Name
Affiliation
Papers
XIAOHONG YUAN
Dept . of Computer Science and Eng .|Department of Computer Science
54
Collaborators
Citations 
PageRank 
93
169
26.72
Referers 
Referees 
References 
490
376
160
Search Limit
100490
Title
Citations
PageRank
Year
Semi-Supervised Self Training to Assess the Credibility of Tweets00.342021
A Study Of Gender Bias In Face Presentation Attack And Its Mitigation00.342021
Identifying Panic Triggers from Disaster-Related Tweets.00.342020
Teaching Flooding Attack to the SDN Data Plane with POGIL00.342020
Identifying Security Concerns Based on a Use Case Ontology Framework.00.342020
Developing and Assessing a Web-Based Interactive Visualization Tool to Teach Buffer Overflow Concepts00.342020
Developing and Assessing an Educational Game for Teaching Access Control00.342020
Security Labs for Software Defined Networks in CloudLab00.342020
Developing And Assessing Educational Games To Enhance Cyber Security Learning In Computer Science00.342019
Mitigating Phishing Attacks: An Overview00.342019
Deep Learning Approach for U.S. Traffic Sign Recognition00.342019
Presentation Attack Detection Using Wavelet Transform and Deep Residual Neural Net.00.342019
Touch-Based Active Cloud Authentication Using Traditional Machine Learning And Lstm On A Distributed Tensorflow Framework10.352019
Applying Artificial Immune System for Intrusion Detection00.342018
Enhancing Security Education Through Designing SDN Security Labs in CloudLab.00.342018
Performance Evaluation of Machine Learning Algorithms in Apache Spark for Intrusion Detection00.342018
Creating Abuse Cases Based on Attack Patterns: A User Study00.342017
Semi-supervised Random Forest for Intrusion Detection Network.00.342017
Demystifying ad fraud.00.342017
Developing Abuse Cases Based on Threat Modeling and Attack Patterns.30.472015
Developing a course module for teaching cryptography programming on Android00.342015
Using a case study to teach students about finding and fixing logic flaws in software00.342015
Integrating Mobile Computing and Security into a Computer Science Curriculum (Abstract Only)10.382015
Cloud Computing Threats and Provider Security Assessment.10.362015
Retrieving relevant CAPEC attack patterns for secure software development30.512014
Techniques for retaining low performing students: high-need student mentoring program (abstract only)00.342014
Developing Faculty Expertise in Information Assurance through Case Studies and Hands-On Experiences30.552014
New hands-on labs on browser security (abstract only)10.392014
A Survey Of Security Standards Applicable To Health Information Systems10.352013
Cloud computing and security challenges120.752012
A Survey Of U.S. Laws For Health Information Security & Privacy10.512012
Developing an interdisciplinary health informatics security and privacy program (abstract only)00.342012
Observation of recent Microsoft Zero-Day vulnerabilities00.342011
The Design and Implementation of a Cryptographic Education Tool.10.362011
A Visualization based Simulator for SYN Flood Attacks.00.342011
Visualization Tools for Teaching Computer Security50.642010
Case studies for teaching physical security and security policy20.412010
Designing an SOA-Based Earthquake Forewarning System using BPMN00.342010
Laboratory Design For Demonstrating Phishing00.342009
Low Bit Rate ROI-Based SAR Image Compression00.342009
Multiresolution Target Detection in Wavelet Domain for SAR Imagery10.352009
Using a Practice Oriented Approach to Teach Web Security Course00.342009
Using packet sniffer simulator in the class: experience and evaluation20.472007
Trustworthy remote compiling services for grid-based scientific applications10.362007
Securing analysis patterns70.652007
Engine fault diagnosis based on multi-sensor information fusion using Dempster-Shafer evidence theory854.372007
LAN attacker: a visual education tool40.592006
A Personal Software Process Tool for Eclipse Environment20.402005
Secure Remote Compiling Services On The Grid00.342005
An Analysis Pattern for Course Management.20.532003
  • 1
  • 2