Yi Ren
Orcid: 0000-0001-7423-6719Affiliations:
- University of East Anglia, School of Computing Science, Norwich, UK
- National Chiao Tung University, Department of Computer Science, Hsinchu, Taiwan (2012 - 2017)
- University of Agder, Department of Information and Communication Technology, Grimstad, Norway (PhD 2012)
According to our database1,
Yi Ren
authored at least 73 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
CoPiFL: A collusion-resistant and privacy-preserving federated learning crowdsourcing scheme using blockchain and homomorphic encryption.
Future Gener. Comput. Syst., 2024
A blockchain-empowered authentication scheme for worm detection in wireless sensor network.
Digit. Commun. Networks, 2024
2023
BTC-Shadow: an analysis and visualization system for exposing implicit behaviors in Bitcoin transaction graphs.
Frontiers Comput. Sci., December, 2023
IEEE Trans. Wirel. Commun., November, 2023
Design and Analysis of Dynamic Block-Setup Reservation Algorithm for 5G Network Slicing.
IEEE Trans. Mob. Comput., September, 2023
Enabling Dynamic Autoscaling for NFV in a Non-Standalone Virtual EPC: Design and Analysis.
IEEE Trans. Veh. Technol., June, 2023
A Commitment and Ring Signature based Scheme for Amount and Identity Privacy Protection in Blockchain.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the 19th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, 2023
From 5G to 6G: It is Time to Sniff the Communications between a Base Station and Core Networks.
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, 2023
2021
IEEE Trans. Image Process., 2021
IEEE Trans. Geosci. Remote. Sens., 2021
CDVT: A Cluster-Based Distributed Video Transcoding Scheme for Mobile Stream Services.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
A User Behavior-Based Random Distribution Scheme for Adversarial Example Generated CAPTCHA.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021
2020
A flexible method to defend against computationally resourceful miners in blockchain proof of work.
Inf. Sci., 2020
IEEE Access, 2020
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020
2019
Multi-Slot Allocation Protocols for Massive IoT Devices With Small-Size Uploading Data.
IEEE Wirel. Commun. Lett., 2019
Traceable and Authenticated Key Negotiations via Blockchain for Vehicular Communications.
Mob. Inf. Syst., 2019
SaaS: A situational awareness and analysis system for massive android malware detection.
Future Gener. Comput. Syst., 2019
Proceedings of the IEEE VTS Asia Pacific Wireless Communications Symposium, 2019
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019
2018
How to Reduce Unexpected eMBMS Session Disconnection: Design and Performance Analysis.
IEEE Wirel. Commun. Lett., 2018
Proportional and Preemption-Enabled Traffic Offloading for IP Flow Mobility: Algorithms and Performance Evaluation.
IEEE Trans. Veh. Technol., 2018
Impacts of S1 and X2 Interfaces on eMBMS Handover Failure: Solution and Performance Analysis.
IEEE Trans. Veh. Technol., 2018
RoFa: A Robust and Flexible Fine-Grained Access Control Scheme for Mobile Cloud and IoT based Medical Monitoring.
Fundam. Informaticae, 2018
Future Internet, 2018
Future Gener. Comput. Syst., 2018
LiReK: A lightweight and real-time key establishment scheme for wearable embedded devices by gestures or motions.
Future Gener. Comput. Syst., 2018
Performance and Security Evaluations of Identity- and Pairing-Based Digital Signature Algorithms on Windows, Android, and Linux Platforms: Revisiting the Algorithms of Cha and Cheon, Hess, Barreto, Libert, Mccullagh and Quisquater, and Paterson and Schuldt.
IEEE Access, 2018
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 7th IEEE International Conference on Cloud Networking, 2018
2017
Modeling and Analysis of Channel Holding Time and Handoff Rate for Packet Sessions in All-IP Cellular Networks.
IEEE Trans. Veh. Technol., 2017
Proceedings of the 2017 Wireless Days, Porto, Portugal, March 29-31, 2017, 2017
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017
The hint protocol: Using a broadcast method to enable ID-free data transmission for dense IoT devices.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017
Proceedings of the Genetic and Evolutionary Computing, 2017
Proceedings of the IEEE 8th International Conference on Awareness Science and Technology, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the 19th Asia-Pacific Network Operations and Management Symposium, 2017
2016
Design and Analysis of the Key Management Mechanism in Evolved Multimedia Broadcast/Multicast Service.
IEEE Trans. Wirel. Commun., 2016
LibTiP: a lightweight and robust scheme for data trustworthiness and privacy protection in participatory sensing.
Int. J. Embed. Syst., 2016
CoRR, 2016
Design and Analysis of Optimal Threshold Offloading (OTO) Algorithm for LTE Femtocell/Macrocell Networks.
CoRR, 2016
Design and analysis of a Threshold Offloading (TO) algorithm for LTE femtocell/macrocell networks.
Proceedings of the IEEE Symposium on Computers and Communication, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Design and Analysis of Deadline and Budget Constrained Autoscaling (DBCA) Algorithm for 5G Mobile Networks.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016
2015
A Robust and Flexible Access Control Scheme for Cloud-IoT Paradigm with Application to Remote Mobile Medical Monitoring.
Proceedings of the Third International Conference on Robot, Vision and Signal Processing, 2015
Proceedings of the 14th International Conference on Information Processing in Sensor Networks, 2015
2014
IEEE Trans. Mob. Comput., 2014
2013
How to Authenticate a Device? Formal Authentication Models for M2M Communications Defending against Ghost Compromising Attack.
Int. J. Distributed Sens. Networks, 2013
LIRT: A Lightweight Scheme for Indistinguishability, Reachability, and Timeliness in Wireless Sensor Control Networks.
Int. J. Distributed Sens. Networks, 2013
APP: An Ultralightweight Scheme to Authenticate ONS and Protect EPC Privacy without Cryptography in EPCglobal Networks.
Int. J. Distributed Sens. Networks, 2013
Perturbation-Based Schemes with Ultra-Lightweight Computation to Protect User Privacy in Smart Grid.
Int. J. Distributed Sens. Networks, 2013
Optimized secure and reliable distributed data storage scheme and performance evaluation in unattended WSNs.
Comput. Commun., 2013
Design of a self-portrait application with sensor-assisted guiding for smart devices.
Proceedings of the First International Black Sea Conference on Communications and Networking, 2013
2012
FoSBaS: A bi-directional secrecy and collusion resilience key management scheme for BANs.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012
An Efficient, Robust, and Scalable Trust Management Scheme for Unattended Wireless Sensor Networks.
Proceedings of the 13th IEEE International Conference on Mobile Data Management, 2012
2011
BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid.
Int. J. Digit. Multim. Broadcast., 2011
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011
2010
Secure, dependable and publicly verifiable distributed data storage in unattended wireless sensor networks.
Sci. China Inf. Sci., 2010
Proceedings of the Global Communications Conference, 2010
2009
Network Coding based Dependable and Efficient Data Survival in Unattended Wireless Sensor Networks.
J. Commun., 2009
A distributed data storage and retrieval scheme in unattended WSNs using Homomorphic Encryption and secret sharing.
Proceedings of the 2nd IFIP Wireless Days, 2009
Proceedings of the NTMS 2009, 2009
Efficient and Lightweight Data Integrity Check in In-Networking Storage Wireless Sensor Networks.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009
H2S: A Secure and Efficient Data Aggregative Retrieval Scheme in Unattended Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008