Yong Yu
Orcid: 0000-0002-0187-2439Affiliations:
- Shaanxi Normal University, School of Computer Science, Xi'an, China
- University of Electronic Science and Technology of China, School of Computer Science and Engineering, Chengdu, China (former)
- University of Wollongong, School of Computer Science and Software Engineering, NSW, Australia (former)
- Xidian University, Xi'an, China (PhD 2008)
According to our database1,
Yong Yu
authored at least 166 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Wirel. Commun., October, 2024
RETRACTED: Liu et al. A Publicly Verifiable E-Voting System Based on Biometrics. Cryptography 2023, 7, 62.
Cryptogr., September, 2024
BSCDA: Blockchain-Based Secure Cross-Domain Data Access Scheme for Internet of Things.
IEEE Trans. Netw. Serv. Manag., August, 2024
TBSCrowd: A Blockchain-Assisted Privacy-Preserving Mobile Crowdsourcing Scheme From Threshold Blind Signatures.
IEEE Internet Things J., June, 2024
Comput. Stand. Interfaces, March, 2024
Comput. Stand. Interfaces, January, 2024
A Hierarchical Full-Resolution Fusion Network and Topology-Aware Connectivity Booster for Retinal Vessel Segmentation.
IEEE Trans. Instrum. Meas., 2024
iPMRSS: An Improved privacy-preserving medical record searching scheme for intelligent diagnosis in IoMT.
Expert Syst. Appl., 2024
Proceedings of the IEEE International Conference on Communications, 2024
2023
Cross-Channel: Scalable Off-Chain Channels Supporting Fair and Atomic Cross-Chain Operations.
IEEE Trans. Computers, November, 2023
Multi-stage finite element modeling of the deformation behavior during ultrasonic-assisted incremental sheet forming.
J. Comput. Sci., September, 2023
Cryptogr., September, 2023
A post quantum secure multi-party collaborative signature with deterability in the Industrial Internet of Things.
Future Gener. Comput. Syst., April, 2023
IEEE Trans. Dependable Secur. Comput., 2023
Inf. Sci., 2023
IEEE Internet Things J., 2023
2022
Privacy protection in social applications: A ciphertext policy attribute-based encryption with keyword search.
Int. J. Intell. Syst., December, 2022
Outsourced Data Integrity Checking with Practical Key Update in Edge-Cloud Resilient Networks.
IEEE Wirel. Commun., 2022
Identity-Based Provable Data Possession From RSA Assumption for Secure Cloud Storage.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Lattice-Based Self-Enhancement Authorized Accessible Privacy Authentication for Cyber-Physical Systems.
Secur. Commun. Networks, 2022
Accountable and Verifiable Secure Aggregation for Federated Learning in IoT Networks.
IEEE Netw., 2022
IEEE Netw., 2022
Blockchain-Based Auditable Privacy-Preserving Data Classification for Internet of Things.
IEEE Internet Things J., 2022
Practical Asynchronous Distributed Key Generation: Improved Efficiency, Weaker Assumption, and Standard Model.
IACR Cryptol. ePrint Arch., 2022
Blockchain-based continuous data integrity checking protocol with zero-knowledge privacy protection.
Digit. Commun. Networks, 2022
Comput. Stand. Interfaces, 2022
Sci. China Inf. Sci., 2022
Your Breath Doesn't Lie: Multi-user Authentication by Sensing Respiration Using mmWave Radar.
Proceedings of the 19th Annual IEEE International Conference on Sensing, 2022
2021
PrivCrowd: A Secure Blockchain-Based Crowdsourcing Framework with Fine-Grained Worker Selection.
Wirel. Commun. Mob. Comput., 2021
Security and Privacy for Edge Intelligence in 5G and Beyond Networks: Challenges and Solutions.
IEEE Wirel. Commun., 2021
ACM Trans. Internet Techn., 2021
IEEE Trans. Netw. Sci. Eng., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Netw., 2021
DRBFT: Delegated randomization Byzantine fault tolerance consensus protocol for blockchains.
Inf. Sci., 2021
Post-Quantum Secure Ring Signatures for Security and Privacy in the Cybertwin-Driven 6G.
IEEE Internet Things J., 2021
Int. J. Found. Comput. Sci., 2021
Trans. Emerg. Telecommun. Technol., 2021
Non-Equivocation in Blockchain: Double-Authentication-Preventing Signatures Gone Contractual.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
2020
IEEE Wirel. Commun., 2020
Blockchain-Based Anonymous Authentication With Selective Revocation for Smart Industrial Applications.
IEEE Trans. Ind. Informatics, 2020
IEEE Trans. Emerg. Top. Comput., 2020
Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing.
IEEE Trans. Dependable Secur. Comput., 2020
Blockchain-Based Self-Tallying Voting System with Software Updates in Decentralized IoT.
IEEE Netw., 2020
Key-Policy Attribute-Based Encryption With Keyword Search in Virtualized Environments.
IEEE J. Sel. Areas Commun., 2020
IEEE J. Sel. Areas Commun., 2020
Improved Security of a Pairing-Free Certificateless Aggregate Signature in Healthcare Wireless Medical Sensor Networks.
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
2019
IEEE Trans. Dependable Secur. Comput., 2019
Soft Comput., 2019
Secur. Commun. Networks, 2019
Enabling Secure Intelligent Network with Cloud-Assisted Privacy-Preserving Machine Learning.
IEEE Netw., 2019
Blockchain based privacy-preserving software updates with proof-of-delivery for Internet of Things.
J. Parallel Distributed Comput., 2019
Inf. Sci., 2019
Efficient attribute-based encryption with attribute revocation for assured data deletion.
Inf. Sci., 2019
IEEE Internet Things J., 2019
Secure Your Voice: An Oral Airflow-Based Continuous Liveness Detection for Voice Assistants.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019
Int. J. Found. Comput. Sci., 2019
An efficient linkable group signature for payer tracing in anonymous cryptocurrencies.
Future Gener. Comput. Syst., 2019
Blockchain based Privacy-Preserving Software Updates with Proof-of-Delivery for Internet of Things.
CoRR, 2019
An Efficient Linkable Group Signature for Payer Tracing in Anonymous Cryptocurrencies.
CoRR, 2019
Leakage Resilient CCA Security in Stronger Model: Branch Hidden ABO-LTFs and Their Applications.
Comput. J., 2019
Proceedings of the Structured Object-Oriented Formal Language and Method, 2019
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the IEEE International Conference on Agents, 2019
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2019
2018
IEEE Wirel. Commun., 2018
Privacy-Preserving Smart Parking Navigation Supporting Efficient Driving Guidance Retrieval.
IEEE Trans. Veh. Technol., 2018
Assured Data Deletion With Fine-Grained Access Control for Fog-Based Industrial Applications.
IEEE Trans. Ind. Informatics, 2018
Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes.
J. Comput. Sci. Technol., 2018
Int. J. Web Grid Serv., 2018
Future Gener. Comput. Syst., 2018
CoRR, 2018
IEEE Commun. Mag., 2018
IEEE Commun. Mag., 2018
Secure Pub-Sub: Blockchain-Based Fair Payment With Reputation for Reliable Cyber Physical Systems.
IEEE Access, 2018
An Efficient Privacy Preserving Batch Authentication Scheme with Deterable Function for VANETs.
Proceedings of the Network and System Security - 12th International Conference, 2018
Proceedings of the Information Security Practice and Experience, 2018
Proceedings of the IEEE Global Communications Conference, 2018
An Efficient Anonymous Authentication Scheme Based on Double Authentication Preventing Signature for Mobile Healthcare Crowd Sensing.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2017
EACSIP: Extendable Access Control System With Integrity Protection for Enhancing Collaboration in the Cloud.
IEEE Trans. Inf. Forensics Secur., 2017
Pers. Ubiquitous Comput., 2017
Int. J. Found. Comput. Sci., 2017
Comput. Stand. Interfaces, 2017
Identity-based provable data possession revisited: Security analysis and generic construction.
Comput. Stand. Interfaces, 2017
Achieving public verifiability and data dynamics for cloud data in the standard model.
Clust. Comput., 2017
Privacy-Preserving Extraction of HOG Features Based on Integer Vector Homomorphic Encryption.
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
Comments on "Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification".
IEEE Trans. Inf. Forensics Secur., 2016
J. Netw. Comput. Appl., 2016
Future Gener. Comput. Syst., 2016
Provable multiple replication data possession with full dynamics for secure cloud storage.
Concurr. Comput. Pract. Exp., 2016
SDIVIP<sup>2</sup>: shared data integrity verification with identity privacy preserving in mobile clouds.
Concurr. Comput. Pract. Exp., 2016
Concurr. Comput. Pract. Exp., 2016
Proceedings of the Security and Privacy in Communication Networks, 2016
Proceedings of the Provable Security, 2016
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
IEEE Trans. Serv. Comput., 2015
Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage.
Int. J. Inf. Sec., 2015
Int. J. Inf. Comput. Secur., 2015
Future Gener. Comput. Syst., 2015
A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing.
Future Gener. Comput. Syst., 2015
Proceedings of the Provable Security, 2015
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015
2014
IEEE Trans. Parallel Distributed Syst., 2014
Secur. Commun. Networks, 2014
KSII Trans. Internet Inf. Syst., 2014
Security pitfalls of an efficient threshold proxy signature scheme for mobile agents.
Inf. Process. Lett., 2014
Short computational Diffie-Hellman-based proxy signature scheme in the standard model.
Int. J. Commun. Syst., 2014
Future Gener. Comput. Syst., 2014
Improved security of a dynamic remote data possession checking protocol for cloud storage.
Expert Syst. Appl., 2014
Identity Privacy-Preserving Public Auditing with Dynamic Group for Secure Mobile Cloud Storage.
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the Information Security Practice and Experience, 2014
An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing.
Proceedings of the Information Security Practice and Experience, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
2013
J. Comput. Sci. Technol., 2013
J. Comput., 2013
Security Analysis of a Distributed Reprogramming Protocol for Wireless Sensor Networks.
IEICE Trans. Inf. Syst., 2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
2012
Math. Comput. Model., 2012
Informatica, 2012
IET Inf. Secur., 2012
IEICE Trans. Inf. Syst., 2012
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
2011
J. Syst. Softw., 2011
Comput. Commun., 2011
Comput. J., 2011
2009
Comput. Stand. Interfaces, 2009
Comput. Stand. Interfaces, 2009
Comput. Math. Appl., 2009
Analysis and Improvement of a Proxy Blind Multi-signature Scheme without a Secure Channel.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
IACR Cryptol. ePrint Arch., 2008
2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007