default search action
Zheng Yan 0002
Person information
- unicode name: 闫峥
- affiliation: Xidian University, School of Cyber Engineering, State Key Laboratory on Integrated Services Networks, Xi'an, China
- affiliation (former): Aalto University, Espoo, Finland
- affiliation (former): Nokia Research Center, Helsinki, Finland
- affiliation (PhD 2007): Helsinki University of Technology, Finland
Other persons with the same name
- Zheng Yan — disambiguation page
- Zheng Yan 0001 — University of Technology Sydney, Centre for Artificial Intelligence, Broadway, NSW, Australia (and 2 more)
- Zheng Yan 0003 — Shanghai Jiao Tong University, Department of Electrical Engineering, School of Electronics, Information and Electrical Engineering, China (and 1 more)
- Zheng Yan 0004 (aka: Zheng John Yan) — Jet.com/Walmart Labs, Hoboken, NJ, USA
- Zheng Yan 0005 — State University of New York at Albany, USA
- Zheng Yan 0006 — Yangtze University, Jingzhou, China (and 1 more)
- Zheng Yan 0007 — Meta Platforms, Inc., Menlo Park, CA, USA (and 1 more)
- Zheng Yan 0008 — Huawei Technologies Co., Ltd., Shenzhen, China
- Zheng Yan 0009 — Huaqiao University, Xiamen, Fujian, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j221]Kai Huang, Zhengzi Xu, Su Yang, Hongyu Sun, Xuejun Li, Zheng Yan, Yuqing Zhang:
Evolving Paradigms in Automated Program Repair: Taxonomy, Challenges, and Opportunities. ACM Comput. Surv. 57(2): 36:1-36:43 (2025) - [j220]Baochen Yan, Jiahe Lan, Zheng Yan:
Backdoor Attacks against Voice Recognition Systems: A Survey. ACM Comput. Surv. 57(3): 78:1-78:35 (2025) - 2024
- [j219]Kangde Liu, Zheng Yan, Xueqin Liang, Raimo Kantola, Chuangyue Hu:
A survey on blockchain-enabled federated learning and its prospects with digital twin. Digit. Commun. Networks 10(2): 248-264 (2024) - [j218]Zhao Li, Xiujuan Liang, Yinghou Liu, Jia Liu, Zheng Yan:
Joint alignment and steering to manage interference. Digit. Commun. Networks 10(2): 429-438 (2024) - [j217]Yifan Zhang, Roberto Di Candia, Hüseyin Yigitler, Riku Jäntti, Zheng Yan:
Covert Backscatter Communication in the Presence of Multi-Antenna Eavesdropper. IEEE Commun. Lett. 28(8): 1770-1774 (2024) - [j216]Lanyan Wang, Wenxiu Ding, Zheng Yan, Su Qiu, Mingjun Wang, Zhiguo Wan:
EDDAC: An Efficient and Decentralized Data Access Control Scheme With Attribute Privacy Preservation. IEEE Internet Things J. 11(8): 14579-14592 (2024) - [j215]Xiaokang Zhou, Wang Huang, Wei Liang, Zheng Yan, Jianhua Ma, Yi Pan, Kevin I-Kai Wang:
Federated distillation and blockchain empowered secure knowledge sharing for Internet of medical Things. Inf. Sci. 662: 120217 (2024) - [j214]Xiaoxuan Xie, Jialei Zhang, Zheng Yan, Haiguang Wang, Tieyan Li:
Can Routing Be Effectively Learned in Integrated Heterogeneous Networks? IEEE Netw. 38(1): 210-218 (2024) - [j213]Gao Liu, Zheng Yan, Dongliang Wang, Haiguang Wang, Tieyan Li:
DePTVM: Decentralized Pseudonym and Trust Value Management for Integrated Networks. IEEE Trans. Dependable Secur. Comput. 21(1): 110-124 (2024) - [j212]Yuxuan Cai, Wenxiu Ding, Yuxuan Xiao, Zheng Yan, Ximeng Liu, Zhiguo Wan:
SecFed: A Secure and Efficient Federated Learning Based on Multi-Key Homomorphic Encryption. IEEE Trans. Dependable Secur. Comput. 21(4): 3817-3833 (2024) - [j211]Haomeng Xie, Zheng Yan:
SPCEX: Secure and Privacy-Preserving Cryptocurrency Exchange. IEEE Trans. Dependable Secur. Comput. 21(5): 4404-4417 (2024) - [j210]Jie Wang, Zheng Yan, Jiahe Lan, Elisa Bertino, Witold Pedrycz:
TrustGuard: GNN-Based Robust and Explainable Trust Evaluation With Dynamicity Support. IEEE Trans. Dependable Secur. Comput. 21(5): 4433-4450 (2024) - [j209]Jiajun Li, Pu Wang, Zheng Yan, Yishan Yang, Kai Zeng:
BGKey: Group Key Generation for Backscatter Communications Among Multiple Devices. IEEE Trans. Inf. Forensics Secur. 19: 2470-2486 (2024) - [j208]Yicheng Liu, Zhao Li, Kang G. Shin, Zheng Yan, Jia Liu:
iCoding: Countermeasure Against Interference and Eavesdropping in Wireless Communications. IEEE Trans. Inf. Forensics Secur. 19: 9188-9203 (2024) - [j207]Yishan Yang, Jiajun Li, Niya Luo, Zheng Yan, Yifan Zhang, Kai Zeng:
BatchAuth: A Physical Layer Batch Authentication Scheme for Multiple Backscatter Devices. IEEE Trans. Inf. Forensics Secur. 19: 9452-9466 (2024) - [j206]Masoud Kaveh, Zheng Yan, Riku Jäntti:
Secrecy Performance Analysis of RIS-Aided Smart Grid Communications. IEEE Trans. Ind. Informatics 20(4): 5415-5427 (2024) - [j205]Zhao Li, Siwei Le, Jie Chen, Kang G. Shin, Jia Liu, Zheng Yan, Riku Jäntti:
Decomposed and Distributed Modulation to Achieve Secure Transmission. IEEE Trans. Mob. Comput. 23(12): 11172-11190 (2024) - [j204]Xiaokang Zhou, Jiayi Wu, Wei Liang, Kevin I-Kai Wang, Zheng Yan, Laurence T. Yang, Qun Jin:
Reconstructed Graph Neural Network With Knowledge Distillation for Lightweight Anomaly Detection. IEEE Trans. Neural Networks Learn. Syst. 35(9): 11817-11828 (2024) - [j203]Shufan Fei, Zheng Yan, Haomeng Xie, Guocang Liu:
Sec-E2E: End-to-End Communication Security in LS-HetNets Based on Blockchain. IEEE Trans. Netw. Sci. Eng. 11(1): 761-778 (2024) - [j202]Zhao Li, Chengyu Liu, Lijuan Zhang, Kang G. Shin, Jia Liu, Zheng Yan, Riku Jäntti:
Exploiting Interference With an Intelligent Reflecting Surface to Enhance Data Transmission. IEEE Trans. Wirel. Commun. 23(8): 9776-9792 (2024) - [j201]Yishan Yang, Zheng Yan, Kai Zeng, Pu Wang, Jiajun Li:
Physical Layer Authentication in Backscatter Communication: A Review. IEEE Wirel. Commun. 31(3): 264-270 (2024) - [c104]Jiahe Lan, Yu Chen, Zheng Yan:
Use or Not: A Qualitative Study on the User Adoption and Abandonment of Voice Shopping with Smart Speakers. HICSS 2024: 4000-4009 - [c103]Zhao Li, Chengyu Liu, Lijuan Zhang, Zheng Yan, Jia Liu, Riku Jäntti, Zhixian Chang:
IRS Empowered Interference Utilization for Efficient Data Transmission. ICC 2024: 379-384 - [c102]Jingdong Chang, Jiajun Li, Yishan Yang, Yifan Zhang, Masoud Kaveh, Zheng Yan:
APAuth: Authenticate an Access Point by Backscatter Devices. ICC 2024: 3616-3621 - [c101]Jiahe Lan, Jie Wang, Baochen Yan, Zheng Yan, Elisa Bertino:
FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge. SP 2024: 1646-1664 - [c100]Farshad Rostami Ghadi, Masoud Kaveh, Kai-Kit Wong, Riku Jäntti, Zheng Yan:
On Performance of FAS-Aided Wireless Powered NOMA Communication Systems. WiMob 2024: 496-501 - [i16]Farshad Rostami Ghadi, Masoud Kaveh, Kai-Kit Wong, Riku Jäntti, Zheng Yan:
On Performance of FAS-aided Wireless Powered NOMA Communication Systems. CoRR abs/2405.11520 (2024) - [i15]Xinyu Peng, Feng Han, Li Peng, Weiran Liu, Zheng Yan, Kai Kang, Xinyuan Zhang, Guoxing Wei, Jianling Sun, Jinfei Liu:
MapComp: A Secure View-based Collaborative Analytics Framework for Join-Group-Aggregation. CoRR abs/2408.01246 (2024) - [i14]Masoud Kaveh, Farshad Rostami Ghadi, Zheng Yan, Riku Jäntti:
RIS-Aided Backscattering Tag-to-Tag Networks: Performance Analysis. CoRR abs/2408.16853 (2024) - [i13]Masoud Kaveh, Farshad Rostami Ghadi, Zhao Li, Zheng Yan, Riku Jäntti:
Secure Backscatter Communications Through RIS: Modeling and Performance. CoRR abs/2410.01829 (2024) - [i12]Masoud Kaveh, Farshad Rostami Ghadi, Yishan Yang, Zheng Yan, Riku Jäntti:
Physical Layer Mutual Authentication in RIS-Aided Monostatic Backscatter Communications: A Dual-Edged Analysis. CoRR abs/2410.02778 (2024) - [i11]Panpan Han, Zheng Yan, Laurence T. Yang, Elisa Bertino:
P2C2T: Preserving the Privacy of Cross-Chain Transfer. IACR Cryptol. ePrint Arch. 2024: 1467 (2024) - 2023
- [j200]Rong Han, Zheng Yan, Xueqin Liang, Laurence T. Yang:
How Can Incentive Mechanisms and Blockchain Benefit with Each Other? A Survey. ACM Comput. Surv. 55(7): 136:1-136:38 (2023) - [j199]Ping Wang, Haichang Gao, Xiaoyan Guo, Chenxuan Xiao, Fuqi Qi, Zheng Yan:
An Experimental Investigation of Text-based CAPTCHA Attacks and Their Robustness. ACM Comput. Surv. 55(9): 196:1-196:38 (2023) - [j198]Zhao Li, Pintian Lyu, Jun Li, Zhixian Chang, Jia Liu, Zheng Yan:
SCIM: Incorporating secure communication and interference management in one operation. Digit. Commun. Networks 9(2): 512-522 (2023) - [j197]Panpan Han, Zheng Yan, Wenxiu Ding, Shufan Fei, Zhiguo Wan:
A Survey on Cross-chain Technologies. Distributed Ledger Technol. Res. Pract. 2(2): 1-30 (2023) - [j196]Hui Han, Xuyang Jing, Zheng Yan, Witold Pedrycz:
ExtendedSketch+: Super host identification and network host trust evaluation with memory efficiency and high accuracy. Inf. Fusion 92: 300-312 (2023) - [j195]Zhonghong Ou, Zhaofengnian Wang, Fenrui Xiao, Baiqiao Xiong, Hongxing Zhang, Meina Song, Zheng Yan, Pan Hui:
AD-RCNN: Adaptive Dynamic Neural Network for Small Object Detection. IEEE Internet Things J. 10(5): 4226-4238 (2023) - [j194]Yijia Liu, Jie Wang, Zheng Yan, Zhiguo Wan, Riku Jäntti:
A Survey on Blockchain-Based Trust Management for Internet of Things. IEEE Internet Things J. 10(7): 5898-5922 (2023) - [j193]Mingjun Wang, Dongsheng Zhao, Zheng Yan, Haiguang Wang, Tieyan Li:
XAuth: Secure and Privacy-Preserving Cross-Domain Handover Authentication for 5G HetNets. IEEE Internet Things J. 10(7): 5962-5976 (2023) - [j192]Yulei Wu, Ning Zhang, Zheng Yan, Mohammed Atiquzzaman, Yang Xiang:
Guest Editorial Special Issue on AI and Blockchain-Powered IoT Sustainable Computing. IEEE Internet Things J. 10(8, April 15): 6531-6534 (2023) - [j191]Yinglong Dai, Zheng Yan, Jiangchang Cheng, Xiaojun Duan, Guojun Wang:
Analysis of multimodal data fusion from an information theory perspective. Inf. Sci. 623: 164-183 (2023) - [j190]Hui Bai, Xixun Yu, Zheng Yan, Jialei Zhang, Laurence T. Yang:
VeriORouting: Verification on intelligent routing outsourced to the cloud. Inf. Sci. 633: 410-430 (2023) - [j189]Li Peng, Zheng Yan, Xueqin Liang, Xixun Yu:
SecDedup: Secure data deduplication with dynamic auditing in the cloud. Inf. Sci. 644: 119279 (2023) - [j188]Xiaojun Cheng, Xuyang Jing, Zheng Yan, Xian Li, Pu Wang, Wei Wu:
ALSketch: An adaptive learning-based sketch for accurate network measurement under dynamic traffic distribution. J. Netw. Comput. Appl. 216: 103659 (2023) - [j187]Ruoyu Yin, Zheng Yan, Xueqin Liang, Haomeng Xie, Zhiguo Wan:
A survey on privacy preservation techniques for blockchain interoperability. J. Syst. Archit. 140: 102892 (2023) - [j186]Xiaokang Zhou, Xuzhe Zheng, Xuesong Cui, Jiashuai Shi, Wei Liang, Zheng Yan, Laurence T. Yang, Shohei Shimizu, Kevin I-Kai Wang:
Digital Twin Enhanced Federated Reinforcement Learning With Lightweight Knowledge Distillation in Mobile Networks. IEEE J. Sel. Areas Commun. 41(10): 3191-3211 (2023) - [j185]Masoud Kaveh, Farshad Rostami Ghadi, Riku Jäntti, Zheng Yan:
Secrecy Performance Analysis of Backscatter Communications with Side Information. Sensors 23(20): 8358 (2023) - [j184]Xiaokang Zhou, Xiaozhou Ye, Kevin I-Kai Wang, Wei Liang, Nirmal-Kumar C. Nair, Shohei Shimizu, Zheng Yan, Qun Jin:
Hierarchical Federated Learning With Social Context Clustering-Based Participant Selection for Internet of Medical Things Applications. IEEE Trans. Comput. Soc. Syst. 10(4): 1742-1751 (2023) - [j183]Xixun Yu, Hui Bai, Zheng Yan, Rui Zhang:
VeriDedup: A Verifiable Cloud Data Deduplication Scheme With Integrity and Duplication Proof. IEEE Trans. Dependable Secur. Comput. 20(1): 680-694 (2023) - [j182]Rui Zhang, Zheng Yan, Xuerui Wang, Robert H. Deng:
VOLERE: Leakage Resilient User Authentication Based on Personal Voice Challenges. IEEE Trans. Dependable Secur. Comput. 20(2): 1002-1016 (2023) - [j181]Dan Liu, Zheng Yan, Wenxiu Ding, Yuxuan Cai, Yaxing Chen, Zhiguo Wan:
ESMAC: Efficient and Secure Multi-Owner Access Control With TEE in Multi-Level Data Processing. IEEE Trans. Dependable Secur. Comput. 20(5): 4052-4069 (2023) - [j180]Zhen Liu, Changzhen Hu, Chun Shan, Zheng Yan:
ADCaDeM: A Novel Method of Calculating Attack Damage Based on Differential Manifolds. IEEE Trans. Dependable Secur. Comput. 20(5): 4070-4084 (2023) - [j179]Haomeng Xie, Shufan Fei, Zheng Yan, Yang Xiao:
SofitMix: A Secure Offchain-Supported Bitcoin-Compatible Mixing Protocol. IEEE Trans. Dependable Secur. Comput. 20(5): 4311-4324 (2023) - [j178]Jiajun Li, Pu Wang, Long Jiao, Zheng Yan, Kai Zeng, Yishan Yang:
Security Analysis of Triangle Channel-Based Physical Layer Key Generation in Wireless Backscatter Communications. IEEE Trans. Inf. Forensics Secur. 18: 948-964 (2023) - [j177]Ke Yan, Xinke Chen, Xiaokang Zhou, Zheng Yan, Jianhua Ma:
Physical Model Informed Fault Detection and Diagnosis of Air Handling Units Based on Transformer Generative Adversarial Network. IEEE Trans. Ind. Informatics 19(2): 2192-2199 (2023) - [j176]Rui Zhang, Zheng Yan, Xuerui Wang, Robert H. Deng:
LiVoAuth: Liveness Detection in Voiceprint Authentication With Random Challenges and Detection Modes. IEEE Trans. Ind. Informatics 19(6): 7676-7688 (2023) - [j175]Yan Chen, Tian Shu, Xiaokang Zhou, Xuzhe Zheng, Akira Kawai, Kaoru Fueda, Zheng Yan, Wei Liang, Kevin I-Kai Wang:
Graph Attention Network With Spatial-Temporal Clustering for Traffic Flow Forecasting in Intelligent Transportation System. IEEE Trans. Intell. Transp. Syst. 24(8): 8727-8737 (2023) - [j174]Yaxing Chen, Qinghua Zheng, Zheng Yan:
Efficient Bi-objective SQL Optimization for Enclaved Cloud Databases with Differentially Private Padding. ACM Trans. Database Syst. 48(2): 6:1-6:40 (2023) - [j173]Xi Xu, Qinghua Zheng, Zheng Yan, Ming Fan, Ang Jia, Zhaohui Zhou, Haijun Wang, Ting Liu:
PatchDiscovery: Patch Presence Test for Identifying Binary Vulnerabilities Based on Key Basic Blocks. IEEE Trans. Software Eng. 49(12): 5279-5294 (2023) - [j172]Xiaokang Zhou, Wei Liang, Kevin I-Kai Wang, Zheng Yan, Laurence T. Yang, Wei Wei, Jianhua Ma, Qun Jin:
Decentralized P2P Federated Learning for Privacy-Preserving and Resilient Mobile Robotic Systems. IEEE Wirel. Commun. 30(2): 82-89 (2023) - [c99]Guocang Liu, Haoxiang Han, Wenxiu Ding, Shufan Fei, Zheng Yan:
Demo Paper: Anonymous Authentication on Trust in Blockchain-Based Mobile Crowdsourcing System. Blockchain 2023: 140-144 - [c98]Zhao Li, Siwei Le, Jie Chen, Kang G. Shin, Riku Jäntti, Zheng Yan, Jia Liu:
Decomposed and Distributed Modulation to Achieve Secure Transmission. GLOBECOM 2023: 5378-5383 - [c97]Yishan Yang, Masoud Kaveh, Jiajun Li, Yifan Zhang, Zheng Yan, Kai Zeng:
BatAu: A Batch Authentication Scheme for Backscatter Devices in a Smart Home Network. ICC 2023: 4528-4533 - [c96]Jialei Zhang, Xiaoxuan Xie, Zheng Yan, Haiguang Wang, Tieyan Li:
CustTest: An Effective Testbed for Testing Customized Routing in Integrated Heterogeneous Networks. ICPADS 2023: 783-790 - [c95]Jiahui Wang, Yulong Fu, Mengru Liu, Jin Cao, Hui Li, Zheng Yan:
Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft Biometrics. ISPEC 2023: 52-73 - [c94]Na Wang, Gaofei Wu, Jingfeng Rong, Zheng Yan, Qiuling Yue, Jinglu Hu, Yuqing Zhang:
Cross-Border Data Security from the Perspective of Risk Assessment. ISPEC 2023: 91-104 - [c93]Jingdong Chang, Zhao Li, Masoud Kaveh, Yifan Zhang, Jiajun Li, Zheng Yan:
A Survey on AI-Enabled Attacks and AI-Empowered Countermeasures in Physical Layer. WF-IoT 2023: 1-7 - [c92]Farshad Rostami Ghadi, Masoud Kaveh, Zheng Yan, Riku Jäntti:
Secure Wireless Powered Communications Under Fisher-Snedecor $\mathcal{F}$ Fading Channels. WF-IoT 2023: 1-5 - [c91]Masoud Kaveh, Zhao Li, Zheng Yan, Riku Jäntti:
A Summery of the First Workshop on Backscatter Communication Security in Internet of Things Environment. WF-IoT 2023: 1-2 - [e6]Weizhi Meng, Zheng Yan, Vincenzo Piuri:
Information Security Practice and Experience - 18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24-25, 2023, Proceedings. Lecture Notes in Computer Science 14341, Springer 2023, ISBN 978-981-99-7031-5 [contents] - [i10]Kai Huang, Zhengzi Xu, Su Yang, Hongyu Sun, Xuejun Li, Zheng Yan, Yuqing Zhang:
A Survey on Automated Program Repair Techniques. CoRR abs/2303.18184 (2023) - [i9]Jie Wang, Zheng Yan, Jiahe Lan, Elisa Bertino, Witold Pedrycz:
TrustGuard: GNN-based Robust and Explainable Trust Evaluation with Dynamicity Support. CoRR abs/2306.13339 (2023) - [i8]Baochen Yan, Jiahe Lan, Zheng Yan:
Backdoor Attacks against Voice Recognition Systems: A Survey. CoRR abs/2307.13643 (2023) - [i7]Changan Yang, Yaxing Chen, Yao Zhang, Helei Cui, Zhiwen Yu, Bin Guo, Zheng Yan, Zijiang Yang:
RaftFed: A Lightweight Federated Learning Framework for Vehicular Crowd Intelligence. CoRR abs/2310.07268 (2023) - [i6]Jiahe Lan, Jie Wang, Baochen Yan, Zheng Yan, Elisa Bertino:
FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge. CoRR abs/2312.09665 (2023) - 2022
- [j171]Zhao Li, Bigui Zhang, Chengyu Liu, Zhixian Chang, Kang G. Shin, Zheng Yan:
Framed Fidelity MAC: Losslessly packing multi-user transmissions in a virtual point-to-point framework. Comput. Networks 219: 109425 (2022) - [j170]Jie Wang, Zheng Yan, Haiguang Wang, Tieyan Li, Witold Pedrycz:
A Survey on Trust Models in Heterogeneous Networks. IEEE Commun. Surv. Tutorials 24(4): 2127-2162 (2022) - [j169]Shufan Fei, Zheng Yan, Wenxiu Ding, Haomeng Xie:
Security Vulnerabilities of SGX and Countermeasures: A Survey. ACM Comput. Surv. 54(6): 126:1-126:36 (2022) - [j168]Zheng Yan, Qinghua Zheng, Yulei Wu, Yaliang Zhao, Mohammed Atiquzzaman:
Guest editorial: Blockchain-enabled technologies for cyber-physical systems and big data applications. Digit. Commun. Networks 8(5): 589-590 (2022) - [j167]Haoxiang Han, Shufan Fei, Zheng Yan, Xiaokang Zhou:
A survey on blockchain-based integrity auditing for cloud data. Digit. Commun. Networks 8(5): 591-603 (2022) - [j166]Wentao Wei, Jie Wang, Zheng Yan, Wenxiu Ding:
EPMDroid: Efficient and privacy-preserving malware detection based on SGX through data fusion. Inf. Fusion 82: 43-57 (2022) - [j165]Hui Han, Zheng Yan, Xuyang Jing, Witold Pedrycz:
Applications of sketches in network traffic measurement: A survey. Inf. Fusion 82: 58-85 (2022) - [j164]Wei Feng, Zheng Yan, Laurence T. Yang, Qinghua Zheng:
Anonymous Authentication on Trust in Blockchain-Based Mobile Crowdsourcing. IEEE Internet Things J. 9(16): 14185-14202 (2022) - [j163]Xueqin Liang, Zheng Yan, Raimo Kantola:
GAIMMO: A Grade-Driven Auction-Based Incentive Mechanism With Multiple Objectives for Crowdsourcing Managed by Blockchain. IEEE Internet Things J. 9(18): 17488-17502 (2022) - [j162]Shushu Liu, Zheng Yan:
Efficient Privacy Protection Protocols for 5G-Enabled Positioning in Industrial IoT. IEEE Internet Things J. 9(19): 18527-18538 (2022) - [j161]Yilin Li, Shushu Liu, Zheng Yan, Robert H. Deng:
Secure 5G Positioning With Truth Discovery, Attack Detection, and Tracing. IEEE Internet Things J. 9(22): 22220-22229 (2022) - [j160]Mehrnoosh Monshizadeh, Vikramajeet Khatri, Raimo Kantola, Zheng Yan:
A deep density based and self-determining clustering approach to label unknown traffic. J. Netw. Comput. Appl. 207: 103513 (2022) - [j159]Jiahe Lan, Rui Zhang, Zheng Yan, Jie Wang, Yu Chen, Ronghui Hou:
Adversarial attacks and defenses in Speaker Recognition Systems: A survey. J. Syst. Archit. 127: 102526 (2022) - [j158]Jialei Zhang, Zheng Yan, Shufan Fei, Mingjun Wang, Tieyan Li, Haiguang Wang:
Is Today's End-to-End Communication Security Enough for 5G and Its Beyond? IEEE Netw. 36(1): 105-112 (2022) - [j157]Zheng Yan, Laurence T. Yang, Tieyan Li, Yoan Miche, Shui Yu, Stephen S. Yau:
Guest Editorial: Trust, Security and Privacy of 6G. IEEE Netw. 36(4): 100-102 (2022) - [j156]Gao Liu, Huidong Dong, Zheng Yan, Xiaokang Zhou, Shohei Shimizu:
B4SDC: A Blockchain System for Security Data Collection in MANETs. IEEE Trans. Big Data 8(3): 739-752 (2022) - [j155]Angtai Li, Yu Chen, Zheng Yan, Xiaokang Zhou, Shohei Shimizu:
A Survey on Integrity Auditing for Data Storage in the Cloud: From Single Copy to Multiple Replicas. IEEE Trans. Big Data 8(5): 1428-1442 (2022) - [j154]Xuyang Jing, Zheng Yan, Yinghua Shen, Witold Pedrycz, Ji Yang:
A Group-Based Distance Learning Method for Semisupervised Fuzzy Clustering. IEEE Trans. Cybern. 52(5): 3083-3096 (2022) - [j153]Xuyang Jing, Hui Han, Zheng Yan, Witold Pedrycz:
SuperSketch: A Multi-Dimensional Reversible Data Structure for Super Host Identification. IEEE Trans. Dependable Secur. Comput. 19(4): 2741-2754 (2022) - [j152]Xuyang Jing, Zheng Yan, Hui Han, Witold Pedrycz:
ExtendedSketch: Fusing Network Traffic for Super Host Identification With a Memory Efficient Sketch. IEEE Trans. Dependable Secur. Comput. 19(6): 3913-3924 (2022) - [j151]Pu Wang, Zheng Yan, Kai Zeng:
BCAuth: Physical Layer Enhanced Authentication and Attack Tracing for Backscatter Communications. IEEE Trans. Inf. Forensics Secur. 17: 2818-2834 (2022) - [j150]Kevin I-Kai Wang, Xiaokang Zhou, Wei Liang, Zheng Yan, Jinhua She:
Federated Transfer Learning Based Cross-Domain Prediction for Smart Manufacturing. IEEE Trans. Ind. Informatics 18(6): 4088-4096 (2022) - [j149]Yongzhe Jia, Bowen Liu, Wanchun Dou, Xiaolong Xu, Xiaokang Zhou, Lianyong Qi, Zheng Yan:
CroApp: A CNN-Based Resource Optimization Approach in Edge Computing Environment. IEEE Trans. Ind. Informatics 18(9): 6300-6307 (2022) - [j148]Xiaokang Zhou, Wei Liang, Jianhua Ma, Zheng Yan, Kevin I-Kai Wang:
2D Federated Learning for Personalized Human Activity Recognition in Cyber-Physical-Social Systems. IEEE Trans. Netw. Sci. Eng. 9(6): 3934-3944 (2022) - [j147]Zheng Yan, Xinren Qian, Shushu Liu, Robert H. Deng:
Privacy Protection in 5G Positioning and Location-based Services Based on SGX. ACM Trans. Sens. Networks 18(3): 41:1-41:19 (2022) - [j146]Pu Wang, Zheng Yan, Ning Wang, Kai Zeng:
Resource Allocation Optimization for Secure Multidevice Wirelessly Powered Backscatter Communication With Artificial Noise. IEEE Trans. Wirel. Commun. 21(9): 7794-7809 (2022) - [c90]Rong Han, Xueqin Liang, Zheng Yan:
A Two-layer Game-based Incentive Mechanism for Decentralized Crowdsourcing. GLOBECOM 2022: 927-933 - [c89]Hongke Zhang, Zheng Yan, Xueqin Liang:
A Survey on Data Security in Network Storage Systems. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2022: 320-327 - [c88]Xuyang Jing, Xiaojun Cheng, Zheng Yan, Xian Li:
Deceiving Learning-based Sketches to Cause Inaccurate Frequency Estimation. TrustCom 2022: 209-216 - [c87]Wenxiu Ding, Wei Sun, Zheng Yan, Robert H. Deng, Zhiguo Wan:
An Efficient and Secure Scheme of Verifiable Computation for Intel SGX. TrustCom 2022: 473-482 - [c86]Baochen Yan, Rui Zhang, Zheng Yan:
VoiceSketch: a Privacy-Preserving Voiceprint Authentication System. TrustCom 2022: 623-630 - [c85]Wei Sun, Zheng Yan, Xi Xu, Wenxiu Ding, Lijun Gao:
Software Side Channel Vulnerability Detection Based on Similarity Calculation and Deep Learning. TrustCom 2022: 800-809 - [i5]Jiahe Lan, Rui Zhang, Zheng Yan, Jie Wang, Yu Chen, Ronghui Hou:
Adversarial attacks and defenses in Speaker Recognition Systems: A survey. CoRR abs/2205.13685 (2022) - 2021
- [j145]Mehrnoosh Monshizadeh, Vikramajeet Khatri, Marah Gamdou, Raimo Kantola, Zheng Yan:
Improving Data Generalization With Variational Autoencoders for Network Traffic Anomaly Detection. IEEE Access 9: 56893-56907 (2021) - [j144]Li Wang, Yu Chen, Pu Wang, Zheng Yan:
Security Threats and Countermeasures of Unmanned Aerial Vehicle Communications. IEEE Commun. Stand. Mag. 5(4): 41-47 (2021) - [j143]Jingwen Wang, Xuyang Jing, Zheng Yan, Yulong Fu, Witold Pedrycz, Laurence T. Yang:
A Survey on Trust Evaluation Based on Machine Learning. ACM Comput. Surv. 53(5): 107:1-107:36 (2021) - [j142]Wei Feng, Yafeng Li, Xuetao Yang, Zheng Yan, Liang Chen:
Blockchain-based data transmission control for Tactical Data Link. Digit. Commun. Networks 7(3): 285-294 (2021) - [j141]Li Peng, Wei Feng, Zheng Yan, Yafeng Li, Xiaokang Zhou, Shohei Shimizu:
Privacy preservation in permissionless blockchain: A survey. Digit. Commun. Networks 7(3): 295-307 (2021) - [j140]Gao Liu, Zheng Yan, Wei Feng, Xuyang Jing, Yaxing Chen, Mohammed Atiquzzaman:
SeDID: An SGX-enabled decentralized intrusion detection framework for network trust evaluation. Inf. Fusion 70: 100-114 (2021) - [j139]Jingjing Zhao, Xuyang Jing, Zheng Yan, Witold Pedrycz:
Network traffic classification for data fusion: A survey. Inf. Fusion 72: 22-47 (2021) - [j138]Zheng Yan, Qinghua Zheng, Laurence T. Yang, Robert H. Deng:
Data Fusion for Trust Evaluation. Inf. Fusion 76: 187-188 (2021) - [j137]Zhonghong Ou, Yucheng Hu, Meina Song, Zheng Yan, Pan Hui:
Redundancy Removing Aggregation Network With Distance Calibration for Video Face Recognition. IEEE Internet Things J. 8(9): 7279-7287 (2021) - [j136]Xiaokang Zhou, Xuesong Xu, Wei Liang, Zhi Zeng, Zheng Yan:
Deep-Learning-Enhanced Multitarget Detection for End-Edge-Cloud Surveillance in Smart IoT. IEEE Internet Things J. 8(16): 12588-12596 (2021) - [j135]Dongsheng Zhao, Zheng Yan, Mingjun Wang, Peng Zhang, Bin Song:
Is 5G Handover Secure and Private? A Survey. IEEE Internet Things J. 8(16): 12855-12879 (2021) - [j134]Xuerui Wang, Zheng Yan, Rui Zhang, Peng Zhang:
Attacks and defenses in user authentication systems: A survey. J. Netw. Comput. Appl. 188: 103080 (2021) - [j133]Jun Feng, Laurence T. Yang, Guohui Dai, Jinjun Chen, Zheng Yan:
An Improved Secure High-Order-Lanczos Based Orthogonal Tensor SVD for Outsourced Cyber-Physical-Social Big Data Reduction. IEEE Trans. Big Data 7(4): 808-818 (2021) - [j132]Yulei Wu, Zheng Yan, Ruppa K. Thulasiram, Mohammed Atiquzzaman:
Guest Editorial Introduction to the Special Section on Blockchain in Future Networks and Vertical Industries. IEEE Trans. Netw. Sci. Eng. 8(2): 1117-1119 (2021) - [j131]Zheng Yan, Li Peng, Wei Feng, Laurence T. Yang:
Social-Chain: Decentralized Trust Evaluation Based on Blockchain in Pervasive Social Networking. ACM Trans. Internet Techn. 21(1): 17:1-17:28 (2021) - [j130]Yang Wei, Zhuzhu Wang, Bin Xiao, Ximeng Liu, Zheng Yan, Jianfeng Ma:
Controlling Neural Learning Network with Multiple Scales for Image Splicing Forgery Detection. ACM Trans. Multim. Comput. Commun. Appl. 16(4): 124:1-124:22 (2021) - [j129]Yaxing Chen, Qinghua Zheng, Zheng Yan, Dan Liu:
QShield: Protecting Outsourced Cloud Data Queries With Multi-User Access Control Based on SGX. IEEE Trans. Parallel Distributed Syst. 32(2): 485-499 (2021) - [j128]Xueqin Liang, Zheng Yan, Robert H. Deng, Qinghua Zheng:
Investigating the Adoption of Hybrid Encrypted Cloud Data Deduplication With Game Theory. IEEE Trans. Parallel Distributed Syst. 32(3): 587-600 (2021) - [j127]Jun Feng, Laurence T. Yang, Qing Zhu, Yang Xiang, Jinjun Chen, Zheng Yan:
Secure Outsourced Principal Eigentensor Computation for Cyber-Physical-Social Systems. IEEE Trans. Sustain. Comput. 6(1): 119-130 (2021) - [j126]Xiaokang Zhou, Wei Liang, Jinhua She, Zheng Yan, Kevin I-Kai Wang:
Two-Layer Federated Learning With Heterogeneous Model Aggregation for 6G Supported Internet of Vehicles. IEEE Trans. Veh. Technol. 70(6): 5308-5317 (2021) - [j125]Zhao Li, Jun Li, Yinghou Liu, Xiujuan Liang, Kang G. Shin, Zheng Yan, Hui Li:
Exploiting Interactions of Multiple Interference for Cooperative Interference Alignment. IEEE Trans. Wirel. Commun. 20(11): 7072-7085 (2021) - [c84]Shushu Liu, Zheng Yan, Raimo Kantola:
Privacy-preserving D2D Cooperative Location Verification. GLOBECOM 2021: 1-6 - [c83]Stephen S. Yau, Zheng Yan, Willy Susilo:
Message from the DependSys 2021 General Chairs. HPCC/DSS/SmartCity/DependSys 2021: lxxviii - [c82]Xi Xu, Qinghua Zheng, Zheng Yan, Ming Fan, Ang Jia, Ting Liu:
Interpretation-enabled Software Reuse Detection Based on a Multi-Level Birthmark Model. ICSE 2021: 873-884 - [c81]Pu Wang, Long Jiao, Kai Zeng, Zheng Yan:
Physical Layer Key Generation between Backscatter Devices over Ambient RF Signals. INFOCOM 2021: 1-10 - [c80]Xixun Yu, Yidan Hu, Rui Zhang, Zheng Yan, Yanchao Zhang:
Secure Outsourced Top-k Selection Queries against Untrusted Cloud Service Providers. IWQoS 2021: 1-10 - [i4]Xi Xu, Qinghua Zheng, Zheng Yan, Ming Fan, Ang Jia, Ting Liu:
Interpretation-enabled Software Reuse Detection Based on a Multi-Level Birthmark Model. CoRR abs/2103.10126 (2021) - [i3]Wenxiu Ding, Wei Sun, Zheng Yan, Robert H. Deng:
An efficient and secure scheme of verifiable computation for Intel SGX. CoRR abs/2106.14253 (2021) - 2020
- [j124]Zheng Yan, Venu Govindaraju, Qinghua Zheng, Yan Wang:
IEEE Access Special Section Editorial: Trusted Computing. IEEE Access 8: 25722-25726 (2020) - [j123]Haider Abbas, Hiroki Suguri, Zheng Yan, William Allen, Xiali Sharon Hei:
IEEE Access Special Section: Security Analytics and Intelligence for Cyber Physical Systems. IEEE Access 8: 208195-208198 (2020) - [j122]Xueqin Liang, Zheng Yan, Robert H. Deng:
Game theoretical study on client-controlled cloud data deduplication. Comput. Secur. 91: 101730 (2020) - [j121]Yulei Wu, Zheng Yan, Zhiwei Zhao, Ahmed Al-Dubai:
Editorial: Special issue on SDN-based wireless network virtualization. Concurr. Comput. Pract. Exp. 32(16) (2020) - [j120]Zhen Yao, Zheng Yan:
A trust management framework for software-defined network applications. Concurr. Comput. Pract. Exp. 32(16) (2020) - [j119]Yulei Wu, Weizhi Meng, Zheng Yan, Vijay Varadharajan:
Editorial: Special issue on blockchain and communication networks. Digit. Commun. Networks 6(2): 145-146 (2020) - [j118]Rui Li, Qinghua Zheng, Xiuqi Li, Zheng Yan:
Multi-objective optimization for rebalancing virtual machine placement. Future Gener. Comput. Syst. 105: 824-842 (2020) - [j117]Zheng Yan, Jun Liu, Laurence T. Yang, Witold Pedrycz:
Data fusion in heterogeneous networks. Inf. Fusion 53: 1-3 (2020) - [j116]Tong Meng, Xuyang Jing, Zheng Yan, Witold Pedrycz:
A survey on machine learning for data fusion. Inf. Fusion 57: 115-129 (2020) - [j115]Jin Cao, Zheng Yan, Ruhui Ma, Yinghui Zhang, Yulong Fu, Hui Li:
LSAA: A Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks. IEEE Internet Things J. 7(6): 5329-5344 (2020) - [j114]Yang Liu, Zhuo Ma, Zheng Yan, Zhuzhu Wang, Ximeng Liu, Jianfeng Ma:
Privacy-preserving federated k-means for proactive caching in next generation cellular networks. Inf. Sci. 521: 14-31 (2020) - [j113]Rafik Hamza, Zheng Yan, Khan Muhammad, Paolo Bellavista, Faiza Titouna:
A privacy-preserving cryptosystem for IoT E-healthcare. Inf. Sci. 527: 493-510 (2020) - [j112]Yulong Fu, Hanlu Chen, Qinghua Zheng, Zheng Yan, Raimo Kantola, Xuyang Jing, Jin Cao, Hui Li:
An Adaptive Security Data Collection and Composition Recognition method for security measurement over LTE/LTE-A networks. J. Netw. Comput. Appl. 155: 102549 (2020) - [j111]Zheng Yan, Willy Susilo, Elisa Bertino, Jun Zhang, Laurence T. Yang:
AI-driven data security and privacy. J. Netw. Comput. Appl. 172: 102842 (2020) - [j110]Lijun Gao, Zheng Yan, Laurence T. Yang:
Game Theoretical Analysis on Acceptance of a Cloud Data Access Control System Based on Reputation. IEEE Trans. Cloud Comput. 8(4): 1003-1017 (2020) - [j109]Donghao Zhou, Zheng Yan, Gao Liu, Mohammed Atiquzzaman:
An Adaptive Network Data Collection System in SDN. IEEE Trans. Cogn. Commun. Netw. 6(2): 562-574 (2020) - [j108]Wenxiu Ding, Zheng Yan, Robert H. Deng:
Privacy-Preserving Data Processing with Flexible Access Control. IEEE Trans. Dependable Secur. Comput. 17(2): 363-376 (2020) - [j107]Kim-Kwang Raymond Choo, Zheng Yan, Weizhi Meng:
Editorial: Blockchain in Industrial IoT Applications: Security and Privacy Advances, Challenges, and Opportunities. IEEE Trans. Ind. Informatics 16(6): 4119-4121 (2020) - [j106]Wei Wang, Peng Xu, Dongli Liu, Laurence Tianruo Yang, Zheng Yan:
Lightweighted Secure Searching Over Public-Key Ciphertexts for Edge-Cloud-Assisted Industrial IoT Devices. IEEE Trans. Ind. Informatics 16(6): 4221-4230 (2020) - [j105]Yulei Wu, Zheng Yan, F. Richard Yu, Robert H. Deng, Vijay Varadharajan, Wei Chen:
Guest Editorial: Blockchain and Healthcare Computing. IEEE J. Biomed. Health Informatics 24(8): 2144-2145 (2020) - [j104]Puming Wang, Laurence T. Yang, Gongwei Qian, Jintao Li, Zheng Yan:
HO-OTSVD: A Novel Tensor Decomposition and Its Incremental Decomposition for Cyber-Physical-Social Networks (CPSN). IEEE Trans. Netw. Sci. Eng. 7(2): 713-725 (2020) - [j103]Wenxiu Ding, Rui Hu, Zheng Yan, Xinren Qian, Robert H. Deng, Laurence T. Yang, Mianxiong Dong:
An Extended Framework of Privacy-Preserving Computation With Flexible Access Control. IEEE Trans. Netw. Serv. Manag. 17(2): 918-930 (2020) - [j102]Zhao Li, Yujiao Bai, Kang G. Shin, Zheng Yan, Hui Li:
Inside-Out Precoding to Manage Multiple Interferences From the Same Source. IEEE Trans. Veh. Technol. 69(7): 7583-7595 (2020) - [j101]Yongfeng Wang, Zheng Yan, Wei Feng, Shushu Liu:
Privacy protection in mobile crowd sensing: a survey. World Wide Web 23(1): 421-452 (2020) - [j100]Rui Hu, Zheng Yan, Wenxiu Ding, Laurence T. Yang:
A survey on data provenance in IoT. World Wide Web 23(2): 1441-1463 (2020) - [c79]Xuetao Yang, Yafeng Li, Liang Chen, Wei Feng, Zheng Yan:
TDL-Chain: An Intelligent Data Transmission Control System in Tactical Data Link Based on Blockchain. Blockchain 2020: 305-312 - [c78]Rui Hu, Wenxiu Ding, Zheng Yan:
Privacy-preserving Computation over Encrypted Vectors. GLOBECOM 2020: 1-6 - [c77]Shushu Liu, Zheng Yan:
Verifiable Edge Computing for Indoor Positioning. ICC 2020: 1-6 - [c76]Gao Liu, Huidong Dong, Zheng Yan:
B4SDC: A Blockchain System for Security Data Collection in MANETs. ICC 2020: 1-6 - [c75]Pu Wang, Limei He, Zheng Yan, Wei Feng:
AnonyTrust: An Anonymous Trust Authentication System for Pervasive Social Networking. SPDE 2020: 643-660 - [c74]Muhammad Jehanzaib Yousuf, Mingjun Wang, Zheng Yan, Fawad Khan:
Trusted Network Slicing among Multiple Mobile Network Operators. TrustCom 2020: 1135-1140 - [c73]Xi Xu, Ming Fan, Ang Jia, Yin Wang, Zheng Yan, Qinghua Zheng, Ting Liu:
Revisiting the Challenges and Opportunities in Software Plagiarism Detection. SANER 2020: 537-541 - [i2]Mika Ylianttila, Raimo Kantola, Andrei V. Gurtov, Lorenzo Mucchi, Ian J. Oppermann, Zheng Yan, Tri Hong Nguyen, Fei Liu, Tharaka Mawanane Hewa, Madhusanka Liyanage, Ijaz Ahmad, Juha Partala, Robert Abbas, Artur Hecker, Sara Jayousi, Alessio Martinelli, Stefano Caputo, Jonathan Bechtold, Ivan Morales, Razvan-Andrei Stoica, Giuseppe Abreu, Shahriar Shahabuddin, Erdal Panayirci, Harald Haas, Tanesh Kumar, Basak Ozan Ozparlak, Juha Röning:
6G White paper: Research challenges for Trust, Security and Privacy. CoRR abs/2004.11665 (2020)
2010 – 2019
- 2019
- [j99]Rui Zhang, Zheng Yan:
A Survey on Biometric Authentication: Toward Secure and Privacy-Preserving Identification. IEEE Access 7: 5994-6009 (2019) - [j98]Yulei Wu, Zheng Yan, Kim-Kwang Raymond Choo, Laurence T. Yang:
IEEE Access Special Section Editorial: Internet-of-Things Big Data Trust Management. IEEE Access 7: 65223-65227 (2019) - [j97]Mehrnoosh Monshizadeh, Vikramajeet Khatri, Buse Gul Atli, Raimo Kantola, Zheng Yan:
Performance Evaluation of a Combined Anomaly Detection Platform. IEEE Access 7: 100964-100978 (2019) - [j96]Brij B. Gupta, Yogachandran Rahulamathavan, Shingo Yamaguchi, Tyson Brooks, Zheng Yan:
IEEE Access Special Section Editorial: Recent Advances in Computational Intelligence Paradigms for Security and Privacy for Fog and Mobile Edge Computing. IEEE Access 7: 134063-134070 (2019) - [j95]Xuyang Jing, Zheng Yan, Witold Pedrycz:
Security Data Collection and Data Analytics in the Internet: A Survey. IEEE Commun. Surv. Tutorials 21(1): 586-618 (2019) - [j94]Xueqin Liang, Zheng Yan:
A survey on game theoretical methods in Human-Machine Networks. Future Gener. Comput. Syst. 92: 674-693 (2019) - [j93]Wei Feng, Zheng Yan:
MCS-Chain: Decentralized and trustworthy mobile crowdsourcing based on blockchain. Future Gener. Comput. Syst. 95: 649-666 (2019) - [j92]Kai Fan, Shili Sun, Zheng Yan, Qiang Pan, Hui Li, Yintang Yang:
A blockchain-based clock synchronization Scheme in IoT. Future Gener. Comput. Syst. 101: 524-533 (2019) - [j91]Xuyang Jing, Zheng Yan, Xueqin Liang, Witold Pedrycz:
Network traffic fusion and analysis against DDoS flooding attacks with a novel reversible sketch. Inf. Fusion 51: 100-113 (2019) - [j90]Wenxiu Ding, Xuyang Jing, Zheng Yan, Laurence T. Yang:
A survey on data fusion in internet of things: Towards secure and privacy-preserving fusion. Inf. Fusion 51: 129-144 (2019) - [j89]Haomeng Xie, Zheng Yan, Zhen Yao, Mohammed Atiquzzaman:
Data Collection for Security Measurement in Wireless Sensor Networks: A Survey. IEEE Internet Things J. 6(2): 2205-2224 (2019) - [j88]Kai Fan, Shangyang Wang, Yanhui Ren, Kan Yang, Zheng Yan, Hui Li, Yintang Yang:
Blockchain-Based Secure Time Protection Scheme in IoT. IEEE Internet Things J. 6(3): 4671-4679 (2019) - [j87]Dan Liu, Zheng Yan, Wenxiu Ding, Mohammed Atiquzzaman:
A Survey on Secure Data Analytics in Edge Computing. IEEE Internet Things J. 6(3): 4946-4967 (2019) - [j86]Zhao Li, Yinghou Liu, Kang G. Shin, Jia Liu, Zheng Yan:
Interference Steering to Manage Interference in IoT. IEEE Internet Things J. 6(6): 10458-10471 (2019) - [j85]Jianfei Ruan, Zheng Yan, Bo Dong, Qinghua Zheng, Buyue Qian:
Identifying suspicious groups of affiliated-transaction-based tax evasion in big data. Inf. Sci. 477: 508-532 (2019) - [j84]Xixun Yu, Zheng Yan, Rui Zhang:
Verifiable outsourced computation over encrypted data. Inf. Sci. 479: 372-385 (2019) - [j83]Yousheng Zhou, Xingwang Long, Lvjun Chen, Zheng Yan:
Conditional privacy-preserving authentication and key agreement scheme for roaming services in VANETs. J. Inf. Secur. Appl. 47: 295-301 (2019) - [j82]Huaqing Lin, Zheng Yan, Yulong Fu:
Adaptive security-related data collection with context awareness. J. Netw. Comput. Appl. 126: 88-103 (2019) - [j81]Xuyang Jing, Jingjing Zhao, Qinghua Zheng, Zheng Yan, Witold Pedrycz:
A reversible sketch-based method for detecting and mitigating amplification attacks. J. Netw. Comput. Appl. 142: 15-24 (2019) - [j80]Jiageng Chen, Chunhua Su, Zheng Yan:
AI-Driven Cyber Security Analytics and Privacy Protection. Secur. Commun. Networks 2019: 1859143:1-1859143:2 (2019) - [j79]Zheng Yan, Lifang Zhang, Wenxiu Ding, Qinghua Zheng:
Heterogeneous Data Storage Management with Deduplication in Cloud Computing. IEEE Trans. Big Data 5(3): 393-407 (2019) - [j78]Ning Li, Zheng Yan, Mingjun Wang, Laurence T. Yang:
Securing Communication Data in Pervasive Social Networking Based on Trust with KP-ABE. ACM Trans. Cyber Phys. Syst. 3(1): 9:1-9:23 (2019) - [j77]Xueqin Liang, Zheng Yan, Xiaofeng Chen, Laurence T. Yang, Wenjing Lou, Y. Thomas Hou:
Game Theoretical Analysis on Encrypted Cloud Data Deduplication. IEEE Trans. Ind. Informatics 15(10): 5778-5789 (2019) - [j76]Shushu Liu, An Liu, Zheng Yan, Wei Feng:
Efficient LBS queries with mutual privacy preservation in IoV. Veh. Commun. 16: 62-71 (2019) - [c72]Ruide Zhang, Ning Wang, Ning Zhang, Zheng Yan, Wenjing Lou, Y. Thomas Hou:
PriRoster: Privacy-preserving Radio Context Attestation in Cognitive Radio Networks. DySPAN 2019: 1-10 - [c71]Wenxiu Ding, Zheng Yan, Xinren Qian, Robert H. Deng:
Computing Maximum and Minimum with Privacy Preservation and Flexible Access Control. GLOBECOM 2019: 1-7 - [c70]Pu Wang, Ning Wang, Monireh Dabaghchian, Kai Zeng, Zheng Yan:
Optimal Resource Allocation for Secure Multi-User Wireless Powered Backscatter Communication with Artificial Noise. INFOCOM 2019: 460-468 - [c69]Wei Feng, Yafeng Li, Xuetao Yang, Zheng Yan, Liang Chen:
Blockchain Based Data Transmission Control for Tactical Data Link. iSCI 2019: 583-595 - [c68]Zheng Yan:
Network Data Collection, Fusion, Mining and Analytics for Cyber Security. ML4CS 2019: 1-5 - [c67]Guoquan Li, Yulong Fu, Zheng Yan, Weilin Hao:
Quantifiable Network Security Measurement: A Study Based on an Index System. ML4CS 2019: 47-62 - [c66]Huaqing Lin, Gao Liu, Zheng Yan:
Detection of Application-Layer Tunnels with Rules and Machine Learning. SpaCCS 2019: 441-455 - [c65]Xueqin Liang, Zheng Yan, Wenxiu Ding, Robert H. Deng:
Game Theoretical Study on a Client-Controlled Deduplication Scheme. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1154-1161 - [c64]Mingjun Wang, Zheng Yan, Bin Song, Mohammed Atiquzzaman:
AAKA-D2D: Anonymous Authentication and Key Agreement Protocol in D2D Communications. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1356-1362 - [c63]Yulong Fu, Xinyi Yuan, Ke Wang, Zheng Yan, Hui Li:
A Security Formal Model for Multiple Channels Communication. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1425-1430 - [c62]Yulong Fu, Guoquan Li, Mohammed Atiquzzaman, Zheng Yan, Jin Cao, Hui Li:
A Study and Enhancement to the Security of MANET AODV Protocol Against Black Hole Attacks. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1431-1436 - [p2]Zheng Yan, Xueqin Liang, Wenxiu Ding, Xixun Yu, Mingjun Wang, Robert H. Deng:
Encrypted Big Data Deduplication in Cloud Storage. Smart Data 2019: 63-92 - [i1]Yaxing Chen, Qinghua Zheng, Dan Liu, Zheng Yan, Wenhai Sun, Ning Zhang, Wenjing Lou, Y. Thomas Hou:
Enjoy the Untrusted Cloud: A Secure, Scalable and Efficient SQL-like Query Framework for Outsourcing Data. CoRR abs/1912.08454 (2019) - 2018
- [j75]Limei He, Zheng Yan, Mohammed Atiquzzaman:
LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey. IEEE Access 6: 4220-4242 (2018) - [j74]Zheng Yan, Honggang Wang, Laurence T. Yang, Valtteri Niemi:
IEEE Access Special Section Editorial: Trust Management in Pervasive Social Networking (TruPSN). IEEE Access 6: 16851-16854 (2018) - [j73]Huaqing Lin, Zheng Yan, Yu Chen, Lifang Zhang:
A Survey on Network Security-Related Data Collection Technologies. IEEE Access 6: 18345-18365 (2018) - [j72]Shushu Liu, Lifang Zhang, Zheng Yan:
Predict Pairwise Trust Based on Machine Learning in Online Social Networks: A Survey. IEEE Access 6: 51297-51318 (2018) - [j71]Fengyu Tian, Zheng Yan, Xueqin Liang, Peng Zhang:
Trusted Cooperation Among Virtual Base Stations in C-RAN. IEEE Access 6: 57787-57801 (2018) - [j70]Zhuo Wei, Yongdong Wu, Yanjiang Yang, Zheng Yan, Qingqi Pei, Yajuan Xie, Jian Weng:
AutoPrivacy: Automatic privacy protection and tagging suggestion for mobile social photo. Comput. Secur. 76: 341-353 (2018) - [j69]Zheng Yan, Haomeng Xie, Peng Zhang, Brij B. Gupta:
Flexible data access control in D2D communications. Future Gener. Comput. Syst. 82: 738-751 (2018) - [j68]Zheng Yan, Jun Liu, Laurence T. Yang, Nitesh V. Chawla:
Big data fusion in Internet of Things. Inf. Fusion 40: 32-33 (2018) - [j67]Zheng Yan, Kai Zeng, Yu Xiao, Yiwei Thomas Hou, Pierangela Samarati:
Guest Editorial Special Issue on Trust, Security, and Privacy in Crowdsourcing. IEEE Internet Things J. 5(4): 2880-2883 (2018) - [j66]Wei Feng, Zheng Yan, Hengrun Zhang, Kai Zeng, Yu Xiao, Y. Thomas Hou:
A Survey on Security, Privacy, and Trust in Mobile Crowdsourcing. IEEE Internet Things J. 5(4): 2971-2992 (2018) - [j65]Zheng Yan, Pu Wang, Wei Feng:
A novel scheme of anonymous authentication on trust in Pervasive Social Networking. Inf. Sci. 445-446: 79-96 (2018) - [j64]Haoran Yuan, Xiaofeng Chen, Tao Jiang, Xiaoyu Zhang, Zheng Yan, Yang Xiang:
DedupDUM: Secure and scalable data deduplication with dynamic user management. Inf. Sci. 456: 159-173 (2018) - [j63]Gao Liu, Zheng Yan, Witold Pedrycz:
Data collection for attack detection and security measurement in Mobile Ad Hoc Networks: A survey. J. Netw. Comput. Appl. 105: 105-122 (2018) - [j62]Donghao Zhou, Zheng Yan, Yulong Fu, Zhen Yao:
A survey on network data collection. J. Netw. Comput. Appl. 116: 9-23 (2018) - [j61]Kun Xu, Weidong Zhang, Zheng Yan:
A privacy-preserving mobile application recommender system based on trust evaluation. J. Comput. Sci. 26: 87-107 (2018) - [j60]Zheng Yan, Yuqing Zhang, Kim-Kwang Raymond Choo, Yang Xiang:
Security Measurements of Cyber Networks. Secur. Commun. Networks 2018: 6545314:1-6545314:3 (2018) - [j59]Guoquan Li, Zheng Yan, Yulong Fu, Hanlu Chen:
Data Fusion for Network Intrusion Detection: A Review. Secur. Commun. Networks 2018: 8210614:1-8210614:16 (2018) - [j58]Ping Yan, Zheng Yan:
A survey on dynamic mobile malware detection. Softw. Qual. J. 26(3): 891-919 (2018) - [j57]Qingchen Zhang, Laurence T. Yang, Zheng Yan, Zhikui Chen, Peng Li:
An Efficient Deep Learning Model to Predict Cloud Workload for Industry Informatics. IEEE Trans. Ind. Informatics 14(7): 3170-3178 (2018) - [j56]Mingjun Wang, Zheng Yan:
Privacy-Preserving Authentication and Key Agreement Protocols for D2D Group Communications. IEEE Trans. Ind. Informatics 14(8): 3637-3647 (2018) - [c61]Guoquan Li, Zheng Yan, Yulong Fu:
A Study and Simulation Research of Blackhole Attack on Mobile AdHoc Network. CNS 2018: 1-6 - [c60]Kai Fan, Yanhui Ren, Zheng Yan, Shangyang Wang, Hui Li, Yintang Yang:
Secure Time Synchronization Scheme in IoT Based on Blockchain. iThings/GreenCom/CPSCom/SmartData 2018: 1063-1068 - [c59]Xulyu Zhu, Zheng Yan, Jianfei Ruan, Qinghua Zheng, Bo Dong:
IRTED-TL: An Inter-Region Tax Evasion Detection Method Based on Transfer Learning. TrustCom/BigDataSE 2018: 1224-1235 - 2017
- [j55]Zheng Yan, Xixun Yu, Wenxiu Ding:
Context-Aware Verifiable Cloud Computing. IEEE Access 5: 2211-2227 (2017) - [j54]Wei Feng, Zheng Yan, Haomeng Xie:
Anonymous Authentication on Trust in Pervasive Social Networking Based on Group Signature. IEEE Access 5: 6236-6246 (2017) - [j53]Opeyemi A. Osanaiye, Shuo Chen, Zheng Yan, Rongxing Lu, Kim-Kwang Raymond Choo, Mqhele E. Dlodlo:
From Cloud to Fog Computing: A Review and a Conceptual Live VM Migration Framework. IEEE Access 5: 8284-8300 (2017) - [j52]Fengyu Tian, Peng Zhang, Zheng Yan:
A Survey on C-RAN Security. IEEE Access 5: 13372-13386 (2017) - [j51]Linfeng Wei, Weiqi Luo, Jian Weng, Yanjun Zhong, Xiaoqian Zhang, Zheng Yan:
Machine Learning-Based Malicious Application Detection of Android. IEEE Access 5: 25591-25601 (2017) - [j50]Yulong Fu, Zheng Yan, Hui Li, Xiao-Long Xin, Jin Cao:
A secure SDN based multi-RANs architecture for future 5G networks. Comput. Secur. 70: 648-662 (2017) - [j49]Lifang Zhang, Zheng Yan, Raimo Kantola:
Privacy-preserving trust management for unwanted traffic control. Future Gener. Comput. Syst. 72: 305-318 (2017) - [j48]Jie Guo, Bin Song, Fei Richard Yu, Zheng Yan, Laurence T. Yang:
Object detection among multimedia big data in the compressive measurement domain under mobile distributed architecture. Future Gener. Comput. Syst. 76: 519-527 (2017) - [j47]Zheng Yan, Xuyang Jing, Witold Pedrycz:
Fusing and mining opinions for reputation generation. Inf. Fusion 36: 172-184 (2017) - [j46]Zheng Yan, Robert H. Deng, Vijay Varadharajan:
Cryptography and Data Security in Cloud Computing. Inf. Sci. 387: 53-55 (2017) - [j45]Wenxiu Ding, Zheng Yan, Robert H. Deng:
Encrypted data processing with Homomorphic Re-Encryption. Inf. Sci. 409: 35-55 (2017) - [j44]Zheng Yan, Jun Liu, Laurence T. Yang:
Special issue on pervasive social networking. J. Netw. Comput. Appl. 86: 1-2 (2017) - [j43]Zheng Yan, Wangyang Shi:
CloudFile: A cloud data access control system based on mobile social trust. J. Netw. Comput. Appl. 86: 46-58 (2017) - [j42]Fei Tong, Zheng Yan:
A hybrid approach of mobile malware detection in Android. J. Parallel Distributed Comput. 103: 22-31 (2017) - [j41]Yulong Fu, Zheng Yan, Jin Cao, Ousmane Koné, Xuefei Cao:
An Automata Based Intrusion Detection Method for Internet of Things. Mob. Inf. Syst. 2017: 1750637:1-1750637:13 (2017) - [j40]Mingjun Wang, Zheng Yan:
A Survey on Security in D2D Communications. Mob. Networks Appl. 22(2): 195-208 (2017) - [j39]Zheng Yan, Wei Wang, Yonggang Wen, Chonggang Wang, Honggang Wang:
Editorial: Mobile Multimedia Communications. Mob. Networks Appl. 22(3): 435-437 (2017) - [j38]Xixun Yu, Zheng Yan, Athanasios V. Vasilakos:
A Survey of Verifiable Computation. Mob. Networks Appl. 22(3): 438-453 (2017) - [j37]Mingjun Wang, Zheng Yan, Valtteri Niemi:
UAKA-D2D: Universal Authentication and Key Agreement Protocol in D2D Communications. Mob. Networks Appl. 22(3): 510-525 (2017) - [j36]Jun Liu, Zheng Yan, Athanasios V. Vasilakos, Laurence T. Yang:
Guest Editorial Data Mining in Cyber, Physical, and Social Computing. IEEE Syst. J. 11(1): 194-196 (2017) - [j35]Zheng Yan, Mingjun Wang:
Protect Pervasive Social Networking Based on Two-Dimensional Trust Levels. IEEE Syst. J. 11(1): 207-218 (2017) - [j34]Zheng Yan, Xueyun Li, Mingjun Wang, Athanasios V. Vasilakos:
Flexible Data Access Control Based on Trust and Reputation in Cloud Computing. IEEE Trans. Cloud Comput. 5(3): 485-498 (2017) - [c58]Zhe Guo, Zheng Yan:
Dynamic MAC Protocol for Tactical Data Links. CIT 2017: 87-92 - [c57]Huaqing Lin, Zheng Yan, Raimo Kantola:
CDController: A Cloud Data Access Control System Based on Reputation. CIT 2017: 223-230 - [c56]Mehrnoosh Monshizadeh, Vikramajeet Khatri, Raimo Kantola, Zheng Yan:
An Orchestrated Security Platform for Internet of Robots. GPC 2017: 298-312 - [c55]Wenxiu Ding, Zheng Yan, Robert H. Deng:
Secure Encrypted Data Deduplication with Ownership Proof and User Revocation. ICA3PP 2017: 297-312 - [c54]Wenda Wei, Zheng Yan, Jianfei Ruan, Qinghua Zheng, Bo Dong:
Mining Suspicious Tax Evasion Groups in a Corporate Governance Network. ICA3PP 2017: 465-475 - [c53]Yanxiao Cheng, Zheng Yan:
PerRec: A Permission Configuration Recommender System for Mobile Apps. ICA3PP 2017: 476-485 - [c52]Hanlu Chen, Yulong Fu, Zheng Yan:
Survey on Big Data Analysis Algorithms for Network Security Measurement. NSS 2017: 128-142 - [c51]Guangwu Xu, Yankun Tang, Zheng Yan, Peng Zhang:
TIM: A Trust Insurance Mechanism for Network Function Virtualization Based on Trusted Computing. SpaCCS 2017: 139-152 - [e5]Shadi Ibrahim, Kim-Kwang Raymond Choo, Zheng Yan, Witold Pedrycz:
Algorithms and Architectures for Parallel Processing - 17th International Conference, ICA3PP 2017, Helsinki, Finland, August 21-23, 2017, Proceedings. Lecture Notes in Computer Science 10393, Springer 2017, ISBN 978-3-319-65481-2 [contents] - [e4]Zheng Yan, Refik Molva, Wojciech Mazurczyk, Raimo Kantola:
Network and System Security - 11th International Conference, NSS 2017, Helsinki, Finland, August 21-23, 2017, Proceedings. Lecture Notes in Computer Science 10394, Springer 2017, ISBN 978-3-319-64700-5 [contents] - [e3]Guojun Wang, Mohammed Atiquzzaman, Zheng Yan, Kim-Kwang Raymond Choo:
Security, Privacy, and Anonymity in Computation, Communication, and Storage - 10th International Conference, SpaCCS 2017, Guangzhou, China, December 12-15, 2017, Proceedings. Lecture Notes in Computer Science 10656, Springer 2017, ISBN 978-3-319-72388-4 [contents] - [e2]Guojun Wang, Mohammed Atiquzzaman, Zheng Yan, Kim-Kwang Raymond Choo:
Security, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedings. Lecture Notes in Computer Science 10658, Springer 2017, ISBN 978-3-319-72394-5 [contents] - 2016
- [j33]Wenxiu Ding, Zheng Yan, Robert H. Deng:
A Survey on Future Internet Security Architectures. IEEE Access 4: 4374-4393 (2016) - [j32]Chaoyin Huang, Zheng Yan, Ning Li, Mingjun Wang:
Secure Pervasive Social Communications Based on Trust in a Distributed Way. IEEE Access 4: 9225-9238 (2016) - [j31]Zheng Yan, Mingjun Wang, Yuxiang Li, Athanasios V. Vasilakos:
Encrypted Data Management with Deduplication in Cloud Computing. IEEE Cloud Comput. 3(2): 28-35 (2016) - [j30]Zheng Yan, Wenxiu Ding, Valtteri Niemi, Athanasios V. Vasilakos:
Two Schemes of Privacy-Preserving Trust Evaluation. Future Gener. Comput. Syst. 62: 175-189 (2016) - [j29]Zheng Yan, Valtteri Niemi, Laurence T. Yang:
Key technologies for 5G, the next generation of mobile networks and services. Int. J. Commun. Syst. 29(16): 2328-2329 (2016) - [j28]Xin Huang, Xiong Gao, Zheng Yan:
Security protocols in body sensor networks using visible light communications. Int. J. Commun. Syst. 29(16): 2349-2363 (2016) - [j27]Zheng Yan, Peng Zhang, Athanasios V. Vasilakos:
A security and trust framework for virtualized networks and software-defined networking. Secur. Commun. Networks 9(16): 3059-3069 (2016) - [j26]Xin Huang, Paul Craig, Hangyu Lin, Zheng Yan:
SecIoT: a security framework for the Internet of Things. Secur. Commun. Networks 9(16): 3083-3094 (2016) - [j25]Zheng Yan, Wenxiu Ding, Xixun Yu, Haiqi Zhu, Robert H. Deng:
Deduplication on Encrypted Big Data in Cloud. IEEE Trans. Big Data 2(2): 138-150 (2016) - [j24]Zheng Yan, Jun Liu, Robert H. Deng, Francisco Herrera:
Editorial: Trust Management for Multimedia Big Data. ACM Trans. Multim. Comput. Commun. Appl. 12(4s): 57:1-57:2 (2016) - [j23]Zhuo Wei, Zheng Yan, Yongdong Wu, Robert Huijie Deng:
Trustworthy Authentication on Scalable Surveillance Video with Background Model Support. ACM Trans. Multim. Comput. Commun. Appl. 12(4s): 64:1-64:20 (2016) - [j22]Liwei Kuang, Laurence T. Yang, Seungmin (Charlie) Rho, Zheng Yan, Kai Qiu:
A Tensor-Based Framework for Software-Defined Cloud Data Center. ACM Trans. Multim. Comput. Commun. Appl. 12(5s): 74:1-74:23 (2016) - [c50]Zheng Yan, Sihui Zhao:
A Usable Authentication System Based on Personal Voice Challenge. CBD 2016: 194-199 - [c49]Sihui Zhao, Zheng Yan:
Trust Evaluation in Social Networking: A Review. MobiMedia 2016: 58-64 - [c48]Yuquan Zhu, Zheng Yan:
A Survey on Trust Evaluation in E-commerce. MobiMedia 2016: 130-139 - [c47]Guangwu Xu, Zheng Yan:
A Survey on Trust Evaluation in Mobile Ad Hoc Networks. MobiMedia 2016: 140-148 - [c46]Shanshan Bian, Peng Zhang, Zheng Yan:
A Survey on Software-Defined Networking Security. MobiMedia 2016: 190-198 - [c45]Hanlu Chen, Zheng Yan:
Security and Privacy in Big Data Lifetime: A Review. SpaCCS Workshops 2016: 3-15 - [c44]Xueqin Liang, Zheng Yan, Peng Zhang:
Game Theoretical Analysis on System Adoption and Acceptance: A Review. SpaCCS Workshops 2016: 155-167 - [c43]Kun Xu, Zheng Yan:
Privacy Protection in Mobile Recommender Systems: A Survey. SpaCCS 2016: 305-318 - [c42]Zhen Yao, Zheng Yan:
Security in Software-Defined-Networking: A Survey. SpaCCS 2016: 319-332 - [e1]Zheng Yan, Honggang Wang:
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, MobiMedia 2016, Xi'an, China, June 18-20, 2016. ACM 2016, ISBN 978-1-63190-104-1 [contents] - 2015
- [j21]Zheng Yan, Jun Liu, Athanasios V. Vasilakos, Laurence T. Yang:
Trustworthy data fusion and mining in Internet of Things. Future Gener. Comput. Syst. 49: 45-46 (2015) - [j20]Liang Chen, Zheng Yan, Weidong Zhang, Raimo Kantola:
TruSMS: A trustworthy SMS spam control system based on trust management. Future Gener. Comput. Syst. 49: 77-93 (2015) - [j19]Ruiyang Xu, Xin Huang, Jie Zhang, Yulin Lu, Ge Wu, Zheng Yan:
Software Defined Intelligent Building. Int. J. Inf. Secur. Priv. 9(3): 84-99 (2015) - [j18]Jun Liu, Zheng Yan, Laurence T. Yang:
Fusion - An aide to data mining in Internet of Things. Inf. Fusion 23: 1-2 (2015) - [j17]Junze Wang, Zheng Yan, Laurence T. Yang, Benxiong Huang:
An approach to rank reviews by fusing and mining opinions based on review pertinence. Inf. Fusion 23: 3-15 (2015) - [j16]Zhe Guo, Zheng Yan:
A Weighted Semi-Distributed Routing Algorithm for LEO satellite networks. J. Netw. Comput. Appl. 58: 1-11 (2015) - [j15]Zheng Yan, Athanasios V. Vasilakos, Laurence T. Yang:
Editorial: Recent Advances on the Next Generation of Mobile Networks and Services. Mob. Networks Appl. 20(6): 781-782 (2015) - [j14]Zheng Yan, Xueyun Li, Raimo Kantola:
Controlling Cloud Data Access Based on Reputation. Mob. Networks Appl. 20(6): 828-839 (2015) - [j13]Zheng Yan, Wei Feng, Pu Wang:
Anonymous Authentication for Trustworthy Pervasive Social Networking. IEEE Trans. Comput. Soc. Syst. 2(3): 88-98 (2015) - [j12]Sixuan Ma, Zheng Yan:
PSNController: An Unwanted Content Control System in Pervasive Social Networking Based on Trust Management. ACM Trans. Multim. Comput. Commun. Appl. 12(1s): 17:1-17:23 (2015) - [c41]Zheng Yan, Wenxiu Ding, Haiqi Zhu:
A Scheme to Manage Encrypted Data Storage with Deduplication in Cloud. ICA3PP (3) 2015: 547-561 - [c40]Wei Tang, Zheng Yan:
CloudRec: A Mobile Cloud Service Recommender System Based on Adaptive QoS Management. TrustCom/BigDataSE/ISPA (1) 2015: 9-16 - [c39]Jing Feng, Xin Huang, Yulin Lu, Ruiyang Xu, Zheng Yan:
A Study of IEEE 802.15.6 Association Protocols. TrustCom/BigDataSE/ISPA (1) 2015: 848-855 - [c38]Mingjun Wang, Zheng Yan:
Security in D2D Communications: A Review. TrustCom/BigDataSE/ISPA (1) 2015: 1199-1204 - 2014
- [j11]Zheng Yan, Guojun Wang, Valtteri Niemi, Robert H. Deng:
Editorial: Special issue on trust in cyber, physical and social computing. Comput. Secur. 47: 1-2 (2014) - [j10]Yue Shen, Zheng Yan, Raimo Kantola:
Analysis on the acceptance of Global Trust Management for unwanted traffic control based on game theory. Comput. Secur. 47: 3-25 (2014) - [j9]Zheng Yan, Peng Zhang, Athanasios V. Vasilakos:
A survey on trust management for Internet of Things. J. Netw. Comput. Appl. 42: 120-134 (2014) - [j8]Zheng Yan, Raimo Kantola, Yue Shen:
A generic solution for unwanted traffic control through trust management. New Rev. Hypermedia Multim. 20(1): 25-51 (2014) - [j7]Zheng Yan, Yu Chen, Yue Shen:
PerContRep: a practical reputation system for pervasive content services. J. Supercomput. 70(3): 1051-1074 (2014) - [c37]Xingyu Liu, Peng Zhang, Weixue Gong, Zheng Yan:
An Analytic Hierarchy Process Algorithm for Cloud Based Wi-Fi Offloading. CIT 2014: 234-239 - [c36]Zheng Yan, Mingjun Wang, Peng Zhang:
A Scheme to Secure Instant Community Data Access Based on Trust and Contexts. CIT 2014: 646-651 - [c35]Xueyun Li, Zheng Yan, Peng Zhang:
A Review on Privacy-Preserving Data Mining. CIT 2014: 769-774 - [c34]Mehrnoosh Monshizadeh, Zheng Yan:
Security Related Data Mining. CIT 2014: 775-782 - [c33]Tianli Dang, Zheng Yan, Fei Tong, Weidong Zhang, Peng Zhang:
Implementation of a Trust-Behavior Based Reputation System for Mobile Applications. BWCCA 2014: 221-228 - [c32]Zheng Yan, Xueyun Li, Raimo Kantola:
Personal Data Access Based on Trust Assessment in Mobile Social Networking. TrustCom 2014: 989-994 - 2013
- [j6]Xin Huang, Bangdao Chen, Andrew Markham, Qinghua Wang, Zheng Yan, A. W. Roscoe:
Human interactive secure key and identity exchange protocols in body sensor networks. IET Inf. Secur. 7(1): 30-38 (2013) - [j5]Zheng Yan, Yu Chen, Yue Shen:
A practical reputation system for pervasive social chatting. J. Comput. Syst. Sci. 79(5): 556-572 (2013) - [j4]Zheng Yan, Conghui Liu, Valtteri Niemi, Guoliang Yu:
Exploring the impact of trust information visualization on mobile application usage. Pers. Ubiquitous Comput. 17(6): 1295-1313 (2013) - [c31]Zheng Yan, Mingjun Wang, Valtteri Niemi, Raimo Kantola:
Secure pervasive social networking based on multi-dimensional trust levels. CNS 2013: 100-108 - [c30]Liang Chen, Zheng Yan, Weidong Zhang, Raimo Kantola:
Implementation of an SMS Spam Control System Based on Trust Management. GreenCom/iThings/CPScom 2013: 887-894 - [c29]Yue Shen, Zheng Yan, Raimo Kantola:
Game Theoretical Analysis of the Acceptance of Global Trust Management for Unwanted Traffic Control. HPCC/EUC 2013: 935-942 - [c28]Zheng Yan, Raimo Kantola, Gaowa Shi, Peng Zhang:
Unwanted Content Control via Trust Management in Pervasive Social Networking. TrustCom/ISPA/IUCC 2013: 202-209 - [c27]Zheng Yan, Peng Zhang, Valtteri Niemi, Raimo Kantola:
A Research Model for Trustworthy Pervasive Social Networking. TrustCom/ISPA/IUCC 2013: 1522-1527 - 2012
- [j3]Zheng Yan, Peng Zhang, Robert H. Deng:
TruBeRepec: a trust-behavior-based reputation and recommender system for mobile applications. Pers. Ubiquitous Comput. 16(5): 485-506 (2012) - [c26]Yue Shen, Zheng Yan, Raimo Kantola:
Implementation of an Evaluation Platform for Unwanted Traffic Control via Trust Management. GreenCom 2012: 79-86 - [c25]Zheng Yan, Raimo Kantola, Yue Shen:
Unwanted Traffic Control via Hybrid Trust Management. TrustCom 2012: 666-673 - [c24]Yu Chen, Zheng Yan:
Gemini: A Handbag for Pervasive Social Communications. TrustCom 2012: 820-825 - [c23]Zheng Yan, Yu Chen, Peng Zhang:
An approach of secure and fashionable recognition for pervasive face-to-face social communications. WiMob 2012: 853-860 - 2011
- [j2]Junze Wang, Furong Wang, Zheng Yan, Benxiong Huang:
Message Receiver Determination in Multiple Simultaneous IM Conversations. IEEE Intell. Syst. 26(3): 24-31 (2011) - [j1]Zheng Yan, Christian Prehofer:
Autonomic Trust Management for a Component-Based Software System. IEEE Trans. Dependable Secur. Comput. 8(6): 810-823 (2011) - [c22]Peng Zhang, Zheng Yan:
A QoS-aware system for mobile cloud computing. CCIS 2011: 518-522 - [c21]Zheng Yan, Peng Zhang:
Trust Behavior Based Recommender System for Software Usage. iThings/CPSCom 2011: 589-591 - [c20]Zheng Yan, Raimo Kantola, Peng Zhang:
A Research Model for Human-Computer Trust Interaction. TrustCom 2011: 274-281 - [c19]Zheng Yan, Raimo Kantola, Yue Shen:
Unwanted Traffic Control via Global Trust Management. TrustCom 2011: 647-654 - [c18]Zheng Yan, Raimo Kantola, Peng Zhang:
Theoretical Issues in the Study of Trust in Human-Computer Interaction. TrustCom 2011: 853-856 - [c17]Yu Chen, Zheng Yan, Valtteri Niemi:
Implementation of a Reputation System for Pervasive Social Networking. TrustCom 2011: 857-862 - [c16]Peng Zhang, Hanlin Sun, Zheng Yan:
Building up Trusted Identity Management in Mobile Heterogeneous Environment. TrustCom 2011: 873-877 - [c15]Zheng Yan, Peng Zhang:
AdPriRec: A Context-Aware Recommender System for User Privacy in MANET Services. UIC 2011: 295-309 - 2010
- [c14]Zheng Yan, Conghui Liu, Valtteri Niemi, Guoliang Yu:
Effects of Displaying Trust Information on Mobile Application Usage. ATC 2010: 107-121 - [c13]Zhe Guo, Zheng Yan, Furong Wang:
A Methodology to Predicate Human-Being's Movement Based on Movement Group. GreenCom/CPSCom 2010: 612-619 - [c12]Zheng Yan, Yu Chen:
AdContRep: A Privacy Enhanced Reputation System for MANET Content Services. UIC 2010: 414-429 - [p1]Zheng Yan:
Security via Trusted Communications. Handbook of Information and Communication Security 2010: 719-746
2000 – 2009
- 2009
- [c11]Zheng Yan, Valtteri Niemi:
A Methodology towards Usable Trust Management. ATC 2009: 179-193 - [c10]Zheng Yan, Rong Yan:
Formalizing Trust Based on Usage Behaviours for Mobile Applications. ATC 2009: 194-208 - [c9]Zheng Yan, Yan Dong, Valtteri Niemi, Guoliang Yu:
Exploring Trust of Mobile Applications Based on User Behaviors. INTRUST 2009: 212-226 - 2008
- [c8]Zheng Yan, Valtteri Niemi, Yan Dong, Guoliang Yu:
A User Behavior Based Trust Model for Mobile Applications. ATC 2008: 455-469 - [c7]Zheng Yan:
Autonomic Trust Management for a Pervasive System. SECRYPT 2008: 491-500 - 2007
- [c6]Zheng Yan, Christian Prehofer:
An Adaptive Trust Control Model for a Trustworthy Component Software Platform. ATC 2007: 226-238 - [c5]Zheng Yan:
Predicting Trustworthiness for Component Software. SECPerU 2007: 1-6 - 2006
- [c4]Zheng Yan, Ronan MacLaverty:
Autonomic Trust Management in a Component Based Software System. ATC 2006: 279-292 - [c3]Zheng Yan:
A Conceptual Architecture of a Trusted Mobile Environment. SecPerU 2006: 75-81 - 2004
- [c2]Zheng Yan, Piotr Cofta:
A Mechanism for Trust Sustainability Among Trusted Computing Platforms. TrustBus 2004: 11-19 - 2003
- [c1]Zheng Yan, Piotr Cofta:
Methodology to Bridge Different Domains of Trust in Mobile Communications. iTrust 2003: 211-224
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 01:53 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint