Yuanyu Zhang
Orcid: 0000-0002-3248-5909
According to our database1,
Yuanyu Zhang
authored at least 60 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Achieving Covertness and Secrecy: The Interplay Between Detection and Eavesdropping Attacks.
IEEE Internet Things J., January, 2024
Knowing What Not to Do: Leverage Language Model Insights for Action Space Pruning in Multi-agent Reinforcement Learning.
CoRR, 2024
Proceedings of the International Conference on Networking and Network Applications, 2024
2023
Opportunistic Wiretapping/Jamming: A New Attack Model in Millimeter-Wave Wireless Networks.
IEEE Trans. Wirel. Commun., December, 2023
Signal Image Video Process., October, 2023
Secrecy, Covertness and Authentication in Wireless Communications - Physical Layer Security Approach
Wireless Networks, Springer, ISBN: 978-3-031-38464-6, 2023
PRAM: A Practical Sybil-Proof Auction Mechanism for Dynamic Spectrum Access With Untruthful Attackers.
IEEE Trans. Mob. Comput., 2023
Object-Oriented Clustering Approach to Detect Evolutions of ENSO-Related Precipitation Anomalies over Tropical Pacific Using Remote Sensing Products.
Remote. Sens., 2023
Proceedings of the IEEE International Conference on Data Mining, 2023
Proceedings of the IEEE Global Communications Conference, 2023
2022
BCA: Bilinear Convolutional Neural Networks and Attention Networks for legal question answering.
AI Open, January, 2022
IEEE Trans. Inf. Forensics Secur., 2022
Int. J. Netw. Manag., 2022
An Incentivization Mechanism with Validator Voting Profile in Proof-of-Stake-Based Blockchain.
IEICE Trans. Commun., 2022
Dynamical community detection and spatiotemporal analysis in multilayer spatial interaction networks using trajectory data.
Int. J. Geogr. Inf. Sci., 2022
Future Gener. Comput. Syst., 2022
Opportunistic Wiretapping/Jamming: A New Attack Model in Millimeter-Wave Wireless Networks.
CoRR, 2022
Proceedings of the International Conference on Networking and Network Applications, 2022
2021
Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things.
Sensors, 2021
IEEE Internet Things J., 2021
A Process-Oriented Approach to Identify Evolutions of Sea Surface Temperature Anomalies with a Time-Series of a Raster Dataset.
ISPRS Int. J. Geo Inf., 2021
Trust-aware buffer-aided relay selection for secure communications in cooperative wireless systems.
Comput. Networks, 2021
Buffer-aided relay selection for secure communication in two-hop wireless networks with limited packet lifetime.
Ad Hoc Networks, 2021
Wiretapping or Jamming: On Eavesdropper Attacking Strategy in mmWave Ad Hoc Networks.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021
Intelligent Mining Pool Selection in the Case of Unobservable Block Withholding Attack.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021
Proceedings of the IEEE Global Communications Conference, 2021
2020
Wirel. Networks, 2020
Exploiting Smart Contracts for Capability-Based Access Control in the Internet of Things.
Sensors, 2020
Secrecy transmission capacity in mobile <i>ad hoc</i> networks with security-aware Aloha protocol.
IET Commun., 2020
CoRR, 2020
Buffer-aided relay selection for secure two-hop wireless networks with decode-and-forward relays and a diversity-combining eavesdropper.
Ad Hoc Networks, 2020
Proceedings of the Iberian Languages Evaluation Forum (IberLEF 2020) co-located with 36th Conference of the Spanish Society for Natural Language Processing (SEPLN 2020), 2020
Proceedings of the International Conference on Networking and Network Applications, 2020
Proceedings of the 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services, 2020
Proceedings of the IEEE International Conference on Blockchain, 2020
2019
Wirel. Networks, 2019
Mode Selection and Spectrum Partition for D2D Inband Communications: A Physical Layer Security Perspective.
IEEE Trans. Commun., 2019
IEEE Internet Things J., 2019
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019
Using Ethereum Blockchain for Distributed Attribute-Based Access Control in the Internet of Things.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Capability-Based Access Control for the Internet of Things: An Ethereum Blockchain-Based Scheme.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
2018
On Security-Delay Trade-Off in Two-Hop Wireless Networks With Buffer-Aided Relay Selection.
IEEE Trans. Wirel. Commun., 2018
IEEE Trans. Serv. Comput., 2018
Ad Hoc Networks, 2018
Air Flow Measurement and Management for Improving Cooling and Energy Efficiency in Raised-Floor Data Centers: A Survey.
IEEE Access, 2018
2017
A Robust Text Classifier Based on Denoising Deep Neural Network in the Analysis of Big Data.
Sci. Program., 2017
Proceedings of the 19th IEEE International Conference on e-Health Networking, 2017
2016
IEEE Trans Autom. Sci. Eng., 2016
CoRR, 2016
Optimal Relay-Destination Pair Selection Mechanism for Secure Communications in Wireless Cooperative Relay Networks.
Proceedings of the International Conference on Networking and Network Applications, 2016
Proceedings of the International Conference on Networking and Network Applications, 2016
Proceedings of the International Conference on Networking and Network Applications, 2016
Link Selection for Secure Two-Hop Transmissions in Buffer-Aided Relay Wireless Networks.
Proceedings of the International Conference on Networking and Network Applications, 2016
Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2016
2015
Eavesdropper-Tolerance Capability in Two-Hop Wireless Networks via Cooperative Jamming.
Ad Hoc Sens. Wirel. Networks, 2015
Proceedings of the Third International Symposium on Computing and Networking, 2015
2014
Exploring Relay Cooperation for Secure and Reliable Transmission in Two-HopWireless Networks.
EAI Endorsed Trans. Scalable Inf. Syst., 2014
Transmission protocol for secure big data in two-hop wireless networks with cooperative jamming.
Inf. Sci., 2014
2013