Zheng Yan

Orcid: 0000-0002-9697-2108

Affiliations:
  • Xidian University, School of Cyber Engineering, State Key Laboratory on Integrated Services Networks, Xi'an, China
  • Aalto University, Espoo, Finland (former)
  • Nokia Research Center, Helsinki, Finland (former)
  • Helsinki University of Technology, Finland (PhD 2007)


According to our database1, Zheng Yan authored at least 335 papers between 2003 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Backdoor Attacks against Voice Recognition Systems: A Survey.
ACM Comput. Surv., March, 2025

Evolving Paradigms in Automated Program Repair: Taxonomy, Challenges, and Opportunities.
ACM Comput. Surv., February, 2025

2024
Decomposed and Distributed Modulation to Achieve Secure Transmission.
IEEE Trans. Mob. Comput., December, 2024

Reconstructed Graph Neural Network With Knowledge Distillation for Lightweight Anomaly Detection.
IEEE Trans. Neural Networks Learn. Syst., September, 2024

Exploiting Interference With an Intelligent Reflecting Surface to Enhance Data Transmission.
IEEE Trans. Wirel. Commun., August, 2024

Covert Backscatter Communication in the Presence of Multi-Antenna Eavesdropper.
IEEE Commun. Lett., August, 2024

Physical Layer Authentication in Backscatter Communication: A Review.
IEEE Wirel. Commun., June, 2024

Secrecy Performance Analysis of RIS-Aided Smart Grid Communications.
IEEE Trans. Ind. Informatics, April, 2024

EDDAC: An Efficient and Decentralized Data Access Control Scheme With Attribute Privacy Preservation.
IEEE Internet Things J., April, 2024

Can Routing Be Effectively Learned in Integrated Heterogeneous Networks?
IEEE Netw., January, 2024

Sec-E2E: End-to-End Communication Security in LS-HetNets Based on Blockchain.
IEEE Trans. Netw. Sci. Eng., 2024

BatchAuth: A Physical Layer Batch Authentication Scheme for Multiple Backscatter Devices.
IEEE Trans. Inf. Forensics Secur., 2024

iCoding: Countermeasure Against Interference and Eavesdropping in Wireless Communications.
IEEE Trans. Inf. Forensics Secur., 2024

BGKey: Group Key Generation for Backscatter Communications Among Multiple Devices.
IEEE Trans. Inf. Forensics Secur., 2024

SPCEX: Secure and Privacy-Preserving Cryptocurrency Exchange.
IEEE Trans. Dependable Secur. Comput., 2024

TrustGuard: GNN-Based Robust and Explainable Trust Evaluation With Dynamicity Support.
IEEE Trans. Dependable Secur. Comput., 2024

DePTVM: Decentralized Pseudonym and Trust Value Management for Integrated Networks.
IEEE Trans. Dependable Secur. Comput., 2024

SecFed: A Secure and Efficient Federated Learning Based on Multi-Key Homomorphic Encryption.
IEEE Trans. Dependable Secur. Comput., 2024

Federated distillation and blockchain empowered secure knowledge sharing for Internet of medical Things.
Inf. Sci., 2024

P2C2T: Preserving the Privacy of Cross-Chain Transfer.
IACR Cryptol. ePrint Arch., 2024

A survey on blockchain-enabled federated learning and its prospects with digital twin.
Digit. Commun. Networks, 2024

Joint alignment and steering to manage interference.
Digit. Commun. Networks, 2024

Physical Layer Mutual Authentication in RIS-Aided Monostatic Backscatter Communications: A Dual-Edged Analysis.
CoRR, 2024

Secure Backscatter Communications Through RIS: Modeling and Performance.
CoRR, 2024

RIS-Aided Backscattering Tag-to-Tag Networks: Performance Analysis.
CoRR, 2024

MapComp: A Secure View-based Collaborative Analytics Framework for Join-Group-Aggregation.
CoRR, 2024

On Performance of FAS-Aided Wireless Powered NOMA Communication Systems.
Proceedings of the 20th International Conference on Wireless and Mobile Computing, 2024

FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

IRS Empowered Interference Utilization for Efficient Data Transmission.
Proceedings of the IEEE International Conference on Communications, 2024

APAuth: Authenticate an Access Point by Backscatter Devices.
Proceedings of the IEEE International Conference on Communications, 2024

Use or Not: A Qualitative Study on the User Adoption and Abandonment of Voice Shopping with Smart Speakers.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2023
PatchDiscovery: Patch Presence Test for Identifying Binary Vulnerabilities Based on Key Basic Blocks.
IEEE Trans. Software Eng., December, 2023

Secrecy Performance Analysis of Backscatter Communications with Side Information.
Sensors, October, 2023

Digital Twin Enhanced Federated Reinforcement Learning With Lightweight Knowledge Distillation in Mobile Networks.
IEEE J. Sel. Areas Commun., October, 2023

SecDedup: Secure data deduplication with dynamic auditing in the cloud.
Inf. Sci., October, 2023

Graph Attention Network With Spatial-Temporal Clustering for Traffic Flow Forecasting in Intelligent Transportation System.
IEEE Trans. Intell. Transp. Syst., August, 2023

Hierarchical Federated Learning With Social Context Clustering-Based Participant Selection for Internet of Medical Things Applications.
IEEE Trans. Comput. Soc. Syst., August, 2023

ALSketch: An adaptive learning-based sketch for accurate network measurement under dynamic traffic distribution.
J. Netw. Comput. Appl., July, 2023

VeriORouting: Verification on intelligent routing outsourced to the cloud.
Inf. Sci., July, 2023

Efficient Bi-objective SQL Optimization for Enclaved Cloud Databases with Differentially Private Padding.
ACM Trans. Database Syst., June, 2023

LiVoAuth: Liveness Detection in Voiceprint Authentication With Random Challenges and Detection Modes.
IEEE Trans. Ind. Informatics, June, 2023

A Survey on Cross-chain Technologies.
Distributed Ledger Technol. Res. Pract., June, 2023

Decentralized P2P Federated Learning for Privacy-Preserving and Resilient Mobile Robotic Systems.
IEEE Wirel. Commun., April, 2023

Analysis of multimodal data fusion from an information theory perspective.
Inf. Sci., April, 2023

XAuth: Secure and Privacy-Preserving Cross-Domain Handover Authentication for 5G HetNets.
IEEE Internet Things J., April, 2023

A Survey on Blockchain-Based Trust Management for Internet of Things.
IEEE Internet Things J., April, 2023

ExtendedSketch+: Super host identification and network host trust evaluation with memory efficiency and high accuracy.
Inf. Fusion, April, 2023

SCIM: Incorporating secure communication and interference management in one operation.
Digit. Commun. Networks, April, 2023

AD-RCNN: Adaptive Dynamic Neural Network for Small Object Detection.
IEEE Internet Things J., March, 2023

Physical Model Informed Fault Detection and Diagnosis of Air Handling Units Based on Transformer Generative Adversarial Network.
IEEE Trans. Ind. Informatics, 2023

Security Analysis of Triangle Channel-Based Physical Layer Key Generation in Wireless Backscatter Communications.
IEEE Trans. Inf. Forensics Secur., 2023

VOLERE: Leakage Resilient User Authentication Based on Personal Voice Challenges.
IEEE Trans. Dependable Secur. Comput., 2023

VeriDedup: A Verifiable Cloud Data Deduplication Scheme With Integrity and Duplication Proof.
IEEE Trans. Dependable Secur. Comput., 2023

SofitMix: A Secure Offchain-Supported Bitcoin-Compatible Mixing Protocol.
IEEE Trans. Dependable Secur. Comput., 2023

ESMAC: Efficient and Secure Multi-Owner Access Control With TEE in Multi-Level Data Processing.
IEEE Trans. Dependable Secur. Comput., 2023

ADCaDeM: A Novel Method of Calculating Attack Damage Based on Differential Manifolds.
IEEE Trans. Dependable Secur. Comput., 2023

A survey on privacy preservation techniques for blockchain interoperability.
J. Syst. Archit., 2023

Guest Editorial Special Issue on AI and Blockchain-Powered IoT Sustainable Computing.
IEEE Internet Things J., 2023

An Experimental Investigation of Text-based CAPTCHA Attacks and Their Robustness.
ACM Comput. Surv., 2023

How Can Incentive Mechanisms and Blockchain Benefit with Each Other? A Survey.
ACM Comput. Surv., 2023

RaftFed: A Lightweight Federated Learning Framework for Vehicular Crowd Intelligence.
CoRR, 2023

A Survey on Automated Program Repair Techniques.
CoRR, 2023

A Summery of the First Workshop on Backscatter Communication Security in Internet of Things Environment.
Proceedings of the 9th IEEE World Forum on Internet of Things, 2023

Secure Wireless Powered Communications Under Fisher-Snedecor $\mathcal{F}$ Fading Channels.
Proceedings of the 9th IEEE World Forum on Internet of Things, 2023

A Survey on AI-Enabled Attacks and AI-Empowered Countermeasures in Physical Layer.
Proceedings of the 9th IEEE World Forum on Internet of Things, 2023

Cross-Border Data Security from the Perspective of Risk Assessment.
Proceedings of the Information Security Practice and Experience, 2023

Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft Biometrics.
Proceedings of the Information Security Practice and Experience, 2023

CustTest: An Effective Testbed for Testing Customized Routing in Integrated Heterogeneous Networks.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

BatAu: A Batch Authentication Scheme for Backscatter Devices in a Smart Home Network.
Proceedings of the IEEE International Conference on Communications, 2023

Demo Paper: Anonymous Authentication on Trust in Blockchain-Based Mobile Crowdsourcing System.
Proceedings of the IEEE International Conference on Blockchain, 2023

2022
Resource Allocation Optimization for Secure Multidevice Wirelessly Powered Backscatter Communication With Artificial Noise.
IEEE Trans. Wirel. Commun., 2022

Privacy Protection in 5G Positioning and Location-based Services Based on SGX.
ACM Trans. Sens. Networks, 2022

2D Federated Learning for Personalized Human Activity Recognition in Cyber-Physical-Social Systems.
IEEE Trans. Netw. Sci. Eng., 2022

Federated Transfer Learning Based Cross-Domain Prediction for Smart Manufacturing.
IEEE Trans. Ind. Informatics, 2022

CroApp: A CNN-Based Resource Optimization Approach in Edge Computing Environment.
IEEE Trans. Ind. Informatics, 2022

BCAuth: Physical Layer Enhanced Authentication and Attack Tracing for Backscatter Communications.
IEEE Trans. Inf. Forensics Secur., 2022

ExtendedSketch: Fusing Network Traffic for Super Host Identification With a Memory Efficient Sketch.
IEEE Trans. Dependable Secur. Comput., 2022

SuperSketch: A Multi-Dimensional Reversible Data Structure for Super Host Identification.
IEEE Trans. Dependable Secur. Comput., 2022

A Group-Based Distance Learning Method for Semisupervised Fuzzy Clustering.
IEEE Trans. Cybern., 2022

B4SDC: A Blockchain System for Security Data Collection in MANETs.
IEEE Trans. Big Data, 2022

A Survey on Integrity Auditing for Data Storage in the Cloud: From Single Copy to Multiple Replicas.
IEEE Trans. Big Data, 2022

Is Today's End-to-End Communication Security Enough for 5G and Its Beyond?
IEEE Netw., 2022

Guest Editorial: Trust, Security and Privacy of 6G.
IEEE Netw., 2022

Adversarial attacks and defenses in Speaker Recognition Systems: A survey.
J. Syst. Archit., 2022

A deep density based and self-determining clustering approach to label unknown traffic.
J. Netw. Comput. Appl., 2022

Efficient Privacy Protection Protocols for 5G-Enabled Positioning in Industrial IoT.
IEEE Internet Things J., 2022

GAIMMO: A Grade-Driven Auction-Based Incentive Mechanism With Multiple Objectives for Crowdsourcing Managed by Blockchain.
IEEE Internet Things J., 2022

Secure 5G Positioning With Truth Discovery, Attack Detection, and Tracing.
IEEE Internet Things J., 2022

Anonymous Authentication on Trust in Blockchain-Based Mobile Crowdsourcing.
IEEE Internet Things J., 2022

EPMDroid: Efficient and privacy-preserving malware detection based on SGX through data fusion.
Inf. Fusion, 2022

Applications of sketches in network traffic measurement: A survey.
Inf. Fusion, 2022

Guest editorial: Blockchain-enabled technologies for cyber-physical systems and big data applications.
Digit. Commun. Networks, 2022

A survey on blockchain-based integrity auditing for cloud data.
Digit. Commun. Networks, 2022

Security Vulnerabilities of SGX and Countermeasures: A Survey.
ACM Comput. Surv., 2022

A Survey on Trust Models in Heterogeneous Networks.
IEEE Commun. Surv. Tutorials, 2022

Framed Fidelity MAC: Losslessly packing multi-user transmissions in a virtual point-to-point framework.
Comput. Networks, 2022

VoiceSketch: a Privacy-Preserving Voiceprint Authentication System.
Proceedings of the IEEE International Conference on Trust, 2022

Software Side Channel Vulnerability Detection Based on Similarity Calculation and Deep Learning.
Proceedings of the IEEE International Conference on Trust, 2022

Deceiving Learning-based Sketches to Cause Inaccurate Frequency Estimation.
Proceedings of the IEEE International Conference on Trust, 2022

An Efficient and Secure Scheme of Verifiable Computation for Intel SGX.
Proceedings of the IEEE International Conference on Trust, 2022

A Survey on Data Security in Network Storage Systems.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022

A Two-layer Game-based Incentive Mechanism for Decentralized Crowdsourcing.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Exploiting Interactions of Multiple Interference for Cooperative Interference Alignment.
IEEE Trans. Wirel. Commun., 2021

Two-Layer Federated Learning With Heterogeneous Model Aggregation for 6G Supported Internet of Vehicles.
IEEE Trans. Veh. Technol., 2021

Secure Outsourced Principal Eigentensor Computation for Cyber-Physical-Social Systems.
IEEE Trans. Sustain. Comput., 2021

Investigating the Adoption of Hybrid Encrypted Cloud Data Deduplication With Game Theory.
IEEE Trans. Parallel Distributed Syst., 2021

QShield: Protecting Outsourced Cloud Data Queries With Multi-User Access Control Based on SGX.
IEEE Trans. Parallel Distributed Syst., 2021

Controlling Neural Learning Network with Multiple Scales for Image Splicing Forgery Detection.
ACM Trans. Multim. Comput. Commun. Appl., 2021

Social-Chain: Decentralized Trust Evaluation Based on Blockchain in Pervasive Social Networking.
ACM Trans. Internet Techn., 2021

Guest Editorial Introduction to the Special Section on Blockchain in Future Networks and Vertical Industries.
IEEE Trans. Netw. Sci. Eng., 2021

An Improved Secure High-Order-Lanczos Based Orthogonal Tensor SVD for Outsourced Cyber-Physical-Social Big Data Reduction.
IEEE Trans. Big Data, 2021

Attacks and defenses in user authentication systems: A survey.
J. Netw. Comput. Appl., 2021

Deep-Learning-Enhanced Multitarget Detection for End-Edge-Cloud Surveillance in Smart IoT.
IEEE Internet Things J., 2021

Is 5G Handover Secure and Private? A Survey.
IEEE Internet Things J., 2021

Redundancy Removing Aggregation Network With Distance Calibration for Video Face Recognition.
IEEE Internet Things J., 2021

Network traffic classification for data fusion: A survey.
Inf. Fusion, 2021

SeDID: An SGX-enabled decentralized intrusion detection framework for network trust evaluation.
Inf. Fusion, 2021

Data Fusion for Trust Evaluation.
Inf. Fusion, 2021

Privacy preservation in permissionless blockchain: A survey.
Digit. Commun. Networks, 2021

Blockchain-based data transmission control for Tactical Data Link.
Digit. Commun. Networks, 2021

A Survey on Trust Evaluation Based on Machine Learning.
ACM Comput. Surv., 2021

Security Threats and Countermeasures of Unmanned Aerial Vehicle Communications.
IEEE Commun. Stand. Mag., 2021

An efficient and secure scheme of verifiable computation for Intel SGX.
CoRR, 2021

Improving Data Generalization With Variational Autoencoders for Network Traffic Anomaly Detection.
IEEE Access, 2021

Secure Outsourced Top-k Selection Queries against Untrusted Cloud Service Providers.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

Physical Layer Key Generation between Backscatter Devices over Ambient RF Signals.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

Interpretation-enabled Software Reuse Detection Based on a Multi-Level Birthmark Model.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

Message from the DependSys 2021 General Chairs.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

Privacy-preserving D2D Cooperative Location Verification.
Proceedings of the IEEE Global Communications Conference, 2021

2020
Privacy protection in mobile crowd sensing: a survey.
World Wide Web, 2020

A survey on data provenance in IoT.
World Wide Web, 2020

Inside-Out Precoding to Manage Multiple Interferences From the Same Source.
IEEE Trans. Veh. Technol., 2020

An Extended Framework of Privacy-Preserving Computation With Flexible Access Control.
IEEE Trans. Netw. Serv. Manag., 2020

HO-OTSVD: A Novel Tensor Decomposition and Its Incremental Decomposition for Cyber-Physical-Social Networks (CPSN).
IEEE Trans. Netw. Sci. Eng., 2020

Guest Editorial: Blockchain and Healthcare Computing.
IEEE J. Biomed. Health Informatics, 2020

Lightweighted Secure Searching Over Public-Key Ciphertexts for Edge-Cloud-Assisted Industrial IoT Devices.
IEEE Trans. Ind. Informatics, 2020

Editorial: Blockchain in Industrial IoT Applications: Security and Privacy Advances, Challenges, and Opportunities.
IEEE Trans. Ind. Informatics, 2020

Privacy-Preserving Data Processing with Flexible Access Control.
IEEE Trans. Dependable Secur. Comput., 2020

An Adaptive Network Data Collection System in SDN.
IEEE Trans. Cogn. Commun. Netw., 2020

Game Theoretical Analysis on Acceptance of a Cloud Data Access Control System Based on Reputation.
IEEE Trans. Cloud Comput., 2020

AI-driven data security and privacy.
J. Netw. Comput. Appl., 2020

An Adaptive Security Data Collection and Composition Recognition method for security measurement over LTE/LTE-A networks.
J. Netw. Comput. Appl., 2020

Privacy-preserving federated <i>k</i>-means for proactive caching in next generation cellular networks.
Inf. Sci., 2020

A privacy-preserving cryptosystem for IoT E-healthcare.
Inf. Sci., 2020

LSAA: A Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks.
IEEE Internet Things J., 2020

Data fusion in heterogeneous networks.
Inf. Fusion, 2020

A survey on machine learning for data fusion.
Inf. Fusion, 2020

Multi-objective optimization for rebalancing virtual machine placement.
Future Gener. Comput. Syst., 2020

Editorial: Special issue on blockchain and communication networks.
Digit. Commun. Networks, 2020

6G White paper: Research challenges for Trust, Security and Privacy.
CoRR, 2020

A trust management framework for software-defined network applications.
Concurr. Comput. Pract. Exp., 2020

Editorial: Special issue on SDN-based wireless network virtualization.
Concurr. Comput. Pract. Exp., 2020

Game theoretical study on client-controlled cloud data deduplication.
Comput. Secur., 2020

IEEE Access Special Section Editorial: Trusted Computing.
IEEE Access, 2020

IEEE Access Special Section: Security Analytics and Intelligence for Cyber Physical Systems.
IEEE Access, 2020

Revisiting the Challenges and Opportunities in Software Plagiarism Detection.
Proceedings of the 27th IEEE International Conference on Software Analysis, 2020

Trusted Network Slicing among Multiple Mobile Network Operators.
Proceedings of the 19th IEEE International Conference on Trust, 2020

AnonyTrust: An Anonymous Trust Authentication System for Pervasive Social Networking.
Proceedings of the Security and Privacy in Digital Economy, 2020

B4SDC: A Blockchain System for Security Data Collection in MANETs.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Verifiable Edge Computing for Indoor Positioning.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Privacy-preserving Computation over Encrypted Vectors.
Proceedings of the IEEE Global Communications Conference, 2020

TDL-Chain: An Intelligent Data Transmission Control System in Tactical Data Link Based on Blockchain.
Proceedings of the IEEE International Conference on Blockchain, 2020

2019
Efficient LBS queries with mutual privacy preservation in IoV.
Veh. Commun., 2019

Game Theoretical Analysis on Encrypted Cloud Data Deduplication.
IEEE Trans. Ind. Informatics, 2019

Securing Communication Data in Pervasive Social Networking Based on Trust with KP-ABE.
ACM Trans. Cyber Phys. Syst., 2019

Heterogeneous Data Storage Management with Deduplication in Cloud Computing.
IEEE Trans. Big Data, 2019

AI-Driven Cyber Security Analytics and Privacy Protection.
Secur. Commun. Networks, 2019

Adaptive security-related data collection with context awareness.
J. Netw. Comput. Appl., 2019

A reversible sketch-based method for detecting and mitigating amplification attacks.
J. Netw. Comput. Appl., 2019

Conditional privacy-preserving authentication and key agreement scheme for roaming services in VANETs.
J. Inf. Secur. Appl., 2019

Verifiable outsourced computation over encrypted data.
Inf. Sci., 2019

Identifying suspicious groups of affiliated-transaction-based tax evasion in big data.
Inf. Sci., 2019

Data Collection for Security Measurement in Wireless Sensor Networks: A Survey.
IEEE Internet Things J., 2019

A Survey on Secure Data Analytics in Edge Computing.
IEEE Internet Things J., 2019

Interference Steering to Manage Interference in IoT.
IEEE Internet Things J., 2019

Blockchain-Based Secure Time Protection Scheme in IoT.
IEEE Internet Things J., 2019

Network traffic fusion and analysis against DDoS flooding attacks with a novel reversible sketch.
Inf. Fusion, 2019

A survey on data fusion in internet of things: Towards secure and privacy-preserving fusion.
Inf. Fusion, 2019

A survey on game theoretical methods in Human-Machine Networks.
Future Gener. Comput. Syst., 2019

A blockchain-based clock synchronization Scheme in IoT.
Future Gener. Comput. Syst., 2019

MCS-Chain: Decentralized and trustworthy mobile crowdsourcing based on blockchain.
Future Gener. Comput. Syst., 2019

Enjoy the Untrusted Cloud: A Secure, Scalable and Efficient SQL-like Query Framework for Outsourcing Data.
CoRR, 2019

Security Data Collection and Data Analytics in the Internet: A Survey.
IEEE Commun. Surv. Tutorials, 2019

IEEE Access Special Section Editorial: Internet-of-Things Big Data Trust Management.
IEEE Access, 2019

A Survey on Biometric Authentication: Toward Secure and Privacy-Preserving Identification.
IEEE Access, 2019

Performance Evaluation of a Combined Anomaly Detection Platform.
IEEE Access, 2019

IEEE Access Special Section Editorial: Recent Advances in Computational Intelligence Paradigms for Security and Privacy for Fog and Mobile Edge Computing.
IEEE Access, 2019

AAKA-D2D: Anonymous Authentication and Key Agreement Protocol in D2D Communications.
Proceedings of the 2019 IEEE SmartWorld, 2019

Game Theoretical Study on a Client-Controlled Deduplication Scheme.
Proceedings of the 2019 IEEE SmartWorld, 2019

A Security Formal Model for Multiple Channels Communication.
Proceedings of the 2019 IEEE SmartWorld, 2019

A Study and Enhancement to the Security of MANET AODV Protocol Against Black Hole Attacks.
Proceedings of the 2019 IEEE SmartWorld, 2019

Detection of Application-Layer Tunnels with Rules and Machine Learning.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

Network Data Collection, Fusion, Mining and Analytics for Cyber Security.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

Quantifiable Network Security Measurement: A Study Based on an Index System.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

Optimal Resource Allocation for Secure Multi-User Wireless Powered Backscatter Communication with Artificial Noise.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Computing Maximum and Minimum with Privacy Preservation and Flexible Access Control.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

PriRoster: Privacy-preserving Radio Context Attestation in Cognitive Radio Networks.
Proceedings of the 2019 IEEE International Symposium on Dynamic Spectrum Access Networks, 2019

Encrypted Big Data Deduplication in Cloud Storage.
Proceedings of the Smart Data: State-of-the-Art Perspectives in Computing and Applications, 2019

2018
An Efficient Deep Learning Model to Predict Cloud Workload for Industry Informatics.
IEEE Trans. Ind. Informatics, 2018

Privacy-Preserving Authentication and Key Agreement Protocols for D2D Group Communications.
IEEE Trans. Ind. Informatics, 2018

A survey on dynamic mobile malware detection.
Softw. Qual. J., 2018

Security Measurements of Cyber Networks.
Secur. Commun. Networks, 2018

Data Fusion for Network Intrusion Detection: A Review.
Secur. Commun. Networks, 2018

A privacy-preserving mobile application recommender system based on trust evaluation.
J. Comput. Sci., 2018

A survey on network data collection.
J. Netw. Comput. Appl., 2018

Data collection for attack detection and security measurement in Mobile Ad Hoc Networks: A survey.
J. Netw. Comput. Appl., 2018

A novel scheme of anonymous authentication on trust in Pervasive Social Networking.
Inf. Sci., 2018

DedupDUM: Secure and scalable data deduplication with dynamic user management.
Inf. Sci., 2018

Guest Editorial Special Issue on Trust, Security, and Privacy in Crowdsourcing.
IEEE Internet Things J., 2018

A Survey on Security, Privacy, and Trust in Mobile Crowdsourcing.
IEEE Internet Things J., 2018

Big data fusion in Internet of Things.
Inf. Fusion, 2018

Flexible data access control in D2D communications.
Future Gener. Comput. Syst., 2018

AutoPrivacy: Automatic privacy protection and tagging suggestion for mobile social photo.
Comput. Secur., 2018

IEEE Access Special Section Editorial: Trust Management in Pervasive Social Networking (TruPSN).
IEEE Access, 2018

Trusted Cooperation Among Virtual Base Stations in C-RAN.
IEEE Access, 2018

Predict Pairwise Trust Based on Machine Learning in Online Social Networks: A Survey.
IEEE Access, 2018

A Survey on Network Security-Related Data Collection Technologies.
IEEE Access, 2018

LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey.
IEEE Access, 2018

IRTED-TL: An Inter-Region Tax Evasion Detection Method Based on Transfer Learning.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Secure Time Synchronization Scheme in IoT Based on Blockchain.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

A Study and Simulation Research of Blackhole Attack on Mobile AdHoc Network.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Flexible Data Access Control Based on Trust and Reputation in Cloud Computing.
IEEE Trans. Cloud Comput., 2017

Protect Pervasive Social Networking Based on Two-Dimensional Trust Levels.
IEEE Syst. J., 2017

Guest Editorial Data Mining in Cyber, Physical, and Social Computing.
IEEE Syst. J., 2017

A Survey of Verifiable Computation.
Mob. Networks Appl., 2017

Editorial: Mobile Multimedia Communications.
Mob. Networks Appl., 2017

UAKA-D2D: Universal Authentication and Key Agreement Protocol in D2D Communications.
Mob. Networks Appl., 2017

A Survey on Security in D2D Communications.
Mob. Networks Appl., 2017

An Automata Based Intrusion Detection Method for Internet of Things.
Mob. Inf. Syst., 2017

A hybrid approach of mobile malware detection in Android.
J. Parallel Distributed Comput., 2017

CloudFile: A cloud data access control system based on mobile social trust.
J. Netw. Comput. Appl., 2017

Special issue on pervasive social networking.
J. Netw. Comput. Appl., 2017

Cryptography and Data Security in Cloud Computing.
Inf. Sci., 2017

Encrypted data processing with Homomorphic Re-Encryption.
Inf. Sci., 2017

Fusing and mining opinions for reputation generation.
Inf. Fusion, 2017

Privacy-preserving trust management for unwanted traffic control.
Future Gener. Comput. Syst., 2017

Object detection among multimedia big data in the compressive measurement domain under mobile distributed architecture.
Future Gener. Comput. Syst., 2017

A secure SDN based multi-RANs architecture for future 5G networks.
Comput. Secur., 2017

Context-Aware Verifiable Cloud Computing.
IEEE Access, 2017

Machine Learning-Based Malicious Application Detection of Android.
IEEE Access, 2017

A Survey on C-RAN Security.
IEEE Access, 2017

From Cloud to Fog Computing: A Review and a Conceptual Live VM Migration Framework.
IEEE Access, 2017

Anonymous Authentication on Trust in Pervasive Social Networking Based on Group Signature.
IEEE Access, 2017

TIM: A Trust Insurance Mechanism for Network Function Virtualization Based on Trusted Computing.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Survey on Big Data Analysis Algorithms for Network Security Measurement.
Proceedings of the Network and System Security - 11th International Conference, 2017

Mining Suspicious Tax Evasion Groups in a Corporate Governance Network.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2017

Secure Encrypted Data Deduplication with Ownership Proof and User Revocation.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2017

PerRec: A Permission Configuration Recommender System for Mobile Apps.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2017

An Orchestrated Security Platform for Internet of Robots.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

CDController: A Cloud Data Access Control System Based on Reputation.
Proceedings of the 2017 IEEE International Conference on Computer and Information Technology, 2017

Dynamic MAC Protocol for Tactical Data Links.
Proceedings of the 2017 IEEE International Conference on Computer and Information Technology, 2017

2016
Editorial: Trust Management for Multimedia Big Data.
ACM Trans. Multim. Comput. Commun. Appl., 2016

Trustworthy Authentication on Scalable Surveillance Video with Background Model Support.
ACM Trans. Multim. Comput. Commun. Appl., 2016

A Tensor-Based Framework for Software-Defined Cloud Data Center.
ACM Trans. Multim. Comput. Commun. Appl., 2016

Deduplication on Encrypted Big Data in Cloud.
IEEE Trans. Big Data, 2016

A security and trust framework for virtualized networks and software-defined networking.
Secur. Commun. Networks, 2016

SecIoT: a security framework for the Internet of Things.
Secur. Commun. Networks, 2016

Key technologies for 5G, the next generation of mobile networks and services.
Int. J. Commun. Syst., 2016

Security protocols in body sensor networks using visible light communications.
Int. J. Commun. Syst., 2016

Two Schemes of Privacy-Preserving Trust Evaluation.
Future Gener. Comput. Syst., 2016

Encrypted Data Management with Deduplication in Cloud Computing.
IEEE Cloud Comput., 2016

Secure Pervasive Social Communications Based on Trust in a Distributed Way.
IEEE Access, 2016

A Survey on Future Internet Security Architectures.
IEEE Access, 2016

Security in Software-Defined-Networking: A Survey.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

Privacy Protection in Mobile Recommender Systems: A Survey.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

Game Theoretical Analysis on System Adoption and Acceptance: A Review.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

Security and Privacy in Big Data Lifetime: A Review.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

A Survey on Trust Evaluation in E-commerce.
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016

Trust Evaluation in Social Networking: A Review.
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016

A Survey on Trust Evaluation in Mobile Ad Hoc Networks.
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016

A Survey on Software-Defined Networking Security.
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016

A Usable Authentication System Based on Personal Voice Challenge.
Proceedings of the International Conference on Advanced Cloud and Big Data, 2016

2015
PSNController: An Unwanted Content Control System in Pervasive Social Networking Based on Trust Management.
ACM Trans. Multim. Comput. Commun. Appl., 2015

Anonymous Authentication for Trustworthy Pervasive Social Networking.
IEEE Trans. Comput. Soc. Syst., 2015

Editorial: Recent Advances on the Next Generation of Mobile Networks and Services.
Mob. Networks Appl., 2015

Controlling Cloud Data Access Based on Reputation.
Mob. Networks Appl., 2015

A Weighted Semi-Distributed Routing Algorithm for LEO satellite networks.
J. Netw. Comput. Appl., 2015

An approach to rank reviews by fusing and mining opinions based on review pertinence.
Inf. Fusion, 2015

Fusion - An aide to data mining in Internet of Things.
Inf. Fusion, 2015

Software Defined Intelligent Building.
Int. J. Inf. Secur. Priv., 2015

Trustworthy data fusion and mining in Internet of Things.
Future Gener. Comput. Syst., 2015

TruSMS: A trustworthy SMS spam control system based on trust management.
Future Gener. Comput. Syst., 2015

Security in D2D Communications: A Review.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

CloudRec: A Mobile Cloud Service Recommender System Based on Adaptive QoS Management.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Study of IEEE 802.15.6 Association Protocols.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Scheme to Manage Encrypted Data Storage with Deduplication in Cloud.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
PerContRep: a practical reputation system for pervasive content services.
J. Supercomput., 2014

A generic solution for unwanted traffic control through trust management.
New Rev. Hypermedia Multim., 2014

A survey on trust management for Internet of Things.
J. Netw. Comput. Appl., 2014

Editorial: Special issue on trust in cyber, physical and social computing.
Comput. Secur., 2014

Analysis on the acceptance of Global Trust Management for unwanted traffic control based on game theory.
Comput. Secur., 2014

Personal Data Access Based on Trust Assessment in Mobile Social Networking.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Implementation of a Trust-Behavior Based Reputation System for Mobile Applications.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

A Scheme to Secure Instant Community Data Access Based on Trust and Contexts.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

Security Related Data Mining.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

An Analytic Hierarchy Process Algorithm for Cloud Based Wi-Fi Offloading.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

A Review on Privacy-Preserving Data Mining.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

2013
Exploring the impact of trust information visualization on mobile application usage.
Pers. Ubiquitous Comput., 2013

A practical reputation system for pervasive social chatting.
J. Comput. Syst. Sci., 2013

Human interactive secure key and identity exchange protocols in body sensor networks.
IET Inf. Secur., 2013

A Research Model for Trustworthy Pervasive Social Networking.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Unwanted Content Control via Trust Management in Pervasive Social Networking.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Game Theoretical Analysis of the Acceptance of Global Trust Management for Unwanted Traffic Control.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Implementation of an SMS Spam Control System Based on Trust Management.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Secure pervasive social networking based on multi-dimensional trust levels.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
TruBeRepec: a trust-behavior-based reputation and recommender system for mobile applications.
Pers. Ubiquitous Comput., 2012

An approach of secure and fashionable recognition for pervasive face-to-face social communications.
Proceedings of the 8th IEEE International Conference on Wireless and Mobile Computing, 2012

Unwanted Traffic Control via Hybrid Trust Management.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Gemini: A Handbag for Pervasive Social Communications.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Implementation of an Evaluation Platform for Unwanted Traffic Control via Trust Management.
Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, 2012

2011
Autonomic Trust Management for a Component-Based Software System.
IEEE Trans. Dependable Secur. Comput., 2011

Message Receiver Determination in Multiple Simultaneous IM Conversations.
IEEE Intell. Syst., 2011

AdPriRec: A Context-Aware Recommender System for User Privacy in MANET Services.
Proceedings of the Ubiquitous Intelligence and Computing - 8th International Conference, 2011

Building up Trusted Identity Management in Mobile Heterogeneous Environment.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Theoretical Issues in the Study of Trust in Human-Computer Interaction.
Proceedings of the IEEE 10th International Conference on Trust, 2011

A Research Model for Human-Computer Trust Interaction.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Unwanted Traffic Control via Global Trust Management.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Implementation of a Reputation System for Pervasive Social Networking.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Trust Behavior Based Recommender System for Software Usage.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011

A QoS-aware system for mobile cloud computing.
Proceedings of the 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, 2011

2010
Security via Trusted Communications.
Proceedings of the Handbook of Information and Communication Security, 2010

AdContRep: A Privacy Enhanced Reputation System for MANET Content Services.
Proceedings of the Ubiquitous Intelligence and Computing - 7th International Conference, 2010

A Methodology to Predicate Human-Being's Movement Based on Movement Group.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

Effects of Displaying Trust Information on Mobile Application Usage.
Proceedings of the Autonomic and Trusted Computing - 7th International Conference, 2010

2009
Exploring Trust of Mobile Applications Based on User Behaviors.
Proceedings of the Trusted Systems, First International Conference, 2009

Formalizing Trust Based on Usage Behaviours for Mobile Applications.
Proceedings of the Autonomic and Trusted Computing, 6th International Conference, 2009

A Methodology towards Usable Trust Management.
Proceedings of the Autonomic and Trusted Computing, 6th International Conference, 2009

2008
Autonomic Trust Management for a Pervasive System.
Proceedings of the SECRYPT 2008, 2008

A User Behavior Based Trust Model for Mobile Applications.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

2007
Predicting Trustworthiness for Component Software.
Proceedings of the Third International Workshop on Security, 2007

An Adaptive Trust Control Model for a Trustworthy Component Software Platform.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

2006
A Conceptual Architecture of a Trusted Mobile Environment.
Proceedings of the Second International Workshop on Security, 2006

Autonomic Trust Management in a Component Based Software System.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

2004
A Mechanism for Trust Sustainability Among Trusted Computing Platforms.
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004

2003
Methodology to Bridge Different Domains of Trust in Mobile Communications.
Proceedings of the Trust Management, First International Conference, 2003


  Loading...