Ayong Ye

Orcid: 0000-0002-2606-5406

According to our database1, Ayong Ye authored at least 30 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Information-Minimizing Generative Adversarial Network for Fair Generation and Classification.
Neural Process. Lett., February, 2024

CSFL: Cooperative Security Aware Federated Learning Model Using The Blockchain.
Comput. J., 2024

2023
Key Extraction Using Ambient Sounds for Smart Devices.
ACM Trans. Sens. Networks, February, 2023

Service-Splitting-Based Privacy Protection Mechanism for Proximity Detection Supporting High Utility.
IEEE Trans. Comput. Soc. Syst., February, 2023

The dummy-based trajectory privacy protection method to resist correlation attacks in Internet of Vehicles.
Concurr. Comput. Pract. Exp., 2023

Leverage Generative Adversarial Network for Enhancing Fairness and Utility.
Proceedings of the International Conference on Networking and Network Applications, 2023

A Continuous Authentication Scheme for Digital Therapeutics Using Denoising Autoencoder.
Proceedings of the 2023 13th International Conference on Communication and Network Security, 2023

2022
A Fair Federated Learning Framework based on Clustering.
Proceedings of the International Conference on Networking and Network Applications, 2022

2021
A new -map mechanism for mobility traces privacy.
Concurr. Comput. Pract. Exp., 2021

Evolutionary game analysis on competition strategy choice of application providers.
Concurr. Comput. Pract. Exp., 2021

2020
A Semantic-Based Approach for Privacy-Preserving in Trajectory Publishing.
IEEE Access, 2020

Detection of Spoofing Attacks in WLAN-Based Positioning Systems Using WiFi Hotspot Tags.
IEEE Access, 2020

A Dummy-Based Privacy Protection Scheme for Location-Based Services under Spatiotemporal Correlation.
Proceedings of the International Conference on Networking and Network Applications, 2020

2019
A novel adaptive radio map for RSS-based indoor positioning.
Concurr. Comput. Pract. Exp., 2019

Pseudonym Changing for Vehicles in VANETs: A Game-Theoretic Analysis Based Approach.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Indoor Fingerprinting Positioning Based on the Least Anticipation Loss.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

2018
Local HMM for indoor positioning based on fingerprinting and displacement ranging.
IET Commun., 2018

The flexible and privacy-preserving proximity detection in mobile social network.
Future Gener. Comput. Syst., 2018

2017
A novel location privacy-preserving scheme based on l-queries for continuous LBS.
Comput. Commun., 2017

Private and Flexible Proximity Detection Based on Geohash.
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017

A Trajectory Privacy-Preserving Algorithm Based on Road Networks in Continuous Location-Based Services.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Privacy Protection-Oriented Mobile Crowdsensing Analysis Based on Game Theory.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

A Defense Mechanism Against Location Cheating Attack in Social Network.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

2016
A robust location fingerprint based on differential signal strength and dynamic linear interpolation.
Secur. Commun. Networks, 2016

A privacy-preserving Proximity Detection Method in social network.
Proceedings of the International Conference on Internet of Things and Cloud Computing, 2016

A Secure Data Deduplication Scheme Based on Differential Privacy.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

2013
An Improved RFID-Based Localization Algorithm for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

2012
A Secure DV-Hop Localization Algorithm Based on Secure Beacon Nodes.
Proceedings of the Advances in Wireless Sensor Networks, 2012

2009
Robust Node Positioning in Wireless Sensor Networks.
IEICE Trans. Commun., 2009

2006
Analysis and Countermeasure of Selfish Node Problem in Mobile Ad Hoc Network.
Proceedings of the 10th International Conference on CSCW in Design, 2006


  Loading...