Zheng Yan

Zheng Yan

Academy Research Fellow, Visiting Professor

    • Konemiehentie 2, P.O.Box 15400, Espoo 02150, Finland

    20032021

    Research activity per year

    If you made any changes in Pure these will be visible here soon.
    Filter
    Chapter

    Search results

    • Detecting Controller Interlock based Tax Evasion Groups in a Corporate Governance Network

      Ruan, J., Zheng, Q., Dong, B. & Yan, Z., 7 Feb 2019, Machine Learning for Computer and Cyber Security: Principle, Algorithms, and Practices. Gupta, B. B. & Sheng, M. (eds.). 1 ed. p. 278-289 12 p.

      Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

    • Encrypted Big Data Deduplication in Cloud Storage

      Yan, Z., Liang, X., Ding, W., Yu, X., Wang, M. & Deng, R. H., 13 Mar 2019, Smart Data: State-of-the-Art and Perspectives in Computing and Applications. Li, K-C., Zhang, Q., Yang, L. T. & DiMartin, B. (eds.). p. 63-91 30 p. (Chapman & Hall/CRC Big Data Series).

      Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

    • Flexible Access Control over Privacy-Preserving Cloud Data Processing

      Ding, W., Qian, X., Hu, R., Yan, Z. & Deng, R. H., 2020, Innovation in Cybersecurity Education. Daimi, K. & Francia III, G. (eds.). p. 231-255 25 p.

      Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

    • Game-theoretic analysis of encrypted cloud data deduplication

      Liang, X., Yan, Z., Deng, R. H., Kantola, R., Ding, W., Yu, X. & Zheng, Q., 2021, Data Deduplication Approaches: Concepts, Strategies and Challenges. Thwel, T. T. & Sinha, G. R. (eds.). Elsevier, p. 335-354 20 p.

      Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

    • Heterogeneous Data Access Control based on Trust and Reputation in Mobile Cloud Computing

      Yan, Z., Li, X. & Kantola, R., 2016, Advances in Mobile Cloud Computing and Big Data under the 5G Era. Mavromoustakis, C., Mastorakis, G. & Dobre, C. (eds.). p. 65-113 (Studies in Big Data; vol. 22).

      Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

    • Preserving Privacy for Trust-Based Unwanted Traffic Control with Homomorphic Encryption

      Zhang, L., Yan, Z. & Kantola, R., 2018, Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives. Gupta, B. B., Agrawal, D. P. & Wang, H. (eds.). p. 389-424 36 p.

      Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

    • Security Design for D2D

      Wang, M. & Yan, Z., 2019, Wiley 5G Ref: The Essential 5G Reference Online . JOHN WILEY & SONS

      Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

    • Security of Scalable Video Coding: Encryption and Authentication

      Wei, Z., Won Lo, S., Wu, Y., Yang, Y., Yan, Z. & Deng, R. H., 2018, Cryptographic and Information Security Approaches for Images and Videos. Ramakrishnan, S. (ed.). p. 171-210

      Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

    • Towards Trustworthy Mobile Social Networking

      Yan, Z., Chen, Y., Zhang, P. & Kantola, R., 2013, Mobile Social Networking: An Innovative Approach. Chin, A. & Zhang, D. (eds.). p. 195-236

      Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

    • Trust Management in Mobile Platforms

      Yan, Z., Cheng, Y., Yan, P. & Deng, R. H., 2017, Handbook of Blockchain, Digital Finance, and Inclusion: ChinaTech, Mobile Security, and Distributed Ledger. Chen, D. LEE. K. & Deng, R. (eds.). ACADEMIC PRESS, Vol. 2. p. 83-113

      Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

    • Unwanted Traffic Detection and Control Based on Trust Management

      Yan, Z., Kantola, R., Zhang, L. & Ma, Y., 1 Jan 2017, Information Fusion for Cyber-Security Analytics. Alsmadi, I. M., Karabatis, G. & AlEroud, A. (eds.). p. 77-109 33 p. (Studies in computational intelligence; vol. 691).

      Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

      1 Citation (Scopus)
    Your message has successfully been sent.
    Your message was not sent due to an error.