industry for its proven benefits. However, reliability of SDN become a significant barrier adopting it. Many efforts have been made to enhance SDNs. research all assume benign data plane, overlook fundamental question: what if switches provide tainted network state information (controller's inputs) controller? To obtain global view produce decisions, controllers must collect...

10.1109/tnsm.2018.2822668 article EN IEEE Transactions on Network and Service Management 2018-04-03

Internet of Things (IoT) has become a critical infrastructure in smart city services. Unlike traditional network nodes, most the current IoT devices are constrained with limited capabilities. Moreover, frequent changes status (e.g., nodes turns into sleep mode to save battery) make it even more difficult set up stable, secure transmission among devices. On one hand, these weaknesses vulnerable attacks, such as data eavesdropping, which can monitor, tamper, and obtain transporting data. other...

10.1109/jiot.2020.2993587 article EN IEEE Internet of Things Journal 2020-05-12

An IoT device today can be managed through different channels, e.g., by its manufacturer's app, or third-party channels such as Apple's Home a smart speaker. Supporting each channel is management framework integrated in the and provided parties. For example, that integrates Apple HomeKit app. We call of this kind, including all device- cloud-side components, (DMC). 4 DMCs are widely today's devices along with own DMC: HomeKit, Zigbee/Z-Wave compatible DMC, smart-speaker Seamless DMC. Each...

10.1145/3460120.3484592 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2021-11-12

Emerging IoT clouds are playing a more important role in modern lives, enabling users/developers to program applications make better use of smart devices. However, preliminary research has shown cloud vulnerabilities could expose users security risks. To understand the problem, we studied SmartThings cloud, one most popular platforms that support user-defined device automation (SmartApps). Specifically, found new allow attackers fake events trigger SmartApps operate devices (e.g., open...

10.1109/tdsc.2022.3162312 article EN cc-by-nc-nd IEEE Transactions on Dependable and Secure Computing 2022-03-25

The corrected ultraviolet-visible light spectrum was used to calculate the color of synthetic rubies with different path lengths, and influence length standard source on ruby studied. results show that difference in colour between o direction e decreases as increases. At same time, increases, lightness L* decreases, hue angle h° chroma C* first increases then begins decrease under continuous lightness. ΔE*ab reaches maximum when is around 10 mm, has greatest ΔE*ab. As continues increase,...

10.1038/s41598-022-08811-y article EN cc-by Scientific Reports 2022-04-08

Wireless Body Area Network (WBAN) is a kind of network placed around human body and provides continuous monitoring physical signals for e-health application. When bunch WBANs group together in small area, the strong inter-BAN interference causes severe influence to intra-BAN communication. In this paper, we investigate throughput-maximizing strategy concerning that case. Firstly, throughput optimization problem with fairness consideration formulated based on model, which shown be non-linear...

10.1109/icc.2015.7249347 article EN 2015-06-01

High-resolution images with abundant detailed information are necessary elements for various applications of synthetic aperture radar (SAR). In this paper, a novel super-resolution image reconstruction method based on self-normalizing generative adversarial network (SNGAN) is proposed. Compared other published GAN-based algorithms, the proposed reflects its superiority in two aspects. First, scaled exponential linear units (SeLU) introduced as activation function generator to give GAN system...

10.1109/igarss.2019.8900084 article EN IGARSS 2022 - 2022 IEEE International Geoscience and Remote Sensing Symposium 2019-07-01
Coming Soon ...