Yuqing Zhang

Orcid: 0000-0001-8306-7195

Affiliations:
  • University of Chinese Academy of Sciences, National Computer Network Intrusion Protection Center, Beijing, China
  • Hainan University, School of Computer Science and Cyberspace Security, Haikou, China
  • Xi'an University of Posts and Telecommunications, School of Cyberspace Security, Xi'an, China
  • Xidian University, School of Cyber Engineering, Xi'an, China


According to our database1, Yuqing Zhang authored at least 191 papers between 1999 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Evolving Paradigms in Automated Program Repair: Taxonomy, Challenges, and Opportunities.
ACM Comput. Surv., February, 2025

2024
Uncovering Access Token Security Flaws in Multiuser Scenario of Smart Home Platforms.
IEEE Internet Things J., November, 2024

Sybil Attacks Detection and Traceability Mechanism Based on Beacon Packets in Connected Automobile Vehicles.
Sensors, April, 2024

SSI-FL: Self-sovereign identity based privacy-preserving federated learning.
J. Parallel Distributed Comput., 2024

Several new classes of optimal ternary cyclic codes with two or three zeros.
CoRR, 2024

StateGuard: Detecting State Derailment Defects in Decentralized Exchange Smart Contract.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024

DeFiTail: DeFi Protocol Inspection through Cross-Contract Execution Analysis.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024

Catch the Butterfly: Peeking into the Terms and Conflicts Among SPDX Licenses.
Proceedings of the IEEE International Conference on Software Analysis, 2024

Maginot Line: Assessing a New Cross-app Threat to PII-as-Factor Authentication in Chinese Mobile Apps.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Research on SSL/TLS Security Differences Based on RFC Documents.
Proceedings of the International Conference on Computing, Networking and Communications, 2024

Prompt Fix: Vulnerability Automatic Repair Technology Based on Prompt Engineering.
Proceedings of the International Conference on Computing, Networking and Communications, 2024

LibGuard: Protecting Sensitive Data In Android Third-Party Libraries From XLDH Attacks.
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024

Applying Contrastive Learning to Code Vulnerability Type Classification.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024

NMT vs MLM: Which is the Best Paradigm for APR?
Proceedings of the IEEE Congress on Evolutionary Computation, 2024

2023
Several classes of optimal <i>p</i>-ary cyclic codes with minimum distance four.
Finite Fields Their Appl., December, 2023

Inconsistent measurement and incorrect detection of software names in security vulnerability reports.
Comput. Secur., December, 2023

FeSA: Automatic Federated Swarm Attestation on Dynamic Large-Scale IoT Devices.
IEEE Trans. Dependable Secur. Comput., 2023

A novel secure and distributed architecture for privacy-preserving healthcare system.
J. Netw. Comput. Appl., 2023

A Survey on Automated Program Repair Techniques.
CoRR, 2023

FISHFUZZ: Catch Deeper Bugs by Throwing Larger Nets.
Proceedings of the 32nd USENIX Security Symposium, 2023

PPA: Preference Profiling Attack Against Federated Learning.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

An Empirical Study on Fine-Tuning Large Language Models of Code for Automated Program Repair.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

Cross-Border Data Security from the Perspective of Risk Assessment.
Proceedings of the Information Security Practice and Experience, 2023

Multimodal Software Defect Severity Prediction Based on Sentiment Probability.
Proceedings of the Information Security Practice and Experience, 2023

Malicious Random-index PIR and its Application.
Proceedings of the 2023 2nd International Symposium on Computing and Artificial Intelligence, 2023

Research on Named Entity Recognition in the Steel Industry Based on MacBERT.
Proceedings of the 2023 2nd International Symposium on Computing and Artificial Intelligence, 2023

CEFI: Command Execution Flow Integrity for Embedded Devices.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2023

Enhancing OSS Patch Backporting with Semantics.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
A survey of DeFi security: Challenges and opportunities.
J. King Saud Univ. Comput. Inf. Sci., November, 2022

Efficient Certificateless Multi-Copy Integrity Auditing Scheme Supporting Data Dynamics.
IEEE Trans. Dependable Secur. Comput., 2022

Understanding and Conquering the Difficulties in Identifying Third-Party Libraries From Millions of Android Apps.
IEEE Trans. Big Data, 2022

NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users.
IEEE Trans. Big Data, 2022

Fingerprinting Mainstream IoT Platforms Using Traffic Analysis.
IEEE Internet Things J., 2022

Cargo Ecosystem Dependency-Vulnerability Knowledge Graph Construction and Vulnerability Propagation Study.
CoRR, 2022

Several classes of optimal p-ary cyclic codes with minimal distance four.
CoRR, 2022

A Secure Data Sharing Framework for Robot Operating Systems Leveraging Ethereum.
CoRR, 2022

FishFuzz: Throwing Larger Nets to Catch Deeper Bugs.
CoRR, 2022

CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences.
CoRR, 2022

A traffic anomaly detection scheme for non-directional denial of service attacks in software-defined optical network.
Comput. Secur., 2022

FH-CFI: Fine-grained hardware-assisted control flow integrity for ARM-based IoT devices.
Comput. Secur., 2022

Hazard Integrated: Understanding Security Risks in App Extensions to Team Chat Systems.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Hierarchical Attention Network for Interpretable and Fine-Grained Vulnerability Detection.
Proceedings of the IEEE INFOCOM 2022, 2022

Unfettered Access Tokens: Discovering Security Flaws of the Access Token in Smart Home Platforms.
Proceedings of the IEEE International Conference on Communications, 2022

VDBWGDL: Vulnerability Detection Based On Weight Graph And Deep Learning.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

An Overview of Sybil Attack Detection Mechanisms in VFC.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

Vulnerability Dataset Construction Methods Applied To Vulnerability Detection: A Survey.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

Repairing Security Vulnerabilities Using Pre-trained Programming Language Models.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

SbrPBert: A BERT-Based Model for Accurate Security Bug Report Prediction.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

Detecting API Missing-Check Bugs Through Complete Cross Checking of Erroneous Returns.
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022

What Your Firmware Tells You Is Not How You Should Emulate It: A Specification-Guided Approach for Firmware Emulation.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

A Minimal Disclosure Signature Authentication Scheme Based on Consortium Blockchain.
Proceedings of the IEEE International Conference on Blockchain, 2022

2021
KeyD: Secure Key-Deduplication with Identity-Based Broadcast Encryption.
IEEE Trans. Cloud Comput., 2021

Reviewing IoT Security via Logic Bugs in IoT Platforms and Systems.
IEEE Internet Things J., 2021

Automatic Firmware Emulation through Invalidity-guided Knowledge Inference (Extended Version).
CoRR, 2021

Understanding Malicious Cross-library Data Harvesting on Android.
Proceedings of the 30th USENIX Security Symposium, 2021

Automatic Firmware Emulation through Invalidity-guided Knowledge Inference.
Proceedings of the 30th USENIX Security Symposium, 2021

Using Dynamic Analysis to Automatically Detect Anti-Adblocker on the Web.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

A system for detecting third-party tracking through the combination of dynamic analysis and static analysis.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

Research on Security Assessment of Cross Border Data Flow.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021

Detecting Inconsistent Vulnerable Software Version in Security Vulnerability Reports.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021

A Review of Data Representation Methods for Vulnerability Mining Using Deep Learning.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021

Whether the sensitive information statement of the IoT privacy policy is consistent with the actual behavior.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2021

Ant Hole: Data Poisoning Attack Breaking out the Boundary of Face Cluster.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2021

Who's In Control? On Security Risks of Disjointed IoT Device Management Channels.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Identify Vulnerability Fix Commits Automatically Using Hierarchical Attention Network.
EAI Endorsed Trans. Security Safety, 2020

Vul-Mirror: A Few-Shot Learning Method for Discovering Vulnerable Code Clone.
EAI Endorsed Trans. Security Safety, 2020

Privacy preserving based logistic regression on big data.
J. Netw. Comput. Appl., 2020

Privacy-Preserving Federated Learning in Fog Computing.
IEEE Internet Things J., 2020

DO-RA: Data-oriented runtime attestation for IoT devices.
Comput. Secur., 2020

Secure IoT Data Outsourcing With Aggregate Statistics and Fine-Grained Access Control.
IEEE Access, 2020

Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation.
Proceedings of the 29th USENIX Security Symposium, 2020

Burglars' IoT Paradise: Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

An Improved Shapley Value Benefit Distribution Mechanism in Cooperative Game of Cyber Threat Intelligence Sharing.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Efficient Vulnerability Detection based on abstract syntax tree and Deep Learning.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

CPSIOTSEC'20: 2020 Joint Workshop on CPS&IoT Security and Privacy.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Comments on "Provably Secure Dynamic Id-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model".
IEEE Trans. Inf. Forensics Secur., 2019

The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved.
IEEE Internet Things J., 2019

ESDRA: An Efficient and Secure Distributed Remote Attestation Scheme for IoT Swarms.
IEEE Internet Things J., 2019

Securing Traffic-Related Messages Exchange Against Inside-and-Outside Collusive Attack in Vehicular Networks.
IEEE Internet Things J., 2019

One secure data integrity verification scheme for cloud storage.
Future Gener. Comput. Syst., 2019

Logic Bugs in IoT Platforms and Systems: A Review.
CoRR, 2019

Good Motive but Bad Design: Why ARM MPU Has Become an Outcast in Embedded Systems.
CoRR, 2019

A revised CVSS-based system to improve the dispersion of vulnerability risk scores.
Sci. China Inf. Sci., 2019

Privacy Preserving Association Rule Mining: Taxonomy, Techniques, and Metrics.
IEEE Access, 2019

Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms.
Proceedings of the 28th USENIX Security Symposium, 2019

Attack-Defense Utility Quantification And Security Risk Assessment.
Proceedings of the 2019 IEEE SmartWorld, 2019

Research on the Impact of Attacks on Security Characteristics.
Proceedings of the 2019 IEEE SmartWorld, 2019

Security Analysis of Smart Home Based on Life Cycle.
Proceedings of the 2019 IEEE SmartWorld, 2019

Research on the Destructive Capability Metrics of Common Network Attacks.
Proceedings of the 2019 IEEE SmartWorld, 2019

FIoT: Detecting the Memory Corruption in Lightweight IoT Device Firmware.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Semantically Secure and Verifiable Multi-keyword Search in Cloud Computing.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

A Blackboard Sharing Mechanism for Community Cyber Threat Intelligence Based on Multi-Agent System.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

A Hybrid Model for Optimal Defense Strategy Generation.
Proceedings of the 28th International Conference on Computer Communication and Networks, 2019

0-RTT Attack and Defense of QUIC Protocol.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

Identifying Privilege Separation Vulnerabilities in IoT Firmware with Symbolic Execution.
Proceedings of the Computer Security - ESORICS 2019, 2019

Randex: Mitigating Range Injection Attacks on Searchable Encryption.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

IoT S&P 2019: 2nd Workshop on the Internet of Things Security and Privacy.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Security Measurements of Cyber Networks.
Secur. Commun. Networks, 2018

Privacy-preserving composite modular exponentiation outsourcing with optimal checkability in single untrusted cloud server.
J. Netw. Comput. Appl., 2018

Phantom Device Attack: Uncovering the Security Implications of the Interactions among Devices, IoT Cloud, and Mobile Apps.
CoRR, 2018

The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved.
CoRR, 2018

Several classes of negabent functions over finite fields.
Sci. China Inf. Sci., 2018

An adaptive system for detecting malicious queries in web attacks.
Sci. China Inf. Sci., 2018

Privacy-Preserving and Dynamic Multi-Attribute Conjunctive Keyword Search Over Encrypted Cloud Data.
IEEE Access, 2018

E-SC: Collusion-Resistant Secure Outsourcing of Sequence Comparison Algorithm.
IEEE Access, 2018

Efficient and Secure Top-k Queries With Top Order-Preserving Encryption.
IEEE Access, 2018

A Novel Improved System Based on CVSS.
Proceedings of the Communications, Signal Processing, and Systems, 2018

SCPN-based Game Model for Security Situational Awareness in the Intenet of Things.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys.
IEEE Trans. Serv. Comput., 2017

SecReach: Secure Reachability Computation on Encrypted Location Check-in Data.
IACR Cryptol. ePrint Arch., 2017

T-DB: Toward Fully Functional Transparent Encrypted Databases in DBaaS Framework.
CoRR, 2017

Driving Android apps to trigger target API invocations based on activity and GUI filtering.
Sci. China Inf. Sci., 2017

Avoiding monopolization: mutual-aid collusive attack detection in cooperative spectrum sensing.
Sci. China Inf. Sci., 2017

A static technique for detecting input validation vulnerabilities in Android apps.
Sci. China Inf. Sci., 2017

Application Research on Network Attacks and Defenses with Zachman Framework.
Proceedings of the Network and System Security - 11th International Conference, 2017

A Novel Approach to Network Security Situation Assessment Based on Attack Confidence.
Proceedings of the Network and System Security - 11th International Conference, 2017

Mixed Wavelet-Based Neural Network Model for Cyber Security Situation Prediction Using MODWT and Hurst Exponent Analysis.
Proceedings of the Network and System Security - 11th International Conference, 2017

One-tag checker: Message-locked integrity auditing on encrypted cloud deduplication storage.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

IoT S&P 2017: First Workshop on Internet of Things Security and Privacy.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Predicting the Popularity of Online News Based on Multivariate Analysis.
Proceedings of the 2017 IEEE International Conference on Computer and Information Technology, 2017

2016
A privacy-preserving group authentication protocol for machine-type communication in LTE/LTE-A networks.
Secur. Commun. Networks, 2016

Efficient quantum dialogue using entangled states and entanglement swapping without information leakage.
Quantum Inf. Process., 2016

SVC: Secure VANET-Assisted Remote Healthcare Monitoring System in Disaster Area.
KSII Trans. Internet Inf. Syst., 2016

One-round Secure Key Exchange Protocol With Strong Forward Secrecy.
KSII Trans. Internet Inf. Syst., 2016

New complementary sets of length 2<sup>m</sup> and size 4.
Adv. Math. Commun., 2016

Enhancing multi-label classification based on local label constraints and classifier chains.
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016

A Machine Learning Approach for Detecting Third-Party Trackers on the Web.
Proceedings of the Computer Security - ESORICS 2016, 2016

Stay in Your Cage! A Sound Sandbox for Third-Party Libraries on Android.
Proceedings of the Computer Security - ESORICS 2016, 2016

Call Me Back!: Attacks on System Server and System Apps in Android through Synchronous Callback.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
EasiND: Effective Neighbor Discovery Algorithms for Asynchronous and Asymmetric-Duty-Cycle Multi-channel Mobile WSNs.
Wirel. Pers. Commun., 2015

A privacy preserving authentication scheme for roaming services in global mobility networks.
Secur. Commun. Networks, 2015

Securing cooperative spectrum sensing against ISSDF attack using dynamic trust evaluation in cognitive radio networks.
Secur. Commun. Networks, 2015

Lightweight handover authentication with location privacy-preserving in mobile wireless networks.
Int. J. Embed. Syst., 2015

TrackerDetector: A system to detect third-party trackers through machine learning.
Comput. Networks, 2015

XAS: Cross-API scripting attacks in social ecosystems.
Sci. China Inf. Sci., 2015

IVDroid: Static Detection for Input Validation Vulnerability in Android Inter-component Communication.
Proceedings of the Information Security Practice and Experience, 2015

A fuzzing test for dynamic vulnerability detection on Android Binder mechanism.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Fast and Secure Handover Authentication Scheme Based on Ticket for WiMAX and WiFi Heterogeneous Networks.
Wirel. Pers. Commun., 2014

On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in Multicloud Storage.
IEEE Trans. Parallel Distributed Syst., 2014

Using fuzzy comprehensive evaluation method to establish a credible spectrum sensing and allocation model.
Secur. Commun. Networks, 2014

An anonymous data aggregation scheme for smart grid systems.
Secur. Commun. Networks, 2014

Static detection of logic vulnerabilities in Java web applications.
Secur. Commun. Networks, 2014

Securing Cooperative Spectrum Sensing against Rational SSDF Attack in Cognitive Radio Networks.
KSII Trans. Internet Inf. Syst., 2014

Some classes of monomial complete permutation polynomials over finite fields of characteristic two.
Finite Fields Their Appl., 2014

Function Escalation Attack.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

POSTER: Recommendation-based Third-Party Tracking Monitor to Balance Privacy with Personalization.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

A Soft Decision Scheme against Intermittent SSDF Attack in Cooperative Spectrum Sensing.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

2013
GHAP: An Efficient Group-based Handover Authentication Mechanism for IEEE 802.16m Networks.
Wirel. Pers. Commun., 2013

Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud.
IEEE Trans. Parallel Distributed Syst., 2013

IKE vulnerability discovery based on fuzzing.
Secur. Commun. Networks, 2013

Structurized grammar-based fuzz testing for programs with highly structured inputs.
Secur. Commun. Networks, 2013

Verifiable symmetric polynomial-based key distribution schemes.
Secur. Commun. Networks, 2013

A privacy-preserving acceleration authentication protocol for mobile pay-TV systems.
Secur. Commun. Networks, 2013

A new certificateless authenticated key agreement protocol for SIP with different KGCs.
Secur. Commun. Networks, 2013

A simple and robust anonymous two-factor authenticated key exchange protocol.
Secur. Commun. Networks, 2013

RPFuzzer: A Framework for Discovering Router Protocols Vulnerabilities Based on Fuzzing.
KSII Trans. Internet Inf. Syst., 2013

A New Roaming Authentication Framework For Wireless Communication.
KSII Trans. Internet Inf. Syst., 2013

A Lightweight Three-Party Privacy-preserving Authentication Key Exchange Protocol Using Smart Card.
KSII Trans. Internet Inf. Syst., 2013

EasiND: Neighbor Discovery in Duty-Cycled Asynchronous Multichannel Mobile WSNs.
Int. J. Distributed Sens. Networks, 2013

More Classes of Complete Permutation Polynomials over $\F_q$.
CoRR, 2013

Defend against Collusive SSDF Attack Using Trust in Cooperative Spectrum Sensing Environment.
Proceedings of the 12th IEEE International Conference on Trust, 2013

A new framework against privilege escalation attacks on android.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Fuzzing the ActionScript virtual machine.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

trend of online flash XSS vulnerabilities.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks.
IEEE Trans. Dependable Secur. Comput., 2012

Improving VRSS-based vulnerability prioritization using analytic hierarchy process.
J. Syst. Softw., 2012

Efficient (n, t, n) secret sharing schemes.
J. Syst. Softw., 2012

Construction of Near-Complementary Sequences with Low PMEPR for Peak Power Control in OFDM.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

A Novel Group-Based Handover Authentication Scheme with Privacy Preservation for Mobile WiMAX Networks.
IEEE Commun. Lett., 2012

An efficient handover authentication scheme with privacy preservation for IEEE 802.16m network.
Comput. Secur., 2012

Dealing with dishonest recommendation: The trials in reputation management court.
Ad Hoc Networks, 2012

BlendFuzz: A Model-Based Framework for Fuzz Testing Programs with Grammatical Inputs.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Analysis and Improvements of Two Identity Based Anonymous Signcryption Schemes for Multiple Receivers.
Proceedings of the 11th IEEE International Conference on Trust, 2012

The Analysis of Mobility Models in MANETs with Two-Hop Relay Algorithm.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

An efficient handover authentication scheme with location privacy preserving for EAP-based wireless networks.
Proceedings of IEEE International Conference on Communications, 2012

A lightweight roaming authentication protocol for anonymous wireless communication.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

A research on vulnerability discovering for router protocols based on fuzzing.
Proceedings of the 7th International Conference on Communications and Networking in China, 2012

2011
Cryptanalysis of an Efficient Threshold Self-Healing Key Distribution Scheme.
IEEE Trans. Wirel. Commun., 2011

Security Issues and Solutions of the Key Management Protocols in IEEE 802.16j Multi-Hop Relay Network.
IEICE Trans. Commun., 2011

VRSS: A new system for rating and scoring vulnerabilities.
Comput. Commun., 2011

EKMP: An enhanced key management protocol for IEEE 802.16m.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

Identity-Based Strong Key-Insulated Ring Signature Scheme in the Standard Model.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

A Privacy Preserving Handover Authentication Scheme for EAP-Based Wireless Networks.
Proceedings of the Global Communications Conference, 2011

2010
A Trust Management Model Based on Bi-evaluation in P2P Networks.
IEICE Trans. Inf. Syst., 2010

A Fast Handover Authentication Mechanism Based on Ticket for IEEE 802.16m.
IEEE Commun. Lett., 2010

Eliminating Human Specification in Static Analysis.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Coping with Traitor Attacks in Reputation Models for Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2010

2008
TFTP vulnerability finding technique based on fuzzing.
Comput. Commun., 2008

2006
Common Program Analysis of Two-Party Security Protocols Using SMV.
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006

1999
An Approach to the Formal Verification of the Two-Party Crypographic Protocols.
ACM SIGOPS Oper. Syst. Rev., 1999


  Loading...