Fajiang Yu

Orcid: 0000-0002-7547-0029

According to our database1, Fajiang Yu authored at least 15 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SDATA: Symmetrical Device Identifier Composition Engine Complied Aggregate Trust Attestation.
Symmetry, March, 2024

2023
Exploring the Intersection of Lattice Attacks and Blockchain Technology: A Heuristic Approach Using TPM2.0 ECDSA to Ascertain and Approach the Boundary.
Symmetry, March, 2023

2022
FUSION: Measuring Binary Function Similarity with Code-Specific Embedding and Order-Sensitive GNN.
Symmetry, 2022

2020
Hybridchain: A Novel Architecture for Confidentiality-Preserving and Performant Permissioned Blockchain Using Trusted Execution Environment.
IEEE Access, 2020

2019
Detecting and Mitigating Target Link-Flooding Attacks Using SDN.
IEEE Trans. Dependable Secur. Comput., 2019

An efficient anonymous remote attestation scheme for trusted computing based on improved CPK.
Electron. Commer. Res., 2019

2016
A formal analysis of Trusted Platform Module 2.0 hash-based message authentication code authorization under digital rights management scenario.
Secur. Commun. Networks, 2016

A multi-objective optimization model based on immune algorithm in wireless mesh networks.
Int. J. Commun. Syst., 2016

Virtual TPM Dynamic Trust Extension Suitable for Frequent Migrations.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

2014
POSTER: An E2E Trusted Cloud Infrastructure.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2012
A Vulnerability Attack Graph Generation Method Based on Scripts.
Proceedings of the Information Computing and Applications - Third International Conference, 2012

2011
Similar vulnerability query based on text mining.
Proceedings of the 11th International Symposium on Communications and Information Technologies, 2011

Hierarchical-CPK-Based Trusted Computing Cryptography Scheme.
Proceedings of the Autonomic and Trusted Computing - 8th International Conference, 2011

2010
Research on trusted computing and its development.
Sci. China Inf. Sci., 2010

2006
An Improved Global Trust Value Computing Method in P2P System.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006


  Loading...