


default search action
Yong Xie 0003
Person information
- affiliation: Qinghai University, Xining, China
Other persons with the same name
- Yong Xie (aka: Xie Yong) — disambiguation page
- Yong Xie 0001 — University of Oxford, UK
- Yong Xie 0002
— Amazon, WA, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2025
- [j45]Hui Wang
, Yong Xie
, Min Luo
, Yi-Ning Liu
, Syed Hamad Shirazi
:
EAPDS: Efficient Auditable and Privacy-Preservation Data-Sharing Scheme Based on Attribute-Based Encryption for IoMT. IEEE Internet Things J. 12(14): 26844-26854 (2025) - [j44]Muhammad Asad Saleem
, Xiong Li
, Khalid Mahmood
, Zahid Ghaffar
, Yong Xie
, Guijuan Wang
:
Provably Secure Authenticated Key-Management Mechanism for e-Healthcare Environment. IEEE Internet Things J. 12(14): 26933-26942 (2025) - [j43]Shaojun Zuo
, Yong Xie
, HeHua Yao, Zhijie Ke:
TPFL: Privacy-preserving personalized federated learning mitigates model poisoning attacks. Inf. Sci. 702: 121901 (2025) - [j42]Xiao Wang
, Yong Xie
, Dingyi Shui, Shaolong Ge:
An improved biometric authentication and key agreement scheme based on fuzzy extractor for Wireless Body Area Networks. J. Inf. Secur. Appl. 91: 104047 (2025) - [j41]Zheng Che
, Meng Shen
, Zhehui Tan, Hanbiao Du
, Wei Wang
, Ting Chen
, Qinglin Zhao
, Yong Xie
, Liehuang Zhu
:
Across-Platform Detection of Malicious Cryptocurrency Accounts via Interaction Feature Learning. IEEE Trans. Inf. Forensics Secur. 20: 4783-4798 (2025) - [j40]Gang Xu
, Shiyuan Xu
, Xinyu Fan, Yibo Cao, Yanhui Mao, Yong Xie
, Xiubo Chen
:
RAT Ring: Event Driven Publish/Subscribe Communication Protocol for IIoT by Report and Traceable Ring Signature. IEEE Trans. Ind. Informatics 21(9): 6670-6678 (2025) - [j39]Qingyong Deng
, Qinghua Zuo
, Zhetao Li
, Haolin Liu
, Yong Xie:
Privacy-Preserving Stable Data Trading for Unknown Market Based on Blockchain. IEEE Trans. Mob. Comput. 24(7): 5615-5631 (2025) - [j38]Xiaoxiao Li
, Yong Xie
, Cong Peng
, Entao Luo, Xiong Li
, Zhili Zhou
:
EPREAR:An Efficient Attribute-Based Proxy Re-Encryption Scheme With Fast Revocation for Data Sharing in AIoT. IEEE Trans. Mob. Comput. 24(10): 11005-11018 (2025) - [j37]Qingyong Deng
, Mengyao Li
, Zhetao Li
, Haolin Liu
, Yong Xie:
End-Edge Collaborative Optimization of Microservice Caching in D2D-Assisted Network. IEEE Trans. Mob. Comput. 24(11): 12162-12176 (2025) - 2024
- [j36]Zakir Khan, Syed Hamad Shirazi
, Muhammad Shahzad
, Arslan Munir
, Assad Rasheed, Yong Xie
, Sarah Gul:
A Framework for Segmentation and Classification of Blood Cells Using Generative Adversarial Networks. IEEE Access 12: 51995-52015 (2024) - [j35]Hui Wang
, Yong Xie
, Yi-Ning Liu
, Xiong Li
, Phuntsog Dorje
:
Data Verifiable Personalized Access Control Electronic Healthcare Record Sharing Based on Blockchain in IoT Environment. IEEE Internet Things J. 11(4): 5696-5707 (2024) - [j34]Songsong Zhang, Yining Liu
, Tiegang Gao
, Yong Xie
, Chuan Zhou
:
Practical and Secure Password Authentication and Key-Agreement-Scheme-Based Dual Server for IoT Devices in 5G Network. IEEE Internet Things J. 11(21): 34639-34651 (2024) - [j33]Shiyuan Yu, Qingyong Deng
, Haolin Liu
, Xin Peng
, Yong Xie:
WTIPPTD: Weight-Based Trust Identification for Privacy-Preserving Truth Discovery in MCS. IEEE Internet Things J. 11(21): 35266-35281 (2024) - [j32]Xiaoxiao Li
, Yong Xie
, Hui Wang
, Xing Su, Haifeng Li:
dAPRE:Efficient and Reliable Attribute-Based Proxy Re-Encryption Using DAG for Data Sharing in IoT. IEEE Trans. Consumer Electron. 70(1): 584-596 (2024) - [j31]Shaojun Zuo
, Yong Xie
, Libing Wu
, Jing Wu:
ApaPRFL: Robust Privacy-Preserving Federated Learning Scheme Against Poisoning Adversaries for Intelligent Devices Using Edge Computing. IEEE Trans. Consumer Electron. 70(1): 725-734 (2024) - [j30]Ruoli Zhao
, Yong Xie
, Debiao He
, Kim-Kwang Raymond Choo
, Zoe L. Jiang
:
Practical Privacy-Preserving Convolutional Neural Network Inference Framework With Edge Computing for Health Monitoring. IEEE Trans. Netw. Sci. Eng. 11(6): 5995-6006 (2024) - [j29]Qingyong Deng
, Qinghua Zuo
, Zhetao Li
, Haolin Liu
, Yong Xie:
Blockchain-Based Reputation Privacy Preserving for Quality-Aware Worker Recruitment Scheme in MCS. IEEE/ACM Trans. Netw. 32(6): 5188-5203 (2024) - [j28]Dingyi Shui
, Yong Xie, Libing Wu, Yining Liu
, Xing Su:
Lightweight three-party key agreement for V2G networks with physical unclonable function. Veh. Commun. 47: 100747 (2024) - 2023
- [j27]Asfandyar Khan
, Syed Hamad Shirazi
, Muhammad Adeel
, Muhammad Assam, Yazeed Yasin Ghadi
, Heba G. Mohamed, Yong Xie:
A QoS-Aware Data Aggregation Strategy for Resource Constrained IoT-Enabled AMI Network in Smart Grid. IEEE Access 11: 98988-99004 (2023) - [j26]Ruoli Zhao
, Yong Xie
, Hong Cheng
, Xingxing Jia
, Syed Hamad Shirazi
:
ePMLF: Efficient and Privacy-Preserving Machine Learning Framework Based on Fog Computing. Int. J. Intell. Syst. 2023: 1-16 (2023) - [j25]Yong Xie
, Gang Zeng
, Ryo Kurachi
, Fu Xiao
, Hiroaki Takada
, Shiyan Hu
:
Timing Analysis of CAN FD for Security-Aware Automotive Cyber-Physical Systems. IEEE Trans. Dependable Secur. Comput. 20(4): 3064-3078 (2023) - 2022
- [j24]Fang Xu, Nan Xiao, Min Deng
, Yong Xie, Zenggang Xiong, Qiong Xu:
Efficient opportunistic routing with social context awareness for distributed mobile social networks. Concurr. Comput. Pract. Exp. 34(7) (2022) - [j23]Xiang Li, Ping Liu, Songsong Zhang, Yong Xie
:
An improved secure and efficient group key agreement scheme in VANETs. Int. J. Commun. Syst. 35(3) (2022) - [j22]Jian Zhou
, Tiantian Zhao, Yong Xie, Fu Xiao, Lijuan Sun:
Emotion Recognition Based on Brain Connectivity Reservoir and Valence Lateralization for Cyber-Physical-Social Systems. Pattern Recognit. Lett. 161: 154-160 (2022) - [j21]Hongyuan Wang, Jin Meng, Xilong Du, Tengfei Cao, Yong Xie
:
Lightweight and Anonymous Mutual Authentication Protocol for Edge IoT Nodes with Physical Unclonable Function. Secur. Commun. Networks 2022: 1203691:1-1203691:11 (2022) - 2021
- [j20]Zhengliang Jiang, Wei Liu, Ruijiang Ma
, Syed Hamad Shirazi, Yong Xie
:
Lightweight Healthcare Wireless Body Area Network Scheme With Amplified Security. IEEE Access 9: 125739-125752 (2021) - [j19]Jian Zhou
, Xiaotian Gong, Lijuan Sun
, Yong Xie, Xiaoyong Yan:
Adaptive Routing Strategy Based on Improved Double Q-Learning for Satellite Internet of Things. Secur. Commun. Networks 2021: 5530023:1-5530023:11 (2021) - [j18]Yong Xie
, Yili Guo, Sheng Yang, Jian Zhou, Xiaobai Chen:
Security-Related Hardware Cost Optimization for CAN FD-Based Automotive Cyber-Physical Systems. Sensors 21(20): 6807 (2021) - [j17]Jian Zhou
, Jian Wang, Yang Chen, Xin Li, Yong Xie
:
Water Quality Prediction Method Based on Multi-Source Transfer Learning for Water Environmental IoT System. Sensors 21(21): 7271 (2021) - [j16]Yong Xie
, Yu Zhou, Jing Xu, Jian Zhou
, Xiaobai Chen, Fu Xiao:
Cybersecurity protection on in-vehicle networks for distributed automotive cyber-physical systems: State-of-the-art and future challenges. Softw. Pract. Exp. 51(11): 2108-2127 (2021) - [j15]Yong Xie
, Gang Zeng
, Ryo Kurachi
, Fu Xiao
, Hiroaki Takada
:
Optimizing Extensibility of CAN FD for Automotive Cyber-Physical Systems. IEEE Trans. Intell. Transp. Syst. 22(12): 7875-7886 (2021) - 2020
- [j14]Yong Xie
, Gang Zeng
, Ryo Kurachi
, Xin Peng, Guoqi Xie
, Hiroaki Takada
:
Balancing Bandwidth Utilization and Interrupts: Two Heuristic Algorithms for the Optimized Design of Automotive CPS. IEEE Trans. Ind. Informatics 16(4): 2382-2392 (2020) - [j13]Guoqi Xie
, Yanwen Li, Yunbo Han, Yong Xie
, Gang Zeng
, Renfa Li
:
Recent Advances and Future Trends for Automotive Functional Safety Design Methodologies. IEEE Trans. Ind. Informatics 16(9): 5629-5642 (2020) - 2019
- [j12]Yong Xie
, Xiang Li, Songsong Zhang, Yanggui Li
:
iCLAS: An Improved Certificateless Aggregate Signature Scheme for Healthcare Wireless Sensor Networks. IEEE Access 7: 15170-15182 (2019) - [j11]Fang Xu, Qiong Xu, Zenggang Xiong, Nan Xiao, Yong Xie, Min Deng, Huibing Hao:
Intelligent distributed routing scheme based on social similarity for mobile social networks. Future Gener. Comput. Syst. 96: 472-480 (2019) - [j10]Yong Xie, Libing Wu
, Jian Shen
, Li Li:
Efficient two-party certificateless authenticated key agreement protocol under GDH assumption. Int. J. Ad Hoc Ubiquitous Comput. 30(1): 11-25 (2019) - [j9]Yong Xie
, Songsong Zhang, Xiang Li, Yanggui Li
:
An efficient cooperative message authentication based on reputation mechanism in vehicular ad hoc networks. Int. J. Distributed Sens. Networks 15(6) (2019) - [j8]Yong Xie
, Gang Zeng
, Ryo Kurachi
, Hiroaki Takada
, Guoqi Xie
:
Security/Timing-Aware Design Space Exploration of CAN FD for Automotive Cyber-Physical Systems. IEEE Trans. Ind. Informatics 15(2): 1094-1104 (2019) - 2018
- [j7]Guoqi Xie
, Hao Peng, Zhetao Li
, Jinlin Song, Yong Xie
, Renfa Li
, Keqin Li
:
Reliability Enhancement Toward Functional Safety Goal Assurance in Energy-Aware Automotive Cyber-Physical Systems. IEEE Trans. Ind. Informatics 14(12): 5447-5462 (2018) - [j6]Yong Xie
, Fang Xu
, Dong Li, Yu Nie:
Efficient Message Authentication Scheme with Conditional Privacy-Preserving and Signature Aggregation for Vehicular Cloud Network. Wirel. Commun. Mob. Comput. 2018: 1875489:1-1875489:12 (2018) - 2017
- [j5]Yong Xie, Gang Zeng, Ryo Kurachi, Guoqi Xie, Yong Dou, Zhili Zhou:
An optimized design of CAN FD for automotive cyber-physical systems. J. Syst. Archit. 81: 101-111 (2017) - [j4]Yong Xie
, Libing Wu
, Jian Shen
, Abdulhameed Alelaiwi:
EIAS-CP: new efficient identity-based authentication scheme with conditional privacy-preserving for VANETs. Telecommun. Syst. 65(2): 229-240 (2017) - [j3]Yong Xie, Libing Wu
, Neeraj Kumar
, Jian Shen
:
Analysis and Improvement of a Privacy-Aware Handover Authentication Scheme for Wireless Network. Wirel. Pers. Commun. 93(2): 523-541 (2017) - [j2]Libing Wu
, Yubo Zhang, Yong Xie, Abdulhameed Alelaiwi, Jian Shen
:
An Efficient and Secure Identity-Based Authentication and Key Agreement Protocol with User Anonymity for Mobile Devices. Wirel. Pers. Commun. 94(4): 3371-3387 (2017) - 2013
- [j1]Yong Xie, Gang Zeng, Yang Chen, Ryo Kurachi, Hiroaki Takada, Renfa Li:
Worst Case Response Time Analysis for Messages in Controller Area Network with Gateway. IEICE Trans. Inf. Syst. 96-D(7): 1467-1477 (2013)
Conference and Workshop Papers
- 2025
- [c11]Zhili Zhou, Chunhui Zeng, Linna Zhou, Zhongliang Yang, Yujiang Li, Fei Peng, Yong Xie:
Dual-Population Watermark Vaccine: Efficient and Imperceptible Adversarial Attack for Watermarked Image Protection. ICASSP 2025: 1-5 - 2024
- [c10]Xiaochuan Guo, Wufei Wu, Lei Li, Sai Xiao, Yong Xie, Keqin Li:
Task Offloading Optimization Design for Delay-Sensitive and Energy-Constrained Applications in Fog Computing. MSN 2024: 1210-1211 - 2023
- [c9]Zonghong Li, Guoqi Xie, Wenhong Ma, Xiongren Xiao, Yong Xie, Wei Ren, Wanli Chang:
RTISM: Real-Time Inter-VM Communication Based on Shared Memory for Mixed-Criticality Flows. RTSS 2023: 279-290 - 2022
- [c8]Xing Su, Yong Xie, Hongyuan Wang, Hui Wang:
Blockchain-based Privacy-preserving Authentication Key Agreement Protocol for Industrial Wireless Sensor Networks. ICPADS 2022: 234-241 - [c7]Xing Su, Yong Xie, Hui Wang, Wei Liu, Dingyi Shui:
Secure and Efficient Anonymous Authentication Key Agreement Scheme for Smart Industry. ICPADS 2022: 250-257 - [c6]Hui Wang, Yong Xie, Xing Su, HeHua Yao:
BARM: Blockchain-based Anonymous Reward Mechanism for Medical Recommendation in Smart Healthcare. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 985-992 - 2021
- [c5]Xiaobai Chen, Weibei Fan, Yong Xie, Fu Xiao:
A 2.44 Tops/W Heterogeneous DCNN Inference/Training Processor for Embedded System. ISCAS 2021: 1-5 - 2016
- [c4]Yong Xie, Libing Wu
, Yubo Zhang, Zhiyan Xu:
Strongly Secure Two-Party Certificateless Key Agreement Protocol with Short Message. ProvSec 2016: 244-254 - 2013
- [c3]Long Li, Lida Huang, Renfa Li, Renfei Wu, Yong Xie:
Positive Handling the Low-Criticality Tasks in Mixed-Criticality Scheduling on Multiprocessors. HPCC/EUC 2013: 1790-1795 - 2012
- [c2]Yong Xie, Gang Zeng, Hiroaki Takada, Renfa Li:
Extensibility-Aware Message Scheduling Algorithm for the Static Segment of the FlexRay. CSE 2012: 508-515 - [c1]Yong Xie, Gang Zeng, Yang Chen, Ryo Kurachi, Hiroaki Takada, Renfa Li:
Schedulability Analysis for Messages in Gateway-Interconnected Controller Area Network. ICCVE 2012: 83-90
Informal and Other Publications
- 2024
- [i1]Zheng Che, Meng Shen, Zhehui Tan, Hanbiao Du, Liehuang Zhu, Wei Wang, Ting Chen, Qinglin Zhao, Yong Xie:
Across-Platform Detection of Malicious Cryptocurrency Transactions via Account Interaction Learning. CoRR abs/2410.23563 (2024)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-10-20 22:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint