Yunhua He
Orcid: 0000-0001-8414-1385
According to our database1,
Yunhua He
authored at least 51 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Attribute-Based Access Control Scheme for Secure Identity Resolution in Prognostics and Health Management.
IEEE Internet Things J., July, 2024
IEEE Trans. Netw. Sci. Eng., 2024
Game-Theoretic Incentive Mechanism for Collaborative Quality Control in Blockchain-Enhanced Carbon Emissions Verification.
IEEE Trans. Netw. Sci. Eng., 2024
Future Gener. Comput. Syst., 2024
An efficient hierarchical attribute-based encryption scheme with cross-domain data sharing.
Comput. Networks, 2024
Comput. Networks, 2024
2023
Cross-Chain Trusted Service Quality Computing Scheme for Multichain-Model-Based 5G Network Slicing SLA.
IEEE Internet Things J., July, 2023
IEEE/ACM Trans. Netw., April, 2023
AQRS: Anti-quantum ring signature scheme for secure epidemic control with blockchain.
Comput. Networks, April, 2023
IEEE Trans. Big Data, February, 2023
A Game Theory-Based Incentive Mechanism for Collaborative Security of Federated Learning in Energy Blockchain Environment.
IEEE Internet Things J., 2023
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023
An Efficient and Verifiable Polynomial Cross-chain Outsourcing Calculation Scheme for IoT.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
2022
Privacy-Preserving Query Scheme (PPQS) for Location-Based Services in Outsourced Cloud.
Secur. Commun. Networks, 2022
A Cross-Chain Trusted Reputation Scheme for a Shared Charging Platform Based on Blockchain.
IEEE Internet Things J., 2022
A forward-secure and efficient authentication protocol through lattice-based group signature in VANETs scenarios.
Comput. Networks, 2022
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
SBA-GT: A Secure Bandwidth Allocation Scheme with Game Theory for UAV-Assisted VANET Scenarios.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the Wireless Sensor Networks - 16th China Conference, 2022
2021
A blockchain-based privacy-preserving 5G network slicing service level agreement audit scheme.
EURASIP J. Wirel. Commun. Netw., 2021
EURASIP J. Wirel. Commun. Netw., 2021
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Proceedings of the ICC 2021, 2021
2020
Intell. Serv. Robotics, 2020
IEEE Access, 2020
IEEE Access, 2020
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
2019
IEEE Access, 2019
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the Wireless Sensor Networks - 13th China Conference, 2019
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019
2018
A Blockchain Based Privacy-Preserving Incentive Mechanism in Crowdsensing Applications.
IEEE Access, 2018
IEEE Access, 2018
Proceedings of the 15th International Symposium on Pervasive Systems, 2018
2017
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
Poster: Smart-Contract Based Incentive Mechanism for K-Anonymity Privacy Protection in LBSs.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
Proceedings of the 2017 International Conference on Identification, 2017
2016
An optimal query strategy for protecting location privacy in location-based services.
Peer-to-Peer Netw. Appl., 2016
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016
Side-channel information leakage of encrypted video stream in video surveillance systems.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
A Lightweight Location Privacy-Preserving Scheme for WiFi Fingerprint-Based Localization.
Proceedings of the International Conference on Identification, 2016
2015
IEEE Commun. Mag., 2015
2014
Int. J. Distributed Sens. Networks, 2014
Proceedings of the 10th ACM International Workshop on Foundations of Mobile Computing, 2014