default search action
Yuanyu Zhang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j33]Huihui Wu, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang, Tarik Taleb:
Achieving Covertness and Secrecy: The Interplay Between Detection and Eavesdropping Attacks. IEEE Internet Things J. 11(2): 3233-3249 (2024) - [c21]Yuanyu Zhang, Jia-Ning Wang, Zhumeng Zheng, Yulong Shen, Yunsong Jiang, Mengfei Yang:
Variational AutoEncoder-Based Radio Frequency Fingerprinting for GPS Anti-spoofing. NaNA 2024: 172-178 - [i12]Jesse Atuhurra, Takanori Hara, Yuanyu Zhang, Masahiro Sasabe, Shoji Kasahara:
Dealing with Imbalanced Classes in Bot-IoT Dataset. CoRR abs/2403.18989 (2024) - [i11]Zhihao Liu, Xianliang Yang, Zichuan Liu, Yifan Xia, Wei Jiang, Yuanyu Zhang, Lijuan Li, Guoliang Fan, Lei Song, Jiang Bian:
Knowing What Not to Do: Leverage Language Model Insights for Action Space Pruning in Multi-agent Reinforcement Learning. CoRR abs/2405.16854 (2024) - [i10]Wenhao Zhang, Ji He, Yuanyu Zhang:
Covert Multicast in UAV-Enabled Wireless Communication Systems With One-hop and Two-hop Strategies. CoRR abs/2410.12287 (2024) - 2023
- [b1]Yulong Shen, Yuanyu Zhang, Xiaohong Jiang:
Secrecy, Covertness and Authentication in Wireless Communications - Physical Layer Security Approach. Wireless Networks, Springer 2023, ISBN 978-3-031-38464-6, pp. 1-360 - [j32]Yu Zhang, Shuangrui Zhao, Ji He, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang:
A Survey of Secure Communications for Satellite Internet Based on Cryptography and Physical Layer Security. IET Inf. Secur. 2023: 1-15 (2023) - [j31]Lianwei Li, Yuanyu Zhang, Cunjin Xue, Zhi Zheng:
Object-Oriented Clustering Approach to Detect Evolutions of ENSO-Related Precipitation Anomalies over Tropical Pacific Using Remote Sensing Products. Remote. Sens. 15(11): 2902 (2023) - [j30]Hui Huang, Yuanyu Zhang, Yuhang Si, Jin Wang, Dongzhi He:
Two-branch 3D convolution neural network for gait recognition. Signal Image Video Process. 17(7): 3495-3504 (2023) - [j29]Xuewen Dong, Yuanyu Zhang, Yuanxiong Guo, Yanmin Gong, Yulong Shen, Jianfeng Ma:
PRAM: A Practical Sybil-Proof Auction Mechanism for Dynamic Spectrum Access With Untruthful Attackers. IEEE Trans. Mob. Comput. 22(2): 1143-1156 (2023) - [j28]Yuanyu Zhang, Zhumeng Zheng, Ji He, Shuangrui Zhao, Qianyue Qu, Yulong Shen, Xiaohong Jiang:
Opportunistic Wiretapping/Jamming: A New Attack Model in Millimeter-Wave Wireless Networks. IEEE Trans. Wirel. Commun. 22(12): 9907-9922 (2023) - [c20]Siyu Zhu, Yuanyu Zhang, Jinxiao Zhu, Yin Chen, Yulong Shen, Xiaohong Jiang:
3D Convolution-Based Radio Frequency Fingerprinting for Satellite Authentication. GLOBECOM 2023: 7586-7591 - [c19]Yuanyu Zhang, Cheng Qian, Wenhang Bao:
Bayesian A/B Testing with Covariates. ICDM 2023: 1553-1558 - 2022
- [j27]Haiguang Zhang, Tongyue Zhang, Faxin Cao, Zhizheng Wang, Yuanyu Zhang, Yuanyuan Sun, Mark Anthony Vicente:
BCA: Bilinear Convolutional Neural Networks and Attention Networks for legal question answering. AI Open 3: 172-181 (2022) - [j26]Wei Tong, Xuewen Dong, Yulong Shen, Yuanyu Zhang, Xiaohong Jiang, Wensheng Tian:
CHChain: Secure and parallel crowdsourcing driven by hybrid blockchain. Future Gener. Comput. Syst. 131: 279-291 (2022) - [j25]Tao Jia, Chenxi Cai, Xin Li, Xi Luo, Yuanyu Zhang, Xuesong Yu:
