![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Jingyu Feng
Person information
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Wenhua Huang, Yan Chen, Dong Jing
, Jingyu Feng
, Gang Han
, Wenbo Zhang:
A Multicloud Collaborative Data Security Sharing Scheme With Blockchain Indexing in Industrial Internet Environments. IEEE Internet Things J. 11(16): 27532-27544 (2024) - [j24]Jingyu Feng
, Yue Li
, Teng Wang
, Shuanggen Liu
:
A Certificateless Threshold Proxy Re-Encrypted Data-Sharing Scheme With Cloud-Chain Collaboration in Industrial Internet Environments. IEEE Internet Things J. 11(20): 33247-33268 (2024) - [j23]Wenbo Zhang
, Tao Wang, Chaoyang Zhang, Jingyu Feng
:
Securing multi-chain consensus against diverse miner behavior attacks in blockchain networks. Frontiers Inf. Technol. Electron. Eng. 25(4): 540-554 (2024) - 2022
- [j22]Wenbo Zhang
, Yayu Bai, Jingyu Feng:
TIIA: A blockchain-enabled Threat Intelligence Integrity Audit scheme for IIoT. Future Gener. Comput. Syst. 132: 254-265 (2022) - [j21]Wenbo Zhang, Lin Chen, Hengtao Su, Yin Wang, Jingyu Feng:
TCA: A Trusted Collaborative Anonymity Construction Scheme for Location Privacy Protection in VANETs. KSII Trans. Internet Inf. Syst. 16(10): 3438-3457 (2022) - [c8]Xin Zhang, Hongyu Sun, Zhipeng He, Mianxue Gu, Jingyu Feng, Yuqing Zhang:
VDBWGDL: Vulnerability Detection Based On Weight Graph And Deep Learning. DSN Workshops 2022: 186-190 - 2021
- [j20]Jingyu Feng
, Yin Wang, Jialin Wang, Fang Ren:
Blockchain-Based Data Management and Edge-Assisted Trusted Cloaking Area Construction for Location Privacy Protection in Vehicular Networks. IEEE Internet Things J. 8(4): 2087-2101 (2021) - [i3]Jingyu Feng, Yifei Shi, Neal N. Xiong, Feng Xiao:
Blockchain-assisted Undisclosed IIoT Vulnerabilities Trusted Sharing Protection with Dynamic Token. CoRR abs/2103.08908 (2021) - [i2]Jingyu Feng, Tao Wang, Naixue Xiong, Teng Wang:
PoDT: A Secure Multi-chains Consensus Scheme Against Diverse Miners Behaviors Attacks in Blockchain Networks. CoRR abs/2106.02383 (2021) - 2020
- [j19]Jingyu Feng, Xinyu Zhao, Kexuan Chen, Feng Zhao, Guanghua Zhang:
Towards random-honest miners selection and multi-blocks creation: Proof-of-negotiation consensus mechanism in blockchain networks. Future Gener. Comput. Syst. 105: 248-258 (2020) - [j18]Teng Wang
, Xuefeng Zhang
, Jingyu Feng, Xinyu Yang:
A Comprehensive Survey on Local Differential Privacy toward Data Statistics and Analysis. Sensors 20(24): 7030 (2020) - [c7]Lei Zhou
, Anmin Fu
, Jingyu Feng, Chunyi Zhou:
An Efficient and Secure Data Integrity Auditing Scheme with Traceability for Cloud-Based EMR. ICC 2020: 1-6 - [i1]Teng Wang, Xuefeng Zhang, Jingyu Feng, Xinyu Yang:
A Comprehensive Survey on Local Differential Privacy Toward Data Statistics and Analysis in Crowdsensing. CoRR abs/2010.05253 (2020)
2010 – 2019
- 2019
- [j17]Jingyu Feng
, Tao Li, Yujia Zhai, Shaoqing Lv, Feng Zhao:
Ensuring Honest Data Collection Against Collusive CSDF Attack With Binary-Minmaxs Clustering Analysis in Mobile Crowd Sensing. IEEE Access 7: 124491-124501 (2019) - [j16]Jingyu Feng
, Nan Liu, Jie Cao
, Yuqing Zhang
, Guangyue Lu
:
Securing Traffic-Related Messages Exchange Against Inside-and-Outside Collusive Attack in Vehicular Networks. IEEE Internet Things J. 6(6): 9979-9992 (2019) - [j15]Feng Zhao
, Shaoping Li, Jingyu Feng
:
Securing Cooperative Spectrum Sensing against DC-SSDF Attack Using Trust Fluctuation Clustering Analysis in Cognitive Radio Networks. Wirel. Commun. Mob. Comput. 2019: 3174304:1-3174304:11 (2019) - [c6]Jingyu Feng, Xinyu Zhao, Guangyue Lu, Feng Zhao:
