WorldCat Identities

Xiang, Yang (Computer scientist)

Overview
Works: 17 works in 109 publications in 2 languages and 4,069 library holdings
Genres: Conference papers and proceedings 
Roles: Editor, Author, htt, Other
Classifications: QA76.76.P76, 005.8
Publication Timeline
.
Most widely held works by Yang Xiang
Software similarity and classification by Silvio Cesare( )

14 editions published in 2012 in English and held by 483 WorldCat member libraries worldwide

Software similarity and classification is an emerging topic with wide applications. It is applicable to the areas of malware detection, software theft detection, plagiarism detection, and software clone detection. Extracting program features, processing those features into suitable representations, and constructing distance metrics to define similarity and dissimilarity are the key methods to identify software variants, clones, derivatives, and classes of software. Software Similarity and Classification reviews the literature of those core concepts, in addition to relevant literature in each application and demonstrates that considering these applied problems as a similarity and classification problem enables techniques to be shared between areas. Additionally, the authors present in-depth case studies using the software similarity and classification techniques developed throughout the book
Internet and distributed computing systems : 5th International Conference, IDCS 2012, Wuyishan, Fujian, China, November 21-23, 2012 : proceedings by Yang Xiang( )

16 editions published in 2012 in English and German and held by 404 WorldCat member libraries worldwide

This book constitutes the refereed proceedings of the 5th International Conference on Internet and Distributed Computing Systems, IDCS 2012, held in Wuyishan, Fujian, China, in November 2012. The conference was co-located with the 6th International Conference on Network and System Security, NSS 2012. The 22 revised full papers of IDCS 2012 presented were carefully reviewed and selected from 80 submissions. The papers cover the following topics: ad-hoc and sensor networks; internet and Web technologies; network operations and management; information infrastructure; resilience; fault tolerance and availability
Algorithms and Architectures for Parallel Processing 12th International Conference, ICA3PP 2012, Fukuoka, Japan, September 4-7, 2012, Proceedings, Part I by Yang Xiang( )

11 editions published in 2012 in English and held by 401 WorldCat member libraries worldwide

The two volume set LNCS 7439 and 7440 comprises the proceedings of the 12th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2012, as well as some workshop papers of the CDCN 2012 workshop which was held in conjunction with this conference. The 40 regular paper and 26 short papers included in these proceedings were carefully reviewed and selected from 156 submissions. The CDCN workshop attracted a total of 19 original submissions, 8 of which are included in part II of these proceedings. The papers cover many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental results, and commercial components and systems
Algorithms and Architectures for Parallel Processing 11th International Conference, ICA300 2011, Melbourne, Australia, October 24-26, 2011, Proceedings, Part II by Yang Xiang( )

7 editions published in 2011 in English and held by 388 WorldCat member libraries worldwide

This two volume set LNCS 7016 and LNCS 7017 constitutes the refereed proceedings of the 11th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2011, held in Melbourne, Australia, in October 2011. The first volume presents 24 revised regular papers and 17 revised short papers together with the abstract of the keynote lecture - all carefully reviewed and selected from 85 initial submissions. The papers cover the many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental results, and commercial components and systems and focus on two broad areas of parallel and distributed computing, i.e., architectures, algorithms and networks, and systems and applications
Algorithms and Architectures for Parallel Processing 12th International Conference, ICA3PP 2012, Fukuoka, Japan, September 4-7, 2012, Proceedings, Part II by International Conference on Algorithms and Architectures for Parallel Processing( )

8 editions published in 2012 in English and German and held by 360 WorldCat member libraries worldwide

The two volume set LNCS 7439 and 7440 comprises the proceedings of the 12th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2012, as well as some workshop papers of the CDCN 2012 workshop which was held in conjunction with this conference. The 40 regular paper and 26 short papers included in these proceedings were carefully reviewed and selected from 156 submissions. The CDCN workshop attracted a total of 19 original submissions, 8 of which are included in part II of these proceedings. The papers cover many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental results, and commercial components and systems
Algorithms and Architectures for Parallel Processing 11th International Conference, ICA3PP, Melbourne, Australia, October 24-26, 2011, Proceedings, Part I by Yang Xiang( )

1 edition published in 2011 in English and held by 343 WorldCat member libraries worldwide

This two volume set LNCS 7016 and LNCS 7017 constitutes the refereed proceedings of the 11th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2011, held in Melbourne, Australia, in October 2011. The first volume presents 24 revised regular papers and 17 revised short papers together with the abstract of the keynote lecture - all carefully reviewed and selected from 85 initial submissions. The papers cover the many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental results, and commercial components and systems and focus on two broad areas of parallel and distributed computing, i.e., architectures, algorithms and networks, and systems and applications
Cyberspace safety and security : 4th international symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012 : proceedings by Yang Xiang( )

1 edition published in 2012 in English and held by 326 WorldCat member libraries worldwide

This book constitutes the refereed proceedings of the 4th International Symposium on Cyberspace Safety and Security (CSS 2012), held in Melbourne, Australia, in December 2012. The 30 revised full papers presented together with 7 invited talks were carefully reviewed and selected from 105 submissions. The papers cover the following topics: mobile security, cyberspace attacks and defense, security application adn systems, network and cloud security, wireless security, security protocols and models
Green, pervasive, and cloud computing : 11th International Conference, GPC 2016, Xi'an, China, May 6-8, 2016 : proceedings by GPC (Conference)( )

8 editions published in 2016 in English and held by 286 WorldCat member libraries worldwide

This book constitutes the refereed proceedings of the 8th International Conference on Grid and Pervasive Computing, GPC 2013, held in Seoul, Korea, in May 2016. The 20 revised papers were carefully reviewed and selected from 94 submissions. The conference contains various aspects including green computing, cloud computing, virtualisation, data and storage, and network security
Testbeds and Research Infrastructures for the Development of Networks and Communities 11th International Conference, TRIDENTCOM 2016, Hangzhou, China, June 14-15, 2016, Revised Selected Papers by Song Guo( )

13 editions published between 2016 and 2017 in English and German and held by 268 WorldCat member libraries worldwide

This book constitutes the refereed proceedings of the 11th International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, TridentCom 2016, held in Hangzhou, China, in June 2016. The 16 papers were carefully selected from 25 submissions and provide a forum about technologies of big data, cyber physical systems and computer communications. The papers cover future Internet and software defined networks, network testbed design and implementation, testbed for network applications, and QoS/QoE in networks
Internet and distributed computing systems : 10th International Conference, IDCS 2017, Mana Island, Fiji, December 11-13, 2017 : proceedings by IDCS (Conference)( )

8 editions published between 2018 and 2019 in English and held by 220 WorldCat member libraries worldwide

This book constitutes the proceedings of the 10th International Conference on Internet and Distributed Computing Systems, IDCS 2017, held in Mana Island, Fiji, in December 2017. The 16 full papers presented were carefully reviewed and selected from 40 submissions. The papers focus on emerging models, paradigms, technologies and novel applications related to Internet-based distributed systems, including Internet of Things, cyber-physical systems, wireless sensor networks, next-generation collaborative systems, extreme-scale networked systems, and cloud-based big data systems
Honeypot Frameworks and Their Applications: A New Framework by Chee Keong NG( )

1 edition published in 2018 in English and held by 210 WorldCat member libraries worldwide

This book presents the latest research on honeypots and their applications. After introducing readers to the basic concepts of honeypots and common types, it reviews various honeypot frameworks such as web-server-based, client-based, shadow and artificially intelligent honeypots. In addition, it offers extensive information on the contribution of honeypots in some of the most popular malware research area such as DDoS, Worm, APT, forensics and Bot attacks. The book subsequently tackles the issue of honeypot countermeasures, shows many of the tricks often used by hackers to discover honeypots, and proposes a counter-countermeasure to help conceal them. It then puts forward a new framework that integrates various novel concepts, and which can feasibly be used for the detection of potential ransomware and bitcoin. As such, the book provides non-experts with a concise guide to honeypots, and will also benefit practitioners working on security systems
Cloud computing, security, privacy in new computing environments : 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25-26, and December 15-16, 2016 : proceedings by Jiafu Wan( )

8 editions published between 2017 and 2018 in English and held by 193 WorldCat member libraries worldwide

