default search action
Li Yang 0001
Person information
- affiliation: University of Tennessee, Department of Computer Science, Chattanooga, TN, USA
- affiliation (former): Florida International University, Miami, FL, USA
Other persons with the same name
- Li Yang — disambiguation page
- Li Yang 0002 — Chongqing University, Bioengineering College, China
- Li Yang 0003 — Beijing Institute of Technology, School of Mechatronical Engineering, China (and 2 more)
- Li Yang 0004 — Beihang University, School of Reliability and Systems Engineering, Beijing, China
- Li Yang 0005 — Xidian University, School of Cyber Engineering, Xi'an, China (and 1 more)
- Li Yang 0006 — Southwest Petroleum University, School of Computer Science, Chengdu, China
- Li Yang 0007 — University of Plymouth, UK
- Li Yang 0008 — Western Michigan University, Department of Computer Science, Kalamazoo, MI, USA
- Li Yang 0009 — University of North Carolina at Charlotte, NC, USA (and 1 more)
- Li Yang 0010 — University of Western Ontario, London, ON, Canada
- Li Yang 0011 — University of Alcalá, Alcalá de Henares, Madrid, Spain
- Li Yang 0012 — Hunan University, Changsha, Hunan, China (and 1 more)
- Li Yang 0013 — China Agricultural University, Beijing, China
- Li Yang 0014 — Beihang University, School of Electronic and Information Engineering, Beijing, China
- Li Yang 0015 — Insititute of Software, Chinese Academy of Sciences, China
Other persons with a similar name
- Haiyang Li (aka: Hai-Yang Li, Hai-yang Li, HaiYang Li) — disambiguation page
- Xiangyang Li (aka: Xiang-Yang Li) — disambiguation page
- Yang Li — disambiguation page
- Yangyang Li (aka: Yang-Yang Li) — disambiguation page
- Xiang-Yang Li 0001 (aka: Xiangyang Li 0001) — University of Science and Technology of China, School of Computer Science and Technology, Hefei, China (and 1 more)
- Yang Li 0010 — Beihang University, School of Automation Science and Electrical Engineering, Beijing, China (and 2 more)
- Yang Li 0058 — Google Research, Mountain View, CA, USA
- Li-Yang Tan
- Liang Yang (aka: Li'ang Yang) — disambiguation page
- Lijun Yang (aka: Li-Jun Yang, Li-jun Yang) — disambiguation page
- show all similar names
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c52]Mehran Ghafari, Daniel Mailman, Parisa Hatami, Trevor Peyton, Li Yang, Weiwei Dang, Hong Qin:
A Comparison of YOLO and Mask-RCNN for Detecting Cells from Microfluidic Images. ICAIIC 2022: 204-209 - [i1]Megan Doman, Jacob Motley, Hong Qin, Mengjun Xie, Li Yang:
Shifting Trends of COVID-19 Tweet Sentiment with Respect to Voting Preferences in the 2020 Election Year of the United States. CoRR abs/2202.07587 (2022) - 2021
- [j9]Maxwell M. Omwenga, Dalei Wu, Yu Liang, Li Yang, Dryver Huston, Tian Xia:
Cognitive GPR for Subsurface Object Detection Based on Deep Reinforcement Learning. IEEE Internet Things J. 8(14): 11594-11606 (2021) - 2020
- [c51]Chen Xu, Ruipeng Zhang, Mengjun Xie, Li Yang:
Network Intrusion Detection System as a Service in OpenStack Cloud. ICNC 2020: 450-455
2010 – 2019
- 2019
- [c50]Xiaohong Yuan, Tian Zhang, Ali Albu Shama, Jinsheng Xu, Li Yang, Jennifer T. Ellis, Wu He, Cynthia Waters:
Teaching Cybersecurity Using Guided Inquiry Collaborative Learning. FIE 2019: 1-6 - [c49]Dalei Wu, Maxwell M. Omwenga, Yu Liang, Li Yang, Dryver Huston, Tian Xia:
A Fog Computing Framework for Cognitive Portable Ground Penetrating Radars. ICC 2019: 1-6 - [c48]Ruipeng Zhang, Mengjun Xie, Li Yang:
Isoflat: Flat Provider Network Multiplexing and Firewalling in OpenStack Cloud. ICC 2019: 1-7 - [c47]Maxwell M. Omwenga, Dalei Wu, Yu Liang, Li Yang, Dryver Huston, Tian Xia:
Autonomous Cognitive GPR Based on Edge Computing and Reinforcement Learning. ICII 2019: 348-354 - [c46]Chen Xu, Ruipeng Zhang, Mengjun Xie, Li Yang:
Network Intrusion Detection System as a Service on OpenStack Cloud. ICNP 2019: 1-2 - 2018
- [r2]Joseph M. Kizza, Li Yang:
Social History of Computing and Online Social Communities. Encyclopedia of Social Network Analysis and Mining. 2nd Ed. 2018 - 2017
- [j8]Xiaohong Yuan, Kenneth Williams, Huiming Yu, Audrey Rorrer, Bei-Tseng Chu, Li Yang, Kathy Winters, Joseph M. Kizza:
Faculty Workshops for Teaching Information Assurance through Hands-On Exercises and Case Studies. J. Inf. Syst. Educ. 28(1): 11-20 (2017) - [c45]Xiaohong Yuan, Li Yang, Wu He, Jennifer T. Ellis, Jinsheng Xu, Cynthia K. Waters:
Enhancing Cybersecurity Education Using POGIL (Abstract Only). SIGCSE 2017: 719 - 2016
- [c44]Xiaohong Yuan, Wu He, Li Yang, Lindsay Simpkins:
Teaching Security Management for Mobile Devices. SIGITE 2016: 14-19 - 2015
- [c43]Lindsay Simpkins, Xiaohong Yuan, Jwalit Modi, Justin Zhan, Li Yang:
A course module on web tracking and privacy. InfoSecCD 2015: 10:1-10:7 - 2014
- [j7]Prabir Bhattacharya, Li Yang, Minzhe Guo, Kai Qian, Ming Yang:
Learning Mobile Security with Labware. IEEE Secur. Priv. 12(1): 69-72 (2014) - [c42]Xiaohong Yuan, Kenneth Williams, Huiming Yu, Bei-tseng Chu, Audrey Rorrer, Li Yang, Kathy Winters, Joseph M. Kizza:
Developing Faculty Expertise in Information Assurance through Case Studies and Hands-On Experiences. HICSS 2014: 4938-4945 - [c41]Perron Johnson, Philip Harris, Keheira Henderson, Xiaohong Yuan, Li Yang:
A course module on mobile malware. InfoSecCD 2014: 10:1 - [c40]Wenliang Du, Li Yang, Joseph Migga Kizza, Xiaohong Yuan:
New hands-on labs on browser security (abstract only). SIGCSE 2014: 717 - [r1]Joseph M. Kizza, Li Yang:
Social History of Computing and Online Social Communities. Encyclopedia of Social Network Analysis and Mining 2014: 1790-1800 - 2013
- [j6]Wu He, Xiaohong Yuan, Li Yang:
Supporting Case-Based Learning in Information Security with Web-Based Technology. J. Inf. Syst. Educ. 24(1): 31-40 (2013) - [c39]David Schwab, Li Yang:
Entity authentication in a mobile-cloud environment. CSIIRW 2013: 42 - [c38]Li Yang, Xumin Liu:
Teaching business analytics. FIE 2013: 1516-1518 - [c37]Minzhe Guo, Prabir Bhattacharya, Kai Qian, Li Yang:
Authentic learning of mobile security with case studies. FIE 2013: 1519-1521 - [c36]Minzhe Guo, Kai Qian, Ming Yang, Chia-Tien Dan Lo, Kuosheng Ma, Liang Hong, Li Yang:
Android-Based Mobile Sensory System Labware for Embedded System Education. ICALT 2013: 118-119 - [c35]Minzhe Guo, Prabir Bhattacharya, Ming Yang, Kai Qian, Li Yang:
Learning mobile security with android security labware. SIGCSE 2013: 675-680 - [c34]Ming Yang, Kai Qian, Minzhe Guo, Prabir Bhattacharya, Guillermo A. Francia III, Li Yang:
Enhance computer networks learning with hands-on mobile device based labware (abstract only). SIGCSE 2013: 732 - 2012
- [c33]Minzhe Guo, Prabir Bhattacharya, Ming Yang, Kai Qian, Li Yang:
Work in progress: Real world relevant security labware for mobile threat analysis and protection experience. FIE 2012: 1-2 - [c32]Li Yang, Joseph M. Kizza, Andy Ju An Wang, Chung-Han Chen:
Teaching cryptography using hands-on labs (abstract only). SIGCSE 2012: 673 - 2011
- [c31]Wade Gasior, Li Yang:
Network covert channels on the Android platform. CSIIRW 2011: 61 - [c30]Rajeshwar Katipally, Li Yang, Anyi Liu:
Attacker behavior analysis in multi-stage attack detection system. CSIIRW 2011: 63 - [c29]Li Yang, Mina Sartipi, Matt McNeely:
Usable protection to healthcare application. CSIIRW 2011: 82 - [c28]Xiaohui Cui, Justin M. Beaver, Thomas E. Potok, Li Yang:
Visual Mining Intrusion Behaviors by Using Swarm Technology. HICSS 2011: 1-7 - 2010
- [j5]Ran Tao, Li Yang, Lu Peng, Bin Li:
A Host-Based Intrusion Detection System Using Architectural Features to Improve Sophisticated Denial-of-Service Attack Detections. Int. J. Inf. Secur. Priv. 4(1): 18-31 (2010) - [j4]Li Yang, Alma Cemerlic, Xiaohui Cui:
A Dirichlet reputation system in reliable routing of wireless ad hoc network. Secur. Commun. Networks 3(2-3): 250-260 (2010) - [c27]Chia-Tien Dan Lo, Kai Qian, Li Yang:
Innovative CS capstone projects on green energy applications with WSN in a box. ITiCSE 2010: 307 - [c26]Kai Qian, Chia-Tien Dan Lo, Li Yang, Jigang Liu:
Inquiry-based active learning in introductory programming courses. ITiCSE 2010: 312
2000 – 2009
- 2009
- [j3]Harkeerat Bedi, Li Yang:
Fair Electronic Exchange Based on Fingerprint Biometrics. Int. J. Inf. Secur. Priv. 3(3): 76-106 (2009) - [c25]Ran Tao, Li Yang, Lu Peng, Bin Li, Alma Cemerlic:
A case study: Using architectural features to improve sophisticated denial-of-service attack detections. CICS 2009: 13-18 - [c24]Li Yang, Feiqiong Liu, Joseph M. Kizza, Raimund K. Ege:
Discovering topics from dark websites. CICS 2009: 175-179 - [c23]Harkeerat Bedi, Li Yang, Joseph M. Kizza:
Fair electronic exchange using biometrics. CSIIRW 2009: 27 - [c22]Li Yang, Alma Cemerlic:
Integrating Dirichlet reputation into usage control. CSIIRW 2009: 62 - [c21]Raimund K. Ege, Li Yang, Richard Whittaker:
Extracting Value from P2P Content Delivery. ICONS 2009: 102-107 - [c20]Li Yang:
Teaching database security and auditing. SIGCSE 2009: 241-245 - 2008
