default search action
Yanjun Zuo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j22]Yanjun Zuo:
Big data and big risk: a four-factor framework for big data security and privacy. Int. J. Bus. Inf. Syst. 42(2): 224-242 (2023) - 2022
- [j21]Yanjun Zuo, Zhenyu Qi:
A Blockchain-Based IoT Framework for Oil Field Remote Monitoring and Control. IEEE Access 10: 2497-2514 (2022) - [j20]Yanjun Zuo:
Tokenizing Renewable Energy Certificates (RECs) - A Blockchain Approach for REC Issuance and Trading. IEEE Access 10: 134477-134490 (2022) - [j19]Yanjun Zuo:
Towards a Learner-Managed Education Credentialing System Based on Blockchain. Inf. Resour. Manag. J. 35(1): 1-18 (2022) - 2021
- [j18]Yanjun Zuo:
Making smart manufacturing smarter - a survey on blockchain technology in Industry 4.0. Enterp. Inf. Syst. 15(10): 1323-1353 (2021) - [j17]Yanjun Zuo:
Towards a trustworthy RFID system - from a security perspective. Int. J. Bus. Inf. Syst. 36(3): 432-448 (2021)
2010 – 2019
- 2017
- [j16]Yanjun Zuo, Jigang Liu:
A reputation-based model for mobile agent migration for information search and retrieval. Int. J. Inf. Manag. 37(5): 357-366 (2017) - 2016
- [c36]Yanjun Zuo:
Reputation-based service migration for moving target defense. EIT 2016: 239-245 - 2015
- [j15]Peter Sedgeman, Yanjun Zuo:
Web of things: readiness and applications from a business and consumer perspective. Int. J. Bus. Inf. Syst. 18(3): 321-337 (2015) - [c35]Yanjun Zuo:
Fuzzy inference for service migration strategy. EIT 2015: 54-61 - [c34]Yanjun Zuo:
Belief-Based Decision Making for Service Migration. HICSS 2015: 5212-5221 - [c33]Yanjun Zuo, Jigang Liu:
Mobile Agent-Based Service Migration. ITNG 2015: 8-13 - 2014
- [j14]Bennett Gackle, Yanjun Zuo:
A new approach for credit extended mobile phone payment. Int. J. Bus. Inf. Syst. 15(4): 434-449 (2014) - [j13]Yanjun Zuo:
A Constrained, Possibilistic Logical Approach for Software System Survivability Evaluation. Int. J. Softw. Eng. Knowl. Eng. 24(5): 777-800 (2014) - [c32]Yanjun Zuo:
Data labeling for integrity in SCADA systems. ICIS 2014: 111-118 - [c31]David Larson, Jigang Liu, Yanjun Zuo:
Performance analysis of javascript injection detection techniques. EIT 2014: 140-148 - [c30]Dave Larson, Jigang Liu, Yanjun Zuo:
Analyzing the Vulnerabilities in GWT Code and Applications. CANDAR 2014: 525-530 - [c29]Yanjun Zuo, Huixuan Zhu, Peng Cao:
Design of Transplanting Mechanism with B-Spline Curve Gear for Rice Pot Seedling Based on UG. CCTA 2014: 226-232 - 2013
- [j12]Yanjun Zuo:
Toward an RFID Scheme for Secure Material Flow Tracing and Verification in Supply Chains. Int. J. Handheld Comput. Res. 4(4): 72-89 (2013) - [c28]Yanjun Zuo:
Modeling Service Migration and Relocation in Mission-Critical Systems. Critical Infrastructure Protection 2013: 155-170 - [c27]Yanjun Zuo:
Moving and Relocating: A Logical Framework of Service Migration for Software System Survivability. SERE 2013: 139-148 - 2012
- [j11]Yanjun Zuo:
Survivability Experiment and Attack Characterization for RFID. IEEE Trans. Dependable Secur. Comput. 9(2): 289-302 (2012) - [c26]Joseph Julik, Yanjun Zuo:
An RFID Survivability Impact Model in the Military Domain. AMCIS 2012 - [c25]Yanjun Zuo, John Babin:
Searching for the Optimal Proof Schedule in a Proof-Carrying Survivability Paradigm - A Dynamic, Interactive Approach. ITNG 2012: 201-208 - [c24]Yanjun Zuo:
Incorporating Constraints to Software System Survivability Specification and Proof. TASE 2012: 67-74 - 2011
- [j10]Yanjun Zuo:
Survivability Enhancing Techniques for RFID Systems. Int. J. Handheld Comput. Res. 2(1): 25-40 (2011) - [c23]Yanjun Zuo:
Designing Security Requirements - A Flexible, Balanced, and Threshold-Based Approach. AMCIS 2011 - [c22]Yanjun Zuo, Timothy O'Keefe:
RFID-Enabled Logistic Flow Tracing in Supply Chains: Communication, Protocol, and Security. GLOBECOM 2011: 1-5 - [c21]Yanjun Zuo, Suhas Lande:
A Logical Framework of Proof-Carrying Survivability. TrustCom 2011: 472-481 - 2010
- [j9]Wen-Chen Hu, Yanjun Zuo, Lei Chen, Hung-Jen Yang:
Contemporary Issues in Handheld Computing Research. Int. J. Handheld Comput. Res. 1(1): 1-23 (2010) - [j8]Yanjun Zuo:
Secure and private search protocols for RFID systems. Inf. Syst. Frontiers 12(5): 507-519 (2010) - [j7]Yanjun Zuo:
Survivable RFID Systems: Issues, Challenges, and Techniques. IEEE Trans. Syst. Man Cybern. Part C 40(4): 406-418 (2010) - [c20]Yanjun Zuo:
A Framework of Survivability Requirement Specification for Critical Information Systems. HICSS 2010: 1-10 - [c19]Yanjun Zuo:
Changing Hands Together: A Secure Group Ownership Transfer Protocol for RFID Tags. HICSS 2010: 1-10 - [c18]Yanjun Zuo:
A Holistic Approach for Security Requirement Specification for Low-Cost, Distributed Ubiquitous Systems. ICIS 2010: 9 - [c17]Yanjun Zuo, Xu Ma, Long Qi, Xinglong Liao:
3-D Turbulence Numerical Simulation for the Flow Field of Suction Cylinder-Seeder with Socket-Slots. CCTA (1) 2010: 1-8 - [c16]Xinglong Liao, Xu Ma, Yanjun Zuo:
Design of Rotary Root Stubble Digging Machine Based on Solidworks. CCTA (1) 2010: 532-538 - [c15]Yanjun Zuo, Suhas Lande, Malvika Pimple:
Analysis and Simulation of System Survivability. ITNG 2010: 36-41 - [c14]Yanjun Zuo, Wen-Chen Hu, Timothy O'Keefe:
Securely Querying Sensor Enabled RFID Virtual Databases (SERVDs). ITNG 2010: 619-624 - [c13]Yanjun Zuo:
RFID survivability quantification and attack modeling. WISEC 2010: 13-18
2000 – 2009
- 2009
- [j6]Yanjun Zuo, Wen-Chen Hu:
Trust-Based Information Risk Management in a Supply Chain Network. Int. J. Inf. Syst. Supply Chain Manag. 2(3): 19-34 (2009) - [c12]Yanjun Zuo, Malvika Pimple, Suhas Lande:
A Framework for RFID Survivability Requirement Analysis and Specification. SCSS 2009: 153-159 - [c11]Yanjun Zuo, Brajendra Panda:
Unifying strategies and tactics: A survivability framework for countering cyber attacks. ISI 2009: 119-124 - [c10]Yanjun Zuo, Wen-Chen Hu, Timothy O'Keefe:
Trust Computing for Social Networking. ITNG 2009: 1534-1539 - [c9]Wen-Chen Hu, Yanjun Zuo, Naima Kaabouch, Hung-Jen Yang:
Mobile Data Protection Using Handheld Usage Context Matching. Mobile Data Management 2009: 594-599 - 2008
- [j5]Yanjun Zuo, Brajendra Panda:
Two-level trust-based decision model for information assurance in a virtual organization. Decis. Support Syst. 45(2): 291-309 (2008) - [j4]Yanjun Zuo:
Prompt damage identification for system survivability. Int. J. Inf. Comput. Secur. 2(4): 411-433 (2008) - [c8]Wen-Chen Hu, Yanjun Zuo, Tom Wiggen, V. Krishna:
Handheld data protection using handheld usage pattern identification. EIT 2008: 227-230 - 2007
- [j3]Yanjun Zuo:
Component comparison based information quality assurance. Int. J. Inf. Qual. 1(3): 295-313 (2007) - [j2]Yanjun Zuo, Timothy O'Keefe:
Post-release information privacy protection: A framework and next-generation privacy-enhanced operating system. Inf. Syst. Frontiers 9(5): 451-467 (2007) - 2006
- [j1]Yanjun Zuo, Brajendra Panda:
Distributed database damage assessment paradigm. Inf. Manag. Comput. Secur. 14(2): 116-139 (2006) - [c7]Yanjun Zuo, Brajendra Panda:
Information trustworthiness evaluation based on trust combination. SAC 2006: 1880-1885 - 2005
- [c6]Yanjun Zuo, Brajendra Panda:
Component based trust management in the context of a virtual organization. SAC 2005: 1582-1588 - [c5]Yanjun Zuo, Brajendra Panda:
External Object Trust Zone Mapping for Information Clustering. WOSIS 2005: 196-206 - 2004
- [c4]Yanjun Zuo, Brajendra Panda:
Damage Discovery in Distributed Database Systems. DBSec 2004: 111-123 - [c3]Yanjun Zuo, Brajendra Panda:
A Trust-Based Model for Information Integrity in Open Systems. IICIS 2004: 337-354 - 2003
- [c2]Yanjun Zuo, Brajendra Panda:
Network Viruses: Their 306 Working Principles and Marriages with Hacking Programs. IAW 2003: 306-307 - [c1]Yanjun Zuo, Brajendra Panda:
A Service Oriented System Based Information Flow Model for Damage Assessment. IICIS 2003: 177-194
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:52 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint