Yulong Shen
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Bibliography
2024
IEEE Trans. Knowl. Data Eng., November, 2024
On Covert Rate in Full-Duplex D2D-Enabled Cellular Networks With Spectrum Sharing and Power Control.
IEEE Trans. Mob. Comput., October, 2024
IEEE Trans. Knowl. Data Eng., September, 2024
IEEE Syst. J., September, 2024
A Dynamic Task Offloading Scheme Based on Location Forecasting for Mobile Intelligent Vehicles.
IEEE Trans. Veh. Technol., June, 2024
IEEE Trans. Knowl. Data Eng., April, 2024
DSG-BTra: Differentially Semantic-Generalized Behavioral Trajectory for Privacy-Preserving Mobile Internet Services.
IEEE Internet Things J., April, 2024
Differentiated Location Privacy Protection in Mobile Communication Services: A Survey from the Semantic Perception Perspective.
ACM Comput. Surv., March, 2024
Fractal Dimension of DSSS Frame Preamble: Radiometric Feature for Wireless Device Identification.
IEEE Trans. Mob. Comput., February, 2024
A Complete and Comprehensive Semantic Perception of Mobile Traveling for Mobile Communication Services.
IEEE Internet Things J., February, 2024
IEEE Trans. Wirel. Commun., January, 2024
Achieving Covertness and Secrecy: The Interplay Between Detection and Eavesdropping Attacks.
IEEE Internet Things J., January, 2024
Behavioral-Semantic Privacy Protection for Continual Social Mobility in Mobile-Internet Services.
IEEE Internet Things J., January, 2024
Physical layer authentication in the internet of vehicles through multiple vehicle-based physical attributes prediction.
Ad Hoc Networks, January, 2024
Multiple attributes based physical layer authentication through propagation scenario identification in the internet of vehicles.
Veh. Commun., 2024
Enhancing the Physical Layer Security of Two-Way Relay Systems With RIS and Beamforming.
IEEE Trans. Inf. Forensics Secur., 2024
FedPTA: Prior-Based Tensor Approximation for Detecting Malicious Clients in Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
T-Trace: Constructing the APTs Provenance Graphs Through Multiple Syslogs Correlation.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Internet Things J., 2024
On Achievable Covert Communication Performance under CSI Estimation Error and Feedback Delay.
CoRR, 2024
Covert communication in hybrid microwave/mmWave UAV-enabled systems with transmission mode selection.
Comput. Commun., 2024
Comput. Networks, 2024
Concordit: A credit-based incentive mechanism for permissioned redactable blockchain.
Comput. Networks, 2024
Sci. China Inf. Sci., 2024
Detecting Vulnerabilities via Explicitly Leveraging Vulnerability Features on Program Slices.
Proceedings of the Theoretical Aspects of Software Engineering, 2024
Refining Pre-trained Language Models for Domain Adaptation with Entity-Aware Discriminative and Contrastive Learning.
Proceedings of the 2024 SIAM International Conference on Data Mining, 2024
Proceedings of the Pattern Recognition and Computer Vision - 7th Chinese Conference, 2024
Proceedings of the International Conference on Networking and Network Applications, 2024
Proceedings of the International Conference on Networking and Network Applications, 2024
Proceedings of the IEEE International Conference on Web Services, 2024
A Simple and Effective Method for Anomaly Detection on Attributed Graphs via Feature Consistency.
Proceedings of the IEEE International Conference on Acoustics, 2024
Securely and Efficiently Outsourcing Neural Network Inference via Parallel MSB Extraction.
Proceedings of the IEEE International Conference on Acoustics, 2024
Private Decision Tree Evaluation with Malicious Security via Function Secret Sharing.
Proceedings of the Computer Security - ESORICS 2024, 2024
Enhancing Privacy of Spatiotemporal Federated Learning Against Gradient Inversion Attacks.
Proceedings of the Database Systems for Advanced Applications, 2024
Proceedings of the Artificial Intelligence in Healthcare - First International Conference, 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
Opportunistic Wiretapping/Jamming: A New Attack Model in Millimeter-Wave Wireless Networks.
IEEE Trans. Wirel. Commun., December, 2023
Private Inference for Deep Neural Networks: A Secure, Adaptive, and Efficient Realization.
IEEE Trans. Computers, December, 2023
Numerical variational studies of quantum phase transitions in the sub-Ohmic spin-boson model with multiple polaron ansatz.
Comput. Phys. Commun., December, 2023
IEEE Trans. Mob. Comput., November, 2023
Link-ability: A Compatibility Prediction Method of Wireless Service based on Markov Process.
J. Inf. Sci. Eng., November, 2023
A Task-based Personalized Privacy-Preserving Participant Selection Mechanism for Mobile Crowdsensing.
Mob. Networks Appl., October, 2023
Anonymous Lightweight Authenticated Key Agreement Protocol for Fog-Assisted Healthcare IoT System.
IEEE Internet Things J., October, 2023
A Performance and Reliability-Guaranteed Predictive Approach to Service Migration Path Selection in Mobile Computing.
IEEE Internet Things J., October, 2023
SFT-Box: An Online Approach for Minimizing the Embedding Cost of Multiple Hybrid SFCs.
IEEE/ACM Trans. Netw., August, 2023
Manto: A Practical and Secure Inference Service of Convolutional Neural Networks for IoT.
IEEE Internet Things J., August, 2023
Load Balancing of Double Queues and Utility-Workload Tradeoff in Heterogeneous Mobile Edge Computing.
IEEE Trans. Wirel. Commun., July, 2023
Performance-Power Tradeoff in Heterogeneous SaaS Clouds With Trustworthiness Guarantee.
IEEE Trans. Computers, June, 2023
IDADET: Iterative Double-Sided Auction-Based Data-Energy Transaction Ecosystem in Internet of Vehicles.
IEEE Internet Things J., June, 2023
Future Gener. Comput. Syst., June, 2023
IEEE Internet Things J., May, 2023
Time-frequency fusion for enhancement of deep learning-based physical layer identification.
Ad Hoc Networks, April, 2023
A Closed-loop Hybrid Supervision Framework of Cryptocurrency Transactions for Data Trading in IoT.
ACM Trans. Internet Things, February, 2023
Secrecy, Covertness and Authentication in Wireless Communications - Physical Layer Security Approach
Wireless Networks, Springer, ISBN: 978-3-031-38464-6, 2023
Hierarchical and Multi-Group Data Sharing for Cloud-Assisted Industrial Internet of Things.
IEEE Trans. Serv. Comput., 2023
PRAM: A Practical Sybil-Proof Auction Mechanism for Dynamic Spectrum Access With Untruthful Attackers.
IEEE Trans. Mob. Comput., 2023
Exploiting Fine-Grained Channel/Hardware Features for PHY-Layer Authentication in MmWave MIMO Systems.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
DeepAG: Attack Graph Construction and Threats Prediction With Bi-Directional Deep Learning.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Cloud Comput., 2023
IEEE Trans. Cloud Comput., 2023
Edge-Assisted Multi-Layer Offloading Optimization of LEO Satellite-Terrestrial Integrated Networks.
IEEE J. Sel. Areas Commun., 2023
TI-BIoV: Traffic Information Interaction for Blockchain-Based IoV With Trust and Incentive.
IEEE Internet Things J., 2023
IEEE Internet Things J., 2023
SoK: Comparing Different Membership Inference Attacks with a Comprehensive Benchmark.
CoRR, 2023
CoRR, 2023
Covert Communication in Hybrid Microwave/mmWave A2G Systems with Transmission Mode Selection.
CoRR, 2023
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023
Proceedings of the Knowledge Science, Engineering and Management, 2023
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
Proceedings of the 13th International Conference on the Internet of Things, 2023
Optimal Hub Placement and Deadlock-Free Routing for Payment Channel Network Scalability.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023
Proceedings of the IEEE Global Communications Conference, 2023
Proceedings of the IEEE International Conference on Blockchain, 2023
2022
Wirel. Networks, 2022
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Inf. Forensics Secur., 2022
On Covert Communication Performance With Outdated CSI in Wireless Greedy Relay Systems.
IEEE Trans. Inf. Forensics Secur., 2022
Jamming and Link Selection for Joint Secrecy/Delay Guarantees in Buffer-Aided Relay System.
IEEE Trans. Commun., 2022
IEEE Trans. Computers, 2022
IEEE J. Sel. Areas Commun., 2022
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Buffer Space Management in Intermittently Connected Internet of Things: Sharing or Allocation?
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Future Gener. Comput. Syst., 2022
A blockchain-driven data exchange model in multi-domain IoT with controllability and parallelity.
Future Gener. Comput. Syst., 2022
Graph Analysis in Decentralized Online Social Networks with Fine-Grained Privacy Protection.
CoRR, 2022
Opportunistic Wiretapping/Jamming: A New Attack Model in Millimeter-Wave Wireless Networks.
CoRR, 2022
Visibility graph entropy based radiometric feature for physical layer identification.
Ad Hoc Networks, 2022
Ad Hoc Networks, 2022
Fast Detection of Weak Arc Faults Based on Progressive Singular-Value-Decomposition and Empirical Analyses.
IEEE Access, 2022
Fast-Fourier-Transform Enhanced Progressive Singular-Value-Decomposition Algorithm in Double Diagnostic Window Frame for Weak Arc Fault Detection.
IEEE Access, 2022
An Intelligent Indoor Localization System in the NLOS Environment Based on Deep Learning and CSI Images.
Proceedings of the 14th International Conference on Wireless Communications and Signal Processing, 2022
Passive User Authentication Utilizing Consecutive Touch Action Features for IIoT Systems.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022
Multi-antenna covert communications in random wireless networks with full-duplex relay.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022
Proceedings of the International Conference on Networking and Network Applications, 2022
Proceedings of the International Conference on Networking and Network Applications, 2022
Proceedings of the International Conference on Networking and Network Applications, 2022
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022
Towards Relational Multi-Agent Reinforcement Learning via Inductive Logic Programming.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2022, 2022
2021
Performance, Fairness, and Tradeoff in UAV Swarm Underlaid mmWave Cellular Networks With Directional Antennas.
IEEE Trans. Wirel. Commun., 2021
IEEE Trans. Wirel. Commun., 2021
IEEE Trans. Veh. Technol., 2021
IEEE Trans. Inf. Forensics Secur., 2021
Exploiting Channel Gain and Phase Noise for PHY-Layer Authentication in Massive MIMO Systems.
IEEE Trans. Inf. Forensics Secur., 2021
Covert Rate Maximization in Wireless Full-Duplex Relaying Systems With Power Control.
IEEE Trans. Commun., 2021
IEEE Trans. Big Data, 2021
IEEE J. Sel. Areas Commun., 2021
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
Decentralized Online Learning With Compressed Communication for Near-Sensor Data Analytics.
IEEE Commun. Lett., 2021
Wavelet-Analysis-Based Singular-Value-Decomposition Algorithm for Weak Arc Fault Detection via Current Amplitude Normalization.
IEEE Access, 2021
Mobility-Aware Differentially Private Trajectory for Privacy-Preserving Continual Crowdsourcing.
IEEE Access, 2021
IEEE Access, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the IEEE International Conference on Services Computing, 2021
2020
An incentive mechanism with bid privacy protection on multi-bid crowdsourced spectrum sensing.
World Wide Web, 2020
Wirel. Networks, 2020
IEEE Trans. Wirel. Commun., 2020
IEEE Trans. Parallel Distributed Syst., 2020
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Inf. Forensics Secur., 2020
Physical Layer Authentication Jointly Utilizing Channel and Phase Noise in MIMO Systems.
IEEE Trans. Commun., 2020
Knowl. Inf. Syst., 2020
Decentralized and Secure Cross-Domain Data Sharing Scheme Based on Blockchain for Application-Centric IoT.
J. Inf. Sci. Eng., 2020
IEEE Internet Things J., 2020
Secrecy transmission capacity in mobile <i>ad hoc</i> networks with security-aware Aloha protocol.
IET Commun., 2020
CoRR, 2020
CoRR, 2020
Comput. Commun., 2020
Proceedings of the International Conference on Networking and Network Applications, 2020
A Lightweight Auction Framework for Spectrum Allocation with Strong Security Guarantees.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020
GPS Spoofing Detector with Adaptive Trustable Residence Area for Cellular based-UAVs.
Proceedings of the IEEE Global Communications Conference, 2020
2019
Wirel. Networks, 2019
IEEE Trans. Veh. Technol., 2019
IEEE Trans. Serv. Comput., 2019
IEEE Trans. Parallel Distributed Syst., 2019
Mode Selection and Spectrum Partition for D2D Inband Communications: A Physical Layer Security Perspective.
IEEE Trans. Commun., 2019
Reversible data hiding using the dynamic block-partition strategy and pixel-value-ordering.
Multim. Tools Appl., 2019
IEEE J. Sel. Areas Commun., 2019
Authenticated Key Agreement Scheme with Strong Anonymity for Multi-Server Environment in TMIS.
J. Medical Syst., 2019
IEEE Internet Things J., 2019
Detecting cyberattacks in industrial control systems using online learning algorithms.
Neurocomputing, 2019
Future Gener. Comput. Syst., 2019
Anomalies Detection and Proactive Defence of Routers Based on Multiple Information Learning.
Entropy, 2019
Selfholding: A combined attack model using selfish mining with block withholding attack.
Comput. Secur., 2019
Packet delivery ratio and energy consumption in multicast delay tolerant MANETs with power control.
Comput. Networks, 2019
Secure Communication in Non-Geostationary Orbit Satellite Systems: A Physical Layer Security Perspective.
IEEE Access, 2019
IEEE Access, 2019
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Cooperative Jamming Strategy Based on Community Detection for Two-Hop Communication Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Data Analytics for Fog Computing by Distributed Online Learning with Asynchronous Update.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
2018
World Wide Web, 2018
Provoking the Adversary by Detecting Eavesdropping and Jamming Attacks: A Game-Theoretical Framework.
Wirel. Commun. Mob. Comput., 2018
On Security-Delay Trade-Off in Two-Hop Wireless Networks With Buffer-Aided Relay Selection.
IEEE Trans. Wirel. Commun., 2018
IEEE Trans. Veh. Technol., 2018
IEEE Trans. Serv. Comput., 2018
IEEE Trans. Inf. Forensics Secur., 2018
IEEE Trans. Big Data, 2018
IEEE J. Sel. Areas Commun., 2018
Information flow control on encrypted data for service composition among multiple clouds.
Distributed Parallel Databases, 2018
CoRR, 2018
Ad Hoc Networks, 2018
Proceedings of the 2018 Workshop on Network Meets AI & ML, 2018
Provoking the Adversary by Dual Detection Techniques: An Extended Stochastic Game Theoretical Framework.
Proceedings of the International Conference on Networking and Network Applications, 2018
Proceedings of the International Conference on Networking and Network Applications, 2018
Poster abstract: SALUTE: A strategy-proof auction mechanism for flexible multichannel allocation.
Proceedings of the IEEE INFOCOM 2018, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the IEEE INFOCOM 2018, 2018
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018
Proceedings of the 47th International Conference on Parallel Processing, 2018
Proceedings of the 2018 International Conference on Computing, 2018
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018
2017
On throughput capacity of large-scale ad hoc networks with realistic buffer constraint.
Wirel. Networks, 2017
IEEE Trans. Veh. Technol., 2017
Soft Comput., 2017
Mob. Inf. Syst., 2017
CoRR, 2017
Adaptive Traffic Signal Control: Deep Reinforcement Learning Algorithm with Experience Replay and Target Network.
CoRR, 2017
Comput. Commun., 2017
Comput. Networks, 2017
MicroThings: A Generic IoT Architecture for Flexible Data Aggregation and Scalable Service Cooperation.
IEEE Commun. Mag., 2017
Ad Hoc Networks, 2017
Proceedings of the International Conference on Networking and Network Applications, 2017
Distributed Information Flow Verification on Encrypted Data for Service Composition in Multiple Clouds.
Proceedings of the International Conference on Networking and Network Applications, 2017
Proceedings of the International Conference on Networking and Network Applications, 2017
Proceedings of the International Conference on Networking and Network Applications, 2017
Proceedings of the International Conference on Networking and Network Applications, 2017
Proceedings of the International Conference on Networking and Network Applications, 2017
Proceedings of the International Conference on Networking and Network Applications, 2017
Physical Layer Authentication and Identification in Wireless Network via the Locations of Surrounding Noise Sources.
Proceedings of the International Conference on Networking and Network Applications, 2017
On Secrecy Performance of Multibeam Satellite System with Multiple Eavesdropped Users.
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017
SF-sketch: A Fast, Accurate, and Memory Efficient Data Structure to Store Frequencies of Data Items.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017
Secure Beamforming for Full-Duplex MIMO Two-Way Communication via Untrusted Relaying.
Proceedings of the 2017 IEEE Globecom Workshops, Singapore, December 4-8, 2017, 2017
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
2016
IEEE Trans. Commun., 2016
IEEE Trans Autom. Sci. Eng., 2016
Analysis of SVEIR worm attack model with saturated incidence and partial immunization.
J. Commun. Inf. Networks, 2016
Future Gener. Comput. Syst., 2016
CoRR, 2016
CoRR, 2016
Proceedings of the International Conference on Networking and Network Applications, 2016
Proceedings of the International Conference on Networking and Network Applications, 2016
Proceedings of the International Conference on Networking and Network Applications, 2016
Link Selection for Secure Two-Hop Transmissions in Buffer-Aided Relay Wireless Networks.
Proceedings of the International Conference on Networking and Network Applications, 2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
POSTER: RIA: an Audition-based Method to Protect the Runtime Integrity of MapReduce Applications.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Wirel. Networks, 2015
Future Gener. Comput. Syst., 2015
Eavesdropper-Tolerance Capability in Two-Hop Wireless Networks via Cooperative Jamming.
Ad Hoc Sens. Wirel. Networks, 2015
End-To-End Delay Modeling for Mobile Ad Hoc Networks: A Quasi-Birth-and-Death Approach.
Ad Hoc Sens. Wirel. Networks, 2015
Proceedings of the Eighth International Conference on Mobile Computing and Ubiquitous Networking, 2015
2014
Exploring Relay Cooperation for Secure and Reliable Transmission in Two-HopWireless Networks.
EAI Endorsed Trans. Scalable Inf. Syst., 2014
J. Inf. Sci. Eng., 2014
Transmission protocol for secure big data in two-hop wireless networks with cooperative jamming.
Inf. Sci., 2014
IEICE Trans. Commun., 2014
Ad Hoc Networks, 2014
Secure Networking Protocol with Identity Protection for Cooperation of Unmanned Platforms.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014
2013
Int. J. Distributed Sens. Networks, 2013
Distributed Information Flow Verification Framework for the Composition of Service Chain in Wireless Sensor Network.
Int. J. Distributed Sens. Networks, 2013
Generalized Secure Transmission Protocol for Flexible Load-Balance Control with Cooperative Relays in Two-Hop Wireless Networks
CoRR, 2013
CoRR, 2013
Proceedings of the 11th International Symposium and Workshops on Modeling and Optimization in Mobile, 2013
Secure and Reliable Transmission with Cooperative Relays in Two-Hop Wireless Networks.
Proceedings of the Information Technology Convergence, 2013
2012
Int. J. Grid Util. Comput., 2012
Two-Layer Storage Scheme and Repair Method of Failure Data in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2012
Exploring Relay Cooperation Scheme for Load-Balance Control in Two-hop Secure Communication System
CoRR, 2012
Exploring Relay Cooperation for Secure and Reliable Transmission in Two-Hop Wireless Networks
CoRR, 2012
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012
2011
MS2HM: A Multimedia Service Session Handoff Method between Heterogeneous Wireless Networks.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Obstacle-avoiding rectilinear Steiner minimum tree construction based on Discrete Particle Swarm Optimization.
Proceedings of the Seventh International Conference on Natural Computation, 2011
Distributed Storage Schemes for Controlling Data Availability in Wireless Sensor Networks.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
Key Management Protocol Based on Finely Granular Multi-level Security Method in Wireless Networks.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
2010
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010
Efficient security transmission protocol with identity-based encryption in wireless mesh networks.
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010
2009
Proceedings of the 2009 IEEE International Conference on e-Business Engineering, 2009
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
2007
Proceedings of the Computational Intelligence and Security, International Conference, 2007
2003
IEEE Trans. Medical Imaging, 2003