Xin Yang

ORCID: 0000-0002-7375-9806
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Wireless Communication Technologies
  • UAV Applications and Optimization
  • Direction-of-Arrival Estimation Techniques
  • Advanced Malware Detection Techniques
  • Web Data Mining and Analysis
  • Cooperative Communication and Network Coding
  • Advanced Image and Video Retrieval Techniques
  • Advanced MIMO Systems Optimization
  • Antenna Design and Optimization
  • Wireless Communication Security Techniques
  • Energy Efficient Wireless Sensor Networks
  • Wireless Signal Modulation Classification
  • Mobile Ad Hoc Networks
  • Energy Harvesting in Wireless Networks
  • Caching and Content Delivery
  • Speech and Audio Processing
  • Indoor and Outdoor Localization Technologies
  • Vehicular Ad Hoc Networks (VANETs)
  • Opportunistic and Delay-Tolerant Networks
  • Adversarial Robustness in Machine Learning
  • Software Testing and Debugging Techniques
  • Chinese history and philosophy
  • Distributed Control Multi-Agent Systems
  • Advanced Data Storage Technologies
  • IoT and Edge/Fog Computing

Northwestern Polytechnical University
2015-2025

China Southern Power Grid (China)
2024

Tsinghua University
2003-2023

Guizhou University of Finance and Economics
2021

Zhengzhou University
2009-2021

University of California, Santa Cruz
2018

China Telecom (China)
2004

Code reuse improves software development efficiency, however, vulnerabilities can be introduced inadvertently. Many existing works compute the code similarity based on CFGs to determine whether a binary function contains known vulnerability. Unfortunately, their performance in cross-platform search is challenged.

10.1145/3238147.3240480 article EN 2018-08-20

Wireless body area networks (WBANs), as an important part of the Internet things and sensor networks, are becoming more in health monitoring entertainment services. The nodes these applications need to transmit information data personal station receive control from adjust working modes. However, unlike easily rechargeable station, suffer energy shortages, which affect nodes' lifetimes. To solve this problem, we design a novel medium access (MAC) layer protocol enhance efficiency extend...

10.1109/lsens.2018.2795566 article EN IEEE Sensors Letters 2018-01-19

Ethereum Virtual Machine (EVM) is the run-time environment for smart contracts and its vulnerabilities may lead to serious problems ecology. With lots of techniques being continuously developed validation contracts, testing EVM remains challenging because special test input format absence oracles. In this paper, we propose EVMFuzzer, first tool that uses differential fuzzing technique detect EVM. The core idea generate seed feed them target benchmark EVMs, so as find many inconsistencies...

10.1145/3338906.3341175 article EN 2019-08-09

Automatic modulation recognition (AMR) plays an important role in modern wireless communication. In this letter, a novel framework for AMR is proposed. The ResNeXt network serves as the backbone, and four proposed adaptive attention mechanism modules are incorporated. time-frequency representations of received signals utilized inputs deep learning (DL) network, transfer strategy adopted based on pre-trained weakly supervised (WSL) model. comparisons with several state-of-the-art techniques...

10.1109/lcomm.2021.3093485 article EN publisher-specific-oa IEEE Communications Letters 2021-06-29

Ethereum Virtual Machine (EVM) is the run-time environment for smart contracts and its vulnerabilities may lead to serious problems ecology. With lots of techniques being developed validation contracts, security EVM have not been well-studied. In this paper, we propose EVMFuzz, aiming detect EVMs with differential fuzz testing. The core idea EVMFuzz continuously generate seed different EVMs' execution, so as find many inconsistencies among execution results possible, eventually discover...

10.1002/smr.2556 article EN Journal of Software Evolution and Process 2023-03-26

Fog-cloud computing is one of cores techniques in wireless networks, where fog and cloud nodes provide high-speed large-scale services to mobile users through a collaborative method. For the conventional fog-cloud schemes, abilities computation task offloading methods are main factors affecting latency energy consumption. However, when reach saturation, consumption caused by data transmission approximate those computation. In order reduce computation, this paper proposes an opportunistic...

