Yexia Cheng

ORCID: 0000-0003-4673-159X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Wireless Communication Security Techniques
  • Cloud Data Security Solutions
  • Advanced Malware Detection Techniques
  • Chaos-based Image/Signal Encryption
  • Information and Cyber Security
  • Cellular Automata and Applications
  • Digital and Cyber Forensics
  • Chaos control and synchronization
  • Advanced Steganography and Watermarking Techniques
  • Security and Verification in Computing
  • Anomaly Detection Techniques and Applications
  • Cooperative Communication and Network Coding
  • Access Control and Trust
  • Error Correcting Code Techniques
  • graph theory and CDMA systems
  • Smart Grid Security and Resilience
  • Software-Defined Networks and 5G
  • Caching and Content Delivery
  • Cybercrime and Law Enforcement Studies

China Mobile (China)
2019-2023

Institute of Information Engineering
2018-2019

Chinese Academy of Sciences
2018-2019

University of Chinese Academy of Sciences
2019

Shanghai Jiao Tong University
2012

Computer and network technology is developing rapidly, meanwhile various cyber security incidents have occurred frequently. New vulnerabilities many new risks emerged endlessly, which caused serious threats to business security. So the role value of threat intelligence are increasing. However, there still some problems intelligence. The information can be tampered in existing sharing mechanism. At same time, no corresponding feedback mechanism for quality provided by providers. There a lack...

10.1145/3444370.3444623 article EN 2020-12-04

Cloud computing is becoming more and popular its security arising as well. In order to solve issues take evaluation in cloud computing, corresponding hierarchical design model introduced an approach of based on attack graph proposed environment. Firstly, network threat automatic methods are presented get information for generating automatically. By using symbolic checking algorithm, generated visualized. Then, by combining the characteristics Markov Chain with graph, two metrics computing....

10.1109/ccis.2012.6664448 article EN 2012-10-01

In wireless network applications, such as routing decision, selection, etc., the Multi-Attribute Decision Making (MADM) is widely used. The MADM approach can address multi-objective decision making issues effectively. However, when parameters vary greatly, traditional algorithm not effective anymore. To solve this problem, in paper, we propose pairwise-based algorithm. PMADM, only two nodes' utilities are calculated and compared at each time. PMADM much more accurate than Moreover, also...

10.1109/tnet.2021.3074002 article EN IEEE/ACM Transactions on Networking 2021-04-28

With the rapid development of Internet Things, emerging botnet attacks have become more rampant and harmful. In order to detect botnet, method based on artificial intelligence is proposed in paper, which detects domain name core C&C server botnet. The corresponding detection model established 9 types features are given for algorithm. Particularly, we apply pronunciation TLD into machine learning improve accuracy detection. We use statistical methods reduce false positive rate. results fed...

10.1109/dsc.2019.00080 article EN 2019-06-01

Physical-layer secret key generation (PKG) is an emerging technique to address the distribution problem and precoding matrix index (PMI)-based PKG approaches can thwart eavesdropping attempts. However, existing schemes based on PMI only considered square channel matrices, which restricts practical application. In this paper, we propose a new scheme called NS-PMI-PKG yield keys for non-square matrices in time-division duplex (TDD) mode. Specifically, includes two vital steps, i.e., codebook...

10.1109/iccc57788.2023.10233395 article EN 2022 IEEE/CIC International Conference on Communications in China (ICCC) 2023-08-10

Secret keys generated from wireless channel can provide high level of security. The error correction code (ECC) based information reconciliation method owns the benefits security and efficiency. In this paper, we designed a highly robust secret key reconcile system using low-density parity-check (LDPC) codes to correct disagreed bits. system, cache some high-quality bits in cyclic shift buffer (CSB) for compensation, which effectively reduce over-all disagreement rate (KDR). Combined with...

10.1109/icsip57908.2023.10271035 article EN 2022 7th International Conference on Signal and Image Processing (ICSIP) 2023-07-08
Coming Soon ...