Yuexin Zhang

Orcid: 0000-0002-3882-7041

According to our database1, Yuexin Zhang authored at least 66 papers between 2012 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
CNN-based continuous authentication for digital therapeutics using variational autoencoder.
J. Supercomput., January, 2025

2024
Cloud EMRs auditing with decentralized (t, n)-threshold ownership transfer.
Cybersecur., December, 2024

An intra-class distribution-focused generative adversarial network approach for imbalanced tabular data learning.
Int. J. Mach. Learn. Cybern., July, 2024

Two-Stage Method for Clothing Feature Detection.
Big Data Cogn. Comput., April, 2024

Information-Minimizing Generative Adversarial Network for Fair Generation and Classification.
Neural Process. Lett., February, 2024

P-Chain: Towards privacy-aware smart contract using SMPC.
J. Inf. Secur. Appl., 2024

CSFL: Cooperative Security Aware Federated Learning Model Using The Blockchain.
Comput. J., 2024

Brain Age Estimation and Aging-related Brain Regions.
Proceedings of the 6th International Conference on Internet of Things, 2024

2023
Secure transmission for reconfigurable intelligent surface assisted communication with CV-DDPG.
IET Commun., November, 2023

Obstacle detection and tracking for intelligent agricultural machinery.
Comput. Electr. Eng., May, 2023

Key Extraction Using Ambient Sounds for Smart Devices.
ACM Trans. Sens. Networks, February, 2023

CRdb: a comprehensive resource for deciphering chromatin regulators in human.
Nucleic Acids Res., January, 2023

SEdb 2.0: a comprehensive super-enhancer database of human and mouse.
Nucleic Acids Res., January, 2023

BLAC: A Blockchain-based Lightweight Access Control Scheme in Vehicular Social Networks.
IACR Cryptol. ePrint Arch., 2023

Knowledge-aware Graph Transformer for Pedestrian Trajectory Prediction.
Proceedings of the 25th IEEE International Conference on Intelligent Transportation Systems, 2023

BLAC: A Blockchain-Based Lightweight Access Control Scheme in Vehicular Social Networks.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

A Continuous Authentication Scheme for Digital Therapeutics Using Denoising Autoencoder.
Proceedings of the 2023 13th International Conference on Communication and Network Security, 2023

2022
TcoFBase: a comprehensive database for decoding the regulatory transcription co-factors in human and mouse.
Nucleic Acids Res., 2022

A Physical-Layer Key Generation Approach Based on Received Signal Strength in Smart Homes.
IEEE Internet Things J., 2022

Adaptive nonsingular terminal sliding mode control for rehabilitation robots.
Comput. Electr. Eng., 2022

GREAP: a comprehensive enrichment analysis software for human genomic regions.
Briefings Bioinform., 2022

Novel multi-site graph convolutional network with supervision mechanism for COVID-19 diagnosis from X-ray radiographs.
Appl. Soft Comput., 2022

2021
LncSEA: a platform for long non-coding RNA related sets and enrichment analysis.
Nucleic Acids Res., 2021

Adaptive neural network-based path tracking control for autonomous combine harvester with input saturation.
Ind. Robot, 2021

TRlnc: a comprehensive database for human transcriptional regulatory information of lncRNAs.
Briefings Bioinform., 2021

A DDoS Attack Detection Method Based on LSTM Neural Network in The Internet of Vehicles.
Proceedings of the ICITEE 2021: The 4th International Conference on Information Technologies and Electrical Engineering, Changde, Hunan, China, October 29, 2021

ComPAT: A Comprehensive Pathway Analysis Tools.
Proceedings of the Intelligent Computing Theories and Application, 2021

2020
A Hybrid Key Agreement Scheme for Smart Homes Using the Merkle Puzzle.
IEEE Internet Things J., 2020

A universal designated multi verifiers content extraction signature scheme.
Int. J. Comput. Sci. Eng., 2020

Indistinguishability and unextractablility of password-based authentication in blockchain.
Future Gener. Comput. Syst., 2020

Attacks and defences on intelligent connected vehicles: a survey.
Digit. Commun. Networks, 2020

Inner product encryption from ring learning with errors.
Cybersecur., 2020

Short-term Load Forecasting Based on Hybrid Strategy Using Warm-start Gradient Tree Boosting.
CoRR, 2020

Lightweight Certificate-Based Public/Private Auditing Scheme Based on Bilinear Pairing for Cloud Storage.
IEEE Access, 2020

Classification of Mild Cognitive Impairment Based on a Combined High-Order Network and Graph Convolutional Network.
IEEE Access, 2020

2019
Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing.
IEEE Trans. Dependable Secur. Comput., 2019

Privacy-preserving authentication for general directed graphs in industrial IoT.
Inf. Sci., 2019

A Key Agreement Scheme for Smart Homes Using the Secret Mismatch Problem.
IEEE Internet Things J., 2019

Performance Comparison of Machine Learning Platforms.
INFORMS J. Comput., 2019

An Overview of Attacks and Defences on Intelligent Connected Vehicles.
CoRR, 2019

Load Prediction of Space Deployable Structure Based on FBG and LSTM.
IEEE Access, 2019

A Fusion Methodology to Bridge GPS Outages for INS/GPS Integrated Navigation System.
IEEE Access, 2019

An Adaptive Physical Layer Key Extraction Scheme for Smart Homes.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Fuzzy Control Method for Path Tracking System of Combine Harvester.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

An Adaptive Secret Key Establishment Scheme in Smart Home Environments.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Security and Privacy Techniques for the Industrial Internet of Things.
Proceedings of the Security and Privacy Trends in the Industrial Internet of Things, 2019

2018
A matrix-based cross-layer key establishment protocol for smart homes.
Inf. Sci., 2018

An over-the-air key establishment protocol using keyless cryptography.
Future Gener. Comput. Syst., 2018

A variant of password authenticated key exchange protocol.
Future Gener. Comput. Syst., 2018

2017
Load Identification for a Cantilever Beam Based on Fiber Bragg Grating Sensors.
Sensors, 2017

一种改进的属性加密方案 (Improved Attribute-based Encryption Scheme).
计算机科学, 2017

A Universal Designated Multi-Verifier Transitive Signature Scheme.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

A Cross-Layer Key Establishment Model for Wireless Devices in Cyber-Physical Systems.
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017

2016
Password-Authenticated Group Key Exchange: A Cross-Layer Design.
ACM Trans. Internet Techn., 2016

A Trust and Privacy Preserving Handover Authentication Protocol for Wireless Networks.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

2015
Matrix-based key pre-distribution schemes in WMNs using pre and post deployment knowledge.
Int. J. Ad Hoc Ubiquitous Comput., 2015

2014
Matrix-based pairwise key establishment for wireless mesh networks.
Future Gener. Comput. Syst., 2014

Provably secure certificate-based key-insulated signature scheme.
Concurr. Comput. Pract. Exp., 2014

A Cross-Layer Key Establishment Scheme in Wireless Mesh Networks.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
A Matrix-Based Pairwise Key Establishment Scheme for Wireless Mesh Networks Using Pre Deployment Knowledge.
IEEE Trans. Emerg. Top. Comput., 2013

Software Service Signature (S3) for authentication in cloud computing.
Clust. Comput., 2013

Matrix-Based Pairwise Key Establishment with Pre and Post Deployment Knowledge for Wireless Mesh Networks.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Matrix-based pairwise key establishment in wireless mesh networks using deployment knowledge.
Proceedings of IEEE International Conference on Communications, 2013

2012
Identity-Based Proxy Signature for Cloud Service in SaaS.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

A Secure Mix Network with an Efficient Validity Verification Mechanism.
Proceedings of the Internet and Distributed Computing Systems, 2012

Certificate-Based Key-Insulated Signature.
Proceedings of the Data and Knowledge Engineering - Third International Conference, 2012


  Loading...