


default search action
Yu Yao 0002
Person information
- affiliation: Northeastern University, School of Computer Science and Engineering, Shenyang, China
- affiliation (PhD 2005): Northeastern University, Shenyang, China
Other persons with the same name
- Yao Yu (aka: Yu Yao) — disambiguation page
- Yu Yao 0001
— Hainan University, School of Information and Communication Engineering, Haikou, China (and 3 more) - Yu Yao 0003
— University of Plymouth, School of Engineering, Computing and Mathematics, Plymouth, UK (and 1 more) - Yu Yao 0004
— Harbin Institute of Technology, School of Astronautics, Harbin, China (and 1 more) - Yu Yao 0005
— University of Sydney, School of Computer Science, Sydney, Australia (and 3 more) - Yu Yao 0006
— University of Michigan, Robotics Institute, Ann Arbor, MI, USA - Yu Yao 0007
— Southeast University, School of Electrical and Automation Engineering, Nanjing, China - Yu Yao 0008
— Southeast University, School of Computer Science and Engineering, Key Laboratory of Computer Network and Information Integration, Nanjing, China (and 1 more) - Yu Yao 0009
— Northeastern University, College of Information Science and Engineering, Shenyang, China (and 1 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j27]Xaioli Lin
, Yu Yao, Yushan Fang, Boxue Song, Wei Yang
:
A Real-Time Hacker Group Identification Method for Industrial Control Systems Based on Gaussian Self-Organizing Incremental Neural Network. IEEE Internet Things J. 13(5): 8658-8671 (2026)
[j26]Licheng Yang
, Yu Yao, Daoqing Yang, Wei Yang, Yuming Hao:
A generalizable anomaly detection framework with dynamic concept drift suppression for non-stationary time series. Knowl. Based Syst. 337: 115380 (2026)
[j25]Wenxuan Li
, Yu Yao
, Ni Zhang, Chuan Sheng
, Ziyong Ran
, Wei Yang
:
IMADP: Imputation-Based Anomaly Detection in SCADA Systems via Adversarial Diffusion Process. IEEE Trans. Netw. Serv. Manag. 23: 3166-3179 (2026)- 2025
[j24]Wei Yang, Qianyi Wang, Yu Yao:
IPv6 active address detection model based on diffusion model. Comput. Networks 261: 111047 (2025)
[j23]Ziyong Ran
, Yu Yao
, Wenxuan Li
, Wei Yang
, Weihao Li, Yunfeng Wu:
Precise Defense Approach Against Small-Scale Backdoor Attacks in Industrial Internet of Things. IEEE Internet Things J. 12(5): 5742-5754 (2025)
[j22]Xaioli Lin
, Yu Yao
, Bo Hu, Wei Yang
, Xiaoming Zhou, Guangao Li, Wenjie Zhang:
A Real-Time Anomaly Detection Method for Industrial Control Systems Based on Long-Short Period Deterministic Finite Automaton. IEEE Internet Things J. 12(10): 14599-14621 (2025)
[j21]Daoqing Yang
, Yu Yao
, Yao Shan
, Yunfeng Wu, Xiaoli Lin
, Wei Yang
, Licheng Yang
:
InSyfer: Industrial Control Protocols Syntax Inference via Graph Representation Learning. IEEE Trans. Dependable Secur. Comput. 22(6): 7495-7507 (2025)
[j20]Daoqing Yang
, Yu Yao
, Yao Shan
, Licheng Yang
, Wei Yang
, Fuyi Liu, Yunfeng Wu:
Patty: Pattern Series-Based Semantics Analysis for Agnostic Industrial Control Protocols. IEEE Trans. Inf. Forensics Secur. 20: 5478-5491 (2025)
[d2]Chuan Sheng
, Yu Yao
, Qing-Long Han
, Peng Zeng
, Dong Li
, Sheng Wen
, Elisa Bertino
, Kwok-Yan Lam
, Yang Xiang
:
Collecting Industrial Control System Device Data on the Internet: A Dataset for Domain Benchmark. Version v1. Zenodo, 2025 [all versions]
[d1]Chuan Sheng
, Yu Yao
, Qing-Long Han
, Peng Zeng
, Dong Li
, Sheng Wen
, Elisa Bertino
, Kwok-Yan Lam
, Yang Xiang
:
Collecting Industrial Control System Device Data on the Internet: A Dataset for Domain Benchmark. Version ICSLibrary Version v1.1. Zenodo, 2025 [all versions]
- 2024
[j19]Wei Yang, Yao Shan, Jiaxuan Wang, Yu Yao:
An industrial network intrusion detection algorithm based on IGWO-GRU. Clust. Comput. 27(6): 7199-7217 (2024)
[j18]Yushan Fang
, Yu Yao
, Xiaoli Lin, Jiaxuan Wang, Hao Zhai:
A feature selection based on genetic algorithm for intrusion detection of industrial control systems. Comput. Secur. 139: 103675 (2024)
[j17]Yao Shan
, Yu Yao
, Xiaoming Zhou, Tong Zhao, Bo Hu, Lei Wang:
CFL-IDS: An Effective Clustered Federated Learning Framework for Industrial Internet of Things Intrusion Detection. IEEE Internet Things J. 11(6): 10007-10019 (2024)
[j16]Wenxuan Li
, Yu Yao
, Chuan Sheng
, Ni Zhang, Wei Yang:
ALOC: Attack-Aware by Utilizing the Adversarially Learned One-Class Classifier for SCADA System. IEEE Internet Things J. 11(13): 23444-23459 (2024)
[j15]Wei Yang, Yushan Fang
, Xiaoming Zhou, Yijia Shen, Wenjie Zhang, Yu Yao:
Networked Industrial Control Device Asset Identification Method Based on Improved Decision Tree. J. Netw. Syst. Manag. 32(2): 32 (2024)
[j14]Chuan Sheng
, Yu Yao
, Lianxiang Zhao, Peng Zeng
, Jianming Zhao
:
Scanner-Hunter: An Effective ICS Scanning Group Identification System. IEEE Trans. Inf. Forensics Secur. 19: 3077-3092 (2024)- 2023
[j13]Wei Yang, Qiang Fu
, Yu Yao:
A Malware Propagation Model with Dual Delay in the Industrial Control Network. Complex. 2023: 8823080:1-8823080:12 (2023)
[j12]Yao Shan
, Yu Yao
, Tong Zhao
, Wei Yang:
NeuPot: A Neural Network-Based Honeypot for Detecting Cyber Threats in Industrial Control Systems. IEEE Trans. Ind. Informatics 19(10): 10512-10522 (2023)
[j11]Chuan Sheng, Yu Yao
, Wenxuan Li, Wei Yang, Ying Liu
:
Unknown Attack Traffic Classification in SCADA Network Using Heuristic Clustering Technique. IEEE Trans. Netw. Serv. Manag. 20(3): 2625-2638 (2023)- 2021
[j10]Chuan Sheng, Yu Yao, Qiang Fu
, Wei Yang:
A cyber-physical model for SCADA system and its intrusion detection. Comput. Networks 185: 107677 (2021)
[j9]Chuan Sheng
, Yu Yao, Qiang Fu
, Wei Yang, Ying Liu:
Study on the intelligent honeynet model for containing the spread of industrial viruses. Comput. Secur. 111: 102460 (2021)- 2020
[j8]Qiang Fu
, Yu Yao
, Chuan Sheng, Wei Yang:
Interplay Between Malware Epidemics and Honeynet Potency in Industrial Control System Network. IEEE Access 8: 81582-81593 (2020)
[c8]Chuan Sheng, Yu Yao, Dongbiao Li, Hongna An, Wei Yang:
Honeyeye: A Network Traffic Collection Framework for Distributed ICS Honeynets. ISPA/BDCloud/SocialCom/SustainCom 2020: 466-473
2010 – 2019
- 2019
[c7]Wei Yang, Li Zhang, Teng Chen, Yu Yao:
Community-based Malware Immunization Strategy. ICSAI 2019: 788-793- 2018
[j7]Yu Yao
, Qiang Fu
, Wei Yang, Ying Wang, Chuan Sheng:
An Epidemic Model of Computer Worms with Time Delay and Variable Infection Rate. Secur. Commun. Networks 2018: 9756982:1-9756982:11 (2018)- 2017
[c6]Yu Yao, Qiang Fu, Chuan Sheng, Wei Yang:
Modeling and Hopf Bifurcation Analysis of Benign Worms with Quarantine Strategy. CSS 2017: 320-336- 2016
[j6]Yu Yao, Zhao Zhang, Wei Yang, Fuxiang Gao:
Influence of removable devices on worm propagation under pulse quarantine strategy. Intell. Autom. Soft Comput. 22(4): 651-666 (2016)- 2014
[j5]Wei Yang, Yong-peng Gao, Zhiliang Zhu, Guiran Chang, Yu Yao:
Modelling, analysis and containment of passive worms in P2P networks. Int. J. Internet Protoc. Technol. 8(2/3): 130-142 (2014)- 2013
[j4]Yu Yao
, Nan Zhang, Wenlong Xiang, Ge Yu, Fuxiang Gao:
Modeling and Analysis of Bifurcation in a Delayed Worm Propagation Model. J. Appl. Math. 2013: 927369:1-927369:11 (2013)
[j3]Yu Yao, Xiao-wu Xie, Hao Guo, Ge Yu, Fuxiang Gao, Xiao-jun Tong:
Hopf bifurcation in an Internet worm propagation model with time delay in quarantine. Math. Comput. Model. 57(11-12): 2635-2646 (2013)- 2012
[j2]Yu Yao, Lei Guo, Hao Guo, Ge Yu, Fuxiang Gao, Xiao-jun Tong:
Pulse quarantine strategy of internet worm propagation: Modeling and analysis. Comput. Electr. Eng. 38(5): 1047-1061 (2012)- 2011
[j1]Wei Yang, Guiran Chang, Yu Yao, Xiao-meng Shen:
Stability Analysis of P2P Worm Propagation Model with Dynamic Quarantine Defense. J. Networks 6(1): 153-162 (2011)
2000 – 2009
- 2009
[c5]Yu Yao, Yong Li, Fuxiang Gao, Ge Yu:
A Signature-Behavior-Based P2P Worm Detection Approach. HIS (2) 2009: 391-395- 2008
[c4]Yu Yao, Liqiong Wu, Fuxiang Gao, Wei Yang, Ge Yu:
A WAW Model of P2P-based Anti-worm. ICNSC 2008: 1131-1136
[c3]Yu Yao, Junwei Lv, Fuxiang Gao, Yanfang Zhang, Ge Yu:
Behavior-Based Worm Detection and Signature Generation. IMSCCS 2008: 124-131- 2006
[c2]Yu Yao, Yang Wei, Fuxiang Gao, Yao Yu:
Anomaly Intrusion Detection Approach Using Hybrid MLP/CNN Neural Network. ISDA (2) 2006: 1095-1102- 2004
[c1]Yu Yao, Fuxiang Gao, Ge Yu:
Hybrid BP/CNN neural network for intrusion detection. InfoSecu 2004: 226-228
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-03-27 21:14 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID






