Yichuan Wang

Orcid: 0000-0001-6575-1954

Affiliations:
  • Xi'an University of Technology, Xi'an, China


According to our database1, Yichuan Wang authored at least 83 papers between 2011 and 2025.

Collaborative distances:

Timeline

2012
2014
2016
2018
2020
2022
2024
0
5
10
15
1
1
5
2
5
6
4
4
5
1
1
5
8
5
9
6
3
5
1
2
3
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Visually secure image encryption: Exploring deep learning for enhanced robustness and flexibility.
Expert Syst. Appl., 2025

2024
Privacy Block-Streaming: A Novel DEX File Loading Scheme Based on Federated Learning.
J. Inf. Sci. Eng., January, 2024

Probability analysis of system vulnerability distribution based on the matroid theory.
Proceedings of the International Conference on Networking and Network Applications, 2024

Code obfuscation protection strategies for program running states.
Proceedings of the International Conference on Networking and Network Applications, 2024

Crucial Interaction Elements Detection for 5G Core Network based on the Complex Network Model.
Proceedings of the International Conference on Networking and Network Applications, 2024

Compiler Differentiation Detection Method for Binary Similarity.
Proceedings of the International Conference on Networking and Network Applications, 2024

A Novel Multipath Data Transmission Method with Traffic Obfuscation.
Proceedings of the International Conference on Networking and Network Applications, 2024

2023
PrivAim: A Dual-Privacy Preserving and Quality-Aware Incentive Mechanism for Federated Learning.
IEEE Trans. Computers, July, 2023

PTAP: A novel secure privacy-preserving & traceable authentication protocol in VANETs.
Comput. Networks, May, 2023

TRUCON: Blockchain-Based Trusted Data Sharing With Congestion Control in Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., March, 2023

Research on the Security of IPv6 Communication Based on Petri Net under IoT.
Sensors, 2023

Explore the potential of deep learning and hyperchaotic map in the meaningful visual image encryption scheme.
IET Image Process., 2023

Hearing Cyber-Attacks: A Novel Model for Bridging Network Security Situation and Music.
Proceedings of the 5th International Symposium on Signal Processing Systems, 2023

A Text Classification Method of Network Public Opinion Based on Information Fusion.
Proceedings of the International Conference on Networking and Network Applications, 2023

Formal Modeling and Defense Methods for 5G Network Endpoint Access Denial of Service Attacks.
Proceedings of the International Conference on Networking and Network Applications, 2023

A Novel On-Demand Service Architecture for Efficient Cloud-Edge Collaboration.
Proceedings of the International Conference on Networking and Network Applications, 2023

A Trusted Privacy-Preserving Model for Cross-Chain Transactions Based on zk_SNARKs.
Proceedings of the International Conference on Networking and Network Applications, 2023

A Pseudonym Exchange-Based Traceable Location Privacy Protection Scheme for IoV.
Proceedings of the International Conference on Networking and Network Applications, 2023

DDoS Attack Detection Based on Information Entropy Feature Extraction in Software Defined Networks.
Proceedings of the International Conference on Networking and Network Applications, 2023

Smart Contract Symbol Execution Vulnerability Detection Method Based on CFG Path Pruning.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023

2022
Trusted Data Storage Architecture for National Infrastructure.
Sensors, 2022

A Fault-Diagnosis Method for Railway Turnout Systems Based on Improved Autoencoder and Data Augmentation.
Sensors, 2022

TCS Security Analysis in Intel SGX Enclave MultiThreading.
Proceedings of the International Conference on Networking and Network Applications, 2022

Effective Secrecy Throughput Analysis for Communication Systems with a DF Satellite Relay.
Proceedings of the International Conference on Networking and Network Applications, 2022

Block-Streaming Service Loading Optimization of Android Dalvik Executable File for Cloud-End Collaboration.
Proceedings of the International Conference on Networking and Network Applications, 2022

Trusted Storage Architecture for Machine Reasoning based on Blockchain.
Proceedings of the IEEE INFOCOM 2022, 2022

FDQM: Four-Dimensional Quantitative Measure for Statistical Heterogeneity in Federated Learning.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2022

2021
A Novel IoV Block-Streaming Service Awareness and Trusted Verification Scheme in 6G.
IEEE Trans. Veh. Technol., 2021

From Unknown to Similar: Unknown Protocol Syntax Analysis for Network Flows in IoT.
Secur. Commun. Networks, 2021

Deep Learning Data Privacy Protection Based on Homomorphic Encryption in AIoT.
Mob. Inf. Syst., 2021

An intelligent fault diagnosis method based on curve segmentation and SVM for rail transit turnout.
J. Intell. Fuzzy Syst., 2021

An unknown protocol syntax analysis method based on convolutional neural network.
Trans. Emerg. Telecommun. Technol., 2021

A Heuristic SAT Problems Solving Method based on LSTM Network.
Proceedings of the 12th International Symposium on Parallel Architectures, 2021

A permission generation and configuration method based on Rules and FP-Growth algorithm.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

A fine-grained petri model for SQL time-blind injection.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

Signature Scheme Based on The SM2 Algorithm in Fabric.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

Petri net modeling and vulnerability analysis of the Heartbleed.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

A Method for Fast Outlier Detection in High Dimensional Database Log.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

A Driving Risk Prediction Approach Based on Generative Adversarial Networks and VANET for Autonomous Trams.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

Chinese named entity recognition method for the field of network security based on RoBERTa.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

ConvCatb: An Attention-based CNN-CATBOOST Risk Prediction Model for Driving Safety.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

2020
From Hardware to Operating System: A Static Measurement Method of Android System Based on TrustZone.
Wirel. Commun. Mob. Comput., 2020

Combined access control model embedding configurable policy for fine-grained data security.
Microprocess. Microsystems, 2020

Classification and Recognition of Unknown Network Protocol Characteristics.
J. Inf. Sci. Eng., 2020

A novel energy-aware bio-inspired clustering scheme for IoT communication.
J. Ambient Intell. Humaniz. Comput., 2020

A trusted feature aggregator federated learning for distributed malicious attack detection.
Comput. Secur., 2020

A trusted recommendation scheme for privacy protection based on federated learning.
CCF Trans. Netw., 2020

A study on exercise recommendation method using Knowledge Graph for computer network course.
Proceedings of the International Conference on Networking and Network Applications, 2020

Network Flow Analytics: Multi-Class Classification of DDoS Attacks Based on OKNN.
Proceedings of the International Conference on Networking and Network Applications, 2020

A Framework for Audit Analysis of Heterogeneous Logs from PaaS.
Proceedings of the International Conference on Networking and Network Applications, 2020

Deep Learning as a Service Based on Encrypted Data.
Proceedings of the International Conference on Networking and Network Applications, 2020

Independent credible: Secure communication architecture of Android devices based on TrustZone.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020

A Blockchain Based Distributed Storage System for Knowledge Graph Security.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

2019
A novel subgraph querying method based on paths and spectra.
Neural Comput. Appl., 2019

RSU authentication in vehicular ad hoc networks base on verifiable secret sharing.
J. Intell. Fuzzy Syst., 2019

An energy saving based on task migration for mobile edge computing.
EURASIP J. Wirel. Commun. Netw., 2019

Efficient group authentication in RFID using secret sharing scheme.
Clust. Comput., 2019

Feature Extraction Optimization for Bitstream Communication Protocol Format Reverse Analysis.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Bitstream Protocol Classification Mechanism Based on Feature Extraction.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Railway Key Exchange Scheme for Improving Communication Efficiency of RSSP-II Protocol.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

2018
Gleer: A Novel Gini-Based Energy Balancing Scheme for Mobile Botnet Retopology.
Wirel. Commun. Mob. Comput., 2018

Cheating identifiable secret sharing scheme using symmetric bivariate polynomial.
Inf. Sci., 2018

A novel energy-aware trustworthy multi-hop routing model for Internet of things.
Int. J. Distributed Sens. Networks, 2018

AHP Aided Decision-Making in Virtual Machine Migration for Green Cloud.
Comput. Informatics, 2018

A Blockchain-Based Decentralized Cloud Resource Scheduling Architecture.
Proceedings of the International Conference on Networking and Network Applications, 2018

Analysis and Protection of DDOS Attack Based on RSSP-II Protocol.
Proceedings of the International Conference on Networking and Network Applications, 2018

Energy Saving Strategy for Task Migration Based on Genetic Algorithm.
Proceedings of the International Conference on Networking and Network Applications, 2018

A RMM Based Word Segmentation Method for Chinese Design Specifications of Building Stairs.
Proceedings of the 14th International Conference on Computational Intelligence and Security, 2018

A Novel Subgraph Querying Method on Directed Weighted Graphs.
Proceedings of the 14th International Conference on Computational Intelligence and Security, 2018

2017
Efficient (k, n) Secret Sharing Scheme Secure against k - 2 Cheaters.
Proceedings of the International Conference on Networking and Network Applications, 2017

2016
Dynamic game model of botnet DDoS attack and defense.
Secur. Commun. Networks, 2016

Towards energy efcient cloud: an optimized ant colony model for virtual machine placement.
J. Commun. Inf. Networks, 2016

Game strategies for distributed denial of service defense in the Cloud of Things.
J. Commun. Inf. Networks, 2016

Efficiency optimisation signature scheme for time-critical multicast data origin authentication.
Int. J. Grid Util. Comput., 2016

A limited-trust capacity model for mitigating threats of internal malicious services in cloud computing.
Clust. Comput., 2016

(k, n) Secret Sharing Scheme against Two Types of Cheaters.
Proceedings of the International Conference on Networking and Network Applications, 2016

A New Interference Aware Routing Metric for Multi-radio Multi-channel Wireless Mesh Networks.
Proceedings of the International Conference on Networking and Network Applications, 2016

2014
From high-availability to collapse: quantitative analysis of "Cloud-Droplet-Freezing" attack threats to virtual machine migration in cloud computing.
Clust. Comput., 2014

2013
A rational framework for secure communication.
Inf. Sci., 2013

Content Based Spam Text Classification: An Empirical Comparison between English and Chinese.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Game Optimization for Time-Critical Multicast Data Origin Authentication: Trade Off between Security and Efficiency.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Highly Flexible and Extensible Storage Scheme for Virtualization Platforms under Cloud Computing.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2011
PSO-BP Neural Network in Reservoir Parameter Dynamic Prediction.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011


  Loading...