10.1109/tccn.2023.3234290 article EN IEEE Transactions on Cognitive Communications and Networking 2023-01-05

Automatic modulation recognition (AMR) of radio signals is becoming increasingly important due to its key role in wireless communication system management, monitoring, and control. In this paper, we propose an end-to-end AMR framework based on deep learning (DL), named CCNN-Atten. First, the complex-valued convolutional neural network (CCNN) extracts features signal, feature calibration (FC) module selectively enhances suppresses irrelevant features. Then, a temporal context capture (TCC)...

10.1109/tccn.2022.3179450 article EN IEEE Transactions on Cognitive Communications and Networking 2022-05-31

It is challenging to covert communication under channel distribution information (CDI) uncertainty caused by limited feedback and rapid-changing channels. This letter investigates in uplink non-orthogonal multiple access (NOMA) systems CDI uncertainty, where a user (CU) reliable (RU) transmit messages legitimate receiver (Bob) threatened warden (Willie). RU not only transmits its public but also helps CU send private against Willie’s detection. To protect CU’s transmission with imperfect...

10.1109/lcomm.2023.3255838 article EN IEEE Communications Letters 2023-03-10

10.1142/s0218126625503165 article EN Journal of Circuits Systems and Computers 2025-03-28

The rapid development of Internet Things (IoT) has triggered more security requirements than ever, especially in detecting vulnerabilities various IoT devices. widely used clone-based vulnerability search methods are effective on source code; however, their performance is limited binary search. In this article, we present IoTSeeker, a function semantic learning based approach for cross-platform binary. First, construct the graph to capture both data flow and control information encode...

10.1109/tii.2019.2947432 article EN IEEE Transactions on Industrial Informatics 2019-10-15

Industrial Internet of Things (IIoT), regarded as an important technology for Industry 4.0, has the capability to connect massive IoT devices anywhere and at anytime in manufacturing industry. Enabling such a huge network requires message delivering among sensors, actuators, controllers, remote control be seamless reliable. However, IIoT wireless environment typically faces challenges blockage caused by obstacles. To tackle above issue, unmanned aerial vehicle (UAV) reconfigurable...

10.1109/jiot.2024.3369687 article EN IEEE Internet of Things Journal 2024-02-26

Learning-based clone detection is widely exploited for binary vulnerability search. Although they solve the problem of high time overhead traditional dynamic and static search approaches to some extent, their accuracy limited, need manually identify true positive cases among top-M results during industrial practice. This paper presents VulSeeker-Pro, an enhanced seeker that integrates function semantic emulation at back end learning, release engineers from manual identification work. It...

10.1145/3236024.3275524 article EN 2018-10-26

With the rapid proliferation of mobile wireless sensors networks (WSNs), which are widely deployed in Internet things, vehicles, and flying ad hoc networks, more researchers making effort to improve energy efficiency throughput WSNs. In recent years, many protocols have been proposed solve shortage problem. Some based on cooperative or allocation schemes, some contending others foundation hybrid schemes. However, it is still difficult simultaneously. this article, we present a novel carrier...

10.1109/lsens.2018.2828339 article EN IEEE Sensors Letters 2018-04-18

The sparse reconstruction techniques can improve the accuracy and resolution of direction arrival (DOA) estimation using sensor arrays. However, due to reflective objects nonidealities antennas circuitry, received signals may be coherent coupled each other in nonuniform noise environments, causing severe performance degradation signal reconstruction. In this paper, a novel sparsity-inducing DOA method is proposed adapt such challenging scenario. To mitigate noise, its power components are...

10.1109/access.2019.2904208 article EN cc-by-nc-nd IEEE Access 2019-01-01

Wireless sensors network (WSN) is widely used in the Internet of Things at present. However, limited energy source a critical problem improvement and practical applications WSN, so it necessary to improve efficiency. As another important evaluation criterion transmission performance, throughput should be improved too. To mitigate both problems same time, by taking advantages Time Division Multiple Access (TDMA) Carrier Sense (CSMA) medium access control (MAC) layer we propose hybrid...

