Yongjun Ren
Orcid: 0000-0001-6602-9576
According to our database1,
Yongjun Ren
authored at least 80 papers
between 2007 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Blockchain-based cross-domain query integrity verification mechanism for outsourced database.
Comput. Stand. Interfaces, 2025
2024
Distributed Medical Data Storage Mechanism Based on Proof of Retrievability and Vector Commitment for Metaverse Services.
IEEE J. Biomed. Health Informatics, November, 2024
A Multitask Dynamic Graph Attention Autoencoder for Imbalanced Multilabel Time Series Classification.
IEEE Trans. Neural Networks Learn. Syst., September, 2024
Spatio-Temporal Big Data Collaborative Storage Mechanism Based on Incremental Aggregation Subvector Commitment in On-Chain and Off-Chain Systems.
ISPRS Int. J. Geo Inf., August, 2024
ACM Trans. Multim. Comput. Commun. Appl., July, 2024
Deep Learning-Enhanced Internet of Things for Activity Recognition in Post-Stroke Rehabilitation.
IEEE J. Biomed. Health Informatics, July, 2024
Virtual human pose estimation in a fire education system for children with autism spectrum disorders.
Multim. Syst., April, 2024
ACRS-Raft: A Raft Consensus Protocol for Adaptive Data Maintenance in the Metaverse Based on Cauchy Reed-Solomon Codes.
IEEE Trans. Consumer Electron., February, 2024
Digit. Commun. Networks, 2024
2023
J. King Saud Univ. Comput. Inf. Sci., September, 2023
ACM Trans. Internet Techn., August, 2023
Future Gener. Comput. Syst., June, 2023
Access control mechanism for the Internet of Things based on blockchain and inner product encryption.
J. Inf. Secur. Appl., May, 2023
Inf., February, 2023
Multi-server assisted data sharing supporting secure deduplication for metaverse healthcare systems.
Future Gener. Comput. Syst., 2023
Future Gener. Comput. Syst., 2023
Comput. Syst. Sci. Eng., 2023
Comput. Syst. Sci. Eng., 2023
Comput. Syst. Sci. Eng., 2023
NVAS: A non-interactive verifiable federated learning aggregation scheme for COVID-19 based on game theory.
Comput. Commun., 2023
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
2022
Novel Vote Scheme for Decision-Making Feedback Based on Blockchain in Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., 2022
Sensors, 2022
Nonnegative matrix factorization-based privacy-preserving collaborative filtering on cloud computing.
Trans. Emerg. Telecommun. Technol., 2022
Comput. Ind. Eng., 2022
2021
ACM Trans. Internet Techn., 2021
Privacy-Preserving Smart Road-Pricing System with Trustworthiness Evaluation in VANETs.
Sensors, 2021
Threshold Key Management Scheme for Blockchain-Based Intelligent Transportation Systems.
Secur. Commun. Networks, 2021
Multim. Tools Appl., 2021
KSII Trans. Internet Inf. Syst., 2021
Int. J. Sens. Networks, 2021
Future Gener. Comput. Syst., 2021
Proceedings of the Provable and Practical Security, 2021
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
2020
Wirel. Commun. Mob. Comput., 2020
Data Query Mechanism Based on Hash Computing Power of Blockchain in Internet of Things.
Sensors, 2020
Comparative analysis on detection performance with ground-based microwave radiometer and radiosonde.
Int. J. Embed. Syst., 2020
Multi-source Meteorological Observation Data Quality Control Algorithm Based on Data Mining.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020
2019
Data Storage Mechanism Based on Blockchain with Privacy Protection in Wireless Body Area Network.
Sensors, 2019
A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system.
J. Inf. Secur. Appl., 2019
Int. J. Sens. Networks, 2019
Int. J. High Perform. Comput. Netw., 2019
EURASIP J. Wirel. Commun. Netw., 2019
A hierarchical clustering based method to evaluate reuse of rare earth tailings under cloud computing environment.
Clust. Comput., 2019
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019
2018
A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things.
Secur. Commun. Networks, 2018
Multim. Tools Appl., 2018
Incentive Mechanism of Data Storage Based on Blockchain for Wireless Sensor Networks.
Mob. Inf. Syst., 2018
Digital Continuity Guarantee of Electronic Record Based on Data Usability in Big Data Environment.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Preservation Mechanism of Electronic Record Based on Erasure Code and Multi Copies in Cloud Storage.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Consistency Guarantee Method of Electronic Record Based on Blockchain in Cloud Storage.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
2016
Peer-to-Peer Netw. Appl., 2016
Comput. J., 2016
Proceedings of the Cloud Computing and Security - Second International Conference, 2016
2015
Proceedings of the International Carnahan Conference on Security Technology, 2015
Proceedings of the International Carnahan Conference on Security Technology, 2015
Proceedings of the International Carnahan Conference on Security Technology, 2015
Proceedings of the International Carnahan Conference on Security Technology, 2015
A Mobile-Sink Based Energy Efficiency Clustering Routing Algorithm for WSNs in Coal Mine.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015
2014
A Novel Hash-Based RFID Grouping Authentication Protocol on Tag Groups and Multiple Readers.
Proceedings of the Intelligent Systems and Applications, 2014
Proceedings of the Intelligent Systems and Applications, 2014
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Security Analysis of Delegable and Proxy Provable Data Possession in Public Cloud Storage.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
2013
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013
2010
J. Digit. Content Technol. its Appl., 2010
J. Digit. Content Technol. its Appl., 2010
Proceedings of the IEEE International Conference on Wireless Communications, 2010
Proceedings of the IEEE International Conference on Wireless Communications, 2010
2008
Formal Proof of Relative Strengths of Security between ECK2007 Model and other Proof Models for Key Agreement Protocols.
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Chosen-Ciphertext Secure Multi-Authority Fuzzy Identity-Based Key Encapsulation without ROM.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
2007
Proceedings of the Computational Intelligence and Security, International Conference, 2007