Yafang Yang

Orcid: 0000-0002-1432-3885

According to our database1, Yafang Yang authored at least 13 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Device adaptation free-KDA based on multi-teacher knowledge distillation.
J. Ambient Intell. Humaniz. Comput., October, 2024

Cross-device free-text keystroke dynamics authentication using federated learning.
Pers. Ubiquitous Comput., August, 2024

MELPD-Detector: Multi-level ensemble learning method based on adaptive data augmentation for Parkinson disease detection via free-KD.
CCF Trans. Pervasive Comput. Interact., June, 2024

Provably secure multi-signature scheme based on the standard SM2 signature scheme.
Comput. Stand. Interfaces, 2024

ESPM-D: Efficient Sparse Polynomial Multiplication for Dilithium on ARM Cortex-M4 and Apple M2.
CoRR, 2024

Faster Post-quantum TLS 1.3 Based on ML-KEM: Implementation and Assessment.
Proceedings of the Computer Security - ESORICS 2024, 2024

2023
Efficient and Strong Symmetric Password Authenticated Key Exchange With Identity Privacy for IoT.
IEEE Internet Things J., 2023

2022
Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET.
IEEE Trans. Inf. Forensics Secur., 2022

CRFs for Digital Signature and NIZK Proof System in Web Services.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2022

2021
Detection of Behavior Aging from Keystroke Dynamics.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021

2020
Behavior Fingerprints Based Smartphone User Authentication: A Review.
Proceedings of the Green, Pervasive, and Cloud Computing - 15th International Conference, 2020

2019
<i>BehaveSense</i>: Continuous authentication for security-sensitive mobile apps using behavioral biometrics.
Ad Hoc Networks, 2019

2013
An efficient authentication protocol with user anonymity for mobile networks.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013


  Loading...