Yanjun Zuo

Orcid: 0000-0001-7887-8532

According to our database1, Yanjun Zuo authored at least 58 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Big data and big risk: a four-factor framework for big data security and privacy.
Int. J. Bus. Inf. Syst., 2023

2022
Towards a Learner-Managed Education Credentialing System Based on Blockchain.
Inf. Resour. Manag. J., 2022

A Blockchain-Based IoT Framework for Oil Field Remote Monitoring and Control.
IEEE Access, 2022

Tokenizing Renewable Energy Certificates (RECs) - A Blockchain Approach for REC Issuance and Trading.
IEEE Access, 2022

2021
Towards a trustworthy RFID system - from a security perspective.
Int. J. Bus. Inf. Syst., 2021

Making smart manufacturing smarter - a survey on blockchain technology in Industry 4.0.
Enterp. Inf. Syst., 2021

2017
A reputation-based model for mobile agent migration for information search and retrieval.
Int. J. Inf. Manag., 2017

2016
Reputation-based service migration for moving target defense.
Proceedings of the 2016 IEEE International Conference on Electro Information Technology, 2016

2015
Web of things: readiness and applications from a business and consumer perspective.
Int. J. Bus. Inf. Syst., 2015

Mobile Agent-Based Service Migration.
Proceedings of the 12th International Conference on Information Technology, 2015

Belief-Based Decision Making for Service Migration.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

Fuzzy inference for service migration strategy.
Proceedings of the IEEE International Conference on Electro/Information Technology, 2015

2014
A Constrained, Possibilistic Logical Approach for Software System Survivability Evaluation.
Int. J. Softw. Eng. Knowl. Eng., 2014

A new approach for credit extended mobile phone payment.
Int. J. Bus. Inf. Syst., 2014

Design of Transplanting Mechanism with B-Spline Curve Gear for Rice Pot Seedling Based on UG.
Proceedings of the Computer and Computing Technologies in Agriculture VIII, 2014

Analyzing the Vulnerabilities in GWT Code and Applications.
Proceedings of the Second International Symposium on Computing and Networking, 2014

Performance analysis of javascript injection detection techniques.
Proceedings of the IEEE International Conference on Electro/Information Technology, 2014

Data labeling for integrity in SCADA systems.
Proceedings of the 2014 IEEE/ACIS 13th International Conference on Computer and Information Science, 2014

2013
Toward an RFID Scheme for Secure Material Flow Tracing and Verification in Supply Chains.
Int. J. Handheld Comput. Res., 2013

Moving and Relocating: A Logical Framework of Service Migration for Software System Survivability.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

Modeling Service Migration and Relocation in Mission-Critical Systems.
Proceedings of the Critical Infrastructure Protection VII, 2013

2012
Survivability Experiment and Attack Characterization for RFID.
IEEE Trans. Dependable Secur. Comput., 2012

Incorporating Constraints to Software System Survivability Specification and Proof.
Proceedings of the Sixth International Symposium on Theoretical Aspects of Software Engineering, 2012

Searching for the Optimal Proof Schedule in a Proof-Carrying Survivability Paradigm - A Dynamic, Interactive Approach.
Proceedings of the Ninth International Conference on Information Technology: New Generations, 2012

An RFID Survivability Impact Model in the Military Domain.
Proceedings of the 18th Americas Conference on Information Systems, 2012

2011
Survivability Enhancing Techniques for RFID Systems.
Int. J. Handheld Comput. Res., 2011

A Logical Framework of Proof-Carrying Survivability.
Proceedings of the IEEE 10th International Conference on Trust, 2011

RFID-Enabled Logistic Flow Tracing in Supply Chains: Communication, Protocol, and Security.
Proceedings of the Global Communications Conference, 2011

Designing Security Requirements - A Flexible, Balanced, and Threshold-Based Approach.
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011

2010
Survivable RFID Systems: Issues, Challenges, and Techniques.
IEEE Trans. Syst. Man Cybern. Part C, 2010

Secure and private search protocols for RFID systems.
Inf. Syst. Frontiers, 2010

Contemporary Issues in Handheld Computing Research.
Int. J. Handheld Comput. Res., 2010

RFID survivability quantification and attack modeling.
Proceedings of the Third ACM Conference on Wireless Network Security, 2010

Analysis and Simulation of System Survivability.
Proceedings of the Seventh International Conference on Information Technology: New Generations, 2010

Securely Querying Sensor Enabled RFID Virtual Databases (SERVDs).
Proceedings of the Seventh International Conference on Information Technology: New Generations, 2010

3-D Turbulence Numerical Simulation for the Flow Field of Suction Cylinder-Seeder with Socket-Slots.
Proceedings of the Computer and Computing Technologies in Agriculture IV, 2010

Design of Rotary Root Stubble Digging Machine Based on Solidworks.
Proceedings of the Computer and Computing Technologies in Agriculture IV, 2010

A Holistic Approach for Security Requirement Specification for Low-Cost, Distributed Ubiquitous Systems.
Proceedings of the International Conference on Information Systems, 2010

Changing Hands Together: A Secure Group Ownership Transfer Protocol for RFID Tags.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

A Framework of Survivability Requirement Specification for Critical Information Systems.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

2009
Trust-Based Information Risk Management in a Supply Chain Network.
Int. J. Inf. Syst. Supply Chain Manag., 2009

Mobile Data Protection Using Handheld Usage Context Matching.
Proceedings of the MDM 2009, 2009

Trust Computing for Social Networking.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Unifying strategies and tactics: A survivability framework for countering cyber attacks.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

A Framework for RFID Survivability Requirement Analysis and Specification.
Proceedings of the Innovations in Computing Sciences and Software Engineering, 2009

2008
Prompt damage identification for system survivability.
Int. J. Inf. Comput. Secur., 2008

Two-level trust-based decision model for information assurance in a virtual organization.
Decis. Support Syst., 2008

Handheld data protection using handheld usage pattern identification.
Proceedings of the 2008 IEEE International Conference on Electro/Information Technology, 2008

2007
Post-release information privacy protection: A framework and next-generation privacy-enhanced operating system.
Inf. Syst. Frontiers, 2007

Component comparison based information quality assurance.
Int. J. Inf. Qual., 2007

2006
Distributed database damage assessment paradigm.
Inf. Manag. Comput. Secur., 2006

Information trustworthiness evaluation based on trust combination.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

2005
External Object Trust Zone Mapping for Information Clustering.
Proceedings of the Security in Information Systems, 2005

Component based trust management in the context of a virtual organization.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

2004
A Trust-Based Model for Information Integrity in Open Systems.
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004

Damage Discovery in Distributed Database Systems.
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004

2003
A Service Oriented System Based Information Flow Model for Damage Assessment.
Proceedings of the Integrity and Internal Control in Information Systems VI, 2003

Network Viruses: Their 306 Working Principles and Marriages with Hacking Programs.
Proceedings of the IEEE Systems, 2003


  Loading...