scispace - formally typeset
X

Xiaoyue Wan

Researcher at Xiamen University

Publications -  8
Citations -  849

Xiaoyue Wan is an academic researcher from Xiamen University. The author has contributed to research in topics: Information privacy & Attack model. The author has an hindex of 6, co-authored 6 publications receiving 533 citations. Previous affiliations of Xiaoyue Wan include University of Waterloo.

Papers
More filters
Journal ArticleDOI

IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security?

TL;DR: The attack model for IoT systems is investigated, and the IoT security solutions based on machine-learning (ML) techniques including supervised learning, unsupervised learning, and reinforcement learning (RL) are reviewed.
Journal ArticleDOI

Security in Mobile Edge Caching with Reinforcement Learning

TL;DR: In this paper, the authors investigated the attack models in mobile edge computing systems, focusing on both the mobile offloading and the caching procedures, and proposed security solutions that apply reinforcement learning (RL) techniques to provide secure offloading to the edge nodes against jamming attacks.
Posted Content

Security in Mobile Edge Caching with Reinforcement Learning

TL;DR: In this article, the authors proposed security solutions that apply reinforcement learning (RL) techniques to provide secure offloading to the edge nodes against jamming attacks and presented light-weight authentication and secure collaborative caching schemes to protect data privacy.
Posted Content

IoT Security Techniques Based on Machine Learning.

TL;DR: The attack model for IoT systems is investigated, the IoT security solutions based on machine learning techniques including supervised learning, unsupervised learning and reinforcement learning are reviewed, and the challenges that need to be addressed are discussed.
Proceedings ArticleDOI

Reinforcement Learning Based Mobile Offloading for Cloud-Based Malware Detection

TL;DR: This paper investigates the competition of the radio transmission bandwidths and the data sharing of the security server in the dynamic malware detection game, and proposes an offloading strategy based on deep Q-network technique with a deep convolutional neural network to further improve the detection speed, the detection accuracy, and the utility.