1 |
A Survey on Biometric Authentication: towards Secure and Privacy-Preserving Identification
|
期刊论文 |
Rui Zhang;Zheng Yan |
2 |
LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey
|
期刊论文 |
He Limei;Yan Zheng;Atiquzzaman Mohammed |
3 |
A Survey on Network Security-Related Data Collection Technologies
|
期刊论文 |
Lin Huaqing;Yan Zheng;Chen Yu;Zhang Lifang |
4 |
A survey on network data collection
|
期刊论文 |
Zhou Donghao;Yan Zheng;Fu Yulong;Yao Zhen |
5 |
On Performance Modeling for MANETs Under General Limited Buffer Constraint
|
期刊论文 |
Liu Jia;Xu Yang;Shen Yulong;Jiang Xiaohong;Taleb Tarik |
6 |
Special issue on pervasive social networking
|
期刊论文 |
Yan Zheng;Liu Jun;Yang Laurence T |
7 |
Editorial: Mobile Multimedia Communications
|
期刊论文 |
Yan Zheng;Wang Wei;Wen Yonggang;Wang Chonggang;Wang Honggang |
8 |
Exact secrecy throughput capacity study in mobile ad hoc networks
|
期刊论文 |
Li Xiaochen;Zhang Yuanyu;Zhao Shuangrui;Shen Yulong;Jiang Xiaohong |
9 |
Flexible data access control in D2D communications
|
期刊论文 |
Yan Zheng;Xie Haomeng;Zhang Peng;Gupta Brij B |
10 |
Neighbor Detection-Based Spectrum Sensing Algorithm in Distributed Cognitive Radio Networks
|
期刊论文 |
Pei Qingqi;Li Hongning;Liu Xianjun |
11 |
Cutting Long-Tail Latency of Routing Response in Software Defined Networks
|
期刊论文 |
Xie Junjie;Guo Deke;Li Xiaozhou;Shen Yulong;Jiang Xiaohong |
12 |
车联网中基于联盟博弈和距离预测的车辆间数据传输方法
|
专利 |
陈晨;胡锦娜;吕宁;裴庆祺;任智源 |
13 |
A privacy-preserving mobile application recommender system based on trust evaluation
|
期刊论文 |
Xu Kun;Zhang Weidong;Yan Zheng |
14 |
Key technologies for 5G, the next generation of mobile networks and services
|
期刊论文 |
Yan Zheng;Niemi Valtteri;Yang Laurence T |
15 |
Friendship-based cooperative jamming for secure communication in Poisson networks
|
期刊论文 |
Yuanyu Zhang;Yulong Shen;Xiaohong Jiang |
16 |
Context-Aware Verifiable Cloud Computing
|
期刊论文 |
Yan Zheng;Yu Xixun;Ding Wenxiu |
17 |
Secure Encrypted Data Deduplication with Ownership Proof and User Revocation
|
会议论文 |
Wenxiu Ding;Zheng Yan;Robert H. Deng |
18 |
A survey on data fusion in internet of things: Towards secure and privacy-preserving fusion
|
期刊论文 |
Ding Wenxiu;Jing Xuyang;Yan Zheng;Yang Laurence T |
19 |
Efficient LBS queries with mutual privacy preservation in IoV
|
期刊论文 |
Liu Shushu;Liu An;Yan Zheng;Feng Wei |
20 |
Anonymous Authentication on Trust in Pervasive Social Networking Based on Group Signature
|
期刊论文 |
Feng Wei;Yan Zheng;Xie Haomeng |
21 |
Data Fusion for Network Intrusion Detection: A Review
|
期刊论文 |
Li Guoquan;Yan Zheng;Fu Yulong;Chen Hanlu |
22 |
Energy Efficiency-Based Decision Making in Cognitive Radio Networks
|
期刊论文 |
Li Hongning;Pei Qingqi;Xu Leilei |
23 |
数字家庭设备可信接入平台及认证方法
|
专利 |
沈玉龙;王如凯;王建东;廖原;吕海波 |
24 |
Game Theoretical Analysis on Encrypted Cloud Data Deduplication
|
期刊论文 |
Liang Xueqin;Yan Zheng;Chen Xiaofeng;Yang Laurence T;Lou Wenjing;Hou Y Thomas |
25 |
Guest Editorial Special Issue on Trust, Security, and Privacy in Crowdsourcing
|
期刊论文 |
Yan Zheng;Zeng Kai;Xiao Yu;Hou Thomas;Samarati Pierangela |
26 |
Cooperative Secrecy to Resist Authentication Error in Two-Hop Wireless Networks
|
期刊论文 |
Shen Yulong;Pei Qingqi;Ma Jianfeng |
27 |
A Survey on Secure Data Analytics in Edge Computing
|
期刊论文 |
Dan Liu;Zheng Yan;Wenxiu Ding;Mohammed Atiquzzaman |
28 |
Secure Transmission with Limited Feedback in MISOME Wiretap Channels.
|
会议论文 |
Jiao Quan;Xiaochen Li;Yeqiu Xiao;Yulong Shen;Fenghua Li |
29 |
On Secrecy Performance of Multibeam Satellite System with Multiple Eavesdropped Users
|
会议论文 |
Yeqiu Xiao;Jia Liu;Jiao Quan;Yulong Shen;Xiaohong Jiang |
30 |
CFHider: Control Flow Obfuscation with Intel SGX
|
会议论文 |
Wang Yongzhi;Shen Yulong;Su Cuicui;Cheng Ke;Yang Yibo;Faree Anter;Liu Yao |
31 |
On Security-Delay Trade-Off in Two-Hop Wireless Networks With Buffer-Aided Relay Selection
|
期刊论文 |
Liao Xuening;Zhang Yuanyu;Wu Zhenqiang;Shen Yulong;Jiang Xiaohong;Inamura Hiroshi |
32 |
A Survey on Trust Evaluation in Mobile Ad Hoc Networks
|
会议论文 |
Guangwu Xu;Zheng Yan |
33 |
A Hierarchical Sharding Protocol for Multi-Domain IoT Blockchains
|
会议论文 |
Wei Tong;Xuewen Dong;Yulong Shen;Xiaohong Jiang |
34 |
Provoking the Adversary by Dual Detection Techniques: An Extended Stochastic Game Theoretical Framework
|
会议论文 |
Ahmed Salem;Xuening Liao;Shuiguang Zeng;Yulong Shen |
35 |
Smart Contract-Based Access Control for the Internet of Things
|
期刊论文 |
Zhang Yuanyu;Kasahara Shoji;Shen Yulong;Jiang Xiaohong;Wan Jianxiong |
36 |
Adaptive security-related data collection with context awareness
|
期刊论文 |
Lin Huaqing;Yan Zheng;Fu Yulong |
37 |
Privacy Protection in Mobile Recommender Systems: A Survey
|
会议论文 |
Xu Kun;Yan Zheng |
38 |
A novel scheme of anonymous authentication on trust in Pervasive Social Networking
|
期刊论文 |
Yan Zheng;Wang Pu;Feng Wei |
39 |
一种分布式云中计算中心选择方法及其应用
|
专利 |
沈玉龙;宗旋;张琪;姜晓鸿;裴庆祺;张华庆 |
40 |
Survey on Big Data Analysis Algorithms for Network Security Measurement
|
会议论文 |
Hanlu Chen;Yulong Fu;Zheng Yan |
41 |
Provoking the Adversary by Detecting Eavesdropping and Jamming Attacks: A Game-Theoretical Framework
|
期刊论文 |
Ahmed Salem;Xuening Liao;Yulong Shen;Xiaohong Jiang |
42 |
MCS-Chain: Decentralized and trustworthy mobile crowdsourcing based on blockchain
|
期刊论文 |
Feng Wei;Yan Zheng |
43 |
认知无线网络中基于关系匹配的频谱感知数据检测方法
|
专利 |
裴庆祺;谷雨;李红宁;刘雪峰 |
44 |
Game Theoretical Analysis on System Adoption and Acceptance: A Review
|
会议论文 |
Liang Xueqin;Yan Zheng;Zhang Peng |
45 |
Mining Suspicious Tax Evasion Groups in a Corporate Governance Network
|
会议论文 |
Wenda Wei;Zheng Yan;Jianfei Ruan;Qinghua Zheng;Bo Dong |
46 |
A reversible sketch-based method for detecting and mitigating amplification attacks
|
期刊论文 |
Jing Xuyang;Zhao Jingjing;Zheng Qinghua;Yan Zheng;Pedrycz Witold |
47 |
Game Theoretical Analysis on Acceptance of a Cloud Data Access Control System Based on Reputation
|
期刊论文 |
Lijun Gao;Zheng Yan;Laurence T Yang |
48 |
Provoking the Adversary by Dual Detection Techniques: A Game Theoretical Framework
|
会议论文 |
Ahmed Salem;Xuening Liao;Yulong Shen;Xiang Lu |
49 |
Predict Pairwise Trust Based on Machine Learning in Online Social Networks: A Survey
|
期刊论文 |
Shushu Liu;Lifang Zhang;Zheng Yan |
50 |
Big data fusion in Internet of Things
|
期刊论文 |
Yan Zheng;Liu Jun;Yang Laurence T;Chawla Nitesh |
51 |
Exploiting Content Delivery Networks for covert channel communications
|
期刊论文 |
Wang Yongzhi;Shen Yulong;Jiao Xiaopeng;Zhang Tao;Si Xu;Salem Ahmed;Liu Jia |
52 |
Fast OpenFlow Table Lookup with Fast Update
|
会议论文 |
Tong Yang;Alex X. Liu;Yulong Shen;Qiaobin Fu;Dagang Li;Xiaoming Li |
53 |
A Survey on Trust Evaluation in E-commerce.
|
会议论文 |
Yuquan Zhu;Zheng Yan |
54 |
Data Collection for Security Measurement in Wireless Sensor Networks: A Survey
|
期刊论文 |
Xie Haomeng;Yan Zheng;Yao Zhen;Atiquzzaman Mohammed |
55 |
Privacy-preserving trust management for unwanted traffic control
|
期刊论文 |
Zhang Lifang;Yan Zheng;Kantola Raimo |
56 |
A trust management framework for software-defined network applications
|
期刊论文 |
Zhen Yao;Zheng Yan |
57 |
Obfuscating program control flow with Intel SGX
|
会议论文 |
Yongzhi Wang;Yulong Shen;Ke Cheng;Yibo Yang;Cuicui Su;Anter Faree |
58 |
Network traffic fusion and analysis against DDoS flooding attacks with a novel reversible sketch
|
期刊论文 |
Jing Xuyang;Yan Zheng;Jiang Xueqin;Pedrycz Witold |
59 |
Trusted Cooperation among Virtual Base Stations in C-RAN
|
期刊论文 |
Fengyu Tian;Zheng Yan;Xueqin Liang;Peng Zhang |
60 |
Poster abstract: SALUTE: A strategy-proof auction mechanism for flexible multichannel allocation
|
会议论文 |
Xuewen Dong;Xiaozhou Yang;Yongzhi Wang;Ahmed Salem;Yulong Shen;Jianfeng Ma |
61 |
Cryptography and Data Security in Cloud Computing
|
期刊论文 |
Yan Zheng;Deng Robert H;Varadharajan Vijay |
62 |
Physical Layer Authentication and Identification in Wireless Network via the Locations of Surrounding Noise Sources
|
会议论文 |
Yongchao Dang;Yin Chen;Huihui Wu;Yulong Shen;Xiaohong Jiang |
63 |
Strongly Secure and Efficient Range Queries in Cloud Databases under Multiple Keys
|
会议论文 |
Cheng Ke;Shen Yulong;Wang Yongzhi;Wang Liangmin;Ma Jianfeng;Jiang Xionghong;Su Cuicui |
64 |
A Survey on Security in D2D Communications
|
期刊论文 |
Wang Mingjun;Yan Zheng |
65 |
Heterogeneous Data Storage Management with Deduplication in Cloud Computing
|
期刊论文 |
Zheng Yan;Lifang Zhang;Wenxiu Ding;Qinghua Zheng |
66 |
一种基于物联网感知设备云平台认证系统及方法
|
专利 |
沈玉龙;邬俊杰;王建东;徐荣茂;姜仕双 |
67 |
Improving Database Storage Usability with the Cloud-Based Architecture
|
会议论文 |
Cuicui Su;Yongzhi Wang;Yulong Shen;Ke Cheng;Jiawen Ma |
68 |
Data Analytics for Fog Computing by Distributed Online Learning with Asynchronous Update
|
会议论文 |
Guangxia Li;Peilin Zhao;Xiao Lu;Jia Liu;Yulong Shen |
69 |
CloudFile: A cloud data access control system based on mobile social trust
|
期刊论文 |
Yan Zheng;Shi Wangyang |
70 |
Verifiable outsourced computation over encrypted data
|
期刊论文 |
Yu Xixun;Yan Zheng;Zhang Rui |
71 |
A Survey on Software-Defined Networking Security
|
会议论文 |
Shanshan Bian;Peng Zhang;Zheng Yan |
72 |
On throughput capacity of large-scale ad hoc networks with realistic buffer constraint
|
期刊论文 |
Xu Yang;Liu Jia;Shen Yulong;Li Xiangning;Jiang Xiaohong |
73 |
UAKA-D2D: Universal Authentication and Key Agreement Protocol in D2D Communications
|
期刊论文 |
Wang Mingjun;Yan Zheng;Niemi Valtteri |
74 |
Data Mining in Cyber, Physical, and Social Computing
|
期刊论文 |
Liu Jun;Yan Zheng;Vasilakos Athanasios V;Yang Laurence T |
75 |
Secure and Energy-Efficient Beamforming for MIMO Two-way Untrusted Relay Systems
|
会议论文 |
Shuangrui Zhao;Jia Liu;Yulong Shen;Xiaohong Jiang;Norio Shiratori |
76 |
A survey on game theoretical methods in Human-Machine Networks
|
期刊论文 |
Liang Xueqin;Yan Zheng |
77 |
IEEE ACCESS SPECIAL SECTION EDITORIAL: TRUST MANAGEMENT IN PERVASIVE SOCIAL NETWORKING (TruPSN)
|
期刊论文 |
Yan Zheng;Wang Honggang;Yang Laurence T;Niemi Valtteri |
78 |
A Survey on Future Internet Security Architectures
|
期刊论文 |
Ding Wenxiu;Yan Zheng;Deng Robert H |
79 |
Spoofing attacks against FM indoor localization
|
会议论文 |
Zi Li;Yao Liu;Qingqi Pei;Lei Bai |
80 |
Mode Selection and Spectrum Partition for D2D Inband Communications: A Physical Layer Security Perspective
|
期刊论文 |
Yuanyu Zhang;Yulong Shen;Xiaohong Jiang;Shoji Kasahara |
81 |
Editorial: Trust Management for Multimedia Big Data
|
期刊论文 |
Yan Zheng;Liu Jun;Deng Robert H;Herrera Francisco |
82 |
Practical Verifiable Computation-A MapReduce Case Study
|
期刊论文 |
Wang Yongzhi;Shen Yulong;Jiang Xiaohong |
83 |
Trustworthy service composition with secure data transmission in sensor networks
|
期刊论文 |
Zhang Tao;Zheng Lele;Wang Yongzhi;Shen Yulong;Xi Ning;Ma Jianfeng;Yong Jianming |
84 |
Secure Communication in Non-Geostationary Orbit Satellite Systems: A Physical Layer Security Perspective
|
期刊论文 |
Yeqiu Xiao;Jia Liu;Yulong Shen;Xiaohong Jiang;Norio Shiratori |
85 |
MicroThings: A Generic IoT Architecture for Flexible Data Aggregation and Scalable Service Cooperation
|
期刊论文 |
Shen Yulong;Zhang Tao;Wang Yongzhi;Wang Hua;Jiang Xiaohong |
86 |
Secure Pervasive Social Communications Based on Trust in a Distributed Way
|
期刊论文 |
Chaoyin Huang;Zheng Yan;Ning Li;Mingjun Wang |
87 |
物联网感知设备云端仿真系统的信息安全保障方法
|
专利 |
沈玉龙;王建东;姜仕双;胡俊;祝幸辉 |
88 |
PerRec: A Permission Configuration Recommender System for Mobile Apps
|
会议论文 |
Yanxiao Cheng;Zheng Yan |
89 |
A Survey of Verifiable Computation
|
期刊论文 |
Yu Xixun;Yan Zheng;Vasilakos Athanasios V |
90 |
Object detection among multimedia big data in the compressive measurement domain under mobile distributed architecture
|
期刊论文 |
Guo Jie;Song Bin;Yu Fei Richard;Yan Zheng;Yang Laurence T |
91 |
A Survey on Security, Privacy, and Trust in Mobile Crowdsourcing
|
期刊论文 |
Feng Wei;Yan Zheng;Zhang Hengrun;Zeng Kai;Xiao Yu;Hou Y Thomas |
92 |
Secure Beamforming for Full-Duplex MIMO Two-Way Communication via Untrusted Relaying
|
会议论文 |
Shuangrui Zhao;Jia Liu;Xiaochen Li;Yulong Shen;Xiaohong Jiang |
93 |
Encrypted Data Management with Deduplication in Cloud Computing
|
期刊论文 |
Yan Zheng;Wang Mingjun;Li Yuxiang;Vasilakos Athanasios V |
94 |
Security Measurements of Cyber Networks
|
期刊论文 |
Zheng Yan;Yuqing Zhang;Kim Kwang Raymond Choo;Yang Xiang |
95 |
Privacy-Preserving Authentication and Key Agreement Protocols for D2D Group Communications
|
期刊论文 |
Wang Mingjun;Yan Zheng |
96 |
A survey on dynamic mobile malware detection
|
期刊论文 |
Yan Ping;Yan Zheng |
97 |
From Cloud to Fog Computing: A Review and a Conceptual Live VM Migration Framework
|
期刊论文 |
Osanaiye Opeyemi;Chen Shuo;Yan Zheng;Lu Rongxing;Choo Kim Kwang Raymond;Dlodlo Mqhele |
98 |
Location Privacy-Preserving Channel Allocation Scheme in Cognitive Radio Networks
|
期刊论文 |
Li Hongning;Pei Qingqi;Zhang Wenjing |
99 |
Cooperative Jamming Strategy Based on Community Detection for Two-Hop Communication Networks
|
会议论文 |
Yeqiu Xiao;Yulong Shen;Yong Zeng;Yuzhen Zhang |
100 |
Securing Communication Data in Pervasive Social Networking Based on Trust with KP-ABE
|
期刊论文 |
Ning Li;Zheng Yan;Mingjun Wang;Laurence T Yang |
101 |
Trust Evaluation in Social Networking: A Review
|
会议论文 |
Sihui Zhao;Zheng Yan |
102 |
Encrypted data processing with Homomorphic Re-Encryption
|
期刊论文 |
Ding Wenxiu;Yan Zheng;Deng Robert H |
103 |
Physical layer security-aware routing and performance tradeoffs in ad hoc networks
|
期刊论文 |
Xu Yang;Liu Jia;Shen Yulong;Jiang Xiaohong;Shiratori Norio |
104 |
Deduplication on Encrypted Big Data in Cloud
|
期刊论文 |
Zheng Yan;Wenxiu Ding;Xixun Yu;Haiqi Zhu;Robert H Deng |
105 |
Minimizing Traffic Migration During Network Update in IaaS Datacenters
|
期刊论文 |
Qu Ting;Guo Deke;Shen Yulong;Zhu Xiaomin;Luo Lailong;Liu Zhong |
106 |
一种基于物联网感知设备云端仿真节点的云服务系统
|
专利 |
沈玉龙;王建东;胡俊;刘茜;徐荣茂 |
107 |
Data Fusion in Heterogeneous Networks
|
期刊论文 |
Zheng Yan;Jun Liu;Laurence T. Yang;Witold Pedrycz |
108 |
Fusing and mining opinions for reputation generation
|
期刊论文 |
Zheng Yan;Xuyang Jing;Witold Pedrycz |
109 |
A hybrid approach of mobile malware detection in Android
|
期刊论文 |
Tong Fei;Yan Zheng |
110 |
MtMR: Ensuring MapReduce Computation Integrity with Merkle Tree-Based Verifications
|
期刊论文 |
Yongzhi Wang;Yulong Shen;Hua Wang;Jinli Cao;Xiaohong Jiang |
111 |
一种分布式云计算数据迁移方法
|
专利 |
沈玉龙;姜晓鸿;曹小坤;傅祥优;徐闻拯;宗旋;裴庆祺;齐士垚;王如凯 |
112 |
Spoofing attacks and countermeasures in fm indoor localization system
|
期刊论文 |
Li Zi;Pei Qingqi;Liu Yao |
113 |
一种计算中心内部物理主机的选择方法
|
专利 |
沈玉龙;宗旋;张琪;姜晓鸿;裴庆祺;张华庆 |