


default search action
Yi Ren 0001
Person information
- affiliation: University of East Anglia, School of Computing Science, Norwich, UK
- affiliation (2012 - 2017): National Chiao Tung University, Department of Computer Science, Hsinchu, Taiwan
- affiliation (PhD 2012): University of Agder, Department of Information and Communication Technology, Grimstad, Norway
Other persons with the same name
- Yi Ren — disambiguation page
- Yi Ren 0002
— Chongqing University of Posts and Telecommunications, School of Electronic Engineering, China (and 3 more)
- Yi Ren 0003
— Beihang University, School of Reliability and Systems Engineering, Beijing, China
- Yi Ren 0004
— University of Pittsburgh, Department of Biostatistics, Graduate School of Public Health, PA, USA
- Yi Ren 0005
— Technion - Israel Institute of Technology, Computer Science Department, Haifa, Israel
- Yi Ren 0006
— Zhejiang University, China
- Yi Ren 0007 — Columbia University, NY, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j35]Yuling Chen
, Xiong Yang
, Tao Li
, Yi Ren
, Yangyang Long
:
A blockchain-empowered authentication scheme for worm detection in wireless sensor network. Digit. Commun. Networks 10(2): 265-272 (2024) - [j34]Ruoting Xiong, Wei Ren
, Shenghui Zhao, Jie He, Yi Ren, Kim-Kwang Raymond Choo, Geyong Min
:
CoPiFL: A collusion-resistant and privacy-preserving federated learning crowdsourcing scheme using blockchain and homomorphic encryption. Future Gener. Comput. Syst. 156: 95-104 (2024) - 2023
- [j33]Ding Bao, Wei Ren, Yuexin Xiang
, Weimao Liu, Tianqing Zhu, Yi Ren, Kim-Kwang Raymond Choo:
BTC-Shadow: an analysis and visualization system for exposing implicit behaviors in Bitcoin transaction graphs. Frontiers Comput. Sci. 17(6): 176215 (2023) - [j32]Zan Chen
, Yuanjing Feng, Yi Ren:
Deep 2nd-order residual block for image denoising. Multim. Tools Appl. 82(2): 2101-2119 (2023) - [j31]Cheng-Ying Hsieh
, Tuan Phung-Duc
, Yi Ren
, Jyh-Cheng Chen
:
Design and Analysis of Dynamic Block-Setup Reservation Algorithm for 5G Network Slicing. IEEE Trans. Mob. Comput. 22(9): 5140-5154 (2023) - [j30]Yi Ren
, Tuan Phung-Duc
, Jyh-Cheng Chen
, Frank Y. Li
:
Enabling Dynamic Autoscaling for NFV in a Non-Standalone Virtual EPC: Design and Analysis. IEEE Trans. Veh. Technol. 72(6): 7743-7756 (2023) - [j29]Cheng-Ying Hsieh, Yi Ren
, Jyh-Cheng Chen
:
Edge-Cloud Offloading: Knapsack Potential Game in 5G Multi-Access Edge Computing. IEEE Trans. Wirel. Commun. 22(11): 7158-7171 (2023) - [c35]Ruoting Xiong
, Kit-Lun Tong
, Yi Ren
, Wei Ren
, Gerard Parr
:
From 5G to 6G: It is Time to Sniff the Communications between a Base Station and Core Networks. MobiCom 2023: 117:1-117:2 - [c34]Yu-Cheng Liang
, Kun-Ru Wu
, Kit-Lun Tong
, Yi Ren
, Yu-Chee Tseng
:
An Exchange-based AIoT Platform for Fast AI Application Development. Q2SWinet 2023: 105-114 - [c33]Shiyong Huang, Haocong Li, Ruoting Xiong, Wei Ren, Jie He, Yi Ren:
A Commitment and Ring Signature based Scheme for Amount and Identity Privacy Protection in Blockchain. TrustCom 2023: 292-299 - 2021
- [j28]Shidong Wang
, Yi Ren
, Gerard Parr, Yu Guan
, Ling Shao
:
Invariant Deep Compressible Covariance Pooling for Aerial Scene Categorization. IEEE Trans. Geosci. Remote. Sens. 59(8): 6549-6561 (2021) - [j27]Zan Chen
, Wenlong Guo
, Yuanjing Feng, Yongqiang Li, Changchen Zhao
, Yi Ren, Ling Shao
:
Deep-Learned Regularization and Proximal Operator for Image Compressive Sensing. IEEE Trans. Image Process. 30: 7112-7126 (2021) - [c32]Wenwen Zheng, Weiqi Wang
, Wei Ren, Shiyuan Feng, Shiqin Liu, Yi Ren:
A User Behavior-Based Random Distribution Scheme for Adversarial Example Generated CAPTCHA. ISPA/BDCloud/SocialCom/SustainCom 2021: 1215-1221 - [c31]Cheng Xu, Wei Ren, Daxi Tu, Linchen Yu, Tianqing Zhu, Yi Ren:
CDVT: A Cluster-Based Distributed Video Transcoding Scheme for Mobile Stream Services. WASA (1) 2021: 608-628 - 2020
- [j26]Yuling Chen
, Hongyan Yin, Yuexin Xiang
, Wei Ren
, Yi Ren
, Neal Naixue Xiong
:
CVT: A Crowdsourcing Video Transcoding Scheme Based on Blockchain Smart Contracts. IEEE Access 8: 220672-220681 (2020) - [j25]Wei Ren
, Jingjing Hu, Tianqing Zhu, Yi Ren, Kim-Kwang Raymond Choo
:
A flexible method to defend against computationally resourceful miners in blockchain proof of work. Inf. Sci. 507: 161-171 (2020) - [c30]Chia-An Hsu, Kate Ching-Ju Lin, Yi Ren, Yu-Chee Tseng:
On Optimizing Signaling Efficiency of Retransmissions for Voice LTE. WCNC 2020: 1-6 - [i4]Shidong Wang, Yi Ren, Gerard Parr, Yu Guan, Ling Shao:
Invariant Deep Compressible Covariance Pooling for Aerial Scene Categorization. CoRR abs/2011.05702 (2020)
2010 – 2019
- 2019
- [j24]Yaocheng Zhang, Wei Ren
, Tianqing Zhu, Yi Ren
:
SaaS: A situational awareness and analysis system for massive android malware detection. Future Gener. Comput. Syst. 95: 548-559 (2019) - [j23]Yuling Chen, Xiaohan Hao
, Wei Ren
, Yi Ren:
Traceable and Authenticated Key Negotiations via Blockchain for Vehicular Communications. Mob. Inf. Syst. 2019: 5627497:1-5627497:10 (2019) - [j22]Tsung-Yen Chan
, Yi Ren
, Yu-Chee Tseng, Jyh-Cheng Chen
:
Multi-Slot Allocation Protocols for Massive IoT Devices With Small-Size Uploading Data. IEEE Wirel. Commun. Lett. 8(2): 448-451 (2019) - [c29]Tsu-Kuang Lee, Chih-Chieh Chen, Yi Ren, Cheng-Kuan Lin, Yu-Chee Tseng:
ID-Free Multigroup Cardinality Estimation for Massive RFID Tags in IoT. APWCS 2019: 1-6 - [p1]Liangli Ma, Jinyi Guo, Wei Ren, Yi Ren, Lizhe Wang, Kim-Kwang Raymond Choo, Fatos Xhafa:
A watermark-based in situ access-control model for image big data. Security and Privacy for Big Data, Cloud Computing and Applications 2019: 67-87 - 2018
- [j21]Sheng Zhong, Wei Ren
, Tianqing Zhu, Yi Ren, Kim-Kwang Raymond Choo
:
Performance and Security Evaluations of Identity- and Pairing-Based Digital Signature Algorithms on Windows, Android, and Linux Platforms: Revisiting the Algorithms of Cha and Cheon, Hess, Barreto, Libert, Mccullagh and Quisquater, and Paterson and Schuldt. IEEE Access 6: 37850-37857 (2018) - [j20]Zitao Chen
, Wei Ren
, Yi Ren, Kim-Kwang Raymond Choo
:
LiReK: A lightweight and real-time key establishment scheme for wearable embedded devices by gestures or motions. Future Gener. Comput. Syst. 84: 126-138 (2018) - [j19]Yangfan Li, Wei Ren
, Tianqing Zhu
, Yi Ren
, Yue Qin
, Wei Jie
:
RIMS: A Real-time and Intelligent Monitoring System for live-broadcasting platforms. Future Gener. Comput. Syst. 87: 259-266 (2018) - [j18]Jinyi Guo, Wei Ren
, Yi Ren, Tianqing Zhu:
A Watermark-Based In-Situ Access Control Model for Image Big Data. Future Internet 10(8): 69 (2018) - [j17]Yuling Chen, Min Lei, Wei Ren
, Yi Ren, Zhiguo Qu:
RoFa: A Robust and Flexible Fine-Grained Access Control Scheme for Mobile Cloud and IoT based Medical Monitoring. Fundam. Informaticae 157(1-2): 167-184 (2018) - [j16]Yi Ren
, Jyh-Cheng Chen
, Jui-Chih Chin:
Impacts of S1 and X2 Interfaces on eMBMS Handover Failure: Solution and Performance Analysis. IEEE Trans. Veh. Technol. 67(7): 6599-6614 (2018) - [j15]Yi Ren
, Chih-Wei Tung, Jyh-Cheng Chen
, Frank Y. Li
:
Proportional and Preemption-Enabled Traffic Offloading for IP Flow Mobility: Algorithms and Performance Evaluation. IEEE Trans. Veh. Technol. 67(12): 12095-12108 (2018) - [j14]Tsung-Yen Chan
, Yi Ren
, Yu-Chee Tseng, Jyh-Cheng Chen
:
How to Reduce Unexpected eMBMS Session Disconnection: Design and Performance Analysis. IEEE Wirel. Commun. Lett. 7(1): 126-129 (2018) - [c28]Yi Ren, Tuan Phung-Duc
, Yi-Kuan Liu, Jyh-Cheng Chen, Yi-Hao Lin:
ASA: Adaptive VNF Scaling Algorithm for 5G Mobile Networks. CloudNet 2018: 1-4 - [c27]Chia-An Hsu, Yi Ren, Kate Ching-Ju Lin, Yu-Chee Tseng:
Hey! I Have Something for You: Paging Cycle Based Random Access for LTE-A. ICC 2018: 1-6 - [c26]Yi Ren, Tzu-Ming Huang, Kate Ching-Ju Lin, Yu-Chee Tseng:
On Scalable Service Function Chaining with $\mathcal{O}(1)$ Flowtable Entries. INFOCOM 2018: 702-710 - [c25]Yining Xu, Yi Ren, Kate Ching-Ju Lin, Yu-Chee Tseng:
A Hint-Based Random Access Protocol for mMTC in 5G Mobile Network. MASS 2018: 388-396 - 2017
- [j13]Bying-He Ku, Yi Ren, Jeng-Feng Weng, Jyh-Cheng Chen, Wen-Tsuen Chen:
Modeling and Analysis of Channel Holding Time and Handoff Rate for Packet Sessions in All-IP Cellular Networks. IEEE Trans. Veh. Technol. 66(4): 3331-3344 (2017) - [c24]Yi Ren, Muhammad Alfiansyah, Nyoto Arif Wibowo, Cheng-Wei Wu, JieFu Geng, Yu-Chee Tseng:
iToy: A LEGO-like solution for small scale IoT applications. APNOMS 2017: 307-310 - [c23]Yi Ren, Tsung-Han Tsai, Ji-Cheng Huang, Cheng-Wei Wu, Yu-Chee Tseng:
Flowtable-Free Routing for Data Center Networks: A Software-Defined Approach. GLOBECOM 2017: 1-6 - [c22]Cheng-Wei Wu, Hua-Zhi Yang, Yan-Ann Chen
, Ensa Bajo, Yi Ren, Yu-Chee Tseng:
Applying machine learning to head gesture recognition using wearables. iCAST 2017: 436-440 - [c21]Bohdan Myroniv, Cheng-Wei Wu, Yi Ren, Yu-Chee Tseng:
Analysis of Users' Emotions Through Physiology. ICGEC 2017: 136-143 - [c20]Yi Ren, Ren-Jie Wu, Yu-Chee Tseng:
The hint protocol: Using a broadcast method to enable ID-free data transmission for dense IoT devices. PerCom Workshops 2017: 473-478 - [c19]Teng-Wei Huang, Yi Ren, Kate Ching-Ju Lin, Yu-Chee Tseng:
r-Hint: A message-efficient random access response for mMTC in 5G networks. PIMRC 2017: 1-6 - [c18]Tsung-Yen Chan, Yi Ren, Yu-Chee Tseng, Jyh-Cheng Chen:
eHint: An Efficient Protocol for Uploading Small-Size IoT Data. WCNC 2017: 1-6 - [c17]Yi Ren, Ren-Jie Wu, Teng-Wei Huang, Yu-Chee Tseng:
Give me a hint: An ID-free small data transmission protocol for dense IoT devices. Wireless Days 2017: 121-126 - 2016
- [j12]Wei Ren
, Jiahua Lin, Qiang Cao, Yi Ren:
LibTiP: a lightweight and robust scheme for data trustworthiness and privacy protection in participatory sensing. Int. J. Embed. Syst. 8(2/3): 266-275 (2016) - [j11]Yi Ren, Jyh-Cheng Chen
, Jui-Chih Chin, Yu-Chee Tseng:
Design and Analysis of the Key Management Mechanism in Evolved Multimedia Broadcast/Multicast Service. IEEE Trans. Wirel. Commun. 15(12): 8463-8476 (2016) - [c16]Tuan Phung-Duc
, Yi Ren, Jyh-Cheng Chen, Zheng-Wei Yu:
Design and Analysis of Deadline and Budget Constrained Autoscaling (DBCA) Algorithm for 5G Mobile Networks. CloudCom 2016: 94-101 - [c15]Chia-Wei Chang, Yi-Hao Lin, Yi Ren, Jyh-Cheng Chen:
Congestion Control for Machine-Type Communications in LTE-A Networks. GLOBECOM 2016: 1-6 - [c14]Yi Ren, Tuan Phung-Duc
, Jyh-Cheng Chen, Zheng-Wei Yu:
Dynamic Auto Scaling Algorithm (DASA) for 5G Mobile Networks. GLOBECOM 2016: 1-6 - [c13]Wei-Han Chen, Yi Ren, Jyh-Cheng Chen:
Design and analysis of a Threshold Offloading (TO) algorithm for LTE femtocell/macrocell networks. ISCC 2016: 1270-1275 - [i3]Yi Ren, Tuan Phung-Duc, Zheng-Wei Yu, Jyh-Cheng Chen:
Design and Analysis Dynamic Auto Scaling Algorithm (DASA) for 5G Mobile Networks. CoRR abs/1604.05803 (2016) - [i2]Yi Ren, Wei-Han Chen, Chia-Wei Chang, Jyh-Cheng Chen:
Design and Analysis of Optimal Threshold Offloading (OTO) Algorithm for LTE Femtocell/Macrocell Networks. CoRR abs/1605.01126 (2016) - [i1]Tuan Phung-Duc, Yi Ren, Jyh-Cheng Chen, Zheng-Wei Yu:
Design and Analysis of Deadline and Budget Constrained Autoscaling (DBCA) Algorithm for 5G Mobile Networks. CoRR abs/1609.09368 (2016) - 2015
- [c12]Tsung-Yen Chan, Po-Yen Chang, Yi Ren, Yu-Chee Tseng:
From spotting the difference to spotting your difference. IPSN 2015: 416-417 - [c11]Wei Ren
, Yi Ren, Mu-En Wu, Chia-Jung Lee:
A Robust and Flexible Access Control Scheme for Cloud-IoT Paradigm with Application to Remote Mobile Medical Monitoring. RVSP 2015: 130-133 - 2014
- [j10]Yi Ren, Vladimir Zadorozhny, Vladimir A. Oleshchuk, Frank Y. Li
:
A Novel Approach to Trust Management in Unattended Wireless Sensor Networks. IEEE Trans. Mob. Comput. 13(7): 1409-1423 (2014) - 2013
- [j9]Yi Ren, Vladimir A. Oleshchuk, Frank Y. Li
:
Optimized secure and reliable distributed data storage scheme and performance evaluation in unattended WSNs. Comput. Commun. 36(9): 1067-1077 (2013) - [j8]Wei Ren
, Liangli Ma, Yi Ren:
Perturbation-Based Schemes with Ultra-Lightweight Computation to Protect User Privacy in Smart Grid. Int. J. Distributed Sens. Networks 9 (2013) - [j7]Wei Ren
, Liangli Ma, Yi Ren:
APP: An Ultralightweight Scheme to Authenticate ONS and Protect EPC Privacy without Cryptography in EPCglobal Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j6]Wei Ren
, Liangli Ma, Yi Ren:
LIRT: A Lightweight Scheme for Indistinguishability, Reachability, and Timeliness in Wireless Sensor Control Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j5]Wei Ren
, Linchen Yu, Liangli Ma, Yi Ren:
How to Authenticate a Device? Formal Authentication Models for M2M Communications Defending against Ghost Compromising Attack. Int. J. Distributed Sens. Networks 9 (2013) - [c10]Chi-Chung Lo, Sz-Pin Huang, Yi Ren, Yu-Chee Tseng:
Design of a self-portrait application with sensor-assisted guiding for smart devices. BlackSeaCom 2013: 99-101 - 2012
- [c9]Yi Ren, Vladimir Zadorozhny, Vladimir A. Oleshchuk, Frank Y. Li:
An Efficient, Robust, and Scalable Trust Management Scheme for Unattended Wireless Sensor Networks. MDM 2012: 147-156 - [c8]Yi Ren, Vladimir A. Oleshchuk, Frank Y. Li
, Selo Sulistyo
:
FoSBaS: A bi-directional secrecy and collusion resilience key management scheme for BANs. WCNC 2012: 2841-2846 - 2011
- [j4]Wei Ren
, Jun Song
, Min Lei, Yi Ren:
BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid. Int. J. Digit. Multim. Broadcast. 2011: 382147:1-382147:9 (2011) - [j3]Yi Ren, Vladimir A. Oleshchuk, Frank Y. Li, Xiaohu Ge
:
Security in Mobile Wireless Sensor Networks - A Survey. J. Commun. 6(2): 128-142 (2011) - [c7]Yi Ren, Vladimir A. Oleshchuk, Frank Y. Li
, Selo Sulistyo
:
SCARKER: A sensor capture resistance and key refreshing scheme for mobile WSNs. LCN 2011: 271-274 - 2010
- [j2]Wei Ren
, Yi Ren, Hui Zhang:
Secure, dependable and publicly verifiable distributed data storage in unattended wireless sensor networks. Sci. China Inf. Sci. 53(5): 964-979 (2010) - [c6]Yi Ren, Vladimir A. Oleshchuk, Frank Y. Li:
A Scheme for Secure and Reliable Distributed Data Storage in Unattended WSNs. GLOBECOM 2010: 1-6
2000 – 2009
- 2009
- [j1]Wei Ren
, Junge Zhao, Yi Ren:
Network Coding based Dependable and Efficient Data Survival in Unattended Wireless Sensor Networks. J. Commun. 4(11): 894-901 (2009) - [c5]Wei Ren
, Yi Ren, Hui Zhang:
H2S: A Secure and Efficient Data Aggregative Retrieval Scheme in Unattended Wireless Sensor Networks. IAS 2009: 450-453 - [c4]Wei Ren
, Yi Ren, Hui Zhang:
Efficient and Lightweight Data Integrity Check in In-Networking Storage Wireless Sensor Networks. ISPA 2009: 340-347 - [c3]Yi Ren, Vladimir A. Oleshchuk, Frank Y. Li:
Secure and Efficient Data Storage in Unattended Wireless Sensor Networks. NTMS 2009: 1-5 - [c2]Yi Ren, Vladimir A. Oleshchuk, Frank Y. Li:
A distributed data storage and retrieval scheme in unattended WSNs using Homomorphic Encryption and secret sharing. Wireless Days 2009: 1-6 - 2008
- [c1]Wei Ren
, Yi Ren, Hui Zhang:
HybridS: A Scheme for Secure Distributed Data Storage in WSNs. EUC (2) 2008: 318-323
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-20 20:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint