Journal Publications

  1. UserIA: User-Centered Implicit Authentication Leveraging Operant Conditioning
    Yingyuan Yang, Xueli Huang, Farhin Farhad Riya, Jiangnan Li, and Jinyuan Sun, IEEE Transactions on Dependable and Secure Computing (TDSC), 2026.
  2. EchoIA: A Cloud-Based Implicit Authentication Leveraging User Feedback
    Yingyuan Yang, Jiangnan Li, Sunshin Lee, Xueli Huang, and Jinyuan Sun, Network, MDPI , pp. 190-202, 2022.
  3. BubbleMap: Privilege Mapping for Behavior-based Implicit Authentication Systems
    Yingyuan Yang, Xueli Huang, Jiangnan Li, and Jinyuan Sun, IEEE Transactions on Mobile Computing (TMC), 2022.
  4. PersonaIA: A Lightweight Implicit Authentication System based on Customized User Behavior Selection
    Yingyuan Yang, Jinyuan Sun, and Linke Guo, IEEE Transactions on Dependable and Secure Computing (TDSC), 2016.

Conference Publications

  1. Pseudo-Feature Padding: A Lightweight Defense Against False Data Injection in Power Grids FF Riya, S Hoque, Y Yang, J Sun, K Tomsovic, IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), 2025
  2. Minimizing Toponym Ambiguity in Geocoding Tweets by Predicting Common Ground Sunshin Lee, Mohamed Farag, Yingyuan Yang and Goutham Alavalapati, IEEE International Conference on Future Machine Learning and Data Science (FMLDS), 2025.
  3. Towards Predicting COVID-19 Trends: Feature Engineering on Social Media Responses Farhin Farhad Riya, Shahinul Hoque, Yingyuan Yang, Jinyuan Sun, The 22nd Annual International Conference on Privacy, Security, and Trust (PST), 2025
  4. LightSentinel: A Lightweight Anomaly Detection System Leveraging Smart Devices Yingyuan Yang, Xueli Huang, Sunshin Lee, and Jiangnan Li, IEEE Global Communications Conference: Communication & Information Systems Security (IEEE GLOBECOM), 2024
  5. Modeling and Feature Engineering of COVID-19 Statistical Trends using Social Media Responses Kiev Glasscock, Antone Evans Jr., Yingyuan Yang, Sunshin Lee, IEEE International Conference on Artificial Intelligence for Medicine, Health and Care (AIMHC), 2024
  6. Towards adversarial-resilient deep neural networks for false data injection attack detection in power grids Jiangnan Li, Yingyuan Yang, Jinyuan Stella Sun, Kevin Tomsovic, and Hairong Qi, International Conference on Computer Communications and Networks (ICCCN), 2023
  7. Balancing Trade-offs: Adaptive Differential Privacy in Interpretable Machine Learning Models Antone Evans Jr., Yingyuan Yang, and Sunshin Lee, The 18th International Conference on Information Systems for Crisis Response and Management (ISCRAM), 2021
  8. ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems
    J Li, JY Lee, Y Yang, JS Sun, and K Tomsovic, 16th ACM ASIA Conference on Computer and Communications Security (ASIACCS), 2021
  9. SearchFromFree: Adversarial Measurements for Machine Learning-based Energy Theft Detection
    J Li, Y Yang, and JS Sun, in IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), 2020
  10. User Behavior-Based Implicit Authentication
    Yingyuan Yang, in Trace: Tennessee Research and Creative Exchange, University of Tennessee Doctoral Dissertation, May 2019
  11. Dynamic Multi-level Privilege Control in Behavior-based Implicit Authentication Systems Leveraging Mobile Devices
    Yingyuan Yang and Jinyuan Sun,arXiv preprint, arXiv:1808.00638., 2018, published in IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS)
  12. Energy-efficient W-layer for Behavior-based Implicit Authentication on Mobile Devices
    Yingyuan Yang and Jinyuan Sun, in IEEE International Conference on Computer Communications (INFOCOM), 2017.
  13. Retraining and Dynamic Privilege for Implicit Authentication Systems
    Yingyuan Yang, Jinyuan Sun, Chi Zhang and Pan Li, in IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2015
  14. APPIC: Finding The Hidden Scene Behind Description Files for Android Apps
    Yingyuan Yang, Jinyuan Stella Sun, Michael W. Berry, 2014
  15. Reinforcement Authentication for Behavior-based User Identification
    Yingyuan Yang, Xueli Huang, Sunshin Lee, and Jinyuan Stella Sun,
    2026 Waiting to be submitted