10.1155/2018/4168354 article EN cc-by Wireless Communications and Mobile Computing 2018-01-01

Automatic Web page segmentation is the basis to adaptive browsing on mobile devices. It breaks a large into smaller blocks, in which contents with coherent semantics are keeping together. Then, various adaptations like single column and thumbnail view can be developed. However, remains challenging task, its poor result directly yields frustrating user experience. As human usually understand well, this paper, we start from Gestalt theory, psychological theory that explain human's visual...

10.1109/icme.2007.4285135 article EN 2007-07-01

Opportunistic beamforming (OBF) is a promising multiple-input–multiple-output (MIMO) downlink precoding technique, where multiuser diversity gain achieved to deal with the performance loss caused by low-complexity channel estimation. Due high-performance and estimation, OBF appropriate for Internet of Things (IoT) networks. However, conventional cannot achieve satisfactory in post-disaster communication, low signal-to-noise ratio (SNR) makes it hard establish communication between base...

10.1109/jiot.2023.3263879 article EN IEEE Internet of Things Journal 2023-04-03

The performance of mobile wireless sensor networks (MWSN) witnessed a significant improvement in recent years, such as throughput, transmission delay, and collision detection. However, MWSN still suffers from high energy consumption, since most the sensors or users are based on passive devices. In order to remedy this problem, paper we present Cross-layer Energy Efficiency (CEE) model for MWSN. CEE is cross-layer which contains three layers. It utilizes nodes location information network...

10.1155/2017/1346416 article EN cc-by Mobile Information Systems 2017-01-01

Localization of the vertebrae is importance in many medical applications. For example, can serve as landmarks image registration. They also provide a reference coordinate system to facilitate localization other organs chest. In this paper, we propose new method using convolutional neural networks (CNN). The main advantage proposed removal hand-crafted features. We construct two training sets train CNNs that share same architecture. One used distinguish from tissues chest, and aimed at...

10.1117/12.2081941 article EN Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE 2015-03-20

Race detection is increasingly popular, both in the academic research and industrial practice. However, there no specialized comprehensive dataset of data race, making it difficult to achieve purpose effectively evaluating race detectors or developing efficient algorithms.

10.1145/3196398.3196451 article EN 2018-05-28

Clone detection is widely exploited for software vulnerability search. The approaches based on source code analysis cannot be applied to binary clone because the same can produce significantly different binaries. In this paper, we present BinSeeker, a cross-platform seeker that integrates semantic learning and emulation. With help of labeled flow graph, BinSeeker quickly identify M candidate functions are most similar from target binary. value relatively large so procedure essentially...

10.1109/tse.2019.2956932 article EN IEEE Transactions on Software Engineering 2019-12-03

Due to the flexibility, utility, and spectrum sharing capability, unmanned aerial vehicle (UAV)-enabled device-to-device (D2D) communications play an important role in space-airground integrated network (SAGIN). To further improve communication quality system performance, reconfigurable intelligent surface (RIS) can also be employed. In this paper, we consider a RIS-aided UAV-D2D system. A joint optimization problem of channel selection as well transmit power design D2D users, discrete phase...

10.1109/iccc57788.2023.10233510 article EN 2022 IEEE/CIC International Conference on Communications in China (ICCC) 2023-08-10

With the development of internet things (IoT) technology and its wide application in urban traffic, next-generation vehicle-to-everything (V2X) communication network should support high-capacity, ultra-reliable, low-latency massive information exchange to provide unprecedentedly diverse user experiences. The sixth-generation (6G) mobile will pave way for realizing this vision. Reconfigurable intelligent surfaces (RISs), a critical 6G technology, is expected make big difference V2X...

10.1109/jiot.2024.3387997 article EN IEEE Internet of Things Journal 2024-04-12

Page segmentation plays a key role in browsing on small screens. It breaks large page into smaller segments according to their semantic relationships. Then, various approaches such as single column adaptation and thumbnail view with zooming links can be implemented based these segments. However, for current flexible Web pages, remains challenging task. This paper proposes an effective automatic method which combining pattern analysis visual separators. The basic idea is that page's structure...

10.1109/wi.2006.67 article EN 2006-12-01
Coming Soon ...