Yong Wang

Orcid: 0000-0002-0422-5691

Affiliations:
  • University of Electronic Science and Technology of China, School of Computer Science and Engineering, Center for CyberSecurity, Chengdu, China
  • Chinese Academy of Sciences, Institute of Computing Technology, Beijing, China (PhD 2008)


According to our database1, Yong Wang authored at least 38 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Replacing self-attentions with convolutional layers in multivariate long sequence time-series forecasting.
Appl. Intell., January, 2024

An improved self-attention for long-sequence time-series data forecasting with missing values.
Neural Comput. Appl., 2024

Computer vision based distributed denial of service attack detection for resource-limited devices.
Comput. Electr. Eng., 2024

2023
Traffic data extraction and labeling for machine learning based attack detection in IoT networks.
Int. J. Mach. Learn. Cybern., July, 2023

A hybrid framework for multivariate long-sequence time series forecasting.
Appl. Intell., June, 2023

Multivariate long sequence time-series forecasting using dynamic graph learning.
J. Ambient Intell. Humaniz. Comput., 2023

2022
Securing content-based image retrieval on the cloud using generative models.
Multim. Tools Appl., 2022

2021
Secure content based image retrieval for mobile users with deep neural networks in the cloud.
J. Syst. Archit., 2021

Secure image classification with deep neural networks for IoT applications.
J. Ambient Intell. Humaniz. Comput., 2021

An authorized equality test on identity-based cryptosystem for mobile social networking applications.
Trans. Emerg. Telecommun. Technol., 2021

2020
An efficient certificateless public key encryption scheme with authorized equality test in healthcare environments.
J. Syst. Archit., 2020

Efficient Public Key Cryptography Scheme with Equality Test for Heterogeneous Systems in IIoT.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

2019
Privacy-preserving content-based image retrieval for mobile computing.
J. Inf. Secur. Appl., 2019

Secure string pattern query for open data initiative.
J. Inf. Secur. Appl., 2019

An efficient multiple-user location-based query authentication approach for social networking.
J. Inf. Secur. Appl., 2019

Intelligent and Secure Content-Based Image Retrieval for Mobile Users.
IEEE Access, 2019

2018
Processing Multiple-User Location-Based Keyword Queries.
IEICE Trans. Inf. Syst., 2018

Interactive Multiple-User Location-Based Keyword Queries on Road Networks.
IEEE Access, 2018

Statistical Analysis of Extracted Data from Video Site by Using Web Crawler.
Proceedings of the 2018 International Conference on Computing and Artificial Intelligence, 2018

An Authentication Approach for Multiple-User Location-Based Queries.
Proceedings of the Frontiers in Cyber Security - First International Conference, 2018

Decentralized Privacy Preserving Reputation System.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Authentication of Multiple-User Spatial Keywords Queries.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
Authenticating Preference-Oriented Multiple Users Spatial Queries.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
Authenticating Multiple User-Defined Spatial Queries.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
A fast privacy-preserving framework for continuous location-based queries in road networks.
J. Netw. Comput. Appl., 2015

Efficient privacy preserving matchmaking for mobile social networking.
Concurr. Comput. Pract. Exp., 2015

2014
Rumor Riding: An Anonymity Approach for Decentralized Peer to Peer Systems.
Wirel. Pers. Commun., 2014

A context-dependent privacy preserving framework in road networks.
Proceedings of the IEEE International Conference on Communications, 2014

Dummy Based Privacy Preservation in Continuous Querying Road Network Services.
Proceedings of the 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2014

Achieving Absolute Privacy Preservation in Continuous Query Road Network Services.
Proceedings of the Advanced Data Mining and Applications - 10th International Conference, 2014

2013
Protocol Formats Reverse Engineering Based on Association Rules in Wireless Environment.
Proceedings of the 12th IEEE International Conference on Trust, 2013

A Recommendation-based Matchmaking Scheme for Multiple Mobile Social Networks against Private Data Leakage.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

A Privacy Preserving Matchmaking Scheme for Multiple Mobile Social Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2013

Protocol Specification Inference Based on Keywords Identification.
Proceedings of the Advanced Data Mining and Applications - 9th International Conference, 2013

Optimizing Placement of Mix Zones to Preserve Users' Privacy for Continuous Query Services in Road Networks.
Proceedings of the Advanced Data Mining and Applications - 9th International Conference, 2013

2012
Efficient Privacy Preserving Matchmaking for Mobile Social Networking against Malicious Users.
Proceedings of the 11th IEEE International Conference on Trust, 2012

LBSs privacy preserving for continuous query based on semi-honest third parties.
Proceedings of the 31st IEEE International Performance Computing and Communications Conference, 2012

Privacy Preserving for Continuous Query in Location Based Services.
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012


  Loading...