Biblio

Filters: Author is Wan, Y.  [Clear All Filters]
2018-05-27
Torres, J.A., Roy, S., Wan, Y..  Submitted.  Sparse resource allocation for linear network spread dynamics. IEEE Transactions on Automatic Control. 62:1714–1728}year={2017.
2018-05-15
2018-05-11
2019-04-05
Huang, M. Chiu, Wan, Y., Chiang, C., Wang, S..  2018.  Tor Browser Forensics in Exploring Invisible Evidence. 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC). :3909-3914.
Given the high frequency of information security incidents, feeling that we may soon become innocent victims of these events may be justified. Perpetrators of information security offenses take advantage of several methods to leave no evidence of their crimes, and this pattern of hiding tracks has caused difficulties for investigators searching for digital evidence. Use of the onion router (Tor) is a common way for criminals to conceal their identities and tracks. This paper aims to explain the composition and operation of onion routing; we conduct a forensic experiment to detect the use of the Tor browser and compare several browser modes, including incognito and normal. Through the experimental method described in this paper, investigators can learn to identify perpetrators of Internet crimes, which will be helpful in future endeavors in digital forensics.
2018-05-11
2018-05-15
2018-05-11
Gu, Y., Zhou, M., Fu, S., Wan, Y..  2015.  Airborne WiFi networks through directional antennae: An experimental study. 2015 IEEE Wireless Communications and Networking Conference, WCNC 2015.
2018-05-15
2018-05-27
2018-05-11
Talasila, M., Fu, S., Wan, Y..  2015.  Energy conservative distributed average consensus through connected dominating set. 2015 IEEE Wireless Communications and Networking Conference, WCNC 2015.
2018-05-15
2018-05-27