Journal Publications

  1. EchoIA: A Cloud-Based Implicit Authentication Leveraging User Feedback
    Yingyuan Yang, Jiangnan Li, Sunshin Lee, Xueli Huang, and Jinyuan Sun, Network, MDPI , pp. 190-202, 2022.
  2. BubbleMap: Privilege Mapping for Behavior-based Implicit Authentication Systems
    Yingyuan Yang, Xueli Huang, Jiangnan Li, and Jinyuan Sun, IEEE Transactions on Mobile Computing (TMC), 2022.
  3. PersonaIA: A Lightweight Implicit Authentication System based on Customized User Behavior Selection
    Yingyuan Yang, Jinyuan Sun, and Linke Guo, IEEE Transactions on Dependable and Secure Computing (TDSC), 2016.

Conference Publications

  1. Modeling and Feature Engineering of COVID-19 Statistical Trends using Social Media Responses
    1. Kiev Glasscock, Antone Evans Jr., Yingyuan Yang, Sunshin Lee, in IEEE International Conference on Artificial Intelligence for Medicine, Health and Care (AIMHC), 2024
  2. Towards adversarial-resilient deep neural networks for false data injection attack detection in power grids
    Jiangnan Li, Yingyuan Yang, Jinyuan Stella Sun, Kevin Tomsovic, and Hairong Qi, in the International Conference on Computer Communications and Networks (ICCCN), 2023
  3. Towards Predicting COVID-19 Trends: Feature Engineering on Social Media Responses
    Antone Evans Jr., Yingyuan Yang, and Sunshin Lee, in the 18th International Conference on Information Systems for Crisis Response and Management (ISCRAM), 2021
  4. ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems
    J Li, JY Lee, Y Yang, JS Sun, and K Tomsovic, in 16th ACM ASIA Conference on Computer and Communications Security (ASIACCS), 2021
  5. SearchFromFree: Adversarial Measurements for Machine Learning-based Energy Theft Detection
    J Li, Y Yang, and JS Sun, in IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), 2020
  6. User Behavior-Based Implicit Authentication
    Yingyuan Yang, in Trace: Tennessee Research and Creative Exchange, University of Tennessee Doctoral Dissertation, May 2019
  7. Dynamic Multi-level Privilege Control in Behavior-based Implicit Authentication Systems Leveraging Mobile Devices
    Yingyuan Yang and Jinyuan Sun,arXiv preprint, arXiv:1808.00638., 2018, published in IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS)
  8. Energy-efficient W-layer for Behavior-based Implicit Authentication on Mobile Devices
    Yingyuan Yang and Jinyuan Sun, in IEEE International Conference on Computer Communications (INFOCOM), 2017.
  9. Retraining and Dynamic Privilege for Implicit Authentication Systems
    Yingyuan Yang, Jinyuan Sun, Chi Zhang and Pan Li, in IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2015
  10. APPIC: Finding The Hidden Scene Behind Description Files for Android Apps
    Yingyuan Yang, Jinyuan Stella Sun, Michael W. Berry, 2014
  11. Reinforcement Authentication for Behavior-based User Identification
    Yingyuan Yang and Jinyuan Stella Sun,
    2019 Waiting to be submitted