Yichuan Wang
Orcid: 0000-0001-6575-1954Affiliations:
- Xi'an University of Technology, Xi'an, China
According to our database1,
Yichuan Wang
authored at least 83 papers
between 2011 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
2012
2014
2016
2018
2020
2022
2024
0
5
10
15
1
1
5
2
5
6
4
4
5
1
1
5
8
5
9
6
3
5
1
2
3
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Visually secure image encryption: Exploring deep learning for enhanced robustness and flexibility.
Expert Syst. Appl., 2025
2024
Privacy Block-Streaming: A Novel DEX File Loading Scheme Based on Federated Learning.
J. Inf. Sci. Eng., January, 2024
Probability analysis of system vulnerability distribution based on the matroid theory.
Proceedings of the International Conference on Networking and Network Applications, 2024
Proceedings of the International Conference on Networking and Network Applications, 2024
Crucial Interaction Elements Detection for 5G Core Network based on the Complex Network Model.
Proceedings of the International Conference on Networking and Network Applications, 2024
Proceedings of the International Conference on Networking and Network Applications, 2024
Proceedings of the International Conference on Networking and Network Applications, 2024
2023
PrivAim: A Dual-Privacy Preserving and Quality-Aware Incentive Mechanism for Federated Learning.
IEEE Trans. Computers, July, 2023
PTAP: A novel secure privacy-preserving & traceable authentication protocol in VANETs.
Comput. Networks, May, 2023
TRUCON: Blockchain-Based Trusted Data Sharing With Congestion Control in Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., March, 2023
Sensors, 2023
Explore the potential of deep learning and hyperchaotic map in the meaningful visual image encryption scheme.
IET Image Process., 2023
Hearing Cyber-Attacks: A Novel Model for Bridging Network Security Situation and Music.
Proceedings of the 5th International Symposium on Signal Processing Systems, 2023
Proceedings of the International Conference on Networking and Network Applications, 2023
Formal Modeling and Defense Methods for 5G Network Endpoint Access Denial of Service Attacks.
Proceedings of the International Conference on Networking and Network Applications, 2023
Proceedings of the International Conference on Networking and Network Applications, 2023
Proceedings of the International Conference on Networking and Network Applications, 2023
Proceedings of the International Conference on Networking and Network Applications, 2023
DDoS Attack Detection Based on Information Entropy Feature Extraction in Software Defined Networks.
Proceedings of the International Conference on Networking and Network Applications, 2023
Smart Contract Symbol Execution Vulnerability Detection Method Based on CFG Path Pruning.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023
2022
A Fault-Diagnosis Method for Railway Turnout Systems Based on Improved Autoencoder and Data Augmentation.
Sensors, 2022
Proceedings of the International Conference on Networking and Network Applications, 2022
Effective Secrecy Throughput Analysis for Communication Systems with a DF Satellite Relay.
Proceedings of the International Conference on Networking and Network Applications, 2022
Block-Streaming Service Loading Optimization of Android Dalvik Executable File for Cloud-End Collaboration.
Proceedings of the International Conference on Networking and Network Applications, 2022
Proceedings of the IEEE INFOCOM 2022, 2022
FDQM: Four-Dimensional Quantitative Measure for Statistical Heterogeneity in Federated Learning.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2022
2021
IEEE Trans. Veh. Technol., 2021
Secur. Commun. Networks, 2021
Mob. Inf. Syst., 2021
An intelligent fault diagnosis method based on curve segmentation and SVM for rail transit turnout.
J. Intell. Fuzzy Syst., 2021
Trans. Emerg. Telecommun. Technol., 2021
Proceedings of the 12th International Symposium on Parallel Architectures, 2021
A permission generation and configuration method based on Rules and FP-Growth algorithm.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021
A Driving Risk Prediction Approach Based on Generative Adversarial Networks and VANET for Autonomous Trams.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021
Chinese named entity recognition method for the field of network security based on RoBERTa.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021
2020
From Hardware to Operating System: A Static Measurement Method of Android System Based on TrustZone.
Wirel. Commun. Mob. Comput., 2020
Combined access control model embedding configurable policy for fine-grained data security.
Microprocess. Microsystems, 2020
J. Inf. Sci. Eng., 2020
J. Ambient Intell. Humaniz. Comput., 2020
A trusted feature aggregator federated learning for distributed malicious attack detection.
Comput. Secur., 2020
CCF Trans. Netw., 2020
A study on exercise recommendation method using Knowledge Graph for computer network course.
Proceedings of the International Conference on Networking and Network Applications, 2020
Proceedings of the International Conference on Networking and Network Applications, 2020
Proceedings of the International Conference on Networking and Network Applications, 2020
Proceedings of the International Conference on Networking and Network Applications, 2020
Independent credible: Secure communication architecture of Android devices based on TrustZone.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020
2019
Neural Comput. Appl., 2019
J. Intell. Fuzzy Syst., 2019
EURASIP J. Wirel. Commun. Netw., 2019
Clust. Comput., 2019
Feature Extraction Optimization for Bitstream Communication Protocol Format Reverse Analysis.
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019
Railway Key Exchange Scheme for Improving Communication Efficiency of RSSP-II Protocol.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019
2018
Wirel. Commun. Mob. Comput., 2018
Inf. Sci., 2018
Int. J. Distributed Sens. Networks, 2018
Comput. Informatics, 2018
Proceedings of the International Conference on Networking and Network Applications, 2018
Proceedings of the International Conference on Networking and Network Applications, 2018
Proceedings of the International Conference on Networking and Network Applications, 2018
A RMM Based Word Segmentation Method for Chinese Design Specifications of Building Stairs.
Proceedings of the 14th International Conference on Computational Intelligence and Security, 2018
Proceedings of the 14th International Conference on Computational Intelligence and Security, 2018
2017
Proceedings of the International Conference on Networking and Network Applications, 2017
2016
Towards energy efcient cloud: an optimized ant colony model for virtual machine placement.
J. Commun. Inf. Networks, 2016
J. Commun. Inf. Networks, 2016
Efficiency optimisation signature scheme for time-critical multicast data origin authentication.
Int. J. Grid Util. Comput., 2016
A limited-trust capacity model for mitigating threats of internal malicious services in cloud computing.
Clust. Comput., 2016
Proceedings of the International Conference on Networking and Network Applications, 2016
A New Interference Aware Routing Metric for Multi-radio Multi-channel Wireless Mesh Networks.
Proceedings of the International Conference on Networking and Network Applications, 2016
2014
From high-availability to collapse: quantitative analysis of "Cloud-Droplet-Freezing" attack threats to virtual machine migration in cloud computing.
Clust. Comput., 2014
2013
Content Based Spam Text Classification: An Empirical Comparison between English and Chinese.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Game Optimization for Time-Critical Multicast Data Origin Authentication: Trade Off between Security and Efficiency.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Highly Flexible and Extensible Storage Scheme for Virtualization Platforms under Cloud Computing.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011