Dynamical community detection and spatiotemporal analysis in multilayer spatial interaction networks using trajectory data. Int. J. Geogr. Inf. Sci. 36(9): 1719-1740 (2022) - [j24]Takeaki Matsunaga, Yuanyu Zhang, Masahiro Sasabe, Shoji Kasahara:
An Incentivization Mechanism with Validator Voting Profile in Proof-of-Stake-Based Blockchain. IEICE Trans. Commun. 105-B(2): 228-239 (2022) - [j23]Masahiro Sasabe, Masanari Yamamoto, Yuanyu Zhang, Shoji Kasahara:
Block diffusion delay attack and its countermeasures in a Bitcoin network. Int. J. Netw. Manag. 32(3) (2022) - [j22]Yuanyu Zhang, Yulong Shen, Xiaohong Jiang, Shoji Kasahara:
Secure Millimeter-Wave Ad Hoc Communications Using Physical Layer Security. IEEE Trans. Inf. Forensics Secur. 17: 99-114 (2022) - [c18]Jiandong Wang, Xiang Xia, Zhiwei Zhang, Yuanyu Zhang, Yulong Shen, Baoquan Ren:
Class Continuous LOD Algorithm for Lightweight WebGL Rendering Optimization. NaNA 2022: 489-494 - [i9]Yuanyu Zhang, Zhumeng Zheng, Ji He, Shuangrui Zhao, Qianyue Qu, Yulong Shen, Xiaohong Jiang:
Opportunistic Wiretapping/Jamming: A New Attack Model in Millimeter-Wave Wireless Networks. CoRR abs/2207.05383 (2022) - 2021
- [j21]Xuening Liao, Zhenqiang Wu, Yuanyu Zhang, Xiaohong Jiang:
Buffer-aided relay selection for secure communication in two-hop wireless networks with limited packet lifetime. Ad Hoc Networks 121: 102580 (2021) - [j20]Xuening Liao, Zhenqiang Wu, Yuanyu Zhang, Xiaohong Jiang:
Trust-aware buffer-aided relay selection for secure communications in cooperative wireless systems. Comput. Networks 199: 108456 (2021) - [j19]Lianwei Li, Yangfeng Xu, Cunjin Xue, Yuxuan Fu, Yuanyu Zhang:
A Process-Oriented Approach to Identify Evolutions of Sea Surface Temperature Anomalies with a Time-Series of a Raster Dataset. ISPRS Int. J. Geo Inf. 10(8): 500 (2021) - [j18]Yuanyu Zhang, Mirei Yutaka, Masahiro Sasabe, Shoji Kasahara:
Attribute-Based Access Control for Smart Cities: A Smart-Contract-Driven Framework. IEEE Internet Things J. 8(8): 6372-6384 (2021) - [j17]Yuanyu Zhang, Ruka Nakanishi, Masahiro Sasabe, Shoji Kasahara:
Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things. Sensors 21(15): 5053 (2021) - [c17]Christopher Wiraatmaja, Yuanyu Zhang, Masahiro Sasabe, Shoji Kasahara:
Cost-Efficient Blockchain-Based Access Control for the Internet of Things. GLOBECOM 2021: 1-6 - [c16]Kentaro Fujita, Yuanyu Zhang, Masahiro Sasabe, Shoji Kasahara:
Intelligent Mining Pool Selection in the Case of Unobservable Block Withholding Attack. IEEE ICBC 2021: 1-4 - [c15]Yuanyu Zhang, Ji He, Qianyue Qu, Zhiwei Zhang:
Wiretapping or Jamming: On Eavesdropper Attacking Strategy in mmWave Ad Hoc Networks. NaNA 2021: 8-14 - [i8]Ruka Nakanishi, Yuanyu Zhang, Masahiro Sasabe, Shoji Kasahara:
Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things. CoRR abs/2103.04016 (2021) - 2020
- [j16]Xuening Liao, Yuanyu Zhang, Zhenqiang Wu, Xiaohong Jiang:
Buffer-aided relay selection for secure two-hop wireless networks with decode-and-forward relays and a diversity-combining eavesdropper. Ad Hoc Networks 98 (2020) - [j15]Xiaochen Li, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang:
Secrecy transmission capacity in mobile ad hoc networks with security-aware Aloha protocol. IET Commun. 14(22): 4135-4141 (2020) - [j14]Yuta Nakamura, Yuanyu Zhang, Masahiro Sasabe, Shoji Kasahara:
Exploiting Smart Contracts for Capability-Based Access Control in the Internet of Things. Sensors 20(6): 1793 (2020) - [j13]Huihui Wu, Yuanyu Zhang, Xuening Liao, Yulong Shen, Xiaohong Jiang:
On covert throughput performance of two-way relay covert wireless communications. Wirel. Networks 26(5): 3275-3289 (2020) - [c14]Kentaro Fujita, Yuanyu Zhang, Masahiro Sasabe, Shoji Kasahara:
Mining Pool Selection Problem in the Presence of Block Withholding Attack. Blockchain 2020: 321-326 - [c13]Ruka Nakanishi, Yuanyu Zhang, Masahiro Sasabe, Shoji Kasahara:
IOTA-Based Access Control Framework for the Internet of Things. BRAINS 2020: 87-91 - [c12]Qianyue Qu, Yuanyu Zhang, Shoji Kasahara:
On Eavesdropping Region Characterization in Hybrid Wireless Communications. NaNA 2020: 29-34 - [c11]Tong Wang, Yuanyu Zhang, Yongbin Li:
A Parallel-Attention Model for Tumor Named Entity Recognition in Spanish. IberLEF@SEPLN 2020: 438-446 - [i7]Huihui Wu, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang, Weidong Yang:
Achieving Covertness and Secrecy: A New Paradigm for Secure Wireless Communication. CoRR abs/2008.00147 (2020) - [i6]Yuanyu Zhang, Yulong Shen, Xiaohong Jiang, Shoji Kasahara:
Secure Millimeter-Wave Ad Hoc Communications Using Physical Layer Security. CoRR abs/2009.01988 (2020) - [i5]Yuanyu Zhang, Mirei Yutaka, Masahiro Sasabe, Shoji Kasahara:
Attribute-Based Access Control for Smart Cities: A Smart Contract-Driven Framework. CoRR abs/2009.02933 (2020)
2010 – 2019
- 2019
- [j12]Yuanyu Zhang, Shoji Kasahara, Yulong Shen, Xiaohong Jiang, Jianxiong Wan:
Smart Contract-Based Access Control for the Internet of Things. IEEE Internet Things J. 6(2): 1594-1605 (2019) - [j11]Yuanyu Zhang, Yulong Shen, Xiaohong Jiang, Shoji Kasahara:
Mode Selection and Spectrum Partition for D2D Inband Communications: A Physical Layer Security Perspective. IEEE Trans. Commun. 67(1): 623-638 (2019) - [j10]Yuanyu Zhang, Yulong Shen, Xiaohong Jiang:
Friendship-based cooperative jamming for secure communication in Poisson networks. Wirel. Networks 25(7): 4077-4095 (2019) - [c10]Yuta Nakamura, Yuanyu Zhang, Masahiro Sasabe, Shoji Kasahara:
Capability-Based Access Control for the Internet of Things: An Ethereum Blockchain-Based Scheme. GLOBECOM 2019: 1-6 - [c9]Mirei Yutaka, Yuanyu Zhang, Masahiro Sasabe, Shoji Kasahara:
Using Ethereum Blockchain for Distributed Attribute-Based Access Control in the Internet of Things. GLOBECOM 2019: 1-6 - [c8]Xuening Liao, Yuanyu Zhang, Bo Liu, Zhenqiang Wu:
Secure Communication in Two-Hop Buffer-Aided Networks with Limited Packet Lifetime. NaNA 2019: 102-106 - 2018
- [j9]Jianxiong Wan, Xiang Gui, Shoji Kasahara, Yuanyu Zhang, Ran Zhang:
Air Flow Measurement and Management for Improving Cooling and Energy Efficiency in Raised-Floor Data Centers: A Survey. IEEE Access 6: 48867-48901 (2018) - [j8]Xiaochen Li, Yuanyu Zhang, Shuangrui Zhao, Yulong Shen, Xiaohong Jiang:
Exact secrecy throughput capacity study in mobile ad hoc networks. Ad Hoc Networks 72: 105-114 (2018) - [j7]Yuanyu Zhang, Yulong Shen, Hua Wang, Yanchun Zhang, Xiaohong Jiang:
On Secure Wireless Communications for Service Oriented Computing. IEEE Trans. Serv. Comput. 11(2): 318-328 (2018) - [j6]Xuening Liao, Yuanyu Zhang, Zhenqiang Wu, Yulong Shen, Xiaohong Jiang, Hiroshi Inamura:
On Security-Delay Trade-Off in Two-Hop Wireless Networks With Buffer-Aided Relay Selection. IEEE Trans. Wirel. Commun. 17(3): 1893-1906 (2018) - [i4]Yuanyu Zhang, Yulong Shen, Xiaohong Jiang, Shoji Kasahara:
Mode Selection and Spectrum Partition for D2D Inband Communications: A Physical Layer Security Perspective. CoRR abs/1802.03147 (2018) - [i3]Yuanyu Zhang, Shoji Kasahara, Yulong Shen, Xiaohong Jiang, Jianxiong Wan:
Smart Contract-Based Access Control for the Internet of Things. CoRR abs/1802.04410 (2018) - 2017
- [j5]Aziguli Wulamu, Yuanyu Zhang, Yonghong Xie, Dezheng Zhang, Xiong Luo, Chunmiao Li, Yao Zhang:
A Robust Text Classifier Based on Denoising Deep Neural Network in the Analysis of Big Data. Sci. Program. 2017: 3610378:1-3610378:10 (2017) - [c7]Aziguli Wulamu, Yuanyu Zhang, Yonghong Xie, Yang Xu, Yujia Chen:
Structural technology research on symptom data of Chinese medicine. Healthcom 2017: 1-4 - 2016
- [j4]Yuanyu Zhang, Yulong Shen, Hua Wang, Jianming Yong, Xiaohong Jiang:
On Secure Wireless Communications for IoT Under Eavesdropper Collusion. IEEE Trans Autom. Sci. Eng. 13(3): 1281-1293 (2016) - [c6]Yujia Chen, Yifeng Peng, Leiqi Wang, Yuanyu Zhang, Tao Zhu:
Cyber-Enabled Traditional Chinese Medicine. iThings/GreenCom/CPSCom/SmartData 2016: 449-450 - [c5]Ji He, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang:
Link Selection for Secure Two-Hop Transmissions in Buffer-Aided Relay Wireless Networks. NaNA 2016: 64-68 - [c4]Pinchang Zhang, Yuanyu Zhang, Bin Yang, Xiaolan Liu:
Optimal Relay-Destination Pair Selection Mechanism for Secure Communications in Wireless Cooperative Relay Networks. NaNA 2016: 84-89 - [c3]Xiaochen Li, Shuangrui Zhao, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang:
Exact Secrecy Throughput of MANETs with Guard Zone. NaNA 2016: 167-172 - [c2]Xuening Liao, Zhenqiang Wu, Yuanyu Zhang, Xiaohong Jiang:
The Delay-Security Trade-Off in Two-Hop Buffer-Aided Relay Wireless Network. NaNA 2016: 173-177 - [i2]Yuanyu Zhang, Yulong Shen, Hua Wang, Xiaohong Jiang:
Friendship-based Cooperative Jamming for Secure Communication in Poisson Networks. CoRR abs/1609.07830 (2016) - 2015
- [j3]Yuanyu Zhang, Yulong Shen, Jinxiao Zhu, Xiaohong Jiang:
Eavesdropper-Tolerance Capability in Two-Hop Wireless Networks via Cooperative Jamming. Ad Hoc Sens. Wirel. Networks 29(1-4): 113-131 (2015) - [c1]Bo Liu, Yuanyu Zhang, Xiaohong Jiang, Zhenqiang Wu:
An Energy-Efficient Data Collection Scheme in Body Area Nanonetworks. CANDAR 2015: 240-245 - 2014
- [j2]Yulong Shen, Yuanyu Zhang:
Transmission protocol for secure big data in two-hop wireless networks with cooperative jamming. Inf. Sci. 281: 201-210 (2014) - [j1]Yulong Shen, Yuanyu Zhang:
Exploring Relay Cooperation for Secure and Reliable Transmission in Two-HopWireless Networks. EAI Endorsed Trans. Scalable Inf. Syst. 1(2): e2 (2014) - 2013
- [i1]Yuanyu Zhang, Yulong Shen, Hua Wang, Xiaohong Jiang:
On Eavesdropper-Tolerance Capability of Two-Hop Wireless Networks. CoRR abs/1312.3748 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-30 01:14 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint