Hongyang Yan
Orcid: 0000-0002-1493-9671
According to our database1,
Hongyang Yan
authored at least 76 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Wirel. Networks, July, 2024
zkChain: A privacy-preserving model based on zk-SNARKs and hash chain for efficient transfer of assets.
Trans. Emerg. Telecommun. Technol., April, 2024
IEEE Trans. Multim., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
LEOCN: Real-time and complete network simulation framework for LEO constellation networks<sup>1</sup>.
J. High Speed Networks, 2024
Self-sovereign identity management in ciphertext policy attribute based encryption for IoT protocols.
J. Inf. Secur. Appl., 2024
Comput. Stand. Interfaces, 2024
Are You Copying My Prompt? Protecting the Copyright of Vision Prompt for VPaaS via Watermark.
CoRR, 2024
Sci. China Inf. Sci., 2024
Towards Key-Escrow Free Attribute-Based Encryption for Self-Sovereign Identity Systems.
Proceedings of the 32nd IEEE/ACM International Symposium on Quality of Service, 2024
2023
World Wide Web (WWW), September, 2023
World Wide Web (WWW), September, 2023
IEEE Trans. Intell. Transp. Syst., September, 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
The influence of explanation designs on user understanding differential privacy and making data-sharing decision.
Inf. Sci., 2023
IACR Cryptol. ePrint Arch., 2023
CoRR, 2023
SSL-ABD : An Adversarial Defense Method Against Backdoor Attacks in Self-supervised Learning.
Proceedings of the Artificial Intelligence Security and Privacy, 2023
Proceedings of the Artificial Intelligence Security and Privacy, 2023
2022
ACM Trans. Internet Techn., 2022
Int. J. Intell. Syst., 2022
Int. J. Intell. Syst., 2022
Outsourcing multiauthority access control revocation and computations over medical data to mobile cloud.
Int. J. Intell. Syst., 2022
Detection of global positioning system spoofing attack on unmanned aerial vehicle system.
Concurr. Comput. Pract. Exp., 2022
Proceedings of the Security and Privacy in Social Networks and Big Data, 2022
Network Intrusion Detection Adversarial Attacks for LEO Constellation Networks Based on Deep Learning.
Proceedings of the Network and System Security - 16th International Conference, 2022
Highsimb: A Concrete Blockchain High Simulation with Contract Vulnerability Detection for Ethereum and Hyperledger Fabric.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022
TGPFM: An Optimized Framework for Ordering and Transporting Raw Materials for Production.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022
2021
Int. J. Mach. Learn. Cybern., 2021
Inf. Sci., 2021
PPCL: Privacy-preserving collaborative learning for mitigating indirect information leakage.
Inf. Sci., 2021
Inf. Sci., 2021
MHAT: An efficient model-heterogenous aggregation training scheme for federated learning.
Inf. Sci., 2021
An improved anti-quantum MST3 public key encryption scheme for remote sensing images.
Enterp. Inf. Syst., 2021
Proceedings of the 2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2021
ABAC: Anonymous Bilateral Access Control Protocol with Traceability for Fog-Assisted Mobile Crowdsensing.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021
2020
Inf. Sci., 2020
An efficient blockchain-based privacy preserving scheme for vehicular social networks.
Inf. Sci., 2020
Toward optimal participant decisions with voting-based incentive model for crowd sensing.
Inf. Sci., 2020
Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts.
Comput. Secur., 2020
Complex., 2020
Appl. Soft Comput., 2020
An ensemble learning based prediction strategy for dynamic multi-objective optimization.
Appl. Soft Comput., 2020
Proceedings of the Cyberspace Safety and Security - 12th International Symposium, 2020
2019
A trust-based collaborative filtering algorithm for E-commerce recommendation system.
J. Ambient Intell. Humaniz. Comput., 2019
Inf. Sci., 2019
IoT-FBAC: Function-based access control scheme using identity-based encryption in IoT.
Future Gener. Comput. Syst., 2019
Improved collusion-resisting secure nearest neighbor query over encrypted data in cloud.
Concurr. Comput. Pract. Exp., 2019
An Efficient Cryptosystem for Video Surveillance in the Internet of Things Environment.
Complex., 2019
Sensitive and Energetic IoT Access Control for Managing Cloud Electronic Health Records.
IEEE Access, 2019
An Efficient Outsourced Privacy Preserving Machine Learning Scheme With Public Verifiability.
IEEE Access, 2019
New Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools with Defence Cost.
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
2018
Sensors, 2018
A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT.
Secur. Commun. Networks, 2018
IEEE Access, 2018
An Efficient and Certificateless Conditional Privacy-Preserving Authentication Scheme for Wireless Body Area Networks Big Data Services.
IEEE Access, 2018
2017
IEEE Syst. J., 2017
Towards secure and flexible EHR sharing in mobile health cloud under static assumptions.
Clust. Comput., 2017
2016
Intell. Autom. Soft Comput., 2016
2015
J. Univers. Comput. Sci., 2015
Future Gener. Comput. Syst., 2015
Proceedings of the Information and Communication Technology, 2015
2014
Secure Personal Health Record System with Attribute-Based Encryption in Cloud Computing.
Proceedings of the 2014 Ninth International Conference on P2P, 2014