Yuan Fei

Orcid: 0000-0002-0977-2256

According to our database1, Yuan Fei authored at least 30 papers between 2016 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
FVF-BIoT: a formal verification framework for blockchain-based IoT authentication.
Softw. Qual. J., December, 2024

An architecture refactoring approach to reducing software hierarchy complexity.
J. Softw. Evol. Process., April, 2024

2023
FVF-AKA: A Formal Verification Framework of AKA Protocols for Multi-server IoT.
Formal Aspects Comput., December, 2023

Modeling and verifying NLSR protocol of NDN for CPS using UPPAAL.
J. Softw. Evol. Process., July, 2023

Formalization and Verification of Data Auction Mechanism Based on Smart Contract Using CSP.
Proceedings of the 35th International Conference on Software Engineering and Knowledge Engineering, 2023

2022
Modeling and verifying NDN-based IoV using CSP.
J. Softw. Evol. Process., 2022

2021
Formal analysis and automated validation of privacy-preserving AICE protocol in mobile edge computing.
Mob. Networks Appl., 2021

Formal Verification of HPS-based Master-Slave Scheme in MEC with Timed Automata.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Formal Modelling and Verification of the RTPS Behavior Module.
Proceedings of the International Symposium on Theoretical Aspects of Software Engineering, 2021

SC4MEC: Automated Implementation of A Secure Hierarchical Calculus for Mobile Edge Computing.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021

2020
Security Analysis of the Access Control Solution of NDN Using BAN Logic.
Mob. Networks Appl., 2020

Specification and Verification of the Zab Protocol with TLA+.
J. Comput. Sci. Technol., 2020

Modeling and Verifying NDN-based IoV Using CSP.
Proceedings of the 32nd International Conference on Software Engineering and Knowledge Engineering, 2020

Formal Modelling and Verification of MCAC Router Architecture in ICN.
Proceedings of the 32nd International Conference on Software Engineering and Knowledge Engineering, 2020

Formalization and Verification of VANET.
Proceedings of the 32nd International Conference on Software Engineering and Knowledge Engineering, 2020

Modeling and Verifying Data Access Mechanism of NLSR Trust Model.
Proceedings of the 27th Asia-Pacific Software Engineering Conference, 2020

2019
Formalization and Verification of TESAC Using CSP.
Int. J. Softw. Eng. Knowl. Eng., 2019

Formalization and Verification of RTPS StatefulWriter Module Using CSP.
Proceedings of the 31st International Conference on Software Engineering and Knowledge Engineering, 2019

Modeling and Verifying TESAC Using CSP.
Proceedings of the 31st International Conference on Software Engineering and Knowledge Engineering, 2019

A Security Calculus for Wireless Networks of Named Data Networking.
Proceedings of the Formal Methods and Software Engineering, 2019

Modeling and Verifying Spark on YARN Using Process Algebra.
Proceedings of the 19th IEEE International Symposium on High Assurance Systems Engineering, 2019

2018
Comparative modelling and verification of Pthreads and Dthreads.
J. Softw. Evol. Process., 2018

Formalization and Verification of the OpenFlow Bundle Mechanism Using CSP.
Int. J. Softw. Eng. Knowl. Eng., 2018

Modeling and Verification of NLSR Protocol using UPPAAL.
Proceedings of the 2018 International Symposium on Theoretical Aspects of Software Engineering, 2018

Security Analysis of the Access Control Solution of NDN Using BAN Logic (S).
Proceedings of the 30th International Conference on Software Engineering and Knowledge Engineering, 2018

Modeling and Verifying NDN Access Control Using CSP.
Proceedings of the Formal Methods and Software Engineering, 2018

Modeling and analysis of the disruptor framework in CSP.
Proceedings of the IEEE 8th Annual Computing and Communication Workshop and Conference, 2018

2017
A Proof System for MDESL.
Proceedings of the Communication Papers of the 2017 Federated Conference on Computer Science and Information Systems, 2017

Modeling and Analysis of the Security Protocol in C-DAX Based on Process Algebra.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
Comparative Modeling and Verification of Pthreads and Dthreads.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016


  Loading...