PoTN: A Novel Blockchain Consensus Protocol with Proof-of-Trust Negotiation in Distributed IoT Networks. IoT S&P@CCS 2019: 32-37 - 2018
- [j14]Jingyu Feng, Man Zhang, Yun Xiao, Hongzhou Yue:
Securing Cooperative Spectrum Sensing Against Collusive SSDF Attack using XOR Distance Analysis in Cognitive Radio Networks. Sensors 18(2): 370 (2018) - [j13]Jingyu Feng
, Shaoping Li, Shaoqing Lv, Honggang Wang, Anmin Fu
:
Securing Cooperative Spectrum Sensing Against Collusive False Feedback Attack in Cognitive Radio Networks. IEEE Trans. Veh. Technol. 67(9): 8276-8287 (2018) - 2017
- [j12]Jingyu Feng, Xu Du, Guanghua Zhang, Wei Shi:
Securing multi-channel selection using distributed trust in cognitive radio ad hoc networks. Ad Hoc Networks 61: 85-94 (2017) - [j11]Jingyu Feng, Guangyue Lu, Yuqing Zhang, Honggang Wang
:
Avoiding monopolization: mutual-aid collusive attack detection in cooperative spectrum sensing. Sci. China Inf. Sci. 60(5): 59101 (2017) - 2016
- [j10]Feng Zhao, Jingyu Feng:
Supporting Trusted Soft Decision Scheme Using Volatility Decay in Cooperative Spectrum Sensing. KSII Trans. Internet Inf. Syst. 10(5): 2067-2080 (2016) - [j9]Jingyu Feng, Guangyue Lu, Honggang Wang
, Xuanhong Wang:
Supporting secure spectrum sensing data transmission against SSDH attack in cognitive radio ad hoc networks. J. Netw. Comput. Appl. 72: 140-149 (2016) - 2015
- [j8]Jingyu Feng, Guangyue Lu, Hong Chang:
Behave Well: How to Win a Pop Vacant Band via Cooperative Spectrum Sensing. KSII Trans. Internet Inf. Syst. 9(4): 1321-1336 (2015) - [j7]Jingyu Feng, Yuqing Zhang, Guangyue Lu, Wenxiu Zheng:
Securing cooperative spectrum sensing against ISSDF attack using dynamic trust evaluation in cognitive radio networks. Secur. Commun. Networks 8(17): 3157-3166 (2015) - 2014
- [j6]Jingyu Feng, Yuqing Zhang, Guangyue Lu, Liang Zhang:
Securing Cooperative Spectrum Sensing against Rational SSDF Attack in Cognitive Radio Networks. KSII Trans. Internet Inf. Syst. 8(1): 1-17 (2014) - [j5]Jingyu Feng, Guangyue Lu, Xiangcen Min:
Social Incentives for Cooperative Spectrum Sensing in Distributed Cognitive Radio Networks. KSII Trans. Internet Inf. Syst. 8(2): 355-370 (2014) - [c5]Jingyu Feng, Yuqing Zhang, Guangyue Lu:
A Soft Decision Scheme against Intermittent SSDF Attack in Cooperative Spectrum Sensing. CIT 2014: 293-298 - 2013
- [c4]Jingyu Feng, Yuqing Zhang, Guangyue Lu, Liang Zhang:
Defend against Collusive SSDF Attack Using Trust in Cooperative Spectrum Sensing Environment. TrustCom/ISPA/IUCC 2013: 1656-1661 - 2012
- [j4]Shenlong Chen, Yuqing Zhang, Qixu Liu, Jingyu Feng:
Dealing with dishonest recommendation: The trials in reputation management court. Ad Hoc Networks 10(8): 1603-1618 (2012) - [j3]Anmin Fu
, Yuqing Zhang, Zhenchao Zhu, Qi Jing, Jingyu Feng:
An efficient handover authentication scheme with privacy preservation for IEEE 802.16m network. Comput. Secur. 31(6): 741-749 (2012) - 2011
- [j2]Anmin Fu
, Yuqing Zhang, Jingyu Feng:
Security Issues and Solutions of the Key Management Protocols in IEEE 802.16j Multi-Hop Relay Network. IEICE Trans. Commun. 94-B(5): 1295-1302 (2011) - [c3]Anmin Fu
, Yuqing Zhang, Zhenchao Zhu, Jingyu Feng:
EKMP: An enhanced key management protocol for IEEE 802.16m. WCNC 2011: 1137-1142 - 2010
- [j1]Jingyu Feng, Yuqing Zhang, Hong Wang:
A Trust Management Model Based on Bi-evaluation in P2P Networks. IEICE Trans. Inf. Syst. 93-D(3): 466-472 (2010) - [c2]Shenlong Chen, Yuqing Zhang, Peng Liu, Jingyu Feng:
Coping with Traitor Attacks in Reputation Models for Wireless Sensor Networks. GLOBECOM 2010: 1-6 - [c1]Chunling Wang, Jingyu Feng:
A Study of Mutual Authentication for P2P Trust Management. IIH-MSP 2010: 474-477
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint