default search action
Zheng Yan 0002
闫峥
Person information
- unicode name: 闫峥
- affiliation: Xidian University, School of Cyber Engineering, State Key Laboratory on Integrated Services Networks, Xi'an, China
- affiliation (former): Aalto University, Espoo, Finland
- affiliation (former): Nokia Research Center, Helsinki, Finland
- affiliation (PhD 2007): Helsinki University of Technology, Finland
Other persons with the same name
- Zheng Yan — disambiguation page
- Zheng Yan 0001 — University of Technology Sydney, Centre for Artificial Intelligence, Broadway, NSW, Australia (and 2 more)
- Zheng Yan 0003 — Shanghai Jiao Tong University, Department of Electrical Engineering, School of Electronics, Information and Electrical Engineering, China (and 1 more)
- Zheng Yan 0004 (aka: Zheng John Yan) — Jet.com/Walmart Labs, Hoboken, NJ, USA
- Zheng Yan 0005 — State University of New York at Albany, USA
- Zheng Yan 0006 — Yangtze University, Jingzhou, China (and 1 more)
- Zheng Yan 0007 — Meta Platforms, Inc., Menlo Park, CA, USA (and 1 more)
- Zheng Yan 0008 — Huawei Technologies Co., Ltd., Shenzhen, China
- Zheng Yan 0009 — Huaqiao University, Xiamen, Fujian, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j219]Kangde Liu, Zheng Yan, Xueqin Liang, Raimo Kantola, Chuangyue Hu:
A survey on blockchain-enabled federated learning and its prospects with digital twin. Digit. Commun. Networks 10(2): 248-264 (2024) - [j218]Zhao Li, Xiujuan Liang, Yinghou Liu, Jia Liu, Zheng Yan:
Joint alignment and steering to manage interference. Digit. Commun. Networks 10(2): 429-438 (2024) - [j217]Yifan Zhang, Roberto Di Candia, Hüseyin Yigitler, Riku Jäntti, Zheng Yan:
Covert Backscatter Communication in the Presence of Multi-Antenna Eavesdropper. IEEE Commun. Lett. 28(8): 1770-1774 (2024) - [j216]Lanyan Wang, Wenxiu Ding, Zheng Yan, Su Qiu, Mingjun Wang, Zhiguo Wan:
EDDAC: An Efficient and Decentralized Data Access Control Scheme With Attribute Privacy Preservation. IEEE Internet Things J. 11(8): 14579-14592 (2024) - [j215]Xiaokang Zhou, Wang Huang, Wei Liang, Zheng Yan, Jianhua Ma, Yi Pan, Kevin I-Kai Wang:
Federated distillation and blockchain empowered secure knowledge sharing for Internet of medical Things. Inf. Sci. 662: 120217 (2024) - [j214]Xiaoxuan Xie, Jialei Zhang, Zheng Yan, Haiguang Wang, Tieyan Li:
Can Routing Be Effectively Learned in Integrated Heterogeneous Networks? IEEE Netw. 38(1): 210-218 (2024) - [j213]Gao Liu, Zheng Yan, Dongliang Wang, Haiguang Wang, Tieyan Li:
DePTVM: Decentralized Pseudonym and Trust Value Management for Integrated Networks. IEEE Trans. Dependable Secur. Comput. 21(1): 110-124 (2024) - [j212]Yuxuan Cai, Wenxiu Ding, Yuxuan Xiao, Zheng Yan, Ximeng Liu, Zhiguo Wan:
SecFed: A Secure and Efficient Federated Learning Based on Multi-Key Homomorphic Encryption. IEEE Trans. Dependable Secur. Comput. 21(4): 3817-3833 (2024) - [j211]Haomeng Xie, Zheng Yan:
SPCEX: Secure and Privacy-Preserving Cryptocurrency Exchange. IEEE Trans. Dependable Secur. Comput. 21(5): 4404-4417 (2024) - [j210]Jie Wang, Zheng Yan, Jiahe Lan, Elisa Bertino, Witold Pedrycz:
TrustGuard: GNN-Based Robust and Explainable Trust Evaluation With Dynamicity Support. IEEE Trans. Dependable Secur. Comput. 21(5): 4433-4450 (2024) - [j209]Jiajun Li, Pu Wang, Zheng Yan, Yishan Yang, Kai Zeng:
BGKey: Group Key Generation for Backscatter Communications Among Multiple Devices. IEEE Trans. Inf. Forensics Secur. 19: 2470-2486 (2024) - [j208]Yicheng Liu, Zhao Li, Kang G. Shin, Zheng Yan, Jia Liu:
iCoding: Countermeasure Against Interference and Eavesdropping in Wireless Communications. IEEE Trans. Inf. Forensics Secur. 19: 9188-9203 (2024) - [j207]Yishan Yang, Jiajun Li, Niya Luo, Zheng Yan, Yifan Zhang, Kai Zeng:
BatchAuth: A Physical Layer Batch Authentication Scheme for Multiple Backscatter Devices. IEEE Trans. Inf. Forensics Secur. 19: 9452-9466 (2024) - [j206]Masoud Kaveh, Zheng Yan, Riku Jäntti:
Secrecy Performance Analysis of RIS-Aided Smart Grid Communications. IEEE Trans. Ind. Informatics 20(4): 5415-5427 (2024) - [j205]Zhao Li, Siwei Le, Jie Chen, Kang G. Shin, Jia Liu, Zheng Yan, Riku Jäntti:
Decomposed and Distributed Modulation to Achieve Secure Transmission. IEEE Trans. Mob. Comput. 23(12): 11172-11190 (2024) - [j204]Xiaokang Zhou, Jiayi Wu, Wei Liang, Kevin I-Kai Wang, Zheng Yan, Laurence T. Yang, Qun Jin:
Reconstructed Graph Neural Network With Knowledge Distillation for Lightweight Anomaly Detection. IEEE Trans. Neural Networks Learn. Syst. 35(9): 11817-11828 (2024) - [j203]Shufan Fei, Zheng Yan, Haomeng Xie, Guocang Liu:
Sec-E2E: End-to-End Communication Security in LS-HetNets Based on Blockchain. IEEE Trans. Netw. Sci. Eng. 11(1): 761-778 (2024) - [j202]Zhao Li, Chengyu Liu, Lijuan Zhang, Kang G. Shin, Jia Liu, Zheng Yan, Riku Jäntti:
Exploiting Interference With an Intelligent Reflecting Surface to Enhance Data Transmission. IEEE Trans. Wirel. Commun. 23(8): 9776-9792 (2024) - [j201]Yishan Yang, Zheng Yan, Kai Zeng, Pu Wang, Jiajun Li:
Physical Layer Authentication in Backscatter Communication: A Review. IEEE Wirel. Commun. 31(3): 264-270 (2024) - [c102]Jiahe Lan, Yu Chen, Zheng Yan:
Use or Not: A Qualitative Study on the User Adoption and Abandonment of Voice Shopping with Smart Speakers. HICSS 2024: 4000-4009 - [c101]Zhao Li, Chengyu Liu, Lijuan Zhang, Zheng Yan, Jia Liu, Riku Jäntti, Zhixian Chang:
IRS Empowered Interference Utilization for Efficient Data Transmission. ICC 2024: 379-384 - [c100]Jiahe Lan, Jie Wang, Baochen Yan, Zheng Yan, Elisa Bertino:
FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge. SP 2024: 1646-1664 - [i16]Farshad Rostami Ghadi, Masoud Kaveh, Kai-Kit Wong, Riku Jäntti, Zheng Yan:
On Performance of FAS-aided Wireless Powered NOMA Communication Systems. CoRR abs/2405.11520 (2024) - [i15]Xinyu Peng, Feng Han, Li Peng, Weiran Liu, Zheng Yan, Kai Kang, Xinyuan Zhang, Guoxing Wei, Jianling Sun, Jinfei Liu:
MapComp: A Secure View-based Collaborative Analytics Framework for Join-Group-Aggregation. CoRR abs/2408.01246 (2024) - [i14]Masoud Kaveh, Farshad Rostami Ghadi, Zheng Yan, Riku Jäntti:
RIS-Aided Backscattering Tag-to-Tag Networks: Performance Analysis. CoRR abs/2408.16853 (2024) - [i13]Masoud Kaveh, Farshad Rostami Ghadi, Zhao Li, Zheng Yan, Riku Jäntti:
Secure Backscatter Communications Through RIS: Modeling and Performance. CoRR abs/2410.01829 (2024) - [i12]Masoud Kaveh, Farshad Rostami Ghadi, Yishan Yang, Zheng Yan, Riku Jäntti:
Physical Layer Mutual Authentication in RIS-Aided Monostatic Backscatter Communications: A Dual-Edged Analysis. CoRR abs/2410.02778 (2024) - [i11]Panpan Han, Zheng Yan, Laurence T. Yang, Elisa Bertino:
P2C2T: Preserving the Privacy of Cross-Chain Transfer. IACR Cryptol. ePrint Arch. 2024: 1467 (2024) - 2023
- [j200]Rong Han, Zheng Yan, Xueqin Liang, Laurence T. Yang:
How Can Incentive Mechanisms and Blockchain Benefit with Each Other? A Survey. ACM Comput. Surv. 55(7): 136:1-136:38 (2023) - [j199]Ping Wang, Haichang Gao, Xiaoyan Guo, Chenxuan Xiao, Fuqi Qi, Zheng Yan:
An Experimental Investigation of Text-based CAPTCHA Attacks and Their Robustness. ACM Comput. Surv. 55(9): 196:1-196:38 (2023) - [j198]Zhao Li, Pintian Lyu, Jun Li, Zhixian Chang, Jia Liu, Zheng Yan:
SCIM: Incorporating secure communication and interference management in one operation. Digit. Commun. Networks 9(2): 512-522 (2023) - [j197]Panpan Han, Zheng Yan, Wenxiu Ding, Shufan Fei, Zhiguo Wan:
A Survey on Cross-chain Technologies. Distributed Ledger Technol. Res. Pract. 2(2): 1-30 (2023) - [j196]Hui Han, Xuyang Jing, Zheng Yan, Witold Pedrycz:
ExtendedSketch+: Super host identification and network host trust evaluation with memory efficiency and high accuracy. Inf. Fusion 92: 300-312 (2023) - [j195]Zhonghong Ou, Zhaofengnian Wang, Fenrui Xiao, Baiqiao Xiong, Hongxing Zhang, Meina Song, Zheng Yan, Pan Hui:
AD-RCNN: Adaptive Dynamic Neural Network for Small Object Detection. IEEE Internet Things J. 10(5): 4226-4238 (2023) - [j194]Yijia Liu, Jie Wang, Zheng Yan, Zhiguo Wan, Riku Jäntti:
A Survey on Blockchain-Based Trust Management for Internet of Things. IEEE Internet Things J. 10(7): 5898-5922 (2023) - [j193]Mingjun Wang, Dongsheng Zhao, Zheng Yan, Haiguang Wang, Tieyan Li:
XAuth: Secure and Privacy-Preserving Cross-Domain Handover Authentication for 5G HetNets. IEEE Internet Things J. 10(7): 5962-5976 (2023) - [j192]Yulei Wu, Ning Zhang, Zheng Yan, Mohammed Atiquzzaman, Yang Xiang:
Guest Editorial Special Issue on AI and Blockchain-Powered IoT Sustainable Computing. IEEE Internet Things J. 10(8, April 15): 6531-6534 (2023) - [j191]Yinglong Dai, Zheng Yan, Jiangchang Cheng, Xiaojun Duan, Guojun Wang:
Analysis of multimodal data fusion from an information theory perspective. Inf. Sci. 623: 164-183 (2023) - [j190]Hui Bai, Xixun Yu, Zheng Yan, Jialei Zhang, Laurence T. Yang:
VeriORouting: Verification on intelligent routing outsourced to the cloud. Inf. Sci. 633: 410-430 (2023) - [j189]Li Peng, Zheng Yan, Xueqin Liang, Xixun Yu:
SecDedup: Secure data deduplication with dynamic auditing in the cloud. Inf. Sci. 644: 119279 (2023) - [j188]Xiaojun Cheng, Xuyang Jing, Zheng Yan, Xian Li, Pu Wang, Wei Wu:
ALSketch: An adaptive learning-based sketch for accurate network measurement under dynamic traffic distribution. J. Netw. Comput. Appl. 216: 103659 (2023) - [j187]Ruoyu Yin, Zheng Yan, Xueqin Liang, Haomeng Xie, Zhiguo Wan:
A survey on privacy preservation techniques for blockchain interoperability. J. Syst. Archit. 140: 102892 (2023) - [j186]Xiaokang Zhou, Xuzhe Zheng, Xuesong Cui, Jiashuai Shi, Wei Liang, Zheng Yan, Laurence T. Yang, Shohei Shimizu, Kevin I-Kai Wang:
Digital Twin Enhanced Federated Reinforcement Learning With Lightweight Knowledge Distillation in Mobile Networks. IEEE J. Sel. Areas Commun. 41(10): 3191-3211 (2023) - [j185]Masoud Kaveh, Farshad Rostami Ghadi, Riku Jäntti, Zheng Yan:
Secrecy Performance Analysis of Backscatter Communications with Side Information. Sensors 23(20): 8358 (2023) - [j184]Xiaokang Zhou, Xiaozhou Ye, Kevin I-Kai Wang, Wei Liang, Nirmal-Kumar C. Nair, Shohei Shimizu, Zheng Yan, Qun Jin:
Hierarchical Federated Learning With Social Context Clustering-Based Participant Selection for Internet of Medical Things Applications. IEEE Trans. Comput. Soc. Syst. 10(4): 1742-1751 (2023) - [j183]Xixun Yu, Hui Bai, Zheng Yan, Rui Zhang:
VeriDedup: A Verifiable Cloud Data Deduplication Scheme With Integrity and Duplication Proof. IEEE Trans. Dependable Secur. Comput. 20(1): 680-694 (2023) - [j182]Rui Zhang, Zheng Yan, Xuerui Wang, Robert H. Deng:
VOLERE: Leakage Resilient User Authentication Based on Personal Voice Challenges. IEEE Trans. Dependable Secur. Comput. 20(2): 1002-1016 (2023) - [j181]Dan Liu, Zheng Yan, Wenxiu Ding, Yuxuan Cai, Yaxing Chen, Zhiguo Wan:
ESMAC: Efficient and Secure Multi-Owner Access Control With TEE in Multi-Level Data Processing. IEEE Trans. Dependable Secur. Comput. 20(5): 4052-4069 (2023) - [j180]Zhen Liu, Changzhen Hu, Chun Shan, Zheng Yan:
ADCaDeM: A Novel Method of Calculating Attack Damage Based on Differential Manifolds. IEEE Trans. Dependable Secur. Comput. 20(5): 4070-4084 (2023) - [j179]Haomeng Xie, Shufan Fei, Zheng Yan, Yang Xiao:
SofitMix: A Secure Offchain-Supported Bitcoin-Compatible Mixing Protocol. IEEE Trans. Dependable Secur. Comput. 20(5): 4311-4324 (2023) - [j178]Jiajun Li, Pu Wang, Long Jiao, Zheng Yan, Kai Zeng, Yishan Yang:
Security Analysis of Triangle Channel-Based Physical Layer Key Generation in Wireless Backscatter Communications. IEEE Trans. Inf. Forensics Secur. 18: 948-964 (2023) - [j177]Ke Yan, Xinke Chen, Xiaokang Zhou, Zheng Yan, Jianhua Ma:
Physical Model Informed Fault Detection and Diagnosis of Air Handling Units Based on Transformer Generative Adversarial Network. IEEE Trans. Ind. Informatics 19(2): 2192-2199 (2023) - [j176]Rui Zhang, Zheng Yan, Xuerui Wang, Robert H. Deng:
LiVoAuth: Liveness Detection in Voiceprint Authentication With Random Challenges and Detection Modes. IEEE Trans. Ind. Informatics 19(6): 7676-7688 (2023) - [j175]Yan Chen, Tian Shu, Xiaokang Zhou, Xuzhe Zheng, Akira Kawai, Kaoru Fueda, Zheng Yan, Wei Liang, Kevin I-Kai Wang:
Graph Attention Network With Spatial-Temporal Clustering for Traffic Flow Forecasting in Intelligent Transportation System. IEEE Trans. Intell. Transp. Syst. 24(8): 8727-8737 (2023) - [j174]Yaxing Chen, Qinghua Zheng, Zheng Yan:
Efficient Bi-objective SQL Optimization for Enclaved Cloud Databases with Differentially Private Padding. ACM Trans. Database Syst. 48(2): 6:1-6:40 (2023) - [j173]Xi Xu, Qinghua Zheng, Zheng Yan, Ming Fan, Ang Jia, Zhaohui Zhou, Haijun Wang, Ting Liu:
PatchDiscovery: Patch Presence Test for Identifying Binary Vulnerabilities Based on Key Basic Blocks. IEEE Trans. Software Eng. 49(12): 5279-5294 (2023) - [j172]Xiaokang Zhou, Wei Liang, Kevin I-Kai Wang, Zheng Yan, Laurence T. Yang, Wei Wei, Jianhua Ma, Qun Jin:
Decentralized P2P Federated Learning for Privacy-Preserving and Resilient Mobile Robotic Systems. IEEE Wirel. Commun. 30(2): 82-89 (2023) - [c99]Guocang Liu, Haoxiang Han, Wenxiu Ding, Shufan Fei, Zheng Yan:
Demo Paper: Anonymous Authentication on Trust in Blockchain-Based Mobile Crowdsourcing System. Blockchain 2023: 140-144 - [c98]Zhao Li, Siwei Le, Jie Chen, Kang G. Shin, Riku Jäntti, Zheng Yan, Jia Liu:
Decomposed and Distributed Modulation to Achieve Secure Transmission. GLOBECOM 2023: 5378-5383 - [c97]Yishan Yang, Masoud Kaveh, Jiajun Li, Yifan Zhang, Zheng Yan, Kai Zeng:
BatAu: A Batch Authentication Scheme for Backscatter Devices in a Smart Home Network. ICC 2023: 4528-4533 - [c96]Jialei Zhang, Xiaoxuan Xie, Zheng Yan, Haiguang Wang, Tieyan Li:
CustTest: An Effective Testbed for Testing Customized Routing in Integrated Heterogeneous Networks. ICPADS 2023: 783-790 - [c95]Jiahui Wang, Yulong Fu, Mengru Liu, Jin Cao, Hui Li, Zheng Yan:
Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft Biometrics. ISPEC 2023: 52-73 - [c94]Na Wang, Gaofei Wu, Jingfeng Rong, Zheng Yan, Qiuling Yue, Jinglu Hu, Yuqing Zhang:
Cross-Border Data Security from the Perspective of Risk Assessment. ISPEC 2023: 91-104 - [c93]Jingdong Chang, Zhao Li, Masoud Kaveh, Yifan Zhang, Jiajun Li, Zheng Yan:
A Survey on AI-Enabled Attacks and AI-Empowered Countermeasures in Physical Layer. WF-IoT 2023: 1-7 - [c92]Farshad Rostami Ghadi, Masoud Kaveh, Zheng Yan, Riku Jäntti:
Secure Wireless Powered Communications Under Fisher-Snedecor $\mathcal{F}$ Fading Channels. WF-IoT 2023: 1-5 - [c91]Masoud Kaveh, Zhao Li, Zheng Yan, Riku Jäntti:
A Summery of the First Workshop on Backscatter Communication Security in Internet of Things Environment. WF-IoT 2023: 1-2 - [e6]Weizhi Meng, Zheng Yan, Vincenzo Piuri:
Information Security Practice and Experience - 18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24-25, 2023, Proceedings. Lecture Notes in Computer Science 14341, Springer 2023, ISBN 978-981-99-7031-5 [contents] - [i10]Kai Huang, Zhengzi Xu, Su Yang, Hongyu Sun, Xuejun Li, Zheng Yan, Yuqing Zhang:
A Survey on Automated Program Repair Techniques. CoRR abs/2303.18184 (2023) - [i9]Jie Wang, Zheng Yan, Jiahe Lan, Elisa Bertino, Witold Pedrycz:
TrustGuard: GNN-based Robust and Explainable Trust Evaluation with Dynamicity Support. CoRR abs/2306.13339 (2023) - [i8]Baochen Yan, Jiahe Lan, Zheng Yan:
Backdoor Attacks against Voice Recognition Systems: A Survey. CoRR abs/2307.13643 (2023) - [i7]Changan Yang, Yaxing Chen, Yao Zhang, Helei Cui, Zhiwen Yu, Bin Guo, Zheng Yan, Zijiang Yang:
RaftFed: A Lightweight Federated Learning Framework for Vehicular Crowd Intelligence. CoRR abs/2310.07268 (2023) - [i6]Jiahe Lan, Jie Wang, Baochen Yan, Zheng Yan, Elisa Bertino:
FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge. CoRR abs/2312.09665 (2023) - 2022
- [j171]Zhao Li, Bigui Zhang, Chengyu Liu, Zhixian Chang, Kang G. Shin, Zheng Yan:
Framed Fidelity MAC: Losslessly packing multi-user transmissions in a virtual point-to-point framework. Comput. Networks 219: 109425 (2022) - [j170]Jie Wang, Zheng Yan, Haiguang Wang, Tieyan Li, Witold Pedrycz:
A Survey on Trust Models in Heterogeneous Networks. IEEE Commun. Surv. Tutorials 24(4): 2127-2162 (2022) - [j169]Shufan Fei, Zheng Yan, Wenxiu Ding, Haomeng Xie:
Security Vulnerabilities of SGX and Countermeasures: A Survey. ACM Comput. Surv. 54(6): 126:1-126:36 (2022) - [j168]Zheng Yan, Qinghua Zheng, Yulei Wu, Yaliang Zhao, Mohammed Atiquzzaman:
Guest editorial: Blockchain-enabled technologies for cyber-physical systems and big data applications. Digit. Commun. Networks 8(5): 589-590 (2022) - [j167]Haoxiang Han, Shufan Fei, Zheng Yan, Xiaokang Zhou:
A survey on blockchain-based integrity auditing for cloud data. Digit. Commun. Networks 8(5): 591-603 (2022) - [j166]Wentao Wei, Jie Wang, Zheng Yan, Wenxiu Ding:
EPMDroid: Efficient and privacy-preserving malware detection based on SGX through data fusion. Inf. Fusion 82: 43-57 (2022) - [j165]Hui Han, Zheng Yan, Xuyang Jing, Witold Pedrycz:
Applications of sketches in network traffic measurement: A survey. Inf. Fusion 82: 58-85 (2022) - [j164]Wei Feng, Zheng Yan, Laurence T. Yang, Qinghua Zheng:
Anonymous Authentication on Trust in Blockchain-Based Mobile Crowdsourcing. IEEE Internet Things J. 9(16): 14185-14202 (2022) - [j163]Xueqin Liang, Zheng Yan, Raimo Kantola:
GAIMMO: A Grade-Driven Auction-Based Incentive Mechanism With Multiple Objectives for Crowdsourcing Managed by Blockchain. IEEE Internet Things J. 9(18): 17488-17502 (2022) - [j162]Shushu Liu, Zheng Yan:
Efficient Privacy Protection Protocols for 5G-Enabled Positioning in Industrial IoT. IEEE Internet Things J. 9(19): 18527-18538 (2022) - [j161]Yilin Li, Shushu Liu, Zheng Yan, Robert H. Deng:
Secure 5G Positioning With Truth Discovery, Attack Detection, and Tracing. IEEE Internet Things J. 9(22): 22220-22229 (2022) - [j160]Mehrnoosh Monshizadeh, Vikramajeet Khatri, Raimo Kantola, Zheng Yan:
A deep density based and self-determining clustering approach to label unknown traffic. J. Netw. Comput. Appl. 207: 103513 (2022) - [j159]Jiahe Lan, Rui Zhang, Zheng Yan, Jie Wang, Yu Chen, Ronghui Hou:
Adversarial attacks and defenses in Speaker Recognition Systems: A survey. J. Syst. Archit. 127: 102526 (2022) - [j158]Jialei Zhang, Zheng Yan, Shufan Fei, Mingjun Wang, Tieyan Li, Haiguang Wang:
Is Today's End-to-End Communication Security Enough for 5G and Its Beyond? IEEE Netw. 36(1): 105-112 (2022) - [j157]Zheng Yan, Laurence T. Yang, Tieyan Li, Yoan Miche, Shui Yu, Stephen S. Yau:
Guest Editorial: Trust, Security and Privacy of 6G. IEEE Netw. 36(4): 100-102 (2022) - [j156]Gao Liu, Huidong Dong, Zheng Yan, Xiaokang Zhou, Shohei Shimizu:
B4SDC: A Blockchain System for Security Data Collection in MANETs. IEEE Trans. Big Data 8(3): 739-752 (2022) - [j155]Angtai Li, Yu Chen, Zheng Yan, Xiaokang Zhou, Shohei Shimizu:
A Survey on Integrity Auditing for Data Storage in the Cloud: From Single Copy to Multiple Replicas. IEEE Trans. Big Data 8(5): 1428-1442 (2022) - [j154]Xuyang Jing, Zheng Yan, Yinghua Shen, Witold Pedrycz, Ji Yang:
A Group-Based Distance Learning Method for Semisupervised Fuzzy Clustering. IEEE Trans. Cybern. 52(5): 3083-3096 (2022) - [j153]Xuyang Jing, Hui Han, Zheng Yan, Witold Pedrycz:
SuperSketch: A Multi-Dimensional Reversible Data Structure for Super Host Identification. IEEE Trans. Dependable Secur. Comput. 19(4): 2741-2754 (2022) - [j152]Xuyang Jing, Zheng Yan, Hui Han, Witold Pedrycz:
ExtendedSketch: Fusing Network Traffic for Super Host Identification With a Memory Efficient Sketch. IEEE Trans. Dependable Secur. Comput. 19(6): 3913-3924 (2022) - [j151]Pu Wang, Zheng Yan, Kai Zeng:
BCAuth: Physical Layer Enhanced Authentication and Attack Tracing for Backscatter Communications. IEEE Trans. Inf. Forensics Secur. 17: 2818-2834 (2022) - [j150]Kevin I-Kai Wang, Xiaokang Zhou, Wei Liang, Zheng Yan, Jinhua She:
Federated Transfer Learning Based Cross-Domain Prediction for Smart Manufacturing. IEEE Trans. Ind. Informatics 18(6): 4088-4096 (2022) - [j149]Yongzhe Jia, Bowen Liu, Wanchun Dou, Xiaolong Xu, Xiaokang Zhou, Lianyong Qi, Zheng Yan:
CroApp: A CNN-Based Resource Optimization Approach in Edge Computing Environment. IEEE Trans. Ind. Informatics 18(9): 6300-6307 (2022) - [j148]Xiaokang Zhou, Wei Liang, Jianhua Ma, Zheng Yan, Kevin I-Kai Wang:
2D Federated Learning for Personalized Human Activity Recognition in Cyber-Physical-Social Systems. IEEE Trans. Netw. Sci. Eng. 9(6): 3934-3944 (2022) - [j147]Zheng Yan, Xinren Qian, Shushu Liu, Robert H. Deng:
Privacy Protection in 5G Positioning and Location-based Services Based on SGX. ACM Trans. Sens. Networks 18(3): 41:1-41:19 (2022) - [j146]Pu Wang, Zheng Yan, Ning Wang, Kai Zeng:
Resource Allocation Optimization for Secure Multidevice Wirelessly Powered Backscatter Communication With Artificial Noise. IEEE Trans. Wirel. Commun. 21(9): 7794-7809 (2022) - [c90]Rong Han, Xueqin Liang, Zheng Yan:
A Two-layer Game-based Incentive Mechanism for Decentralized Crowdsourcing. GLOBECOM 2022: 927-933 - [c89]Hongke Zhang, Zheng Yan, Xueqin Liang:
A Survey on Data Security in Network Storage Systems. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2022: 320-327 - [c88]Xuyang Jing, Xiaojun Cheng, Zheng Yan, Xian Li:
Deceiving Learning-based Sketches to Cause Inaccurate Frequency Estimation. TrustCom 2022: 209-216 - [c87]Wenxiu Ding, Wei Sun, Zheng Yan, Robert H. Deng, Zhiguo Wan:
An Efficient and Secure Scheme of Verifiable Computation for Intel SGX. TrustCom 2022: 473-482 - [c86]Baochen Yan, Rui Zhang, Zheng Yan:
VoiceSketch: a Privacy-Preserving Voiceprint Authentication System. TrustCom 2022: 623-630 - [c85]Wei Sun, Zheng Yan, Xi Xu, Wenxiu Ding, Lijun Gao:
Software Side Channel Vulnerability Detection Based on Similarity Calculation and Deep Learning. TrustCom 2022: 800-809 - [i5]Jiahe Lan, Rui Zhang, Zheng Yan, Jie Wang, Yu Chen, Ronghui Hou:
Adversarial attacks and defenses in Speaker Recognition Systems: A survey. CoRR abs/2205.13685 (2022) - 2021
- [j145]Mehrnoosh Monshizadeh, Vikramajeet Khatri, Marah Gamdou, Raimo Kantola, Zheng Yan:
Improving Data Generalization With Variational Autoencoders for Network Traffic Anomaly Detection. IEEE Access 9: 56893-56907 (2021) - [j144]