His primary areas of study are Algorithm, Artificial intelligence, Computer security, Decoding methods and Digital watermarking. His work carried out in the field of Algorithm brings together such families of science as Relay channel, Subspace topology, Mathematical optimization and Blind signal separation. Yong Xiang combines subjects such as Traffic classification, Machine learning, Data mining and Computer vision with his study of Artificial intelligence.
His research investigates the connection between Data mining and topics such as Botnet that intersect with problems in Network security. His Computer security study combines topics in areas such as Server and Internet privacy. Yong Xiang has included themes like Robustness and Audio signal in his Decoding methods study.
His main research concerns Algorithm, Artificial intelligence, Computer security, Blind signal separation and Digital watermarking. His Algorithm research is multidisciplinary, incorporating elements of Speech recognition, MIMO, Communication channel, Mathematical optimization and Signal processing. His study looks at the relationship between MIMO and topics such as Control theory, which overlap with Blind equalization.
His biological study spans a wide range of topics, including Machine learning, Computer vision and Pattern recognition. His studies deal with areas such as Mixing, Source separation and Cyclostationary process as well as Blind signal separation. His Digital watermarking research integrates issues from Watermark, Discrete cosine transform, Decoding methods, Robustness and Audio signal.
Yong Xiang mainly investigates Artificial intelligence, Computer security, Deep learning, Pattern recognition and Machine learning. His Artificial intelligence study frequently draws parallels with other fields, such as Computer vision. His Computer security research includes themes of Differential privacy and Digital watermarking.
His studies in Digital watermarking integrate themes in fields like Artificial neural network, Signal processing, Host and Audio signal. His Machine learning study integrates concerns from other disciplines, such as Anomaly detection and Generative model. His work in Probabilistic logic addresses issues such as Contrast, which are connected to fields such as Algorithm.
Yong Xiang focuses on Information privacy, Distributed computing, Edge computing, Computer security and Artificial intelligence. His Distributed computing research is multidisciplinary, relying on both Routing, Network topology and Computer virus. His work deals with themes such as Network architecture, Data security and Real-time computing, which intersect with Edge computing.
In general Computer security study, his work on Key often relates to the realm of Outsourcing, thereby connecting several areas of interest. His Artificial intelligence study incorporates themes from Machine learning, Complement and Big data. Yong Xiang performs integrative study on Non-negative matrix factorization and Algorithm in his works.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Network Traffic Classification Using Correlation Information
Jun Zhang;Yang Xiang;Yu Wang;Wanlei Zhou.
IEEE Transactions on Parallel and Distributed Systems (2013)
Cost Efficient Resource Management in Fog Computing Supported Medical Cyber-Physical System
Lin Gu;Deze Zeng;Song Guo;Ahmed Barnawi.
IEEE Transactions on Emerging Topics in Computing (2017)
Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient
Shui Yu;Wanlei Zhou;Weijia Jia;Song Guo.
IEEE Transactions on Parallel and Distributed Systems (2012)
A Survey on Energy Internet: Architecture, Approach, and Emerging Technologies
Kun Wang;Jun Yu;Yan Yu;Yirou Qian.
IEEE Systems Journal (2018)
Information and Communications Technologies for Sustainable Development Goals: State-of-the-Art, Needs and Perspectives
Jinsong Wu;Song Guo;Huawei Huang;William Liu.
IEEE Communications Surveys and Tutorials (2018)
Fog Computing: Survey of Trends, Architectures, Requirements, and Research Directions
Ranesh Kumar Naha;Saurabh Garg;Dimitrios Georgakopoulos;Prem Prakash Jayaraman.
IEEE Access (2018)
Protection of Big Data Privacy
Abid Mehmood;Iynkaran Natgunanathan;Yong Xiang;Guang Hua.
IEEE Access (2016)
Software-Defined Wireless Networking Opportunities and Challenges for Internet-of-Things: A Review
Keshav Sood;Shui Yu;Yong Xiang.
IEEE Internet of Things Journal (2016)
Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions
Jun Zhang;Chao Chen;Yang Xiang;Wanlei Zhou.
IEEE Transactions on Information Forensics and Security (2013)
Blind source-separation using second-order cyclostationary statistics
K. Abed-Meraim;Yong Xiang;J.H. Manton;Yingbo Hua.
IEEE Transactions on Signal Processing (2001)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: