Digitalizing Trust for Securing Pervasive Social Networking

  • Yan, Zheng (Principal investigator)
Filter
Conference article in proceedings

Search results

  • 2023

    A Two-layer Game-based Incentive Mechanism for Decentralized Crowdsourcing

    Han, R., Liang, X. & Yan, Z., 11 Jan 2023, GLOBECOM 2022 - 2022 IEEE Global Communications Conference. IEEE, p. 927-933 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    56 Downloads (Pure)
  • 2022

    Privacy-preserving D2D Cooperative Location Verification

    Liu, S., Yan, Z. & Kantola, R., Feb 2022, 2021 IEEE Global Communications Conference, GLOBECOM 2021 - Proceedings. IEEE, 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    3 Citations (Scopus)
    125 Downloads (Pure)
  • 2021

    Interpretation-enabled Software Reuse Detection Based on a Multi-Level Birthmark Model

    Xu, X., Zheng, Q., Yan, Z., Fan, M., Jia, A. & Liu, T., 7 May 2021, Proceedings of 43rd IEEE/ACM International Conference on Software Engineering, ICSE 2021. IEEE, p. 873-884 12 p. (Proceedings - International Conference on Software Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    12 Citations (Scopus)
    182 Downloads (Pure)
  • Physical Layer Key Generation between Backscatter Devices over Ambient RF Signals

    Wang, P., Jiao, L., Zeng, K. & Yan, Z., May 2021, INFOCOM 2021 - IEEE Conference on Computer Communications. IEEE, 10 p. 9488885. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    7 Citations (Scopus)
    84 Downloads (Pure)
  • Secure Outsourced Top-k Selection Queries against Untrusted Cloud Service Providers

    Yu, X., Hu, Y., Zhang, R., Yan, Z. & Zhang, Y., 26 Aug 2021, Proceedings of IEEE/ACM 29th International Symposium on Quality of Service, IWQOS 2021. IEEE, 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    4 Citations (Scopus)
    88 Downloads (Pure)
  • 2020

    AnonyTrust: An Anonymous Trust Authentication System for Pervasive Social Networking

    Wang, P., He, L., Yan, Z. & Feng, W., 2020, Security and Privacy in Digital Economy - 1st International Conference, SPDE 2020, Proceedings. Yu, S., Mueller, P. & Qian, J. (eds.). Springer, p. 643-660 18 p. (Communications in Computer and Information Science; vol. 1268 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    129 Downloads (Pure)
  • B4SDC: A Blockchain System for Security Data Collection in MANETs

    Liu, G., Dong, H. & Yan, Z., Jun 2020, 2020 IEEE International Conference on Communications, ICC 2020 - Proceedings. IEEE, 6 p. 9149192. (IEEE International Conference on Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    13 Citations (Scopus)
    305 Downloads (Pure)
  • Privacy-preserving Computation over Encrypted Vectors

    Hu, R., Ding, W. & Yan, Z., Dec 2020, 2020 IEEE Global Communications Conference, GLOBECOM 2020 - Proceedings. IEEE, 6 p. 9322329. (IEEE Global Communications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    94 Downloads (Pure)
  • Trusted Network Slicing among Multiple Mobile Network Operators

    Muhammad, Y., Yan, Z., Wang, M. & Khan, F., Dec 2020, Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020. Wang, G., Ko, R., Bhuiyan, M. Z. A. & Pan, Y. (eds.). IEEE, p. 1135-1140 6 p. 9343054. (IEEE International Conference on Trust, Security and Privacy in Computing and Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    172 Downloads (Pure)
  • Verifiable Edge Computing for Indoor Positioning

    Liu, S. & Yan, Z., Jun 2020, 2020 IEEE International Conference on Communications, ICC 2020 - Proceedings. IEEE, 6 p. 9148819. (IEEE International Conference on Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    5 Citations (Scopus)
    176 Downloads (Pure)
  • 2019

    AAKA-D2D: Anonymous Authentication and Key Agreement Protocol in D2D Communications

    Wang, M., Yan, Z., Song, B. & Atiquzzaman, M., 2019, 2019 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Internet of People and Smart City Innovation. IEEE, p. 1356-1362 9060128

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    8 Citations (Scopus)
    189 Downloads (Pure)
  • Blockchain Based Data Transmission Control for Tactical Data Link

    Leng, W., Li, Y., Yang, X., Yan, Z. & Chen, L., 5 Nov 2019, Smart City and Informatization: iSCI 2019. Wang, G., El Saddik, A., Lai, X., Martinez Perez, G. & Choo, KK. (eds.). Springer, p. 583-595 (Communications in Computer and Information Science; vol. 1122).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    1 Citation (Scopus)
  • Computing Maximum and Minimum with Privacy Preservation and Flexible Access Control

    Ding, W., Yan, Z., Qian, X. R. & Deng, R. H., 2019, IEEE Global Communications Conference. IEEE, 9013937. (IEEE Global Communications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    175 Downloads (Pure)
  • Detection of Application-Layer Tunnels with Rules and Machine Learning

    Lin, H., Liu, G. & Yan, Z., 1 Jan 2019, Security, Privacy, and Anonymity in Computation, Communication, and Storage - 12th International Conference, SpaCCS 2019, Proceedings. Lu, R., Feng, J., Wang, G. & Bhuiyan, M. Z. A. (eds.). Springer, p. 441-455 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11611 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    10 Citations (Scopus)
    303 Downloads (Pure)
  • Game Theoretical Study on a Client-Controlled Deduplication Scheme

    Liang, X., Yan, Z., Ding, W. X. & Deng, R. H., 2019, 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI). IEEE, p. 1154-1161 9060098

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    159 Downloads (Pure)
  • Optimal Resource Allocation for Secure Multi-User Wireless Powered Backscatter Communication with Artificial Noise

    Wang, P., Wang, N., Dabaghchian, M., Zeng, K. & Yan, Z., 1 Apr 2019, INFOCOM 2019 - IEEE Conference on Computer Communications. IEEE, p. 460-468 9 p. 8737501. (Proceedings - IEEE INFOCOM; vol. 2019-April).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    17 Citations (Scopus)
    309 Downloads (Pure)
  • 2018

    A study and simulation research of blackhole attack on mobile adhoc network

    Li, G., Yan, Z. & Fu, Y., 10 Aug 2018, 2018 IEEE Conference on Communications and Network Security, CNS 2018. IEEE, 8433148

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    20 Citations (Scopus)
  • IRTED-TL An Inter-Region Tax Evasion Detection Method Based on Transfer Learning

    Zhu, X., Yan, Z., Ruan, J., Zheng, Q. & Dong, B., 5 Sept 2018, Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018. IEEE, p. 1224-1235 12 p. 8456038. (IEEE International Conference on Trust, Security and Privacy in Computing and Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    15 Citations (Scopus)
    511 Downloads (Pure)