default search action
Yanyan Zhuang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Yanyan Zhuang, Yu Yan, Lois Anne DeLong, Kuo-Chuan (Martin) Yeh:
Do developer perceptions have borders? Comparing C code responses across continents. Softw. Qual. J. 32(2): 431-457 (2024) - [c41]Minhajul Alam Rahat, Vijay Banerjee, Gedare Bloom, Yanyan Zhuang:
Cimalir: Cross-Platform IoT Malware Clustering using Intermediate Representation. CCWC 2024: 460-466 - [c40]Austen Knapp, Emmanuel Wamuo, Minhajul Alam Rahat, Santiago Torres-Arias, Gedare Bloom, Yanyan Zhuang:
Should Smart Homes Be Afraid of Evil Maids? : Identifying Vulnerabilities in IoT Device Firmware. CCWC 2024: 467-473 - [c39]Omolade Ikumapayi, Paul Agbaje, Yanyan Zhuang, Habeeb Olufowobi, Gedare Bloom:
Deadline-Based Class Assignment for Time-Sensitive Network Frame Preemption. ICIT 2024: 1-8 - 2022
- [j10]Martin K.-C. Yeh, Yu Yan, Yanyan Zhuang, Lois Anne DeLong:
Identifying program confusion using electroencephalogram measurements. Behav. Inf. Technol. 41(12): 2528-2545 (2022) - [j9]Heather Lawrence, Uchenna Ezeobi, Orly Tauil, Jacob Nosal, Owen Redwood, Yanyan Zhuang, Gedare Bloom:
CUPID: A labeled dataset with Pentesting for evaluation of network intrusion detection. J. Syst. Archit. 129: 102621 (2022) - [c38]Adam Duby, Teryl Taylor, Yanyan Zhuang:
Malware Family Classification via Residual Prefetch Artifacts. CCNC 2022: 256-259 - [c37]Heather Lawrence, Uchenna Ezeobi, Gedare Bloom, Yanyan Zhuang:
Shining New Light on Useful Features for Network Intrusion Detection Algorithms. CCNC 2022: 369-377 - [c36]Adam Duby, Teryl Taylor, Gedare Bloom, Yanyan Zhuang:
Detecting and Classifying Self-Deleting Windows Malware Using Prefetch Files. CCWC 2022: 745-751 - [c35]Adam Duby, Teryl Taylor, Gedare Bloom, Yanyan Zhuang:
Evaluating Feature Robustness for Windows Malware Family Classification. ICCCN 2022: 1-10 - 2021
- [c34]Mark Vaszary, Andreas Slovacek, Yanyan Zhuang, Sang-Yoon Chang:
Securing Tire Pressure Monitoring System for Vehicular Privacy. CCNC 2021: 1-6 - [c33]Terrance E. Boult, Yanyan Zhuang:
PORT: Pooled Ordered Rectangular Testing for Improved Public Health Screening. ICHI 2021: 238-242 - 2020
- [c32]Mong Tee Sim, Yanyan Zhuang:
A Dual Lockstep Processor System-on-a-Chip for Fast Error Recovery in Safety-Critical Applications. IECON 2020: 2231-2238 - [c31]Mong Tee Sim, Yanyan Zhuang:
Design of Two Interleaved Error Detection and Corrections using Hsiao Code and CRC. IECON 2020: 2261-2266 - [c30]Mong Tee Sim, Yanyan Zhuang:
A SpaceWire PHY with Double Data Rate and Fallback Redundancy. SoCC 2020: 283-288
2010 – 2019
- 2018
- [j8]Justin Cappos, Yanyan Zhuang, Albert Rafetseder, Ivan Beschastnikh:
Tsumiki: A Meta-Platform for Building Your Own Testbed. IEEE Trans. Parallel Distributed Syst. 29(12): 2863-2881 (2018) - [c29]Rory A. Lewis, Chad A. Mello, Yanyan Zhuang, Martin K.-C. Yeh, Yu Yan, Dan Gopstein:
Rough Sets: Visually Discerning Neurological Functionality During Thought Processes. ISMIS 2018: 32-41 - [c28]Yanyan Zhuang, Albert Rafetseder, Richard S. Weiss, Justin Cappos:
Four years experience: Making sensibility testbed work for SAS. SAS 2018: 1-6 - [c27]Yanyan Zhuang, Albert Rafetseder, Yu Hu, Yuan Tian, Justin Cappos:
Sensibility Testbed: Automated IRB Policy Enforcement in Mobile Research Apps. HotMobile 2018: 113-118 - 2017
- [c26]Martin K.-C. Yeh, Dan Gopstein, Yu Yan, Yanyan Zhuang:
Detecting and comparing brain activity in short program comprehension using EEG. FIE 2017: 1-5 - [c25]Ivan Beschastnikh, Mircea Filip Lungu, Yanyan Zhuang:
Accelerating Software Engineering Research Adoption with Analysis Bots. ICSE-NIER 2017: 35-38 - [c24]Dan Gopstein, Jake Iannacone, Yu Yan, Lois DeLong, Yanyan Zhuang, Martin K.-C. Yeh, Justin Cappos:
Understanding misunderstandings in source code. ESEC/SIGSOFT FSE 2017: 129-139 - 2015
- [j7]Yanyan Zhuang, Yi Wan:
Joint estimation of carrier frequency offset and in-phase/quadrature-phase imbalances for orthogonal frequency division multiplexing systems. Comput. Electr. Eng. 48: 1-11 (2015) - [j6]Yanyan Zhuang, Albert Rafetseder, Justin Cappos:
Privacy-Preserving Experimentation with Sensibility Testbed. login Usenix Mag. 40(4) (2015) - [c23]Michael Reininger, Seth Miller, Yanyan Zhuang, Justin Cappos:
A first look at vehicle data collection via smartphone sensors. SAS 2015: 1-6 - [c22]Richard S. Weiss, Leon Reznik, Yanyan Zhuang, Andrew Hoffman, Darrell Pollard, Albert Rafetseder, Tao Li, Justin Cappos:
Trust Evaluation in Mobile Devices: An Empirical Study. TrustCom/BigDataSE/ISPA (1) 2015: 25-32 - 2014
- [c21]Daniela Oliveira, Marissa Rosenthal, Nicole Morin, Kuo-Chuan (Martin) Yeh, Justin Cappos, Yanyan Zhuang:
It's the psychology stupid: how heuristics explain software vulnerabilities and how priming can illuminate developer's blind spots. ACSAC 2014: 296-305 - [c20]Yanyan Zhuang, Leonard Law, Albert Rafetseder, Lai Wang, Ivan Beschastnikh, Justin Cappos:
Sensibility testbed: An internet-wide cloud platform for programmable exploration of mobile devices. INFOCOM Workshops 2014: 139-140 - [c19]Yanyan Zhuang, Eleni Gessiou, Steven Portzer, Fraida Fund, Monzur Muhammad, Ivan Beschastnikh, Justin Cappos:
NetCheck: Network Diagnoses from Blackbox Traces. NSDI 2014: 115-128 - [c18]Justin Cappos, Yanyan Zhuang, Daniela Oliveira, Marissa Rosenthal, Kuo-Chuan (Martin) Yeh:
Vulnerabilities as Blind Spots in Developer's Heuristic-Based Decision-Making Processes. NSPW 2014: 53-62 - [c17]Justin Cappos, Lai Wang, Richard S. Weiss, Yi Yang, Yanyan Zhuang:
BlurSense: Dynamic fine-grained access control for smartphone privacy. SAS 2014: 329-332 - [c16]Yanyan Zhuang, Chris Matthews, Stephen Tredger, Steven R. Ness, Jesse Short-Gershman, Li Ji, Niko Rebenich, Andrew French, Josh Erickson, Kyliah Clarkson, Yvonne Coady, Rick McGeer:
Taking a walk on the wild side: teaching cloud computing on distributed research testbeds. SIGCSE 2014: 535-540 - 2013
- [j5]Albert Rafetseder, Florian Metzger, Lukas Pühringer, Kurt Tutschku, Yanyan Zhuang, Justin Cappos:
Sensorium - A Generic Sensor Framework. Prax. Inf.verarb. Kommun. 36(1): 46 (2013) - [j4]Yanyan Zhuang, T. Aaron Gulliver, Yvonne Coady:
On Planar Tessellations and Interference Estimation in Wireless Ad-Hoc Networks. IEEE Wirel. Commun. Lett. 2(3): 331-334 (2013) - [c15]Stephen Tredger, Yanyan Zhuang, Chris Matthews Jesse Short-Gershman, Yvonne Coady, Rick McGeer:
Building Green Systems with Green Students: An Educational Experiment with GENI Infrastructure. GREE 2013: 29-36 - [c14]Yanyan Zhuang, Albert Rafetseder, Justin Cappos:
Experience with Seattle: A Community Platform for Research and Education. GREE 2013: 37-44 - 2012
- [b1]Yanyan Zhuang:
A Geometrical probability approach to location-critical network performance metrics. University of Victoria, Canada, 2012 - [j3]Yanyan Zhuang, Jianping Pan, Vidhoon Viswanathan, Lin Cai:
On the Uplink MAC Performance of a Drive-Thru Internet. IEEE Trans. Veh. Technol. 61(4): 1925-1935 (2012) - [c13]Yanyan Zhuang, Stephen Tredger, Chris Matthews, Rick McGeer, Yvonne Coady:
Distributed Systems in the Wild: The Theoretical Foundations and Experimental Perspectives. 3PGCIC 2012: 87-94 - [c12]Jun Tao, Liang He, Yanyan Zhuang, Jianping Pan, Maryam Ahmadi:
Sweeping and active skipping in wireless sensor networks with mobile elements. GLOBECOM 2012: 106-111 - [c11]Lei Zhang, Yanyan Zhuang, Jianping Pan, Lovereen Kaur, Hongzi Zhu:
Multi-modal message dissemination in vehicular ad-hoc networks. ICCC 2012: 670-675 - [c10]Yanyan Zhuang, Jianping Pan:
A geometrical probability approach to location-critical network performance metrics. INFOCOM 2012: 1817-1825 - [c9]Maryam Ahmadi, Yanyan Zhuang, Jianping Pan:
Distributed Robust Channel Assignment for Multi-Radio Cognitive Radio Networks. VTC Fall 2012: 1-5 - 2011
- [j2]Yanyan Zhuang, Jianping Pan, Yuanqian Luo, Lin Cai:
Time and Location-Critical Emergency Message Dissemination for Vehicular Ad-Hoc Networks. IEEE J. Sel. Areas Commun. 29(1): 187-196 (2011) - [c8]Yanyan Zhuang, Yuanqian Luo, Lin Cai, Jianping Pan:
A Geometric Probability Model for Capacity Analysis and Interference Estimation in Wireless Mobile Cellular Systems. GLOBECOM 2011: 1-6 - [c7]Jun Song, Yanyan Zhuang, Jianping Pan, Lin Cai:
Certificateless Secure Upload for Drive-Thru Internet. ICC 2011: 1-6 - [i2]Yanyan Zhuang, Jianping Pan:
Random Distances Associated with Rhombuses. CoRR abs/1106.1257 (2011) - [i1]Yanyan Zhuang, Jianping Pan:
Random Distances Associated with Hexagons. CoRR abs/1106.2200 (2011) - 2010
- [j1]Yanyan Zhuang, Jianping Pan, Guoxing Wu:
Energy-optimal grid-based clustering in wireless microsensor networks with data aggregation. Int. J. Parallel Emergent Distributed Syst. 25(6): 531-550 (2010) - [c6]Yanyan Zhuang, Jianping Pan:
Probabilistic Energy Optimization in Wireless Sensor Networks with Variable Size Griding. ICC 2010: 1-5 - [c5]Yanyan Zhuang, Jianping Pan, Lin Cai:
Minimizing Energy Consumption with Probabilistic Distance Models in Wireless Sensor Networks. INFOCOM 2010: 2453-2461 - [c4]Yanyan Zhuang, Jianping Pan, Lin Cai:
A probabilistic model for message propagation in two-dimensional vehicular ad-hoc networks. Vehicular Ad Hoc Networks 2010: 31-40 - [c3]Liang He, Yanyan Zhuang, Jianping Pan, Jingdong Xu:
Evaluating On-Demand Data Collection with Mobile Elements in Wireless Sensor Networks. VTC Fall 2010: 1-5
2000 – 2009
- 2009
- [c2]Yanyan Zhuang, Jianping Pan, Guoxing Wu:
Energy-Optimal Grid-Based Clustering in Wireless Microsensor Networks. ICDCS Workshops 2009: 96-102 - 2007
- [c1]Shan Jin, Yanyan Zhuang, Linfeng Liu, Jiagao Wu:
An Efficient Overlay Multicast Routing Algorithm for Real-Time Multimedia Applications. APWeb/WAIM 2007: 829-836
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint