Yi Xie

ORCID: 0000-0002-8899-4032
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Internet Traffic Analysis and Secure E-voting
  • Network Traffic and Congestion Control
  • Energy Efficient Wireless Sensor Networks
  • Advanced Malware Detection Techniques
  • Advanced MIMO Systems Optimization
  • Indoor and Outdoor Localization Technologies
  • Mobile Ad Hoc Networks
  • Software-Defined Networks and 5G
  • Anomaly Detection Techniques and Applications
  • Spam and Phishing Detection
  • Underwater Vehicles and Communication Systems
  • Wireless Networks and Protocols
  • Cooperative Communication and Network Coding
  • Network Packet Processing and Optimization
  • Opportunistic and Delay-Tolerant Networks
  • Advanced Queuing Theory Analysis
  • Target Tracking and Data Fusion in Sensor Networks
  • Software System Performance and Reliability
  • Cognitive Radio Networks and Spectrum Sensing
  • IoT and Edge/Fog Computing
  • Advanced Wireless Communication Technologies
  • Advanced Optical Network Technologies
  • Millimeter-Wave Propagation and Modeling
  • Caching and Content Delivery

Sun Yat-sen University
2013-2025

Sun Yat-sen Memorial Hospital
2025

National University of Defense Technology
2011-2024

Southeast University
2024

Affiliated Hospital of Nantong University
2024

Nantong University
2024

Xidian University
2024

Northwestern Polytechnical University
2015-2023

South China Normal University
2023

Ministry of Industry and Information Technology
2014-2016

Prior to deploying any intrusion detection system, it is essential obtain a realistic evaluation of its performance. However, the major problems currently faced by research community lack availability dataset and systematic metric for assessing quantified quality realism system dataset. It difficult access collect data from real-world enterprise networks due business continuity integrity issues. In response this, in this paper, firstly, using fuzzy logic based on Sugeno inference model...

10.1016/j.jnca.2017.03.018 article EN cc-by-nc-nd Journal of Network and Computer Applications 2017-03-28

Distributed denial of service (DDoS) attack is a continuous critical threat to the Internet. Derived from low layers, new application-layer-based DDoS attacks utilizing legitimate HTTP requests overwhelm victim resources are more undetectable. The case may be serious when such mimic or occur during flash crowd event popular Website. Focusing on detection for attacks, scheme based document popularity introduced. An Access Matrix defined capture spatial-temporal patterns normal crowd....

10.1109/tnet.2008.925628 article EN IEEE/ACM Transactions on Networking 2008-08-04

Many methods designed to create defenses against distributed denial of service (DDoS) attacks are focused on the IP and TCP layers instead high layer. They not suitable for handling new type attack which is based application In this paper, we introduce a scheme achieve early detection filtering application-layer-based DDoS attack. An extended hidden semi-Markov model proposed describe browsing behaviors web surfers. order reduce computational amount introduced by model's large state space,...

10.1109/tnet.2008.923716 article EN IEEE/ACM Transactions on Networking 2008-08-04

The popularity of Twitter attracts more and spammers. Spammers send unwanted tweets to users promote websites or services, which are harmful normal users. In order stop spammers, researchers have proposed a number mechanisms. focus recent works is on the application machine learning techniques into spam detection. However, retrieved in streaming way, provides Streaming API for developers access public real time. There lacks performance evaluation existing learning-based detection methods....

10.1109/tcss.2016.2516039 article EN IEEE Transactions on Computational Social Systems 2015-09-01

Evaluating corneal morphologic characteristics with tomographic scans before refractive surgery is necessary to exclude patients at-risk corneas and keratoconus. In previous studies, researchers performed screening machine learning methods based on specific parameters. To date, a deep algorithm has not been used in combination scans.To examine the use of model candidates for surgery.A diagnostic, cross-sectional study was conducted at Zhongshan Ophthalmic Center, Guangzhou, China,...

10.1001/jamaophthalmol.2020.0507 article EN JAMA Ophthalmology 2020-03-26

The Windows Operating System (OS) is the most popular desktop OS in world, as it has majority market share of both servers and personal computing necessities. However, its default signature-based security measures are ineffectual for detecting zero-day stealth attacks, needs an intelligent Host-based Intrusion Detection (HIDS). Unfortunately, a comprehensive data set that reflects modern OS’s normal attack surfaces not publicly available. To fill this gap, paper two open sets generated by...

10.3390/fi8030029 article EN cc-by Future Internet 2016-07-05

Countering distributed denial of service (DDoS) attacks is becoming ever more challenging with the vast resources and techniques increasingly available to attackers. DDoS are typically carried out at network layer. However, there evidence suggest that application layer can be effective than traditional ones. In this paper, we consider sophisticated utilize legitimate HTTP requests from legitimately connected machines overwhelm Web server. Since attack signature each represented in abnormal...

10.1109/imsccs.2006.159 article EN 2006-06-01

Anomaly detection for cloud servers is important detecting zero-day attacks. However, it very challenging due to the large amount of accumulated data. In this paper, a new mathematical model modeling dynamic usage behavior and anomalies proposed. It constructed using state summarization novel nested-arc hidden semi-Markov (NAHSMM). State designed extract reflective states from raw sequence. The NAHSMM comprised exterior interior Markov chains. controls propagation sequences system calls and,...

10.1109/tbdata.2017.2736555 article EN IEEE Transactions on Big Data 2017-08-07

It is essential to acquire the location of sensor nodes in wireless networks (WSNs), since data collected with would become meaningless without their location. In existing studies, range-free localization schemes have been proved suitable large-scaled WSNs due low cost hardware implementation. However, defect those poor accuracy anisotropic coverage holes. To tackle this problem, we propose a scheme that combines advantages geometric constraint and hop progress-based methods. The information...

10.1109/tcomm.2020.3020553 article EN IEEE Transactions on Communications 2020-08-31

Abstract Cryogenic ion traps offer substantial benefits over their room-temperature counterparts, particularly in terms of stable confinement and cooling. However, this technological growth introduces a significant challenge: the generation additional vibrational noise. This noise is most pronounced during compression expansion phases Gifford-McMahon cyclic refrigerator (GMCR) stems from mechanical operations cold head. Residual can modulate Rabi oscillation frequency, thereby compromising...

10.1088/0256-307x/42/3/033101 article EN Chinese Physics Letters 2025-02-12

The data delivery in ICWN is accomplished a collaborative manner, and non-cooperative behavior will gravely impair network QoP user QoE. To select reliable relay nodes for transmission, trust-status-aware forwarding strategy proposed this article. By exploiting locally recorded information, process-based relationshipbased credibility can be precisely evaluated distributed manner. Additionally, with the assistance of an effective intrusion detection mechanism, reasonable selection perfected....

10.1109/mwc.2015.7224729 article EN IEEE Wireless Communications 2015-08-01

Summary Background Aging is a lifelong process that initiates at birth and associated with age-related diseases death. Night shift work has drawn increasing attention due to its negative health effects. This study aims explore the association between night work, biological aging, life expectancy using data from UK Biobank. Methods A total of 192,764 participants (age : 52.69 ± 7.08 years, 51.39% male) Biobank cohort were included in analysis. Biological aging was measured by Klemera-Doubal...

10.1093/qjmed/hcaf091 article EN QJM 2025-04-07

Network traffic modeling is a fundamental problem in communication. A model should be able to capture and reproduce various properties of real trace. Despite the widespread success most numerical models applications, few actually focus on oscillation behavior proven one basic network traffic. In this paper, new mathematical method proposed synthesize stationary nonstationary oscillatory processes The based structure hierarchical hidden Markov model, which includes two nested chains...

10.1109/tpds.2012.268 article EN IEEE Transactions on Parallel and Distributed Systems 2012-09-12

A novel server-side defense scheme is proposed to resist the Web proxy-based distributed denial of service attack. The approach utilizes temporal and spatial locality extract behavior features proxy-to-server traffic, which makes independent traffic intensity frequently varying contents. nonlinear mapping function introduced protect weak signals from interference infrequent large values. Then, a new hidden semi-Markov model parameterized by Gaussian-mixture Gamma distributions describe...

10.1109/tpds.2012.232 article EN IEEE Transactions on Parallel and Distributed Systems 2012-07-31

Massive MIMO is one of the most promising technologies for fifth generation (5G) mobile communication systems. In order to better assess system performance, it essential build a corresponding channel model accurately. this paper, three-dimension (3D) two-cylinder regular-shaped ge

10.4108/eai.19-8-2015.2259755 article EN cc-by 2015-01-01

Internet of Things (IoT) is improving human life in a more convenient and simpler way. One the most promising IoT applications healthcare. In this paper, an availability model healthcare system proposed which composed two groups structures described by separate Markov state-space models. The models are analyzed combined to implement whole modeling. balance equations solved under given scenario some performance metrics interest, such as probabilities full service, degraded unavailability,...

10.3390/iot2020016 article EN cc-by IoT 2021-05-14

Node localization is one of the basic requirements in various Internet Things applications. Among a wide range schemes, range-free algorithm promising as cost-effective technique. However, accuracy this technique susceptible to anisotropy factors, such existence holes, nonuniform node distribution, and dynamic radio propagation pattern. To end, an accurate model using extreme learning machine (ELM) ring-shaped salp swarm (SSA) proposed for anisotropic wireless sensor networks. First, integer...

10.1109/jiot.2022.3230971 article EN IEEE Internet of Things Journal 2022-12-21

Download This Paper Open PDF in Browser Add to My Library Share: Permalink Using these links will ensure access this page indefinitely Copy URL DOI

10.2139/ssrn.4803355 preprint EN 2024-01-01

The generation of representative computer system behavior profile from calls in LINUX environments to establish reliable Host Based Anomaly Detection Systems (HADS) against Next Generation Attacks (NGA) is a challenge due two major reasons. Firstly, NGA causes low footprint upon host activities and consequently, attack are difficult detect normal processes terms accuracy processing time. Secondly, there no effective method extract the natural difference different types traces (e.g. or...

10.1109/cscloud.2015.11 article EN 2015-11-01

Energy efficiency in wireless sensor networks is a crucial factor that affects the performance of networks, as long-time and unceasing energy supply impossible. Recent studies demonstrated previously proposed scheme joint adaptive network-channel coding (JANCC) dynamic consumption (ADEC) obtained an excellent terms efficiency. Based on coding, we propose enhanced ADEC optimization scheme, which integrates essence both JANCC ADEC, overcomes shortcomings them. In identifier vector inserted...

10.1109/jsen.2017.2732464 article EN IEEE Sensors Journal 2017-07-27
Coming Soon ...