Cungang Yang

Orcid: 0009-0006-9348-1000

According to our database1, Cungang Yang authored at least 37 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Energy and Latency Efficient Joint Communication and Computation Optimization in a Multi-UAV-Assisted MEC Network.
IEEE Trans. Wirel. Commun., March, 2024

2023
Queue-Aware Computation Efficient Optimization for MEC-Assisted Aerial-Terrestrial Network.
Proceedings of the 34th IEEE Annual International Symposium on Personal, 2023

2022
Joint User Association, Power Optimization and Trajectory Control in an Integrated Satellite-Aerial-Terrestrial Network.
IEEE Trans. Wirel. Commun., 2022

2021
Hand Gesture Recognition Using CNN & Publication of World's Largest ASL Database.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

2020
Secure Sharing of Data for Dynamic Group in Public Cloud.
Int. J. Netw. Secur., 2020

Design of Key Management Protocols for Internet of Things.
Int. J. Netw. Secur., 2020

Dynamic Resource Management to Enhance Video Streaming Experience in a C-V2X Network.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

2019
SMDP-Based Prioritized Channel Allocations in Vehicular Ad Hoc Networks.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

2018
Secure and Efficient Authentication Protocol for Power System Computer Networks.
Int. J. Netw. Secur., 2018

A Lightweight Authentication Protocol in Smart Grid.
Int. J. Netw. Secur., 2018

A Group Key Management Protocol for Mobile Devices.
Proceedings of the Nineteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2018

(WIP) Authenticated Key Management Protocols for Internet of Things.
Proceedings of the 2018 IEEE International Congress on Internet of Things, 2018

A Novice Group Sharing Method for Public Cloud.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

2013
Privacy protection for RBAC in service oriented architecture.
Proceedings of the 26th IEEE Canadian Conference on Electrical and Computer Engineering CCECE 2013, 2013

2012
A secure multiparty micropayment protocol for internet access over WLAN wireless mesh networks.
Proceedings of the 25th IEEE Canadian Conference on Electrical and Computer Engineering, 2012

2011
Secure Routing for Wireless Mesh Networks.
Int. J. Netw. Secur., 2011

2010
SEAODV: A Security Enhanced AODV Routing Protocol for Wireless Mesh Networks.
Trans. Comput. Sci., 2010

2008
Location-based design for secure and efficient wireless sensor networks.
Comput. Networks, 2008

A Security Protocol for Wireless Sensor Networks.
Proceedings of the Wireless Sensor and Actor Networks II, 2008

2007
Key management for role hierarchy in distributed systems.
J. Netw. Comput. Appl., 2007

Designing secure e-commerce with role-based access control.
Int. J. Web Eng. Technol., 2007

Designing of ORBAC Model For Secure Domain Environments.
Int. J. Netw. Secur., 2007

M-CLIQUES: Modified CLIQUES key agreement for secure multicast.
Comput. Secur., 2007

2006
An Approach to XML-Based Administration and Secure Information Flow Analysis on an Object Oriented Role-Based Access Control Model.
J. Inf. Sci. Eng., 2006

A Role-Based Multilevel Security Access Control Model.
J. Comput. Inf. Syst., 2006

Secure Internet Applications Based on Mobile Agents.
Int. J. Netw. Secur., 2006

2005
A Privacy Enhanced Role-Based Access Control Model for Enterprises.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

2004
An XML-Based Administration Method on Role-Based Access Control in Distributed Systems.
Int. J. Comput. Their Appl., 2004

Access control in a hierarchy using one-way hash functions.
Comput. Secur., 2004

2003
Integrating Object Oriented Role-Based Access Control Model with Mandatory Access Control Principles.
J. Comput. Inf. Syst., 2003

An XML-based administration method on role-based access control in the enterprise environment.
Inf. Manag. Comput. Secur., 2003

Designing Secure E-Commerce with Role-based Access Control.
Proceedings of the 2003 IEEE International Conference on Electronic Commerce (CEC 2003), 2003

An Approach to Secure Information Flow on Object Oriented Role-based Access Control Model.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003

Secure Web-based Applications with XML and RBAC.
Proceedings of the IEEE Systems, 2003

2002
Designing a Complete Model of Role-based Access Control System for Distributed Networks.
J. Inf. Sci. Eng., 2002

Information flow analysis on role-based access control model.
Inf. Manag. Comput. Secur., 2002

2001
An Object-Oriented RBAC Model for Distributed System.
Proceedings of the 2001 Working IEEE / IFIP Conference on Software Architecture (WICSA 2001), 2001


  Loading...