Zheng Yan
Orcid: 0000-0002-9697-2108Affiliations:
- Xidian University, School of Cyber Engineering, State Key Laboratory on Integrated Services Networks, Xi'an, China
- Aalto University, Espoo, Finland (former)
- Nokia Research Center, Helsinki, Finland (former)
- Helsinki University of Technology, Finland (PhD 2007)
According to our database1,
Zheng Yan
authored at least 335 papers
between 2003 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2025
ACM Comput. Surv., March, 2025
Evolving Paradigms in Automated Program Repair: Taxonomy, Challenges, and Opportunities.
ACM Comput. Surv., February, 2025
2024
IEEE Trans. Mob. Comput., December, 2024
Reconstructed Graph Neural Network With Knowledge Distillation for Lightweight Anomaly Detection.
IEEE Trans. Neural Networks Learn. Syst., September, 2024
Exploiting Interference With an Intelligent Reflecting Surface to Enhance Data Transmission.
IEEE Trans. Wirel. Commun., August, 2024
IEEE Commun. Lett., August, 2024
IEEE Wirel. Commun., June, 2024
IEEE Trans. Ind. Informatics, April, 2024
EDDAC: An Efficient and Decentralized Data Access Control Scheme With Attribute Privacy Preservation.
IEEE Internet Things J., April, 2024
IEEE Netw., January, 2024
IEEE Trans. Netw. Sci. Eng., 2024
BatchAuth: A Physical Layer Batch Authentication Scheme for Multiple Backscatter Devices.
IEEE Trans. Inf. Forensics Secur., 2024
iCoding: Countermeasure Against Interference and Eavesdropping in Wireless Communications.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
TrustGuard: GNN-Based Robust and Explainable Trust Evaluation With Dynamicity Support.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
SecFed: A Secure and Efficient Federated Learning Based on Multi-Key Homomorphic Encryption.
IEEE Trans. Dependable Secur. Comput., 2024
Federated distillation and blockchain empowered secure knowledge sharing for Internet of medical Things.
Inf. Sci., 2024
IACR Cryptol. ePrint Arch., 2024
A survey on blockchain-enabled federated learning and its prospects with digital twin.
Digit. Commun. Networks, 2024
Physical Layer Mutual Authentication in RIS-Aided Monostatic Backscatter Communications: A Dual-Edged Analysis.
CoRR, 2024
MapComp: A Secure View-based Collaborative Analytics Framework for Join-Group-Aggregation.
CoRR, 2024
Proceedings of the 20th International Conference on Wireless and Mobile Computing, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE International Conference on Communications, 2024
Proceedings of the IEEE International Conference on Communications, 2024
Use or Not: A Qualitative Study on the User Adoption and Abandonment of Voice Shopping with Smart Speakers.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
2023
PatchDiscovery: Patch Presence Test for Identifying Binary Vulnerabilities Based on Key Basic Blocks.
IEEE Trans. Software Eng., December, 2023
Sensors, October, 2023
Digital Twin Enhanced Federated Reinforcement Learning With Lightweight Knowledge Distillation in Mobile Networks.
IEEE J. Sel. Areas Commun., October, 2023
Inf. Sci., October, 2023
Graph Attention Network With Spatial-Temporal Clustering for Traffic Flow Forecasting in Intelligent Transportation System.
IEEE Trans. Intell. Transp. Syst., August, 2023
Hierarchical Federated Learning With Social Context Clustering-Based Participant Selection for Internet of Medical Things Applications.
IEEE Trans. Comput. Soc. Syst., August, 2023
ALSketch: An adaptive learning-based sketch for accurate network measurement under dynamic traffic distribution.
J. Netw. Comput. Appl., July, 2023
Inf. Sci., July, 2023
Efficient Bi-objective SQL Optimization for Enclaved Cloud Databases with Differentially Private Padding.
ACM Trans. Database Syst., June, 2023
LiVoAuth: Liveness Detection in Voiceprint Authentication With Random Challenges and Detection Modes.
IEEE Trans. Ind. Informatics, June, 2023
Distributed Ledger Technol. Res. Pract., June, 2023
Decentralized P2P Federated Learning for Privacy-Preserving and Resilient Mobile Robotic Systems.
IEEE Wirel. Commun., April, 2023
Inf. Sci., April, 2023
XAuth: Secure and Privacy-Preserving Cross-Domain Handover Authentication for 5G HetNets.
IEEE Internet Things J., April, 2023
IEEE Internet Things J., April, 2023
ExtendedSketch+: Super host identification and network host trust evaluation with memory efficiency and high accuracy.
Inf. Fusion, April, 2023
SCIM: Incorporating secure communication and interference management in one operation.
Digit. Commun. Networks, April, 2023
IEEE Internet Things J., March, 2023
Physical Model Informed Fault Detection and Diagnosis of Air Handling Units Based on Transformer Generative Adversarial Network.
IEEE Trans. Ind. Informatics, 2023
Security Analysis of Triangle Channel-Based Physical Layer Key Generation in Wireless Backscatter Communications.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
VeriDedup: A Verifiable Cloud Data Deduplication Scheme With Integrity and Duplication Proof.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
ESMAC: Efficient and Secure Multi-Owner Access Control With TEE in Multi-Level Data Processing.
IEEE Trans. Dependable Secur. Comput., 2023
ADCaDeM: A Novel Method of Calculating Attack Damage Based on Differential Manifolds.
IEEE Trans. Dependable Secur. Comput., 2023
J. Syst. Archit., 2023
Guest Editorial Special Issue on AI and Blockchain-Powered IoT Sustainable Computing.
IEEE Internet Things J., 2023
ACM Comput. Surv., 2023
ACM Comput. Surv., 2023
RaftFed: A Lightweight Federated Learning Framework for Vehicular Crowd Intelligence.
CoRR, 2023
A Summery of the First Workshop on Backscatter Communication Security in Internet of Things Environment.
Proceedings of the 9th IEEE World Forum on Internet of Things, 2023
Secure Wireless Powered Communications Under Fisher-Snedecor $\mathcal{F}$ Fading Channels.
Proceedings of the 9th IEEE World Forum on Internet of Things, 2023
Proceedings of the 9th IEEE World Forum on Internet of Things, 2023
Proceedings of the Information Security Practice and Experience, 2023
Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft Biometrics.
Proceedings of the Information Security Practice and Experience, 2023
CustTest: An Effective Testbed for Testing Customized Routing in Integrated Heterogeneous Networks.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
BatAu: A Batch Authentication Scheme for Backscatter Devices in a Smart Home Network.
Proceedings of the IEEE International Conference on Communications, 2023
Demo Paper: Anonymous Authentication on Trust in Blockchain-Based Mobile Crowdsourcing System.
Proceedings of the IEEE International Conference on Blockchain, 2023
2022
Resource Allocation Optimization for Secure Multidevice Wirelessly Powered Backscatter Communication With Artificial Noise.
IEEE Trans. Wirel. Commun., 2022
ACM Trans. Sens. Networks, 2022
2D Federated Learning for Personalized Human Activity Recognition in Cyber-Physical-Social Systems.
IEEE Trans. Netw. Sci. Eng., 2022
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Ind. Informatics, 2022
BCAuth: Physical Layer Enhanced Authentication and Attack Tracing for Backscatter Communications.
IEEE Trans. Inf. Forensics Secur., 2022
ExtendedSketch: Fusing Network Traffic for Super Host Identification With a Memory Efficient Sketch.
IEEE Trans. Dependable Secur. Comput., 2022
SuperSketch: A Multi-Dimensional Reversible Data Structure for Super Host Identification.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Cybern., 2022
IEEE Trans. Big Data, 2022
A Survey on Integrity Auditing for Data Storage in the Cloud: From Single Copy to Multiple Replicas.
IEEE Trans. Big Data, 2022
IEEE Netw., 2022
J. Syst. Archit., 2022
A deep density based and self-determining clustering approach to label unknown traffic.
J. Netw. Comput. Appl., 2022
IEEE Internet Things J., 2022
GAIMMO: A Grade-Driven Auction-Based Incentive Mechanism With Multiple Objectives for Crowdsourcing Managed by Blockchain.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
EPMDroid: Efficient and privacy-preserving malware detection based on SGX through data fusion.
Inf. Fusion, 2022
Guest editorial: Blockchain-enabled technologies for cyber-physical systems and big data applications.
Digit. Commun. Networks, 2022
Digit. Commun. Networks, 2022
ACM Comput. Surv., 2022
IEEE Commun. Surv. Tutorials, 2022
Framed Fidelity MAC: Losslessly packing multi-user transmissions in a virtual point-to-point framework.
Comput. Networks, 2022
Proceedings of the IEEE International Conference on Trust, 2022
Software Side Channel Vulnerability Detection Based on Similarity Calculation and Deep Learning.
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022
Proceedings of the IEEE Global Communications Conference, 2022
2021
Exploiting Interactions of Multiple Interference for Cooperative Interference Alignment.
IEEE Trans. Wirel. Commun., 2021
Two-Layer Federated Learning With Heterogeneous Model Aggregation for 6G Supported Internet of Vehicles.
IEEE Trans. Veh. Technol., 2021
Secure Outsourced Principal Eigentensor Computation for Cyber-Physical-Social Systems.
IEEE Trans. Sustain. Comput., 2021
Investigating the Adoption of Hybrid Encrypted Cloud Data Deduplication With Game Theory.
IEEE Trans. Parallel Distributed Syst., 2021
QShield: Protecting Outsourced Cloud Data Queries With Multi-User Access Control Based on SGX.
IEEE Trans. Parallel Distributed Syst., 2021
Controlling Neural Learning Network with Multiple Scales for Image Splicing Forgery Detection.
ACM Trans. Multim. Comput. Commun. Appl., 2021
Social-Chain: Decentralized Trust Evaluation Based on Blockchain in Pervasive Social Networking.
ACM Trans. Internet Techn., 2021
Guest Editorial Introduction to the Special Section on Blockchain in Future Networks and Vertical Industries.
IEEE Trans. Netw. Sci. Eng., 2021
An Improved Secure High-Order-Lanczos Based Orthogonal Tensor SVD for Outsourced Cyber-Physical-Social Big Data Reduction.
IEEE Trans. Big Data, 2021
J. Netw. Comput. Appl., 2021
Deep-Learning-Enhanced Multitarget Detection for End-Edge-Cloud Surveillance in Smart IoT.
IEEE Internet Things J., 2021
Redundancy Removing Aggregation Network With Distance Calibration for Video Face Recognition.
IEEE Internet Things J., 2021
SeDID: An SGX-enabled decentralized intrusion detection framework for network trust evaluation.
Inf. Fusion, 2021
Digit. Commun. Networks, 2021
Digit. Commun. Networks, 2021
IEEE Commun. Stand. Mag., 2021
Improving Data Generalization With Variational Autoencoders for Network Traffic Anomaly Detection.
IEEE Access, 2021
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
Interpretation-enabled Software Reuse Detection Based on a Multi-Level Birthmark Model.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021
Proceedings of the IEEE Global Communications Conference, 2021
2020
IEEE Trans. Veh. Technol., 2020
An Extended Framework of Privacy-Preserving Computation With Flexible Access Control.
IEEE Trans. Netw. Serv. Manag., 2020
HO-OTSVD: A Novel Tensor Decomposition and Its Incremental Decomposition for Cyber-Physical-Social Networks (CPSN).
IEEE Trans. Netw. Sci. Eng., 2020
IEEE J. Biomed. Health Informatics, 2020
Lightweighted Secure Searching Over Public-Key Ciphertexts for Edge-Cloud-Assisted Industrial IoT Devices.
IEEE Trans. Ind. Informatics, 2020
Editorial: Blockchain in Industrial IoT Applications: Security and Privacy Advances, Challenges, and Opportunities.
IEEE Trans. Ind. Informatics, 2020
IEEE Trans. Dependable Secur. Comput., 2020
IEEE Trans. Cogn. Commun. Netw., 2020
Game Theoretical Analysis on Acceptance of a Cloud Data Access Control System Based on Reputation.
IEEE Trans. Cloud Comput., 2020
An Adaptive Security Data Collection and Composition Recognition method for security measurement over LTE/LTE-A networks.
J. Netw. Comput. Appl., 2020
Privacy-preserving federated <i>k</i>-means for proactive caching in next generation cellular networks.
Inf. Sci., 2020
LSAA: A Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks.
IEEE Internet Things J., 2020
Future Gener. Comput. Syst., 2020
Digit. Commun. Networks, 2020
Concurr. Comput. Pract. Exp., 2020
Concurr. Comput. Pract. Exp., 2020
Comput. Secur., 2020
IEEE Access Special Section: Security Analytics and Intelligence for Cyber Physical Systems.
IEEE Access, 2020
Proceedings of the 27th IEEE International Conference on Software Analysis, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
AnonyTrust: An Anonymous Trust Authentication System for Pervasive Social Networking.
Proceedings of the Security and Privacy in Digital Economy, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the IEEE Global Communications Conference, 2020
TDL-Chain: An Intelligent Data Transmission Control System in Tactical Data Link Based on Blockchain.
Proceedings of the IEEE International Conference on Blockchain, 2020
2019
IEEE Trans. Ind. Informatics, 2019
Securing Communication Data in Pervasive Social Networking Based on Trust with KP-ABE.
ACM Trans. Cyber Phys. Syst., 2019
IEEE Trans. Big Data, 2019
Secur. Commun. Networks, 2019
J. Netw. Comput. Appl., 2019
J. Netw. Comput. Appl., 2019
Conditional privacy-preserving authentication and key agreement scheme for roaming services in VANETs.
J. Inf. Secur. Appl., 2019
Identifying suspicious groups of affiliated-transaction-based tax evasion in big data.
Inf. Sci., 2019
IEEE Internet Things J., 2019
Network traffic fusion and analysis against DDoS flooding attacks with a novel reversible sketch.
Inf. Fusion, 2019
A survey on data fusion in internet of things: Towards secure and privacy-preserving fusion.
Inf. Fusion, 2019
Future Gener. Comput. Syst., 2019
Future Gener. Comput. Syst., 2019
Future Gener. Comput. Syst., 2019
Enjoy the Untrusted Cloud: A Secure, Scalable and Efficient SQL-like Query Framework for Outsourcing Data.
CoRR, 2019
IEEE Commun. Surv. Tutorials, 2019
IEEE Access, 2019
A Survey on Biometric Authentication: Toward Secure and Privacy-Preserving Identification.
IEEE Access, 2019
IEEE Access Special Section Editorial: Recent Advances in Computational Intelligence Paradigms for Security and Privacy for Fog and Mobile Edge Computing.
IEEE Access, 2019
Proceedings of the 2019 IEEE SmartWorld, 2019
Proceedings of the 2019 IEEE SmartWorld, 2019
Proceedings of the 2019 IEEE SmartWorld, 2019
A Study and Enhancement to the Security of MANET AODV Protocol Against Black Hole Attacks.
Proceedings of the 2019 IEEE SmartWorld, 2019
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019
Optimal Resource Allocation for Secure Multi-User Wireless Powered Backscatter Communication with Artificial Noise.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 2019 IEEE International Symposium on Dynamic Spectrum Access Networks, 2019
Proceedings of the Smart Data: State-of-the-Art Perspectives in Computing and Applications, 2019
2018
IEEE Trans. Ind. Informatics, 2018
Privacy-Preserving Authentication and Key Agreement Protocols for D2D Group Communications.
IEEE Trans. Ind. Informatics, 2018
A privacy-preserving mobile application recommender system based on trust evaluation.
J. Comput. Sci., 2018
Data collection for attack detection and security measurement in Mobile Ad Hoc Networks: A survey.
J. Netw. Comput. Appl., 2018
Inf. Sci., 2018
Inf. Sci., 2018
IEEE Internet Things J., 2018
IEEE Internet Things J., 2018
Future Gener. Comput. Syst., 2018
AutoPrivacy: Automatic privacy protection and tagging suggestion for mobile social photo.
Comput. Secur., 2018
IEEE Access Special Section Editorial: Trust Management in Pervasive Social Networking (TruPSN).
IEEE Access, 2018
Predict Pairwise Trust Based on Machine Learning in Online Social Networks: A Survey.
IEEE Access, 2018
LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey.
IEEE Access, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
2017
IEEE Trans. Cloud Comput., 2017
IEEE Syst. J., 2017
IEEE Syst. J., 2017
Mob. Networks Appl., 2017
Mob. Inf. Syst., 2017
J. Parallel Distributed Comput., 2017
J. Netw. Comput. Appl., 2017
Future Gener. Comput. Syst., 2017
Object detection among multimedia big data in the compressive measurement domain under mobile distributed architecture.
Future Gener. Comput. Syst., 2017
Comput. Secur., 2017
IEEE Access, 2017
Anonymous Authentication on Trust in Pervasive Social Networking Based on Group Signature.
IEEE Access, 2017
TIM: A Trust Insurance Mechanism for Network Function Virtualization Based on Trusted Computing.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Proceedings of the Network and System Security - 11th International Conference, 2017
Proceedings of the Algorithms and Architectures for Parallel Processing, 2017
Proceedings of the Algorithms and Architectures for Parallel Processing, 2017
Proceedings of the Algorithms and Architectures for Parallel Processing, 2017
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017
Proceedings of the 2017 IEEE International Conference on Computer and Information Technology, 2017
Proceedings of the 2017 IEEE International Conference on Computer and Information Technology, 2017
2016
ACM Trans. Multim. Comput. Commun. Appl., 2016
Trustworthy Authentication on Scalable Surveillance Video with Background Model Support.
ACM Trans. Multim. Comput. Commun. Appl., 2016
ACM Trans. Multim. Comput. Commun. Appl., 2016
A security and trust framework for virtualized networks and software-defined networking.
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
Int. J. Commun. Syst., 2016
Int. J. Commun. Syst., 2016
Future Gener. Comput. Syst., 2016
IEEE Cloud Comput., 2016
IEEE Access, 2016
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016
Proceedings of the International Conference on Advanced Cloud and Big Data, 2016
2015
PSNController: An Unwanted Content Control System in Pervasive Social Networking Based on Trust Management.
ACM Trans. Multim. Comput. Commun. Appl., 2015
IEEE Trans. Comput. Soc. Syst., 2015
Mob. Networks Appl., 2015
J. Netw. Comput. Appl., 2015
An approach to rank reviews by fusing and mining opinions based on review pertinence.
Inf. Fusion, 2015
Future Gener. Comput. Syst., 2015
Future Gener. Comput. Syst., 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
CloudRec: A Mobile Cloud Service Recommender System Based on Adaptive QoS Management.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
2014
J. Supercomput., 2014
New Rev. Hypermedia Multim., 2014
Comput. Secur., 2014
Analysis on the acceptance of Global Trust Management for unwanted traffic control based on game theory.
Comput. Secur., 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014
2013
Pers. Ubiquitous Comput., 2013
J. Comput. Syst. Sci., 2013
Human interactive secure key and identity exchange protocols in body sensor networks.
IET Inf. Secur., 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Game Theoretical Analysis of the Acceptance of Global Trust Management for Unwanted Traffic Control.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
2012
TruBeRepec: a trust-behavior-based reputation and recommender system for mobile applications.
Pers. Ubiquitous Comput., 2012
An approach of secure and fashionable recognition for pervasive face-to-face social communications.
Proceedings of the 8th IEEE International Conference on Wireless and Mobile Computing, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Implementation of an Evaluation Platform for Unwanted Traffic Control via Trust Management.
Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, 2012
2011
IEEE Trans. Dependable Secur. Comput., 2011
IEEE Intell. Syst., 2011
Proceedings of the Ubiquitous Intelligence and Computing - 8th International Conference, 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011
Proceedings of the 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, 2011
2010
Proceedings of the Handbook of Information and Communication Security, 2010
Proceedings of the Ubiquitous Intelligence and Computing - 7th International Conference, 2010
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010
Proceedings of the Autonomic and Trusted Computing - 7th International Conference, 2010
2009
Proceedings of the Trusted Systems, First International Conference, 2009
Proceedings of the Autonomic and Trusted Computing, 6th International Conference, 2009
Proceedings of the Autonomic and Trusted Computing, 6th International Conference, 2009
2008
Autonomic Trust Management for a Pervasive System.
Proceedings of the SECRYPT 2008, 2008
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008
2007
Proceedings of the Third International Workshop on Security, 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
2006
Proceedings of the Second International Workshop on Security, 2006
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006
2004
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004
2003
Proceedings of the Trust Management, First International Conference, 2003