Match!
Yang Xiang
Tongji University
Distributed computingMathematicsComputer securityComputer scienceMedicine
914Publications
57H-index
13.4kCitations
What is this?
Publications 996
Newest
#1Jian ShenH-Index: 26
#2Dengzhi Liu (NUIST: Nanjing University of Information Science and Technology)H-Index: 5
Last. Yang Xiang (Swinburne University of Technology)H-Index: 57
view all 5 authors...
Abstract With the wide usage of the information and communication technology (ICT) in smart cities, people’s lives become easier and more convenient. Cloud computing, as a burgeoning technology of the ICT, provides consumers with unlimited computing capabilities and storage resources. Using the cloud to promote the progress of the ICT-based applications meets the requirement of the practical usage, and is also in line with the sustainable development. As we all know, the secret sharing is a hot ...
Source
#1Shiyao Xu (Tongji University)
#2Shijia E (Tencent)
Last. Yang Xiang (Tongji University)H-Index: 57
view all 3 authors...
Abstract Sentence Pair Modeling is a critical and challenging problem in natural language processing (NLP). It aims to seek the underlying semantic relationship between two sentences. Inspired by human learning, attention mechanisms are widely used in NLP. Previous attentive CNNs mainly focus on attentive pooling which only compute the matching scores between sentence pairs with the same filter size and lack substantive interactive context. In this paper, we propose Enhanced Attentive Convolutio...
Source
#1Rory CoulterH-Index: 1
#2Qing-Long HanH-Index: 71
Last. Yang XiangH-Index: 57
view all 5 authors...
Abstract Cyber code analysis is fundamental to malware detection and vulnerability discovery for defending cyber attacks. Traditional approaches resorting to manually defined rules are gradually replaced by automated approaches empowered by machine learning. This revolution is accelerated by big code from open source projects which support machine learning models with outstanding performance. In the context of a data-driven paradigm, this paper reviews recent analytic research on cyber code of m...
Source
#1Ke Ma (NUPT: Nanjing University of Posts and Telecommunications)
#2Geng Yang (NUPT: Nanjing University of Posts and Telecommunications)
Last. Yang Xiang (Swinburne University of Technology)H-Index: 57
view all 3 authors...
Abstract Unstructured data (mostly text data) have become a vital part in the era of big data. Hence, it has become increasingly difficult to identify the internal relations among data and describing the access control object during the design of access control (especially fine-grained access control) policies. Furthermore, in recent years, security incidents have frequently occurred due to the leakage of secrets by insiders, in both enterprises and government agencies around the world. Due to d...
Source
#1Liju Zong (Peking Union Medical College Hospital)H-Index: 2
#2Shengwei Mo (Peking Union Medical College Hospital)
Last. Yang Xiang (Peking Union Medical College Hospital)H-Index: 57
view all 7 authors...
The original version of this article unfortunately contained a mistake. The correct information is given below.
Source
#1Feng Lin (USYD: University of Sydney)H-Index: 7
Last. Yang Xiang (USYD: University of Sydney)H-Index: 57
view all 5 authors...
Abstract A novel approach for the vibration and buckling analysis of nanobeams with surface stress effects is presented in this paper. The material model is derived in which the bulk core of a beam is assumed to be a single crystalline material and have certain crystallographic directions. The beams are assumed to be covered by atomic layers with the same crystallographic directions on the top and bottom surfaces. A generic third order shear deformable beam theory is employed to derive the total...
Source
#1Lin-Feng ZhuH-Index: 1
#2Liao-Liang KeH-Index: 32
Last. Xinqun ZhuH-Index: 25
view all 4 authors...
Source
#2Yang XiangH-Index: 57
Last. D Y Cao
view all 30 authors...
Source
Last. Shui Yu (UTS: University of Technology, Sydney)H-Index: 36
view all 8 authors...
Abstract Intelligent vehicles are advancing at rapid speed with increasing levels of automation and connectivity, which opens up new possibilities to different cyber-attacks including in-vehicle attacks (e.g., hijacking attack) and vehicle-to-everything communications attacks (e.g., data theft). These problems become more severe with the development of 4G LTE and 5G communication technologies. Although a lot of efforts are made to improve the resilience to cyber attacks, there remain many unsolv...
Source
#1Domenica LorussoH-Index: 32
#2Nicoletta ColomboH-Index: 48
Last. Mansoor Raza Mirza (Copenhagen University Hospital)H-Index: 24
view all 20 authors...
Source
12345678910