User Affective State Assessment for HCI Systems

Qiang Ji , Xiangyang Li
americas conference on information systems 390

2
2004
Toward a secure supply chain: A system's perspective

Xiangyang Li , Charu Chandra ,
Human systems management 27 ( 1) 73 -86

3
2008
Decision tree classifiers for computer intrusion detection

Nong Ye , Xiangyang Li
Real-time system security 77 -93

25
2003
Denial of service lab for experiential cybersecurity learning in primarily undergraduate institutions

Xenia Mountrouidou , Xiangyang Li , Harrison Ledford
Journal of Computing Sciences in Colleges 32 ( 2) 158 -164

2
2016
Cyber Security Education for Liberal Arts Institutions

Xenia Mountrouidou , Xiangyang Li
Journal of The Colloquium for Information Systems Security Education 6 ( 2) 17 -17

2
2019
Understanding Security Behavior of Real Users: Analysis of a Phishing Study

Anton Dahbura , Xiangyang Li , Matthew Shonman , Haoruo Zhang
hawaii international conference on system sciences 7163

2021
Crafting Adversarial Email Content against Machine Learning Based Spam Email Detection

Leah Ding , Danyi Zhang , Suye Huang , Xiangyang Li
Proceedings of the 2021 International Symposium on Advanced Security on Software and Systems

2021
A Machine Learning Algorithm Based on Supervised Clustering and Classification

Nong Ye , Xiangyang Li
Active Media Technology 327 -334

6
2001
A supervised clustering algorithm for computer intrusion detection

Xiangyang Li , Nong Ye
Knowledge and Information Systems 8 ( 4) 498 -509

13
2005
Grid- and dummy-cluster-based learning of normal and intrusive clusters for computer intrusion detection

Xiangyang Li , Nong Ye
Quality and Reliability Engineering International 18 ( 3) 231 -242

23
2002
Fooling A Deep-Learning Based Gait Behavioral Biometric System

Honghao Guo , Zuo Wang , Benfang Wang , Xiangyang Li
ieee symposium on security and privacy 221 -227

2020
A statistical study of covert timing channels using network packet frequency

Fangyue Chen , Yunke Wang , Heng Song , Xiangyang Li
intelligence and security informatics 166 -168

4
2015
Raising flags: Detecting covert storage channels using relative entropy

Josephine Chow , Xiangyang Li , Xenia Mountrouidou
intelligence and security informatics 25 -30

1
2017
Understanding User Behaviors When Phishing Attacks Occur

Yi Li , Kaiqi Xiong , Xiangyang Li
intelligence and security informatics 222 -222

1
2019
Applying Machine Learning Techniques to Understand User Behaviors When Phishing Attacks Occur

Yi Li , Kaiqi Xiong , Xiangyang Li
EAI Endorsed Transactions on Security and Safety 6 ( 21) 162809

2019
Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking (SDN)

Tommy Chin , Xenia Mountrouidou , Xiangyang Li , Kaiqi Xiong
2015 IEEE 35th International Conference on Distributed Computing Systems Workshops 95 -99

45
2015
Efficient knowledge integration to support a complex supply network management

Xiangyang Li , Charu Chandra ,
International Journal of Manufacturing Technology and Management 10 ( 1) 1 -18

10
2007
Developing taxonomy and model for security centric supply chain management

Xiangyang Li , Charu Chandra , Jiun-Yan Shiau ,
International Journal of Manufacturing Technology and Management 17 184 -212

6
2009
Exploring cognitive modelling in engineering usability design

Xiangyang Li , Melih Gunal
Journal of Engineering Design 23 ( 2) 77 -97

10
2012
A knowledge integration framework for complex network management

Xiangyang Li , Charu Chandra ,
Industrial Management and Data Systems 107 ( 8) 1089 -1109

43
2007