default search action
Yuan Fei
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Yongxin Zhao, Wenhan Wu, Yuan Fei, Zhihao Liu, Yang Li, Yilong Yang, Ling Shi, Bo Zhang:
An architecture refactoring approach to reducing software hierarchy complexity. J. Softw. Evol. Process. 36(4) (2024) - 2023
- [j9]Yuan Fei, Huibiao Zhu, Jiaqi Yin:
FVF-AKA: A Formal Verification Framework of AKA Protocols for Multi-server IoT. Formal Aspects Comput. 35(4): 21:1-21:36 (2023) - [j8]Yuan Fei, Huibiao Zhu, Jiaqi Yin:
Modeling and verifying NLSR protocol of NDN for CPS using UPPAAL. J. Softw. Evol. Process. 35(7) (2023) - [c20]Yingjia Du, Yuan Fei, Sini Chen, Huibiao Zhu:
Formalization and Verification of Data Auction Mechanism Based on Smart Contract Using CSP. SEKE 2023: 404-409 - 2022
- [j7]Ningning Chen, Huibiao Zhu, Jiaqi Yin, Yuan Fei, Lili Xiao, Minghua Zhu:
Modeling and verifying NDN-based IoV using CSP. J. Softw. Evol. Process. 34(10) (2022) - 2021
- [j6]Jiaqi Yin, Huibiao Zhu, Yuan Fei:
Formal analysis and automated validation of privacy-preserving AICE protocol in mobile edge computing. Mob. Networks Appl. 26(6): 2258-2271 (2021) - [c19]Jiaqi Yin, Huibiao Zhu, Yuan Fei:
SC4MEC: Automated Implementation of A Secure Hierarchical Calculus for Mobile Edge Computing. DATE 2021: 990-993 - [c18]Jiaqi Yin, Huibiao Zhu, Yuan Fei, Qiwen Xu:
Formal Modelling and Verification of the RTPS Behavior Module. TASE 2021: 127-134 - [c17]Jiaqi Yin, Huibiao Zhu, Yuan Fei:
Formal Verification of HPS-based Master-Slave Scheme in MEC with Timed Automata. TrustCom 2021: 68-75 - 2020
- [j5]Jiaqi Yin, Huibiao Zhu, Yuan Fei:
Specification and Verification of the Zab Protocol with TLA+. J. Comput. Sci. Technol. 35(6): 1312-1323 (2020) - [j4]Yuan Fei, Huibiao Zhu, Phan Cong Vinh:
Security Analysis of the Access Control Solution of NDN Using BAN Logic. Mob. Networks Appl. 25(3): 1162-1173 (2020) - [c16]Ningning Chen, Huibiao Zhu, Yuan Fei, Lili Xiao, Jiaqi Yin:
Modeling and Verifying Data Access Mechanism of NLSR Trust Model. APSEC 2020: 198-207 - [c15]Ran Li, Huibiao Zhu, Lili Xiao, Jiaqi Yin, Yuan Fei, Gang Lu:
Formalization and Verification of VANET. SEKE 2020: 1-6 - [c14]Ningning Chen, Huibiao Zhu, Jiaqi Yin, Lili Xiao, Yuan Fei:
Modeling and Verifying NDN-based IoV Using CSP. SEKE 2020: 31-36 - [c13]Junya Xu, Huibiao Zhu, Lili Xiao, Jiaqi Yin, Yuan Fei, Gang Lu:
Formal Modelling and Verification of MCAC Router Architecture in ICN. SEKE 2020: 222-227
2010 – 2019
- 2019
- [j3]Dongzhen Sun, Huibiao Zhu, Yuan Fei, Lili Xiao, Gang Lu, Jiaqi Yin:
Formalization and Verification of TESAC Using CSP. Int. J. Softw. Eng. Knowl. Eng. 29(11&12): 1741-1760 (2019) - [c12]Jiaqi Yin, Huibiao Zhu, Yuan Fei, Yucheng Fang:
Modeling and Verifying Spark on YARN Using Process Algebra. HASE 2019: 208-215 - [c11]Yuan Fei, Huibiao Zhu, Haiying Sun, Jiaqi Yin:
A Security Calculus for Wireless Networks of Named Data Networking. ICFEM 2019: 170-185 - [c10]Jiaqi Yin, Huibiao Zhu, Yuan Fei, Qiwen Xu, Ruobiao Wu:
Formalization and Verification of RTPS StatefulWriter Module Using CSP. SEKE 2019: 147-198 - [c9]Dongzhen Sun, Huibiao Zhu, Yuan Fei, Lili Xiao, Gang Lu, Jiaqi Yin:
Modeling and Verifying TESAC Using CSP. SEKE 2019: 265-348 - 2018
- [j2]Huiwen Wang, Huibiao Zhu, Lili Xiao, Yuan Fei:
Formalization and Verification of the OpenFlow Bundle Mechanism Using CSP. Int. J. Softw. Eng. Knowl. Eng. 28(11-12): 1657-1677 (2018) - [j1]Yuan Fei, Huibiao Zhu, Xi Wu, Huixing Fang, Shengchao Qin:
Comparative modelling and verification of Pthreads and Dthreads. J. Softw. Evol. Process. 30(3) (2018) - [c8]Yucheng Fang, Huibiao Zhu, Frank Zeyda, Yuan Fei:
Modeling and analysis of the disruptor framework in CSP. CCWC 2018: 803-809 - [c7]Yuan Fei, Huibiao Zhu:
Modeling and Verifying NDN Access Control Using CSP. ICFEM 2018: 143-159 - [c6]Huiwen Wang, Huibiao Zhu, Yuan Fei, Lili Xiao:
Formalization and Verification of the OpenFlow Bundle Mechanism Using CSP. SEKE 2018: 169-168 - [c5]Yuan Fei, Huibiao Zhu, Huiwen Wang:
Security Analysis of the Access Control Solution of NDN Using BAN Logic (S). SEKE 2018: 659-658 - [c4]Yuan Fei, Huibiao Zhu, Xin Li:
Modeling and Verification of NLSR Protocol using UPPAAL. TASE 2018: 108-115 - 2017
- [c3]Ailun Liu, Huibiao Zhu, Yuan Fei, Shuangqing Xiang, Gang Lu, Wanling Xie:
Modeling and Analysis of the Security Protocol in C-DAX Based on Process Algebra. COMPSAC (1) 2017: 39-44 - [c2]Jianyu Lu, Wanling Xie, Huibiao Zhu, Yuan Fei:
A Proof System for MDESL. FedCSIS (Communication Papers) 2017: 387-393 - 2016
- [c1]Yuan Fei, Huibiao Zhu, Xi Wu, Huixing Fang:
Comparative Modeling and Verification of Pthreads and Dthreads. HASE 2016: 132-140
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-08 19:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint