Kan Yang
Orcid: 0000-0003-4234-9596Affiliations:
- University of Memphis, Department of Computer Science, TN, USA
- University of Waterloo, Department of Electrical and Computer Engineering, ON, Canada (2014 - 2016)
- City University of Hong Kong, Department of Computer Science, Hong Kong (PhD 2013)
According to our database1,
Kan Yang
authored at least 85 papers
between 2008 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on memphis.edu
-
on orcid.org
On csauthors.net:
Bibliography
2025
Proc. Priv. Enhancing Technol., 2025
2024
Peer Peer Netw. Appl., July, 2024
EIV-BT-ABE: Efficient Attribute-Based Encryption With Black-Box Traceability Based on Encrypted Identity Vector.
IEEE Internet Things J., May, 2024
Blockchain-Based Portable Authenticated Data Transmission for Mobile Edge Computing: A Universally Composable Secure Solution.
IEEE Trans. Computers, April, 2024
PBFL: Privacy-Preserving and Byzantine-Robust Federated-Learning-Empowered Industry 4.0.
IEEE Internet Things J., February, 2024
Guest Editorial Special Issue on Recent Advances of Security, Privacy, and Trust in Mobile Crowdsourcing.
IEEE Internet Things J., January, 2024
IEEE Trans. Inf. Forensics Secur., 2024
Towards Fair, Robust and Efficient Client Contribution Evaluation in Federated Learning.
CoRR, 2024
Seamless group handover authentication protocol for vehicle networks: Services continuity.
Comput. Networks, 2024
Ensuring Fairness in Federated Learning Services: Innovative Approaches to Client Selection, Scheduling, and Rewards.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
Proceedings of the IEEE International Conference on Communications, 2024
Proceedings of the IEEE International Conference on Communications, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
A Novel Blockchain-Assisted Aggregation Scheme for Federated Learning in IoT Networks.
IEEE Internet Things J., October, 2023
Peer Peer Netw. Appl., May, 2023
IEEE Internet Things J., February, 2023
Efficient and Provably Secure Data Selective Sharing and Acquisition in Cloud-Based Systems.
IEEE Trans. Inf. Forensics Secur., 2023
Decentralized Compromise-Tolerant Public Key Management Ecosystem with Threshold Validation.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Multi-Criteria Client Selection and Scheduling with Fairness Guarantee for Federated Learning Service.
CoRR, 2023
CoRR, 2023
2022
Delegating Authentication to Edge: A Decentralized Authentication Architecture for Vehicular Networks.
IEEE Trans. Intell. Transp. Syst., 2022
Reputation-Based Truth Discovery With Long-Term Quality of Source in Internet of Things.
IEEE Internet Things J., 2022
A new RFID ultra-lightweight authentication protocol for medical privacy protection in smart living.
Comput. Commun., 2022
2021
IEEE Trans. Serv. Comput., 2021
PROTECT: Efficient Password-Based Threshold Single-Sign-On Authentication for Mobile Users against Perpetual Leakage.
IEEE Trans. Mob. Comput., 2021
IEEE Trans. Ind. Informatics, 2021
Proxy-Free Privacy-Preserving Task Matching with Efficient Revocation in Crowdsourcing.
IEEE Trans. Dependable Secur. Comput., 2021
Secur. Commun. Networks, 2021
Secure and Efficient Task Matching with Multi-keyword in Multi-requester and Multi-worker Crowdsourcing.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021
Proceedings of the IEEE Global Communications Conference, 2021
2020
Experience Blocking Ratio Based Game Theoretic Approach for Spectrum Sharing in Heterogeneous Networks.
IEEE Trans. Netw. Sci. Eng., 2020
IEEE Trans. Inf. Forensics Secur., 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Enabling Efficient and Geometric Range Query With Access Control Over Encrypted Spatial Data.
IEEE Trans. Inf. Forensics Secur., 2019
IEEE Internet Things J., 2019
SybSub: Privacy-Preserving Expressive Task Subscription With Sybil Detection in Crowdsourcing.
IEEE Internet Things J., 2019
IEEE Commun. Mag., 2019
2018
HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems.
IEEE Trans. Ind. Informatics, 2018
Exploiting Social Network to Enhance Human-to-Human Infection Analysis without Privacy Leakage.
IEEE Trans. Dependable Secur. Comput., 2018
Querying in Internet of Things with Privacy Preserving: Challenges, Solutions and Opportunities.
IEEE Netw., 2018
IEEE Internet Things J., 2018
TKSE: Trustworthy Keyword Search Over Encrypted Data With Two-Side Verifiability via Blockchain.
IEEE Access, 2018
Proceedings of the IEEE Global Communications Conference, 2018
2017
IEEE Trans. Aerosp. Electron. Syst., 2017
Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms.
Inf. Sci., 2017
IEEE Internet Things J., 2017
An Efficient and Fine-Grained Big Data Access Control Scheme With Privacy-Preserving Policy.
IEEE Internet Things J., 2017
CoRR, 2017
Comput. Secur., 2017
IEEE Commun. Mag., 2017
Optimal Control Theory-Based Epidemic Information Spreading Scheme for Mobile Social Users With Energy Constraint.
IEEE Access, 2017
A blockchain-based reputation system for data credibility assessment in vehicular networks.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017
QoE loss probability based game-theoretic approach for spectrum sharing in heterogeneous networks.
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the IEEE International Conference on Communications, 2017
2016
Exploiting Secure and Energy-Efficient Collaborative Spectrum Sensing for Cognitive Radio Sensor Networks.
IEEE Trans. Wirel. Commun., 2016
IEEE Trans. Wirel. Commun., 2016
Design of Analytical Model and Algorithm for Optimal Roadside AP Placement in VANETs.
IEEE Trans. Veh. Technol., 2016
Time-Domain Attribute-Based Access Control for Cloud-Based Video Content Sharing: A Cryptographic Approach.
IEEE Trans. Multim., 2016
2015
Security and privacy for mobile healthcare networks: from a quality of protection perspective.
IEEE Wirel. Commun., 2015
Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud.
IEEE Trans. Parallel Distributed Syst., 2015
IEEE Commun. Mag., 2015
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
2014
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-7873-7, 2014
Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage.
IEEE Trans. Parallel Distributed Syst., 2014
IACR Cryptol. ePrint Arch., 2014
Enabling efficient access control with dynamic policy updating for big data in the cloud.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
2013
An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing.
IEEE Trans. Parallel Distributed Syst., 2013
IEEE Trans. Inf. Forensics Secur., 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Multi-path Routing and Stream Scheduling with Spatial Multiplexing and Interference Cancellation in MIMO Networks.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013
Attribute-based fine-grained access control with efficient revocation in cloud storage systems.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
Data storage auditing service in cloud computing: challenges, methods and opportunities.
World Wide Web, 2012
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012
2010
Minimum AP Placement for WLAN with Rate Adaptation Using Physical Interference Model.
Proceedings of the Global Communications Conference, 2010
Proceedings of the Global Communications Conference, 2010
Threshold Key Redistribution for Dynamic Change of Authentication Group in Wireless Mesh Networks.
Proceedings of the Global Communications Conference, 2010
2008
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008