This book constitutes the refereed proceedings of the 7th International Conference on Cloud Computing, Security, Privacy in New Computing Environments, CloudComp 2016, and the First EAI International Conference SPNCE 2016, both held in Guangzhou, China, in November and December 2016. The proceedings contain 10 full papers selected from 27 submissions and presented at CloudComp 2016 and 12 full papers selected from 69 submissions and presented at SPNCE 2016. CloudComp 2016 presents recent advances and experiences in clouds, cloud computing and related ecosystems and business support. SPNCE 2016 focuses on security and privacy aspects of new computing environments including mobile computing, big data, cloud computing and other large-scale environments
Security and Privacy in Social Networks and Big Data : 6th International Symposium, SocialSec 2020, Tianjin, China, September 26-27, 2020, Proceedings by SocialSec( )

6 editions published in 2020 in English and held by 171 WorldCat member libraries worldwide

This book constitutes revised and selected papers from the 6th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2020, held in Tianjin, China, in September 2020. The 38 full papers presented in this volume were carefully reviewed and selected from a total of 111 submissions. The papers are organized according to the topical sections on big data security; social networks; privacy-preserving and security
Algorithms and Architectures for Parallel Processing, Part II 11th International Conference, ICA3PP 2011, Workshops, Melbourne, Australia, October 24-26, 2011, Proceedings, Part II by International Conference on Algorithms and Architecture for Parallel Processing( )

4 editions published in 2011 in English and held by 12 WorldCat member libraries worldwide

This two volume set LNCS 7016 and LNCS 7017 constitutes the refereed proceedings of the 11th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2011, held in Melbourne, Australia, in October 2011. The first volume presents 24 revised regular papers and 17 revised short papers together with the abstract of the keynote lecture - all carefully reviewed and selected from 85 initial submissions. The papers cover the many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental results, and commercial components and systems and focus on two broad areas of parallel and distributed computing, i.e., architectures, algorithms and networks, and systems and applications
Data and knowledge engineering : Third International Conference, ICDKE 2012, Wuyishan, Fujian, China, November 21-23, 2012, Proceedings by Yang Xiang( Book )

1 edition published in 2012 in English and held by 2 WorldCat member libraries worldwide

This book constitutes the refereed proceedings of the International Conference on Data and Knowledge Engineering, ICDKE 2012, held in Wuyishan, Fujian, China, in November 2012. The conference was co-located with the 6th International Conference on Network and System Security, NSS 2012. The 13 revised full papers of ICDKE 2012 were carefully reviewed and selected from 53 submissions. The papers cover the following topics: artificial intelligence and data engineering; knowledge discovery and data management; information extraction and retrieval; and data security
Above the trust and security in cloud computing : a notion towards innovation by Mahbub Ahmed( )

1 edition published in 2010 in English and held by 1 WorldCat member library worldwide

While the nascent Cloud Computing paradigm supported by virtualization has the upward new notion of edges, it lacks proper security and trust mechanisms. Edges are like on demand scalability and infinite resource provisioning as per the pay-as-you-go manner in favour of a single information owner (abbreviated as INO from now onwards) to multiple corporate INOs. While outsourcing information to a cloud storage controlled by a cloud service provider (abbreviated as CSP from now onwards) relives an information owner of tackling instantaneous oversight and management needs, a significant issue of retaining the control of that information to the information owner still needs to be solved. This paper perspicaciously delves into the facts of the Cloud Computing security issues and aims to explore and establish a secure channel for the INO to communicate with the CSP while maintaining trust and confidentiality. The objective of the paper is served by analyzing different protocols and proposing the one in commensurate with the requirement of the security property like information or data confidentiality along the line of security in Cloud Computing Environment (CCE). To the best of our knowledge, we are the first to derive a secure protocol by successively eliminating the dangling pitfalls that remain dormant and thereby hamper confidentiality and integrity of information that is worth exchanging between the INO and the CSP. Besides, conceptually, our derived protocol is compared with the SSL from the perspectives of work flow related activities along the line of secure trusted path for information confidentiality
Network and system security : NSS 2007( )

1 edition published in 2009 in English and held by 1 WorldCat member library worldwide

 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.51 (from 0.34 for Above the ... to 0.85 for Network an ...)

Alternative Names
Xiang, Yang (Computer scientist)

Yang, Xiang

Languages
English (106)

German (3)