- [j2]Li Yang, Chang Phuong, Amy Novobilski, Raimund K. Ege:
Trust-Based Usage Control in Collaborative Environment. Int. J. Inf. Secur. Priv. 2(2): 31-45 (2008) - [j1]Li Yang, Lu Peng, Balachandran Ramadass:
SecCMP: Enhancing Critical Secrets Protection in Chip-Multiprocessors. Int. J. Inf. Secur. Priv. 2(4): 54-66 (2008) - [c19]Li Yang, Kathy Winters, Joseph M. Kizza:
Biometrics education with hands-on labs. ACM Southeast Regional Conference 2008: 18-23 - [c18]Hong Qin, Li Yang:
Detection of Changes in Transitive Associations by Shortest-path Analysis of Protein Interaction Networks Integrated with Gene Expression Profiles. BMEI (1) 2008: 418-423 - [c17]Li Yang, Raimund K. Ege:
Integrating Trust Management into Usage Control in P2P Multimedia Delivery. SEKE 2008: 411-416 - [c16]Alma Cemerlic, Li Yang, Joseph M. Kizza:
Network Intrusion Detection Based on Bayesian Networks. SEKE 2008: 791-794 - 2007
- [c15]Li Yang, Joseph M. Kizza, Alma Cemerlic, Feiqiong Liu:
Fine-Grained Reputation-based Routing in Wireless Ad Hoc Networks. ISI 2007: 75-78 - 2006
- [c14]Li Yang, Lu Peng:
SecCMP: a secure chip-multiprocessor architecture. ASID 2006: 72-76 - [c13]Joseph M. Kizza, Li Yang, Andy Novobilski, Kathy Winters:
TMAS A Capstone Project. FECS 2006: 226-231 - [c12]Li Yang, Joseph M. Kizza, Raimund K. Ege:
A Flexible Context-Aware Authorization Framework for Mediation Systems. ISI 2006: 684-685 - [c11]Li Yang, Joseph M. Kizza, Raimund K. Ege, Malek Adjouadi:
A Relationship-based Flexible Authorization Framework for Mediation Systems. SEKE 2006: 381-385 - 2005
- [c10]Huiqun Yu, Dongmei Liu, Xudong He, Li Yang, Shu Gao:
Secure Software Architectures Design by Aspect Orientation. ICECCS 2005: 47-55 - [c9]Li Yang, Raimund K. Ege, Huiqun Yu:
Mediation Systems Modeling and Verification. ICECCS 2005: 322-331 - [c8]Li Yang, Raimund K. Ege, Huiqun Yu:
Mediation security specification and enforcement for heterogeneous databases. SAC 2005: 354-358 - [c7]Li Yang, Raimund K. Ege, Huiqun Yu:
Mediation framework modeling and verification by SAM. SAC 2005: 1567-1568 - [c6]Huiqun Yu, Dongmei Liu, Li Yang, Xudong He:
Formal Aspect-Oriented Modeling and Analysis by Aspect. SEKE 2005: 169-174 - [c5]Li Yang, Raimund K. Ege:
Dynamic Integration Strategy for Mediation Framework. SEKE 2005: 525-530 - 2004
- [c4]Li Yang, Raimund K. Ege, Onyeka Ezenwoye, Qasem Kharma:
A Role-Based Access Control Model for Information Mediation. IRI 2004: 277-282 - [c3]Raimund K. Ege, Li Yang, Qasem Kharma, Xudong Ni:
Three-Layered Mediator Architecture Based on DHT. ISPAN 2004: 313-318 - [c2]Onyeka Ezenwoye, Raimund K. Ege, Li Yang, Qasem Kharma:
A mediation framework for multimedia delivery. MUM 2004: 251-256 - [c1]Li Yang, Raimund K. Ege, Huiqun Yu:
Enhancing Mediation Security by Aspect-Oriented Approach. SEKE 2004: 155-160
Coauthor Index
aka: Joseph M. Kizza
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 19:36 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint