Yang Xu

Orcid: 0000-0002-3194-8369

Affiliations:
  • Hunan University, College of Computer Science and Electronic Engineering, Changsha, China
  • Central South University, School of Information Science and Engineering, Changsha, China (former)


According to our database1, Yang Xu authored at least 63 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Improving completeness and consistency of co-reference annotation standard.
Wirel. Networks, July, 2024

Amount-Based Covert Communication Over Blockchain.
IEEE Trans. Netw. Serv. Manag., June, 2024

Protecting Inference Privacy With Accuracy Improvement in Mobile-Cloud Deep Learning.
IEEE Trans. Mob. Comput., June, 2024

HPDK: A Hybrid PM-DRAM Key-Value Store for High I/O Throughput.
IEEE Trans. Computers, June, 2024

Redactable Blockchain-Based Secure and Accountable Data Management.
IEEE Trans. Netw. Serv. Manag., April, 2024

Enhancing privacy in cyber-physical systems: An efficient blockchain-assisted data-sharing scheme with deniability.
J. Syst. Archit., 2024

A Domain Embedding Model for Botnet Detection Based on Smart Blockchain.
IEEE Internet Things J., 2024

Evaluation of Machine Translation Based on Semantic Dependencies and Keywords.
CoRR, 2024

RobWE: Robust Watermark Embedding for Personalized Federated Learning Model Ownership Protection.
CoRR, 2024

A Semi-Asynchronous Decentralized Federated Learning Framework via Tree-Graph Blockchain.
Proceedings of the IEEE INFOCOM 2024, 2024

Few-Shot Data Completion for New Tasks in Sparse Crowdsensing.
Proceedings of the IEEE INFOCOM 2024, 2024

2023
A decentralized trust management mechanism for crowdfunding.
Inf. Sci., August, 2023

TRUCON: Blockchain-Based Trusted Data Sharing With Congestion Control in Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., March, 2023

C-FDRL: Context-Aware Privacy-Preserving Offloading Through Federated Deep Reinforcement Learning in Cloud-Enabled IoT.
IEEE Trans. Ind. Informatics, 2023

A Blockchain-Based Model Migration Approach for Secure and Sustainable Federated Learning in IoT Systems.
IEEE Internet Things J., 2023

EKDF: An Ensemble Knowledge Distillation Framework for Robust Collaborative Inference on Heterogeneous Edge Devices.
Proceedings of the 19th International Conference on Mobility, Sensing and Networking, 2023

Cost-Effective Dynamic Alliance Pricing Mechanism Based on Distributed Edge-Intelligence.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

2022
A blockchain-based trustworthy collaborative power trading scheme for 5G-enabled social internet of vehicles.
Digit. Commun. Networks, December, 2022

Survey of Testing Methods and Testbed Development Concerning Internet of Things.
Wirel. Pers. Commun., 2022

Trustworthy Target Tracking With Collaborative Deep Reinforcement Learning in EdgeAI-Aided IoT.
IEEE Trans. Ind. Informatics, 2022

Zeroing Neural Networks for Dynamic Quaternion-Valued Matrix Inversion.
IEEE Trans. Ind. Informatics, 2022

A Blockchain-Based Multi-Cloud Storage Data Auditing Scheme to Locate Faults.
IEEE Trans. Cloud Comput., 2022

Quantitative understanding serial-parallel hybrid sfc services: a dependability perspective.
Peer-to-Peer Netw. Appl., 2022

AntiConcealer: Reliable Detection of Adversary Concealed Behaviors in EdgeAI-Assisted IoT.
IEEE Internet Things J., 2022

Blockchain-Based Trustworthy Energy Dispatching Approach for High Renewable Energy Penetrated Power Systems.
IEEE Internet Things J., 2022

Deep Neural Network Security Collaborative Filtering Scheme for Service Recommendation in Intelligent Cyber-Physical Systems.
IEEE Internet Things J., 2022

TrustBuilder: A non-repudiation scheme for IoT cloud applications.
Comput. Secur., 2022

Artificial intelligence in cyber security: research advances, challenges, and opportunities.
Artif. Intell. Rev., 2022

2021
Blockchain-Enabled Accountability Mechanism Against Information Leakage in Vertical Industry Services.
IEEE Trans. Netw. Sci. Eng., 2021

Hierarchical Bidirectional RNN for Safety-Enhanced B5G Heterogeneous Networks.
IEEE Trans. Netw. Sci. Eng., 2021

A Unified Predefined-Time Convergent and Robust ZNN Model for Constrained Quadratic Programming.
IEEE Trans. Ind. Informatics, 2021

A Blockchain-Enabled Deduplicatable Data Auditing Mechanism for Network Storage Services.
IEEE Trans. Emerg. Top. Comput., 2021

A Method of Information Protection for Collaborative Deep Learning under GAN Model Attack.
IEEE ACM Trans. Comput. Biol. Bioinform., 2021

A trustworthy industrial data management scheme based on redactable blockchain.
J. Parallel Distributed Comput., 2021

Robot and its living space: A roadmap for robot development based on the view of living space.
Digit. Commun. Networks, 2021

On the Characterization and Risk Assessment of AI-Powered Mobile Cloud Applications.
Comput. Stand. Interfaces, 2021

Revocable Data Sharing Methodology Based on SGX and Blockchain.
Proceedings of the Network and System Security - 15th International Conference, 2021

2020
Blockchain Empowered Arbitrable Data Auditing Scheme for Network Storage as a Service.
IEEE Trans. Serv. Comput., 2020

Trustworthy Network Anomaly Detection Based on an Adaptive Learning Rate and Momentum in IIoT.
IEEE Trans. Ind. Informatics, 2020

Learning URL Embedding for Malicious Website Detection.
IEEE Trans. Ind. Informatics, 2020

An efficient privacy-enhanced attribute-based access control mechanism.
Concurr. Comput. Pract. Exp., 2020

2019
A Blockchain-Based Nonrepudiation Network Computing Service Scheme for Industrial IoT.
IEEE Trans. Ind. Informatics, 2019

A Trusted Routing Scheme Using Blockchain and Reinforcement Learning for Wireless Sensor Networks.
Sensors, 2019

Review on Smart Gas Sensing Technology.
Sensors, 2019

An adaptive and configurable protection framework against android privilege escalation threats.
Future Gener. Comput. Syst., 2019

CWND: A Coarse, But Simple, Efficient Metric to Reduce Short Flow Completion Time in Data Centers.
IEEE Access, 2019

Distributed Landmark Selection for Lower Bound Estimation of Distances in Large Graphs.
Proceedings of the Web and Big Data - Third International Joint Conference, 2019

2018
Towards Secure Network Computing Services for Lightweight Clients Using Blockchain.
Wirel. Commun. Mob. Comput., 2018

A Feasible Fuzzy-Extended Attribute-Based Access Control Technique.
Secur. Commun. Networks, 2018

Improve symmetry of arbiter in APUF.
Math. Found. Comput., 2018

A Succinct Provable Data Possession Mechanism for Lightweight Clients in Network Computing.
Proceedings of the 2018 IEEE SmartWorld, 2018

A Privacy-Preserving Attribute-Based Access Control Scheme.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

2017
FABAC: A Flexible Fuzzy Attribute-Based Access Control Mechanism.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

PCSD: A Tool for Android Malware Detection.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

An Adaptive Android Security Extension against Privilege Escalation Attacks.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

2016
Decentralized group key management for hierarchical access control using multilinear forms.
Concurr. Comput. Pract. Exp., 2016

Statistical Analysis of Process Variations on the Delay-Based PUF.
Proceedings of the International Conference on Identification, 2016

2015
Research on Key Management for Multi-privileged Group Communications.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Weight-Based Batch Rekeying Scheme for Dynamic Multi-privileged Group Communications.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

An Illegal Indirect Access Prevention Method in Transparent Computing System.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Streaming Computing Technology for Android Applications: Design Model and Case Study.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Design and Implementation of Streaming Application Execution Platform in Android.
Proceedings of the 12th Web Information System and Application Conference, 2015

2013
Distributed Group Key Management Using Multilinear Forms for Multi-privileged Group Communications.
Proceedings of the 12th IEEE International Conference on Trust, 2013


  Loading...