Yulong Fu
Orcid: 0000-0002-1778-4943
According to our database1,
Yulong Fu
authored at least 36 papers
between 2011 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
ACM Comput. Surv., January, 2025
2024
A Dynamic and Efficient Self-Certified Authenticated Group Key Agreement Protocol for VANET.
IEEE Internet Things J., September, 2024
2023
Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft Biometrics.
Proceedings of the Information Security Practice and Experience, 2023
2022
IEEE Trans. Instrum. Meas., 2022
Proceedings of the 14th International Conference on Wireless Communications and Signal Processing, 2022
2021
CPPHA: Capability-Based Privacy-Protection Handover Authentication Mechanism for SDN-Based 5G HetNets.
IEEE Trans. Dependable Secur. Comput., 2021
2020
Packet-Based Intrusion Detection Using Bayesian Topic Models in Mobile Edge Computing.
Secur. Commun. Networks, 2020
An Adaptive Security Data Collection and Composition Recognition method for security measurement over LTE/LTE-A networks.
J. Netw. Comput. Appl., 2020
LSAA: A Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks.
IEEE Internet Things J., 2020
2019
J. Netw. Comput. Appl., 2019
Proceedings of the 2019 IEEE SmartWorld, 2019
A Study and Enhancement to the Security of MANET AODV Protocol Against Black Hole Attacks.
Proceedings of the 2019 IEEE SmartWorld, 2019
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019
Multi-objective Differential-Based Brain Storm Optimization for Environmental Economic Dispatch Problem.
Proceedings of the Brain Storm Optimization Algorithms: Concepts, 2019
2018
EGHR: Efficient group-based handover authentication protocols for mMTC in 5G wireless networks.
J. Netw. Comput. Appl., 2018
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
2017
Mob. Inf. Syst., 2017
Comput. Secur., 2017
Proceedings of the Advances in Swarm Intelligence - 8th International Conference, 2017
An Attack to an Anonymous Certificateless Group Key Agreement Scheme and Its Improvement.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Proceedings of the Network and System Security - 11th International Conference, 2017
Trajectory prediction-based handover authentication mechanism for mobile relays in LTE-A high-speed rail networks.
Proceedings of the IEEE International Conference on Communications, 2017
2016
2015
J. Inf. Secur. Appl., 2015
2014
2013
Comput. Secur., 2013
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
Using transition systems to model and verify the implementation of security protocol.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
2011
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011