


default search action
Yu Yao 0002
Person information
- affiliation: Northeastern University, School of Computer Science and Engineering, Shenyang, China
- affiliation (PhD 2005): Northeastern University, Shenyang, China
Other persons with the same name
- Yao Yu (aka: Yu Yao) — disambiguation page
- Yu Yao 0001
— Hainan University, School of Information and Communication Engineering, Haikou, China (and 3 more)
- Yu Yao 0003
— University of Plymouth, School of Engineering, Computing and Mathematics, Plymouth, UK (and 1 more)
- Yu Yao 0004
— Harbin Institute of Technology, School of Astronautics, Harbin, China (and 1 more)
- Yu Yao 0005
— University of Sydney, School of Computer Science, Sydney, Australia (and 3 more)
- Yu Yao 0006
— University of Michigan, Robotics Institute, Ann Arbor, MI, USA
- Yu Yao 0007
— Southeast University, School of Electrical and Automation Engineering, Nanjing, China
- Yu Yao 0008
— Southeast University, School of Computer Science and Engineering, Key Laboratory of Computer Network and Information Integration, Nanjing, China (and 1 more)
- Yu Yao 0009
— Northeastern University, College of Information Science and Engineering, Shenyang, China (and 1 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Wei Yang, Yao Shan, Jiaxuan Wang, Yu Yao:
An industrial network intrusion detection algorithm based on IGWO-GRU. Clust. Comput. 27(6): 7199-7217 (2024) - [j16]Yushan Fang, Yu Yao
, Xiaoli Lin, Jiaxuan Wang, Hao Zhai:
A feature selection based on genetic algorithm for intrusion detection of industrial control systems. Comput. Secur. 139: 103675 (2024) - [j15]Yao Shan
, Yu Yao
, Xiaoming Zhou, Tong Zhao, Bo Hu, Lei Wang:
CFL-IDS: An Effective Clustered Federated Learning Framework for Industrial Internet of Things Intrusion Detection. IEEE Internet Things J. 11(6): 10007-10019 (2024) - [j14]Wenxuan Li
, Yu Yao
, Chuan Sheng
, Ni Zhang, Wei Yang:
ALOC: Attack-Aware by Utilizing the Adversarially Learned One-Class Classifier for SCADA System. IEEE Internet Things J. 11(13): 23444-23459 (2024) - [j13]Wei Yang, Yushan Fang, Xiaoming Zhou, Yijia Shen, Wenjie Zhang, Yu Yao:
Networked Industrial Control Device Asset Identification Method Based on Improved Decision Tree. J. Netw. Syst. Manag. 32(2): 32 (2024) - [j12]Chuan Sheng
, Yu Yao
, Lianxiang Zhao, Peng Zeng
, Jianming Zhao
:
Scanner-Hunter: An Effective ICS Scanning Group Identification System. IEEE Trans. Inf. Forensics Secur. 19: 3077-3092 (2024) - 2023
- [j11]Wei Yang, Qiang Fu
, Yu Yao:
A Malware Propagation Model with Dual Delay in the Industrial Control Network. Complex. 2023: 8823080:1-8823080:12 (2023) - [j10]Yao Shan
, Yu Yao
, Tong Zhao
, Wei Yang:
NeuPot: A Neural Network-Based Honeypot for Detecting Cyber Threats in Industrial Control Systems. IEEE Trans. Ind. Informatics 19(10): 10512-10522 (2023) - [j9]Chuan Sheng, Yu Yao
, Wenxuan Li, Wei Yang, Ying Liu
:
Unknown Attack Traffic Classification in SCADA Network Using Heuristic Clustering Technique. IEEE Trans. Netw. Serv. Manag. 20(3): 2625-2638 (2023) - 2021
- [j8]Chuan Sheng, Yu Yao, Qiang Fu
, Wei Yang:
A cyber-physical model for SCADA system and its intrusion detection. Comput. Networks 185: 107677 (2021) - [j7]Chuan Sheng
, Yu Yao, Qiang Fu
, Wei Yang, Ying Liu:
Study on the intelligent honeynet model for containing the spread of industrial viruses. Comput. Secur. 111: 102460 (2021) - 2020
- [j6]Qiang Fu
, Yu Yao
, Chuan Sheng, Wei Yang:
Interplay Between Malware Epidemics and Honeynet Potency in Industrial Control System Network. IEEE Access 8: 81582-81593 (2020) - [c7]Chuan Sheng, Yu Yao, Dongbiao Li, Hongna An, Wei Yang:
Honeyeye: A Network Traffic Collection Framework for Distributed ICS Honeynets. ISPA/BDCloud/SocialCom/SustainCom 2020: 466-473
2010 – 2019
- 2018
- [j5]Yu Yao
, Qiang Fu
, Wei Yang, Ying Wang, Chuan Sheng:
An Epidemic Model of Computer Worms with Time Delay and Variable Infection Rate. Secur. Commun. Networks 2018: 9756982:1-9756982:11 (2018) - 2017
- [c6]Yu Yao, Qiang Fu, Chuan Sheng, Wei Yang:
Modeling and Hopf Bifurcation Analysis of Benign Worms with Quarantine Strategy. CSS 2017: 320-336 - 2016
- [j4]Yu Yao, Zhao Zhang, Wei Yang, Fuxiang Gao:
Influence of removable devices on worm propagation under pulse quarantine strategy. Intell. Autom. Soft Comput. 22(4): 651-666 (2016) - 2013
- [j3]Yu Yao
, Nan Zhang, Wenlong Xiang, Ge Yu, Fuxiang Gao:
Modeling and Analysis of Bifurcation in a Delayed Worm Propagation Model. J. Appl. Math. 2013: 927369:1-927369:11 (2013) - [j2]Yu Yao, Xiao-wu Xie, Hao Guo, Ge Yu, Fuxiang Gao, Xiao-jun Tong:
Hopf bifurcation in an Internet worm propagation model with time delay in quarantine. Math. Comput. Model. 57(11-12): 2635-2646 (2013) - 2012
- [j1]Yu Yao, Lei Guo, Hao Guo, Ge Yu, Fuxiang Gao, Xiao-jun Tong:
Pulse quarantine strategy of internet worm propagation: Modeling and analysis. Comput. Electr. Eng. 38(5): 1047-1061 (2012)
2000 – 2009
- 2009
- [c5]Yu Yao, Yong Li, Fuxiang Gao, Ge Yu:
A Signature-Behavior-Based P2P Worm Detection Approach. HIS (2) 2009: 391-395 - 2008
- [c4]Yu Yao, Liqiong Wu, Fuxiang Gao, Wei Yang, Ge Yu:
A WAW Model of P2P-based Anti-worm. ICNSC 2008: 1131-1136 - [c3]Yu Yao, Junwei Lv, Fuxiang Gao, Yanfang Zhang, Ge Yu:
Behavior-Based Worm Detection and Signature Generation. IMSCCS 2008: 124-131 - 2006
- [c2]Yu Yao, Yang Wei, Fuxiang Gao, Yao Yu:
Anomaly Intrusion Detection Approach Using Hybrid MLP/CNN Neural Network. ISDA (2) 2006: 1095-1102 - 2004
- [c1]Yu Yao, Fuxiang Gao, Ge Yu:
Hybrid BP/CNN neural network for intrusion detection. InfoSecu 2004: 226-228
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-24 21:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint