Academy Research Fellow, Visiting Professor Zheng Yan

Academy Research Fellow

Research outputs

  1. 2020
  2. Published

    A survey on machine learning for data fusion

    Meng, T., Jing, X., Yan, Z. & Pedrycz, W., 1 May 2020, In : Information Fusion. 57, p. 115-129 15 p.

    Research output: Contribution to journalReview Article

  3. Published

    An Adaptive Security Data Collection and Composition Recognition method for security measurement over LTE/LTE-A networks

    Fu, Y., Chen, H., Zheng, Q., Yan, Z., Kantola, R., Jing, X., Cao, J. & Li, H., 1 Apr 2020, In : Journal of Network and Computer Applications. 155, 102549.

    Research output: Contribution to journalArticle

  4. Published

    Game theoretical study on client-controlled cloud data deduplication

    Liang, X., Yan, Z. & Deng, R. H., 1 Apr 2020, In : Computers and Security. 91, 101730.

    Research output: Contribution to journalArticle

  5. Published

    Data fusion in heterogeneous networks

    Yan, Z., Liu, J., Yang, L. T. & Pedrycz, W., 1 Jan 2020, In : Information Fusion. 53, p. 1-3 3 p.

    Research output: Contribution to journalEditorial

  6. Published

    Multi-objective optimization for rebalancing virtual machine placement

    Li, R., Zheng, Q., Li, X. & Yan, Z., 2020, In : Future Generation Computer Systems. 105, p. 824-842 19 p.

    Research output: Contribution to journalArticle

  7. 2019
  8. Published
  9. Published

    A blockchain-based clock synchronization Scheme in IoT

    Fan, K., Sun, S., Yan, Z., Pan, Q., Li, H. & Yang, Y., 1 Dec 2019, In : Future Generation Computer Systems. 101, p. 524-533 10 p.

    Research output: Contribution to journalArticle

  10. Published

    Interference Steering to Manage Interference in IoT

    Li, Z., Liu, Y., Shin, K. G., Liu, J. & Yan, Z., Dec 2019, In : IEEE Internet of Things Journal. 6, 6, p. 10458-10471 14 p.

    Research output: Contribution to journalArticle

  11. Published

    A survey on data provenance in IoT

    Hu, R., Yan, Z., Ding, W. & Yang, L. T., 27 Nov 2019, In : World Wide Web. 23 p.

    Research output: Contribution to journalReview Article

  12. Published

    Privacy protection in mobile crowd sensing: a survey

    Wang, Y., Yan, Z., Feng, W. & Liu, S., 20 Nov 2019, In : World Wide Web.

    Research output: Contribution to journalReview Article

  13. Published

    Blockchain Based Data Transmission Control for Tactical Data Link

    Leng, W., Li, Y., Yang, X., Yan, Z. & Chen, L., 5 Nov 2019, Smart City and Informatization: iSCI 2019. Wang, G., El Saddik, A., Lai, X., Martinez Perez, G. & Choo, KK. (eds.). p. 583-595 (Communications in Computer and Information Science; vol. 1122).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  14. Published

    A survey on data fusion in internet of things: Towards secure and privacy-preserving fusion

    Ding, W., Jing, X., Yan, Z. & Yang, L. T., 1 Nov 2019, In : Information Fusion. 51, p. 129-144 16 p.

    Research output: Contribution to journalArticle

  15. Published

    Game Theoretical Analysis on Encrypted Cloud Data Deduplication

    Liang, X., Yan, Z., Chen, X., Yang, L., Lou, W. & Hou, T., Oct 2019, In : IEEE Transactions on Industrial Informatics. 15, 10, p. 5778-5789 12 p.

    Research output: Contribution to journalArticle

  16. Published

    A reversible sketch-based method for detecting and mitigating amplification attacks

    Jing, X., Zhao, J., Zheng, Q., Yan, Z. & Pedrycz, W., 15 Sep 2019, In : Journal of Network and Computer Applications. 142, p. 15-24 10 p.

    Research output: Contribution to journalArticle

  17. Published

    Editorial: Special issue on SDN-based wireless network virtualization

    Wu, Y., Yan, Z., Zhao, Z. & Al-Dubai, A., 25 Jul 2019, In : CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE. 3 p., 5444.

    Research output: Contribution to journalEditorial

  18. Published

    Performance Evaluation of a Combined Anomaly Detection Platform

    Monshizadeh, M., Khatri, V., Atli, B., Kantola, R. & Yan, Z., 24 Jul 2019, In : IEEE Access. 7, 2169-3536 , p. 100964-100978 15 p.

    Research output: Contribution to journalArticle

  19. Published

    A survey on secure data analytics in edge computing

    Liu, D., Yan, Z., Ding, W. & Atiquzzaman, M., 1 Jun 2019, In : IEEE Internet of Things Journal. 6, 3, p. 4946-4967 22 p., 8634892.

    Research output: Contribution to journalReview Article

  20. Published

    Blockchain-based Secure Time Protection Scheme in IoT

    Fan, K., Wang, S., Ren, Y., Yang, K., Yan, Z., Li, H. & Yang, Y., 1 Jun 2019, In : IEEE Internet of Things Journal. 6, 3, p. 4671-4679 8482304.

    Research output: Contribution to journalArticle

  21. Published

    MCS-Chain: Decentralized and trustworthy mobile crowdsourcing based on blockchain

    Feng, W. & Yan, Z., 1 Jun 2019, In : Future Generation Computer Systems. 95, p. 649-666 18 p.

    Research output: Contribution to journalArticle

  22. Published

    Efficient LBS queries with mutual privacy preservation in IoV

    Liu, S., Liu, A., Yan, Z. & Feng, W., 1 Apr 2019, In : Vehicular Communications. 16, p. 62-71 10 p.

    Research output: Contribution to journalArticle

  23. Published

    Optimal Resource Allocation for Secure Multi-User Wireless Powered Backscatter Communication with Artificial Noise

    Wang, P., Wang, N., Dabaghchian, M., Zeng, K. & Yan, Z., 1 Apr 2019, INFOCOM 2019 - IEEE Conference on Computer Communications. IEEE, p. 460-468 9 p. 8737501. (Proceedings - IEEE INFOCOM; vol. 2019-April).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  24. Published

    Verifiable outsourced computation over encrypted data

    Yu, X., Yan, Z. & Zhang, R., 1 Apr 2019, In : Information Sciences. 479, p. 372-385 14 p.

    Research output: Contribution to journalArticle

  25. Published

    Data Collection for Security Measurement in Wireless Sensor Networks: A Survey

    Xie, H., Yan, Z., Yao, Z. & Atiquzzaman, M., Apr 2019, In : IEEE Internet of Things Journal. 6, 2, p. 2205-2224

    Research output: Contribution to journalReview Article

  26. Published

    Encrypted Big Data Deduplication in Cloud Storage

    Yan, Z., Liang, X., Ding, W., Yu, X., Wang, M. & Deng, R. H., 13 Mar 2019, Smart Data: State-of-the-Art and Perspectives in Computing and Applications. Li, K-C., Zhang, Q., Yang, L. T. & DiMartin, B. (eds.). 30 p. (Chapman & Hall/CRC Big Data Series).

    Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

  27. Published

    Identifying suspicious groups of affiliated-transaction-based tax evasion in big data

    Ruan, J., Yan, Z., Dong, B., Zheng, Q. & Qian, B., 1 Mar 2019, In : Information Sciences. 477, p. 508-532 25 p.

    Research output: Contribution to journalArticle

  28. Published

    A Survey on Game Theoretical Methods in Human-Machine Networks

    Liang, X. & Yan, Z., Mar 2019, In : Future Generation Computer Systems. 92, p. 674-693 20 p.

    Research output: Contribution to journalReview Article

  29. Published

    Detecting Controller Interlock based Tax Evasion Groups in a Corporate Governance Network

    Ruan, J., Yan, Z., Dong, B. & Zheng, Q., 7 Feb 2019, Machine Learning for Computer and Cyber Security: Principle, Algorithms, and Practices. Gupta, B. B. & Sheng, M. (eds.). 1 ed.

    Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

  30. Published

    Adaptive security-related data collection with context awareness

    Lin, H., Yan, Z. & Fu, Y., 15 Jan 2019, In : Journal of Network and Computer Applications. 126, p. 88-103 16 p.

    Research output: Contribution to journalArticle

  31. E-pub ahead of print

    A privacy-preserving cryptosystem for IoT E-healthcare

    Hamza, R., Yan, Z., Muhammad, K., Bellavista, P. & Titouna, F., 1 Jan 2019, In : Information Sciences.

    Research output: Contribution to journalArticle

  32. Published

    Detection of Application-Layer Tunnels with Rules and Machine Learning

    Lin, H., Liu, G. & Yan, Z., 1 Jan 2019, Security, Privacy, and Anonymity in Computation, Communication, and Storage - 12th International Conference, SpaCCS 2019, Proceedings. Lu, R., Feng, J., Wang, G. & Bhuiyan, M. Z. A. (eds.). p. 441-455 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11611 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  33. Published

    IEEE Access Special Section Editorial: Internet-of-Things Big Data Trust Management

    Wu, Y., Yan, Z., Choo, K. K. R. & Yang, L. T., 1 Jan 2019, In : IEEE Access. 7, p. 65223-65227 5 p., 8728071.

    Research output: Contribution to journalEditorial

  34. Published

    Network Data Collection, Fusion, Mining and Analytics for Cyber Security

    Yan, Z., 1 Jan 2019, Machine Learning for Cyber Security - 2nd International Conference, ML4CS 2019, Proceedings. Chen, X., Huang, X. & Zhang, J. (eds.). p. 1-5 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11806 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  35. Published

    Quantifiable Network Security Measurement: A Study Based on an Index System

    Li, G., Fu, Y., Yan, Z. & Hao, W., 1 Jan 2019, Machine Learning for Cyber Security - 2nd International Conference, ML4CS 2019, Proceedings. Chen, X., Huang, X. & Zhang, J. (eds.). p. 47-62 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11806 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  36. Accepted/In press

    AAKA-D2D: Anonymous Authentication and Key Agreement Protocol in D2D Communications

    Wang, M., Yan, Z., Song, B. & Atiquzzaman, M., 2019, (Accepted/In press) IEEE International Conference on Advanced and Trusted Computing. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  37. Published

    AI-Driven Cyber Security Analytics and Privacy Protection

    Chen, J., Su, C. & Yan, Z., 2019, In : Security and Communication Networks. 2 p., 1859143.

    Research output: Contribution to journalEditorial

  38. E-pub ahead of print

    An Adaptive Network Data Collection System in SDN

    Zhou, D., Yan, Z., Liu, G. & Atiquzzaman, M., 2019, In : IEEE Transactions on Cognitive Communications and Networking.

    Research output: Contribution to journalArticle

  39. E-pub ahead of print

    An Extended Framework of Privacy-Preserving Computation with Flexible Access Control

    Ding, W., Hu, R., Yan, Z., Qian, X., Deng, R. H., Yang, L. T. & Dong, M., 2019, In : IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT.

    Research output: Contribution to journalArticle

  40. Accepted/In press

    A Security Formal Model for Multiple Channels Communication

    Fu, Y. L., Yuan, X. X., Wang, K., Yan, Z. & Li, H., 2019, (Accepted/In press) IEEE International Workshop on Security Measurements of Cyber Networks. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  41. Accepted/In press

    A Study and Enhancement to the Security of MANET AODV Protocol Against Blackhole Attacks

    Fu, Y. L., Li, G. Q., Atiquzzaman, M., Yan, Z., Cao, J. & Li, H., 2019, (Accepted/In press) IEEE International Workshop on Security Measurements of Cyber Networks. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  42. Published

    A Survey on Biometric Authentication

    Rui, Z. & Yan, Z., 2019, In : IEEE Access. 7, p. 5994 - 6009 16 p., 8590812.

    Research output: Contribution to journalReview Article

  43. Accepted/In press

    Computing Maximum and Minimum with Privacy Preservation and Flexible Access Control

    Ding, W. X., Yan, Z., Qian, X. R. & Deng, R. H., 2019, (Accepted/In press) IEEE Global Communications Conference. IEEE, (IEEE Global Communications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  44. Accepted/In press

    Game Theoretical Study on a Client-Controlled Deduplication Scheme

    Liang, X. Q., Yan, Z., Ding, W. X. & Deng, R. H., 2019, (Accepted/In press) IEEE International Conference on Ubiquitous Intelligence and Computing. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  45. Published

    Heterogeneous Data Storage Management with Deduplication in Cloud Computing

    Yan, Z., Zhang, L., Ding, W. & Zheng, Q., 2019, In : IEEE Transactions on Big Data. 5, 3, p. 393-407 19 p.

    Research output: Contribution to journalArticle

  46. E-pub ahead of print
  47. E-pub ahead of print

    Lightweighted Secure Searching over Public-key Ciphertexts for Edge-Cloud Assisted Industrial IoT Devices

    Wang, W., Xu, P., Liu, D., Yang, L. T. & Yan, Z., 2019, In : IEEE Transactions on Industrial Informatics.

    Research output: Contribution to journalArticle

  48. Published

    PriRoster: Privacy-preserving Radio Context Attestation in Cognitive Radio Network

    Zhang, R., Wang, N., Zhang, N., Yan, Z., Lou, W. & Hou, Y. T., 2019, IEEE International Symposium on Dynamic Spectrum Access Networks. IEEE, 8935740

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  49. Published

    Security Data Collection and Data Analytics in the Internet: A Survey

    Jing, X., Yan, Z. & Pedrycz, W., 2019, In : IEEE Communications Surveys and Tutorials. 21, 1, p. 586 - 618

    Research output: Contribution to journalReview Article

  50. Accepted/In press

    Security Design for D2D

    Wang, M. & Yan, Z., 2019, (Accepted/In press) Wiley 5G Ref: The Essential 5G Reference Online . JOHN WILEY & SONS

    Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

  51. Published

    Survey of Intrusion Detection Methods Based on Data Mining Algorithms

    Jin, Z., Cui, Y. & Yan, Z., 2019, Proceedings of the 2019 International Conference on Big Data Engineering. ACM, p. 98-106

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  52. 2018
  53. Published

    Method and Apparatus for Privacy-Enhanced Evidence Evaluation

    Yan, Z., 18 Dec 2018, Patent No. US10158649

    Research output: Patent

Previous 1 2 3 4 5 Next

ID: 108845