Yong Zeng
Orcid: 0000-0003-2551-7009Affiliations:
- Xidian University, School of Cyber Engineering, Xian, China
According to our database1,
Yong Zeng
authored at least 71 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the International Conference on Networking and Network Applications, 2024
2023
Signcryption-Based Encrypted Traffic Detection Scheme for Fast Establishing Secure Connections.
Proceedings of the Provable and Practical Security, 2023
DLPriv: Deep Learning Based Dynamic Location Privacy Mechanism for LBS in Internet-of-Vehicles.
Proceedings of the International Conference on Networking and Network Applications, 2023
Proceedings of the International Conference on Networking and Network Applications, 2023
Encrypted Voice Traffic Fingerprinting: An Adaptive Network Traffic Feature Encoding Model.
Proceedings of the IEEE International Conference on Communications, 2023
Social Networks Based Robust Federated Learning for Encrypted Traffic Classification.
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the IEEE Global Communications Conference, 2023
MT-CNN: A Classification Method of Encrypted Traffic Based on Semi-Supervised Learning.
Proceedings of the IEEE Global Communications Conference, 2023
2022
Proceedings of the International Conference on Networking and Network Applications, 2022
Proceedings of the International Conference on Networking and Network Applications, 2022
Proceedings of the International Conference on Networking and Network Applications, 2022
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022
2021
Secur. Commun. Networks, 2021
J. Inf. Sci. Eng., 2021
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021
Proceedings of the ICC 2021, 2021
Pri-PGD: Forging privacy-preserving graph towards spectral-based graph neural network.
Proceedings of the IEEE Global Communications Conference, 2021
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021
2020
IEEE Internet Things J., 2020
Proceedings of the 20th IEEE International Conference on Communication Technology, 2020
Perosonalized Differentially Private Location Collection Method with Adaptive GPS Discretization.
Proceedings of the Cyber Security - 17th China Annual Conference, 2020
Spectrum Privacy Preserving for Social Networks: A Personalized Differential Privacy Approach.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020
2019
Social Tie Based Cooperative Jamming for D2D Communications in the Internet of Things.
J. Inf. Sci. Eng., 2019
CoRR, 2019
CoRR, 2019
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019
Security Mechanisms to Provide Convoy Member Co-presence Authentication in Vehicle Platooning.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019
Research on Resolution Limit of Community Detection in Location-Based Social Networks.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019
Proceedings of the 19th IEEE International Conference on Communication Technology, 2019
Cooperative Jamming Strategy Based on Community Detection for Two-Hop Communication Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
2018
IEEE Wirel. Commun., 2018
J. Inf. Sci. Eng., 2018
Proceedings of the International Conference on Networking and Network Applications, 2018
Proceedings of the International Conference on Networking and Network Applications, 2018
Proceedings of the International Conference on Networking and Network Applications, 2018
Exploiting Social Tie and SIR Characteristic for Cooperative Jamming: A Game Model in a Two-layer Network.
Proceedings of the International Conference on Networking and Network Applications, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
2017
The Sound and the Fury: Hiding Communications in Noisy Wireless Networks with Interference Uncertainty.
CoRR, 2017
A Secure Authentication Method of Intelligent Terminals Based on Jensen-Shannon Divergence.
Proceedings of the International Conference on Networking and Network Applications, 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017
Analysis and Improvement of True Random Number Generator Based on Autonomous Boolean Network.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017
2016
IEEE Netw., 2016
2015
2014
J. Softw., 2014
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014
2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
2012
Out-of-Order-Delivery-Tolerant Secure Code Dissemination with Fountain Codes in Wireless Sensor Networks.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012
2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
2010
An Improvement on a Three-party Password-based Key Exchange Protocol Using Weil Pairing.
Int. J. Netw. Secur., 2010
Efficient secure multicast route using genetic algorithms for wireless sensor and actor networks.
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010
2009
Multi-path Protocol for High Data Confidentiality and Reliability in Wireless Sensor Networks Using Non-dominated Dynamic Compensation.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009
A Hardware-Oriented Fast Encryption Keystream Generator for Digital Rights Management.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
2008
Adaptive Algorithms to Mitigate Inefficiency in Reliability Differentiation Mechanisms for Wireless Sensor Networks.
Proceedings of the MSN 2008, 2008
2006
Computing the <i>k</i>-Error <i>N</i>-Adic Complexity of a Sequence of Period <i>p</i><sup><i>n</i></sup>.
Proceedings of the Sequences and Their Applications, 2006
2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
2003
Proceedings of the IEEE Congress on Evolutionary Computation, 2003