5G移动通信系统组合安全理论及关键技术研究

U1536202
2015
F0104.通信网络
沈玉龙
联合基金项目
教授
西安电子科技大学
262万元
多域安全管理;5G;通用可组合安全;无线网络安全融合;物理层安全
2016-01-01到2019-12-31
  • 中英文摘要
  • 结题摘要
  • 结题报告
  • 项目成果
  • 项目参与人
查看更多信息请先登录或注册
查看更多信息请先登录或注册
查看更多信息请先登录或注册
重置
序号 标题 类型 作者
1 A Survey on Biometric Authentication: towards Secure and Privacy-Preserving Identification 期刊论文 Rui Zhang;Zheng Yan
2 LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey 期刊论文 He Limei;Yan Zheng;Atiquzzaman Mohammed
3 A Survey on Network Security-Related Data Collection Technologies 期刊论文 Lin Huaqing;Yan Zheng;Chen Yu;Zhang Lifang
4 A survey on network data collection 期刊论文 Zhou Donghao;Yan Zheng;Fu Yulong;Yao Zhen
5 On Performance Modeling for MANETs Under General Limited Buffer Constraint 期刊论文 Liu Jia;Xu Yang;Shen Yulong;Jiang Xiaohong;Taleb Tarik
6 Special issue on pervasive social networking 期刊论文 Yan Zheng;Liu Jun;Yang Laurence T
7 Editorial: Mobile Multimedia Communications 期刊论文 Yan Zheng;Wang Wei;Wen Yonggang;Wang Chonggang;Wang Honggang
8 Exact secrecy throughput capacity study in mobile ad hoc networks 期刊论文 Li Xiaochen;Zhang Yuanyu;Zhao Shuangrui;Shen Yulong;Jiang Xiaohong
9 Flexible data access control in D2D communications 期刊论文 Yan Zheng;Xie Haomeng;Zhang Peng;Gupta Brij B
10 Neighbor Detection-Based Spectrum Sensing Algorithm in Distributed Cognitive Radio Networks 期刊论文 Pei Qingqi;Li Hongning;Liu Xianjun
11 Cutting Long-Tail Latency of Routing Response in Software Defined Networks 期刊论文 Xie Junjie;Guo Deke;Li Xiaozhou;Shen Yulong;Jiang Xiaohong
12 车联网中基于联盟博弈和距离预测的车辆间数据传输方法 专利 陈晨;胡锦娜;吕宁;裴庆祺;任智源
13 A privacy-preserving mobile application recommender system based on trust evaluation 期刊论文 Xu Kun;Zhang Weidong;Yan Zheng
14 Key technologies for 5G, the next generation of mobile networks and services 期刊论文 Yan Zheng;Niemi Valtteri;Yang Laurence T
15 Friendship-based cooperative jamming for secure communication in Poisson networks 期刊论文 Yuanyu Zhang;Yulong Shen;Xiaohong Jiang
16 Context-Aware Verifiable Cloud Computing 期刊论文 Yan Zheng;Yu Xixun;Ding Wenxiu
17 Secure Encrypted Data Deduplication with Ownership Proof and User Revocation 会议论文 Wenxiu Ding;Zheng Yan;Robert H. Deng
18 A survey on data fusion in internet of things: Towards secure and privacy-preserving fusion 期刊论文 Ding Wenxiu;Jing Xuyang;Yan Zheng;Yang Laurence T
19 Efficient LBS queries with mutual privacy preservation in IoV 期刊论文 Liu Shushu;Liu An;Yan Zheng;Feng Wei
20 Anonymous Authentication on Trust in Pervasive Social Networking Based on Group Signature 期刊论文 Feng Wei;Yan Zheng;Xie Haomeng
21 Data Fusion for Network Intrusion Detection: A Review 期刊论文 Li Guoquan;Yan Zheng;Fu Yulong;Chen Hanlu
22 Energy Efficiency-Based Decision Making in Cognitive Radio Networks 期刊论文 Li Hongning;Pei Qingqi;Xu Leilei
23 数字家庭设备可信接入平台及认证方法 专利 沈玉龙;王如凯;王建东;廖原;吕海波
24 Game Theoretical Analysis on Encrypted Cloud Data Deduplication 期刊论文 Liang Xueqin;Yan Zheng;Chen Xiaofeng;Yang Laurence T;Lou Wenjing;Hou Y Thomas
25 Guest Editorial Special Issue on Trust, Security, and Privacy in Crowdsourcing 期刊论文 Yan Zheng;Zeng Kai;Xiao Yu;Hou Thomas;Samarati Pierangela
26 Cooperative Secrecy to Resist Authentication Error in Two-Hop Wireless Networks 期刊论文 Shen Yulong;Pei Qingqi;Ma Jianfeng
27 A Survey on Secure Data Analytics in Edge Computing 期刊论文 Dan Liu;Zheng Yan;Wenxiu Ding;Mohammed Atiquzzaman
28 Secure Transmission with Limited Feedback in MISOME Wiretap Channels. 会议论文 Jiao Quan;Xiaochen Li;Yeqiu Xiao;Yulong Shen;Fenghua Li
29 On Secrecy Performance of Multibeam Satellite System with Multiple Eavesdropped Users 会议论文 Yeqiu Xiao;Jia Liu;Jiao Quan;Yulong Shen;Xiaohong Jiang
30 CFHider: Control Flow Obfuscation with Intel SGX 会议论文 Wang Yongzhi;Shen Yulong;Su Cuicui;Cheng Ke;Yang Yibo;Faree Anter;Liu Yao
31 On Security-Delay Trade-Off in Two-Hop Wireless Networks With Buffer-Aided Relay Selection 期刊论文 Liao Xuening;Zhang Yuanyu;Wu Zhenqiang;Shen Yulong;Jiang Xiaohong;Inamura Hiroshi
32 A Survey on Trust Evaluation in Mobile Ad Hoc Networks 会议论文 Guangwu Xu;Zheng Yan
33 A Hierarchical Sharding Protocol for Multi-Domain IoT Blockchains 会议论文 Wei Tong;Xuewen Dong;Yulong Shen;Xiaohong Jiang
34 Provoking the Adversary by Dual Detection Techniques: An Extended Stochastic Game Theoretical Framework 会议论文 Ahmed Salem;Xuening Liao;Shuiguang Zeng;Yulong Shen
35 Smart Contract-Based Access Control for the Internet of Things 期刊论文 Zhang Yuanyu;Kasahara Shoji;Shen Yulong;Jiang Xiaohong;Wan Jianxiong
36 Adaptive security-related data collection with context awareness 期刊论文 Lin Huaqing;Yan Zheng;Fu Yulong
37 Privacy Protection in Mobile Recommender Systems: A Survey 会议论文 Xu Kun;Yan Zheng
38 A novel scheme of anonymous authentication on trust in Pervasive Social Networking 期刊论文 Yan Zheng;Wang Pu;Feng Wei
39 一种分布式云中计算中心选择方法及其应用 专利 沈玉龙;宗旋;张琪;姜晓鸿;裴庆祺;张华庆
40 Survey on Big Data Analysis Algorithms for Network Security Measurement 会议论文 Hanlu Chen;Yulong Fu;Zheng Yan
41 Provoking the Adversary by Detecting Eavesdropping and Jamming Attacks: A Game-Theoretical Framework 期刊论文 Ahmed Salem;Xuening Liao;Yulong Shen;Xiaohong Jiang
42 MCS-Chain: Decentralized and trustworthy mobile crowdsourcing based on blockchain 期刊论文 Feng Wei;Yan Zheng
43 认知无线网络中基于关系匹配的频谱感知数据检测方法 专利 裴庆祺;谷雨;李红宁;刘雪峰
44 Game Theoretical Analysis on System Adoption and Acceptance: A Review 会议论文 Liang Xueqin;Yan Zheng;Zhang Peng
45 Mining Suspicious Tax Evasion Groups in a Corporate Governance Network 会议论文 Wenda Wei;Zheng Yan;Jianfei Ruan;Qinghua Zheng;Bo Dong
46 A reversible sketch-based method for detecting and mitigating amplification attacks 期刊论文 Jing Xuyang;Zhao Jingjing;Zheng Qinghua;Yan Zheng;Pedrycz Witold
47 Game Theoretical Analysis on Acceptance of a Cloud Data Access Control System Based on Reputation 期刊论文 Lijun Gao;Zheng Yan;Laurence T Yang
48 Provoking the Adversary by Dual Detection Techniques: A Game Theoretical Framework 会议论文 Ahmed Salem;Xuening Liao;Yulong Shen;Xiang Lu
49 Predict Pairwise Trust Based on Machine Learning in Online Social Networks: A Survey 期刊论文 Shushu Liu;Lifang Zhang;Zheng Yan
50 Big data fusion in Internet of Things 期刊论文 Yan Zheng;Liu Jun;Yang Laurence T;Chawla Nitesh
51 Exploiting Content Delivery Networks for covert channel communications 期刊论文 Wang Yongzhi;Shen Yulong;Jiao Xiaopeng;Zhang Tao;Si Xu;Salem Ahmed;Liu Jia
52 Fast OpenFlow Table Lookup with Fast Update 会议论文 Tong Yang;Alex X. Liu;Yulong Shen;Qiaobin Fu;Dagang Li;Xiaoming Li
53 A Survey on Trust Evaluation in E-commerce. 会议论文 Yuquan Zhu;Zheng Yan
54 Data Collection for Security Measurement in Wireless Sensor Networks: A Survey 期刊论文 Xie Haomeng;Yan Zheng;Yao Zhen;Atiquzzaman Mohammed
55 Privacy-preserving trust management for unwanted traffic control 期刊论文 Zhang Lifang;Yan Zheng;Kantola Raimo
56 A trust management framework for software-defined network applications 期刊论文 Zhen Yao;Zheng Yan
57 Obfuscating program control flow with Intel SGX 会议论文 Yongzhi Wang;Yulong Shen;Ke Cheng;Yibo Yang;Cuicui Su;Anter Faree
58 Network traffic fusion and analysis against DDoS flooding attacks with a novel reversible sketch 期刊论文 Jing Xuyang;Yan Zheng;Jiang Xueqin;Pedrycz Witold
59 Trusted Cooperation among Virtual Base Stations in C-RAN 期刊论文 Fengyu Tian;Zheng Yan;Xueqin Liang;Peng Zhang
60 Poster abstract: SALUTE: A strategy-proof auction mechanism for flexible multichannel allocation 会议论文 Xuewen Dong;Xiaozhou Yang;Yongzhi Wang;Ahmed Salem;Yulong Shen;Jianfeng Ma
61 Cryptography and Data Security in Cloud Computing 期刊论文 Yan Zheng;Deng Robert H;Varadharajan Vijay
62 Physical Layer Authentication and Identification in Wireless Network via the Locations of Surrounding Noise Sources 会议论文 Yongchao Dang;Yin Chen;Huihui Wu;Yulong Shen;Xiaohong Jiang
63 Strongly Secure and Efficient Range Queries in Cloud Databases under Multiple Keys 会议论文 Cheng Ke;Shen Yulong;Wang Yongzhi;Wang Liangmin;Ma Jianfeng;Jiang Xionghong;Su Cuicui
64 A Survey on Security in D2D Communications 期刊论文 Wang Mingjun;Yan Zheng
65 Heterogeneous Data Storage Management with Deduplication in Cloud Computing 期刊论文 Zheng Yan;Lifang Zhang;Wenxiu Ding;Qinghua Zheng
66 一种基于物联网感知设备云平台认证系统及方法 专利 沈玉龙;邬俊杰;王建东;徐荣茂;姜仕双
67 Improving Database Storage Usability with the Cloud-Based Architecture 会议论文 Cuicui Su;Yongzhi Wang;Yulong Shen;Ke Cheng;Jiawen Ma
68 Data Analytics for Fog Computing by Distributed Online Learning with Asynchronous Update 会议论文 Guangxia Li;Peilin Zhao;Xiao Lu;Jia Liu;Yulong Shen
69 CloudFile: A cloud data access control system based on mobile social trust 期刊论文 Yan Zheng;Shi Wangyang
70 Verifiable outsourced computation over encrypted data 期刊论文 Yu Xixun;Yan Zheng;Zhang Rui
71 A Survey on Software-Defined Networking Security 会议论文 Shanshan Bian;Peng Zhang;Zheng Yan
72 On throughput capacity of large-scale ad hoc networks with realistic buffer constraint 期刊论文 Xu Yang;Liu Jia;Shen Yulong;Li Xiangning;Jiang Xiaohong
73 UAKA-D2D: Universal Authentication and Key Agreement Protocol in D2D Communications 期刊论文 Wang Mingjun;Yan Zheng;Niemi Valtteri
74 Data Mining in Cyber, Physical, and Social Computing 期刊论文 Liu Jun;Yan Zheng;Vasilakos Athanasios V;Yang Laurence T
75 Secure and Energy-Efficient Beamforming for MIMO Two-way Untrusted Relay Systems 会议论文 Shuangrui Zhao;Jia Liu;Yulong Shen;Xiaohong Jiang;Norio Shiratori
76 A survey on game theoretical methods in Human-Machine Networks 期刊论文 Liang Xueqin;Yan Zheng
77 IEEE ACCESS SPECIAL SECTION EDITORIAL: TRUST MANAGEMENT IN PERVASIVE SOCIAL NETWORKING (TruPSN) 期刊论文 Yan Zheng;Wang Honggang;Yang Laurence T;Niemi Valtteri
78 A Survey on Future Internet Security Architectures 期刊论文 Ding Wenxiu;Yan Zheng;Deng Robert H
79 Spoofing attacks against FM indoor localization 会议论文 Zi Li;Yao Liu;Qingqi Pei;Lei Bai
80 Mode Selection and Spectrum Partition for D2D Inband Communications: A Physical Layer Security Perspective 期刊论文 Yuanyu Zhang;Yulong Shen;Xiaohong Jiang;Shoji Kasahara
81 Editorial: Trust Management for Multimedia Big Data 期刊论文 Yan Zheng;Liu Jun;Deng Robert H;Herrera Francisco
82 Practical Verifiable Computation-A MapReduce Case Study 期刊论文 Wang Yongzhi;Shen Yulong;Jiang Xiaohong
83 Trustworthy service composition with secure data transmission in sensor networks 期刊论文 Zhang Tao;Zheng Lele;Wang Yongzhi;Shen Yulong;Xi Ning;Ma Jianfeng;Yong Jianming
84 Secure Communication in Non-Geostationary Orbit Satellite Systems: A Physical Layer Security Perspective 期刊论文 Yeqiu Xiao;Jia Liu;Yulong Shen;Xiaohong Jiang;Norio Shiratori
85 MicroThings: A Generic IoT Architecture for Flexible Data Aggregation and Scalable Service Cooperation 期刊论文 Shen Yulong;Zhang Tao;Wang Yongzhi;Wang Hua;Jiang Xiaohong
86 Secure Pervasive Social Communications Based on Trust in a Distributed Way 期刊论文 Chaoyin Huang;Zheng Yan;Ning Li;Mingjun Wang
87 物联网感知设备云端仿真系统的信息安全保障方法 专利 沈玉龙;王建东;姜仕双;胡俊;祝幸辉
88 PerRec: A Permission Configuration Recommender System for Mobile Apps 会议论文 Yanxiao Cheng;Zheng Yan
89 A Survey of Verifiable Computation 期刊论文 Yu Xixun;Yan Zheng;Vasilakos Athanasios V
90 Object detection among multimedia big data in the compressive measurement domain under mobile distributed architecture 期刊论文 Guo Jie;Song Bin;Yu Fei Richard;Yan Zheng;Yang Laurence T
91 A Survey on Security, Privacy, and Trust in Mobile Crowdsourcing 期刊论文 Feng Wei;Yan Zheng;Zhang Hengrun;Zeng Kai;Xiao Yu;Hou Y Thomas
92 Secure Beamforming for Full-Duplex MIMO Two-Way Communication via Untrusted Relaying 会议论文 Shuangrui Zhao;Jia Liu;Xiaochen Li;Yulong Shen;Xiaohong Jiang
93 Encrypted Data Management with Deduplication in Cloud Computing 期刊论文 Yan Zheng;Wang Mingjun;Li Yuxiang;Vasilakos Athanasios V
94 Security Measurements of Cyber Networks 期刊论文 Zheng Yan;Yuqing Zhang;Kim Kwang Raymond Choo;Yang Xiang
95 Privacy-Preserving Authentication and Key Agreement Protocols for D2D Group Communications 期刊论文 Wang Mingjun;Yan Zheng
96 A survey on dynamic mobile malware detection 期刊论文 Yan Ping;Yan Zheng
97 From Cloud to Fog Computing: A Review and a Conceptual Live VM Migration Framework 期刊论文 Osanaiye Opeyemi;Chen Shuo;Yan Zheng;Lu Rongxing;Choo Kim Kwang Raymond;Dlodlo Mqhele
98 Location Privacy-Preserving Channel Allocation Scheme in Cognitive Radio Networks 期刊论文 Li Hongning;Pei Qingqi;Zhang Wenjing
99 Cooperative Jamming Strategy Based on Community Detection for Two-Hop Communication Networks 会议论文 Yeqiu Xiao;Yulong Shen;Yong Zeng;Yuzhen Zhang
100 Securing Communication Data in Pervasive Social Networking Based on Trust with KP-ABE 期刊论文 Ning Li;Zheng Yan;Mingjun Wang;Laurence T Yang
101 Trust Evaluation in Social Networking: A Review 会议论文 Sihui Zhao;Zheng Yan
102 Encrypted data processing with Homomorphic Re-Encryption 期刊论文 Ding Wenxiu;Yan Zheng;Deng Robert H
103 Physical layer security-aware routing and performance tradeoffs in ad hoc networks 期刊论文 Xu Yang;Liu Jia;Shen Yulong;Jiang Xiaohong;Shiratori Norio
104 Deduplication on Encrypted Big Data in Cloud 期刊论文 Zheng Yan;Wenxiu Ding;Xixun Yu;Haiqi Zhu;Robert H Deng
105 Minimizing Traffic Migration During Network Update in IaaS Datacenters 期刊论文 Qu Ting;Guo Deke;Shen Yulong;Zhu Xiaomin;Luo Lailong;Liu Zhong
106 一种基于物联网感知设备云端仿真节点的云服务系统 专利 沈玉龙;王建东;胡俊;刘茜;徐荣茂
107 Data Fusion in Heterogeneous Networks 期刊论文 Zheng Yan;Jun Liu;Laurence T. Yang;Witold Pedrycz
108 Fusing and mining opinions for reputation generation 期刊论文 Zheng Yan;Xuyang Jing;Witold Pedrycz
109 A hybrid approach of mobile malware detection in Android 期刊论文 Tong Fei;Yan Zheng
110 MtMR: Ensuring MapReduce Computation Integrity with Merkle Tree-Based Verifications 期刊论文 Yongzhi Wang;Yulong Shen;Hua Wang;Jinli Cao;Xiaohong Jiang
111 一种分布式云计算数据迁移方法 专利 沈玉龙;姜晓鸿;曹小坤;傅祥优;徐闻拯;宗旋;裴庆祺;齐士垚;王如凯
112 Spoofing attacks and countermeasures in fm indoor localization system 期刊论文 Li Zi;Pei Qingqi;Liu Yao
113 一种计算中心内部物理主机的选择方法 专利 沈玉龙;宗旋;张琪;姜晓鸿;裴庆祺;张华庆
查看更多信息请先登录或注册