Yujue Wang
Orcid: 0000-0002-0951-8880
According to our database1,
Yujue Wang
authored at least 111 papers
between 2011 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
NTRU-CLS: Efficient quantum-resistant NTRU lattice-based certificateless signature scheme for VANETs.
Comput. Networks, 2025
2024
J. Cloud Comput., December, 2024
Health Inf. Sci. Syst., December, 2024
Industrial Wireless Internet Zero Trust Model: Zero Trust Meets Dynamic Federated Learning with Blockchain.
IEEE Wirel. Commun., April, 2024
Trans. Emerg. Telecommun. Technol., April, 2024
An Explainable Coarse-to-Fine Survival Analysis Method on Multi-Center Whole Slide Images.
IEEE Trans. Artif. Intell., March, 2024
Verifiable Federated Learning With Privacy-Preserving Data Aggregation for Consumer Electronics.
IEEE Trans. Consumer Electron., February, 2024
IEEE Trans. Smart Grid, January, 2024
Peer Peer Netw. Appl., January, 2024
Optimizing an Abundance-Based Model for Satellite Remote Sensing of Phytoplankton Size Classes in the Bohai and Yellow Seas of China.
IEEE Trans. Geosci. Remote. Sens., 2024
Holiday Peak Load Forecasting Using Grammatical Evolution-Based Fuzzy Regression Approach.
Int. J. Comput. Commun. Control, 2024
Int. J. Comput. Commun. Control, 2024
Comput. Stand. Interfaces, 2024
IEEE Access, 2024
Proceedings of the Wireless Artificial Intelligent Computing Systems and Applications, 2024
Proceedings of the Database Systems for Advanced Applications, 2024
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
Multi-Server Verifiable Aggregation for Federated Learning in Securing Industrial IoT.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
Verifiable and Privacy-Preserving Online Diagnosis Based on Multiclass SVM and CKKS Leveled Homomorphic Encryption.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
2023
Inf. Sci., October, 2023
Peer Peer Netw. Appl., September, 2023
A Highly Compatible Verification Framework with Minimal Upgrades to Secure an Existing Edge Network.
ACM Trans. Internet Techn., August, 2023
Mapping depth-integrated microphytobenthic biomass on an estuarine tidal flat using Sentinel satellite data.
Int. J. Appl. Earth Obs. Geoinformation, August, 2023
Improved Certificateless Aggregate Signature Scheme Against Collusion Attacks for VANETs.
IEEE Syst. J., March, 2023
Fuzzy Cooperative Control for the Stabilization of the Rotating Inverted Pendulum System.
J. Adv. Comput. Intell. Intell. Informatics, 2023
Ciphertext-policy attribute-based encryption supporting policy-hiding and cloud auditing in smart health.
Comput. Stand. Interfaces, 2023
Comput. Stand. Interfaces, 2023
A Lightweight Privacy-Preserving Data Sharing Scheme Supporting Intelligent Pricing in Smart Grid.
Proceedings of the 19th International Conference on Mobility, Sensing and Networking, 2023
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
Secure Multi-Keyword Retrieval with Integrity Guarantee for Outsourced ADS-B Data in Clouds.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
Proceedings of the 2023 5th International Conference on Blockchain Technology, 2023
Proceedings of the Database Systems for Advanced Applications, 2023
Proceedings of the Database Systems for Advanced Applications, 2023
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2023
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2023
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2023
A Lightweight PUF-Based Group Authentication Scheme for Privacy-Preserving Metering Data Collection in Smart Grid.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2023
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023
Proceedings of the 18th Asia Joint Conference on Information Security, 2023
2022
Comprehensive Indicators for Evaluating and Seeking Elasto-Magnetic Parameters for High-Performance Cable Force Monitoring.
Sensors, 2022
Reconstruction of Monthly Surface Nutrient Concentrations in the Yellow and Bohai Seas from 2003-2019 Using Machine Learning.
Remote. Sens., 2022
Nucleic Acids Res., 2022
Convolutional neural network-based automatic classification for incomplete antibody reaction intensity in solid phase anti-human globulin test image.
Medical Biol. Eng. Comput., 2022
Genetic Algorithm with Local Search for the Multi-Target Scheduling in Flexible Manufacturing System.
J. Circuits Syst. Comput., 2022
IEICE Trans. Inf. Syst., 2022
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022
A Privacy-Preserving Lightweight Energy Data Sharing Scheme Based on Blockchain for Smart Grid.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2022
A Privacy-Preserving Credit Bank Supervision Framework Based on Redactable Blockchain.
Proceedings of the Blockchain and Trustworthy Systems - 4th International Conference, 2022
Proceedings of the Blockchain and Trustworthy Systems - 4th International Conference, 2022
2021
Wirel. Pers. Commun., 2021
CPPA-D: Efficient Conditional Privacy-Preserving Authentication Scheme With Double-Insurance in VANETs.
IEEE Trans. Veh. Technol., 2021
Sensors, 2021
A Certificateless Pairing-Free Authentication Scheme for Unmanned Aerial Vehicle Networks.
Secur. Commun. Networks, 2021
Secure Multi-Keyword Search and Access Control over Electronic Health Records in Wireless Body Area Networks.
Secur. Commun. Networks, 2021
Anonymous and Traceable Authentication for Securing Data Sharing in Parking Edge Computing.
Peer-to-Peer Netw. Appl., 2021
Design and implementation of blockchain-based digital advertising media promotion system.
Peer-to-Peer Netw. Appl., 2021
KSII Trans. Internet Inf. Syst., 2021
Int. J. Distributed Sens. Networks, 2021
Tracking changes in aquaculture ponds on the China coast using 30 years of Landsat images.
Int. J. Appl. Earth Obs. Geoinformation, 2021
An Efficient Certificateless Signcryption Scheme for Secure Communication in UAV Cluster Network.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021
A PUF-based Lightweight Authenticated Metering Data Collection Scheme with Privacy Protection in Smart Grid.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021
Verifiable and Privacy-Preserving Ranked Multi-Keyword Search over Outsourced Data in Clouds.
Proceedings of the 15th IEEE International Conference on Big Data Science and Engineering, 2021
2020
IEEE Trans. Ind. Informatics, 2020
Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud.
IEEE Trans. Inf. Forensics Secur., 2020
Hyperparameter Optimization of ICS Intrusion Detection Classifier Based on Improved Hybrid Algorithm.
Proceedings of the Security and Privacy in Digital Economy, 2020
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020
Smart Watchdog: A Lightweight Defending Mechanism Against Adversarial Transfer Learning.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2020
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2020
Privacy-Preserving Multi-keyword Search over Outsourced Data for Resource-Constrained Devices.
Proceedings of the Blockchain and Trustworthy Systems - Second International Conference, 2020
2019
Privacy-Preserving Cloud-Based Road Condition Monitoring With Source Authentication in VANETs.
IEEE Trans. Inf. Forensics Secur., 2019
Securing messaging services through efficient signcryption with designated equality test.
Inf. Sci., 2019
MagneticSpy: Exploiting Magnetometer in Mobile Devices for Website and Application Fingerprinting.
CoRR, 2019
MagneticSpy: Exploiting Magnetometer in Mobile Devices for Website and Application Fingerprinting.
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, 2019
Proceedings of the Space Information Networks - 4th International Conference, 2019
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019
Proceedings of the Data Science, 2019
Wireless Communication Signal Strength Prediction Method Based on the K-nearest Neighbor Algorithm.
Proceedings of the Data Science, 2019
Proceedings of the 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2019
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019
Proceedings of the 14th Asia Joint Conference on Information Security, 2019
2018
Peer-to-Peer Netw. Appl., 2018
Verifiably encrypted cascade-instantiable blank signatures to secure progressive decision management.
Int. J. Inf. Sec., 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
CCA Secure encryption supporting authorized equality test on ciphertexts in standard model and its applications.
Inf. Sci., 2017
Comput. J., 2017
2016
Security Implications of Transport Layer Protocols in Power Grid Synchrophasor Data Communication.
IEEE Trans. Smart Grid, 2016
Design of Tunnel Magnetoresistive-Based Circular MFL Sensor Array for the Detection of Flaws in Steel Wire Rope.
J. Sensors, 2016
Future Gener. Comput. Syst., 2016
Versatile lightweight key distribution for big data privacy in vehicular ad hoc networks.
Concurr. Comput. Pract. Exp., 2016
Quantifying Uncertainties of Security and QoS for Design of Power Grid Communications Systems.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016
2015
Theor. Comput. Sci., 2015
Sci. China Inf. Sci., 2015
Proceedings of the Information Security Practice and Experience, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage.
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014
2011
An Evidence-Based Trust Assessment Framework for Critical Infrastructure Decision Making.
Proceedings of the Critical Infrastructure Protection V, 2011
Feature extraction of vigilance level based on Heart Rate Variability of Electrocardiogram.
Proceedings of the 4th International Conference on Biomedical Engineering and Informatics, 2011