default search action
Yazhe Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c28]Siyang Wu, Jiakai Wang, Jiejie Zhao, Yazhe Wang, Xianglong Liu:
NAPGuard: Towards Detecting Naturalistic Adversarial Patches. CVPR 2024: 24367-24376 - 2023
- [j12]Mingxuan Li, Yazhe Wang, Shuai Ma, Chao Liu, Dongdong Huo, Yu Wang, Zhen Xu:
Auto-Tuning with Reinforcement Learning for Permissioned Blockchain Systems. Proc. VLDB Endow. 16(5): 1000-1012 (2023) - 2022
- [c27]Mingxuan Li, Nanfang Li, Yazhe Wang, Zong-Rong Li, Dongdong Huo:
FIK: Find Important Knobs for Permessioned Blockchain Hyperledger Fabric. CSCWD 2022: 828-833 - [c26]Penghui Lv, Yu Wang, Yazhe Wang, Chao Liu, Qihui Zhou, Zhen Xu:
A highly reliable cross-domain identity authentication protocol based on blockchain in edge computing environment. CSCWD 2022: 1040-1046 - [c25]Qihui Zhou, Xianglin Dang, Yazhe Wang, Zhen Xu, Penghui Lv:
An atomic member addition mechanism for permissioned blockchain based on autonomous rollback. MSN 2022: 379-385 - [c24]Kong Yusheng, Yazhe Wang, Lei Ren:
A Cloud-Edge Collaborative Security Architecture for Industrial Digital Twin Systems. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 2244-2249 - 2021
- [j11]Wei Zhou, Chen Cao, Dongdong Huo, Kai Cheng, Lan Zhang, Le Guan, Tao Liu, Yan Jia, Yaowen Zheng, Yuqing Zhang, Limin Sun, Yazhe Wang, Peng Liu:
Reviewing IoT Security via Logic Bugs in IoT Platforms and Systems. IEEE Internet Things J. 8(14): 11621-11639 (2021) - [j10]Dongdong Huo, Chen Cao, Peng Liu, Yazhe Wang, Mingxuan Li, Zhen Xu:
Commercial hypervisor-based task sandboxing mechanisms are unsecured? But we can fix it! J. Syst. Archit. 116: 102114 (2021) - [j9]Aiguo Wang, Yazhe Wang, Qinghai Chen:
Analyzing Network Model for Organic Vegetable Distribution: A Case Study of Zhengzhou City. Mob. Inf. Syst. 2021: 7597936:1-7597936:7 (2021) - [j8]Xiancai Tian, Baihua Zheng, Yazhe Wang, Hsiao-Ting Huang, Chih-Chieh Hung:
TRIPDECODER: Study Travel Time Attributes and Route Preferences of Metro Systems from Smart Card Data. Trans. Data Sci. 2(3): 16:1-16:21 (2021) - [c23]Ya Chen, Yazhe Wang, Yu Wang, Mingxuan Li, Guochao Dong, Chao Liu:
CallChain: Identity Authentication Based on Blockchain for Telephony Networks. CSCWD 2021: 416-421 - [c22]Chao Liu, Mingxuan Li, Yazhe Wang, Yu Wang, Dongdong Huo, Ya Chen:
Achieve Better Endorsement Balance on Blockchain Systems. CSCWD 2021: 581-586 - [c21]Mingxuan Li, Xiao Wang, Dongdong Huo, Han Wang, Chao Liu, Yazhe Wang, Yu Wang, Zhen Xu:
A Novel Trojan Attack against Co-learning Based ASR DNN System. CSCWD 2021: 907-912 - [c20]Ya Chen, Chao Liu, Yu Wang, Yazhe Wang:
A Self-Sovereign Decentralized Identity Platform Based on Blockchain. ISCC 2021: 1-7 - [c19]Penghui Lv, Yu Wang, Yazhe Wang, Qihui Zhou:
Potential Risk Detection System of Hyperledger Fabric Smart Contract based on Static Analysis. ISCC 2021: 1-7 - 2020
- [c18]Dongdong Huo, Yu Wang, Chao Liu, Mingxuan Li, Yazhe Wang, Zhen Xu:
LAPE: A Lightweight Attestation of Program Execution Scheme for Bare-Metal Systems. HPCC/DSS/SmartCity 2020: 78-86 - [c17]Dongdong Huo, Chao Liu, Xiao Wang, Mingxuan Li, Yu Wang, Yazhe Wang, Peng Liu, Zhen Xu:
A Machine Learning-Assisted Compartmentalization Scheme for Bare-Metal Systems. ICICS 2020: 20-35 - [c16]Chen Tian, Yazhe Wang, Peng Liu, Yu Wang, Ruirui Dai, Anyuan Zhou, Zhen Xu:
Prihook: Differentiated context-aware hook placement for different owners' smartphones. TrustCom 2020: 615-622 - [i2]Xiancai Tian, Baihua Zheng, Yazhe Wang, Hsiao-Ting Huang, Chih-Chieh Hung:
TRIPDECODER: Study Travel Time Attributes and Route Preferences of Metro Systems from Smart Card Data. CoRR abs/2005.01492 (2020)
2010 – 2019
- 2019
- [c15]Zhiqiang Wang, Quanqi Li, Yazhe Wang, Biao Liu, Jianyi Zhang, Qixu Liu:
Medical Protocol Security: DICOM Vulnerability Mining Based on Fuzzing Technology. CCS 2019: 2549-2551 - [c14]Rongna Xie, Yazhe Wang, Guozhen Shi, Lin Yuan, Quanqi Li:
Pre-authorization Usage Control Mechanism for Cross-Domain in Cloud. DPTA 2019: 881-892 - [c13]Mingxuan Li, Dongdong Huo, Chao Liu, Han Wang, Yazhe Wang, Yu Wang, Ping Zou, Yandong Li, Zhen Xu:
SwiftFabric: Optimizing Fabric Private Data Transaction Flow TPS. ISPA/BDCloud/SocialCom/SustainCom 2019: 308-315 - [c12]Jianxing Hu, Dongdong Huo, Meilin Wang, Yazhe Wang, Yan Zhang, Yu Li:
A Probability Prediction Based Mutable Control-Flow Attestation Scheme on Embedded Platforms. TrustCom/BigDataSE 2019: 530-537 - [i1]Wei Zhou, Chen Cao, Dongdong Huo, Kai Cheng, Lan Zhang, Le Guan, Tao Liu, Yaowen Zheng, Yuqing Zhang, Limin Sun, Yazhe Wang, Peng Liu:
Logic Bugs in IoT Platforms and Systems: A Review. CoRR abs/1912.13410 (2019) - 2018
- [j7]Chen Tian, Yazhe Wang, Peng Liu, Qihui Zhou, Chengyi Zhang:
Using IM-Visor to stop untrusted IME apps from stealing sensitive keystrokes. Cybersecur. 1(1): 5 (2018) - [j6]Yazhe Wang, Baihua Zheng, Ee-Peng Lim:
Understanding the effects of taxi ride-sharing - A case study of Singapore. Comput. Environ. Urban Syst. 69: 124-132 (2018) - [c11]Yazhe Wang, Chih-Chieh Hung, Baihua Zheng, Ee-Peng Lim:
TripDecoder: Inferring Routes of Passengers of Mass Rapid Transit Systems by Smart Card Transaction Data. ICDM Workshops 2018: 655-658 - 2017
- [c10]Chen Tian, Yazhe Wang, Peng Liu, Qihui Zhou, Chengyi Zhang, Zhen Xu:
IM-Visor: A Pre-IME Guard to Prevent IME Apps from Stealing Sensitive Keystrokes Using TrustZone. DSN 2017: 145-156 - [c9]Yu Li, Yazhe Wang, Yuan Zhang:
SecHome: A Secure Large-Scale Smart Home System Using Hierarchical Identity Based Encryption. ICICS 2017: 339-351 - [c8]Chengyi Zhang, Yazhe Wang, Peng Liu, Tao Lin, Lvgen Luo, Ziqi Yu, Xinwang Zhuo:
PMViewer: A Crowdsourcing Approach to Fine-Grained Urban PM2.5 Monitoring in China. MASS 2017: 323-327 - [c7]Yan Zhang, Gui Peng, Lu Yang, Yazhe Wang, Minghui Tian, Jianxing Hu, Liming Wang, Chen Song:
Visual Analysis of Android Malware Behavior Profile Based on PMCG_droid : A Pruned Lightweight APP Call Graph. SecureComm 2017: 449-468 - 2015
- [j5]Kai Chen, Weifeng Chen, Zhen Xu, Dongdai Lin, Yazhe Wang:
VFA: A Variable-Factor Authentication Framework for Mobile Users. J. Commun. 10(6): 366-379 (2015) - [j4]Yazhe Wang, Mingming Hu, Chen Li:
UAuth: A Strong Authentication Method from Personal Devices to Multi-accounts. EAI Endorsed Trans. Security Safety 2(4): e5 (2015) - [j3]Yazhe Wang, Jamie Callan, Baihua Zheng:
Should We Use the Sample? Analyzing Datasets Sampled from Twitter's Stream API. ACM Trans. Web 9(3): 13:1-13:23 (2015) - [c6]Yazhe Wang, Baihua Zheng:
Preserving privacy in social networks against connection fingerprint attacks. ICDE 2015: 54-65 - [c5]Tong Liu, Yazhe Wang:
Beyond Scale: An Efficient Framework for Evaluating Web Access Control Policies in the Era of Big Data. IWSEC 2015: 316-334 - 2014
- [j2]Yazhe Wang, Long Xie, Baihua Zheng, Ken C. K. Lee:
High utility K-anonymization for social network publishing. Knowl. Inf. Syst. 41(3): 697-725 (2014) - [c4]Yazhe Wang, Baihua Zheng:
On macro and micro exploration of hashtag diffusion in Twitter. ASONAM 2014: 285-288 - [c3]Yazhe Wang, Mingming Hu, Chen Li:
UAuth: A Strong Authentication Method from Personal Devices to Multi-accounts. SecureComm (1) 2014: 95-104 - 2013
- [j1]Yazhe Wang, Baihua Zheng:
Hypergraph index: an index for context-aware nearest neighbor query on social networks. Soc. Netw. Anal. Min. 3(4): 813-828 (2013) - 2011
- [c2]Yazhe Wang, Long Xie, Baihua Zheng, Ken C. K. Lee:
Utility-Oriented K-Anonymization on Social Networks. DASFAA (1) 2011: 78-92 - [c1]Yazhe Wang, Baihua Zheng:
Context-Aware Nearest Neighbor Query on Social Networks. SocInfo 2011: 98-112
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 02:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint