Geng Yang

Orcid: 0000-0001-7740-2401

Affiliations:
  • Nanjing University of Posts and Telecommunication, Nanjing, China


According to our database1, Geng Yang authored at least 106 papers between 2003 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Verifiable privacy-preserving spatial-keyword range query in cloud.
J. Supercomput., October, 2025

Privacy-Preserving Contact Query Processing Over Trajectory Data in Mobile Cloud Computing.
IEEE Trans. Mob. Comput., March, 2025

An Intelligent Ride-Sharing Recommendation Method Based on Graph Neural Network and Evolutionary Computation.
IEEE Trans. Intell. Transp. Syst., January, 2025

Robust Federated Learning for Privacy Preservation and Efficiency in Edge Computing.
IEEE Trans. Serv. Comput., 2025

EPSRQ: Efficient Privacy-Preserving Spatial-Keyword Range Query Processing in Cloud.
IEEE Trans. Inf. Forensics Secur., 2025

DBSSL: A Scheme to Detect Backdoor Attacks in Self-Supervised Learning Models.
IEEE Trans. Dependable Secur. Comput., 2025

Federated adaptive pruning with differential privacy.
Future Gener. Comput. Syst., 2025

EDP-CVSM model-based multi-keyword ranked search scheme over encrypted cloud data.
Future Gener. Comput. Syst., 2025

ACSFL: An adaptive client selection-based Federated Learning with personalized differential privacy for heterogeneous AIoT environments.
Comput. Commun., 2025

2024
ECEQ: efficient multi-source contact event query processing for moving objects.
World Wide Web (WWW), November, 2024

DAFL: Domain adaptation-based federated learning for privacy-preserving biometric recognition.
Future Gener. Comput. Syst., January, 2024

VPPFL: A verifiable privacy-preserving federated learning scheme against poisoning attacks.
Comput. Secur., January, 2024

EPSMR: An efficient privacy-preserving semantic-aware multi-keyword ranked search scheme in cloud.
Future Gener. Comput. Syst., 2024

EDSS: An Exemplar Dataset Search Service over Encrypted Spatial Datasets.
Proceedings of the IEEE International Conference on Web Services, 2024

KCPMA: k-degree Contact Pattern Mining Algorithms for Moving Objects.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

Privacy-preserving Spatial Dataset Search in Cloud.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024

EPCQ: Efficient Privacy-Preserving Contact Query Processing over Trajectory Data in Cloud.
Proceedings of the Web and Big Data - 8th International Joint Conference, 2024

2023
A novel semantic-aware search scheme based on BCI-tree index over encrypted cloud data.
World Wide Web (WWW), September, 2023

EVSS: An efficient verifiable search scheme over encrypted cloud data.
World Wide Web (WWW), July, 2023

A Lightweight Matrix Factorization for Recommendation With Local Differential Privacy in Big Data.
IEEE Trans. Big Data, February, 2023

TBAC: A Fine-Grained Topic-Based Access Control Model for Text Data.
IEEE Trans. Serv. Comput., 2023

Privacy-Preserving and Verifiable Federated Learning Framework for Edge Computing.
IEEE Trans. Inf. Forensics Secur., 2023

Privacy-Preserving Split Learning for Large-Scaled Vision Pre-Training.
IEEE Trans. Inf. Forensics Secur., 2023

BP-Model-based convoy mining algorithms for moving objects.
Expert Syst. Appl., 2023

TFS-index-based Multi-keyword Ranked Search Scheme Over Cloud Encrypted Data.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Efficient Multi-source Contact Event Query Processing for Moving Objects.
Proceedings of the IEEE International Conference on Data Mining, 2023

A Human Pose Similarity Calculation Method Based on Partition Weighted OKS Model.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

An Urban Electric Load Forecasting Model Using Discrepancy Compensation and Short-term Sampling Contrastive Loss in LSTM.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
NttpFL: Privacy-Preserving Oriented No Trusted Third Party Federated Learning System Based on Blockchain.
IEEE Trans. Netw. Serv. Manag., December, 2022

FASE: A Fast and Accurate Privacy-Preserving Multi-Keyword Top-k Retrieval Scheme Over Encrypted Cloud Data.
IEEE Trans. Serv. Comput., 2022

PFLF: Privacy-Preserving Federated Learning Framework for Edge Computing.
IEEE Trans. Inf. Forensics Secur., 2022

Enhanced Semantic-Aware Multi-Keyword Ranked Search Scheme Over Encrypted Cloud Data.
IEEE Trans. Cloud Comput., 2022

Accuracy-first and efficiency-first privacy-preserving semantic-aware ranked searches in the cloud.
Int. J. Intell. Syst., 2022

CSMRS: An Efficient and Effective Semantic-aware Ranked Search Scheme over Encrypted Cloud Data.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

Multi-source Infection Pattern Mining Algorithms over Moving Objects.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

SAPMS: A Semantic-Aware Privacy-Preserving Multi-keyword Search Scheme in Cloud.
Proceedings of the Web and Big Data - 6th International Joint Conference, 2022

2021
Travel Trajectory Frequent Pattern Mining Based on Differential Privacy Protection.
Wirel. Commun. Mob. Comput., 2021

Drone-Small-Cell-Assisted Resource Slicing for 5G Uplink Radio Access Networks.
IEEE Trans. Veh. Technol., 2021

ECMA: An Efficient Convoy Mining Algorithm for Moving Objects.
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021

2020
Efficient Privacy Preserving Data Collection and Computation Offloading for Fog-Assisted IoT.
IEEE Trans. Sustain. Comput., 2020

Fog-based Optimized Kronecker-Supported Compression Design for Industrial IoT.
IEEE Trans. Sustain. Comput., 2020

A Multibranch Search Tree-Based Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data.
Secur. Commun. Networks, 2020

RCBAC: A risk-aware content-based access control model for large-scale text data.
J. Netw. Comput. Appl., 2020

QHSE: An efficient privacy-preserving scheme for blockchain-based transactions.
Future Gener. Comput. Syst., 2020

FSSE: An Effective Fuzzy Semantic Searchable Encryption Scheme Over Encrypted Cloud Data.
IEEE Access, 2020

A Privacy-Preserving Multi-Keyword Ranked Search Over Encrypted Data in Hybrid Clouds.
IEEE Access, 2020

A Privacy-preserving and Collusion-resisting Top-k Query Processing in WSNs.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

Detection of Loose Tracking Behavior over Trajectory Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

2019
Laplace Input and Output Perturbation for Differentially Private Principal Components Analysis.
Secur. Commun. Networks, 2019

面向云环境的多关键词密文排序检索研究综述 (Research on Multi-keyword Ranked Search over Encrypted Cloud Data).
计算机科学, 2019

Semantic-aware multi-keyword ranked search scheme over encrypted cloud data.
J. Netw. Comput. Appl., 2019

An Efficient and Dynamic Semantic-Aware Multikeyword Ranked Search Scheme Over Encrypted Cloud Data.
IEEE Access, 2019

Effective Matrix Factorization for Recommendation with Local Differential Privacy.
Proceedings of the Science of Cyber Security - Second International Conference, 2019

A Parallel Multi-keyword Top-k Search Scheme over Encrypted Cloud Data.
Proceedings of the Network and Parallel Computing, 2019

Privacy-Preserving MAX/MIN Query Processing for WSN -as-a -Service.
Proceedings of the 2019 IFIP Networking Conference, 2019

CABAC: A Content-Driven Attribute-Based Access Control Model for Big Data.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

A Privacy-Preserving Multi-keyword Ranked Search over Encrypted Data in Hybrid Clouds.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

PMRS: A Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

2018
Public Key-Based Authentication and En-Route Filtering Scheme in Wireless Sensor Networks.
Sensors, 2018

A Novel Secure Scheme for Supporting Complex SQL Queries over Encrypted Databases in Cloud Computing.
Secur. Commun. Networks, 2018

Privacy-Preserving Oriented Floating-Point Number Fully Homomorphic Encryption Scheme.
Secur. Commun. Networks, 2018

Privacy-Preserving Sorting Algorithms Based on Logistic Map for Clouds.
Secur. Commun. Networks, 2018

基于安全比较码的云环境隐私保护排序方法 (Secure Comparator Based Privacy-preserving Sorting Algorithms for Clouds).
计算机科学, 2018

面向云环境的一致性可验证单关键词检索方法 (Integrity-verifying Single Keyword Search Method in Clouds).
计算机科学, 2018

Efficient Geographical Information-Based En-route Filtering Scheme in Wireless Sensor Networks.
KSII Trans. Internet Inf. Syst., 2018

QSDB: An Encrypted Database Model for Privacy-Preserving in Cloud Computing.
KSII Trans. Internet Inf. Syst., 2018

Data Reconstruction in Wireless Sensor Networks From Incomplete and Erroneous Observations.
IEEE Access, 2018

An Efficient Multi-keyword top-k Search Scheme over Encrypted Cloud Data.
Proceedings of the 15th International Symposium on Pervasive Systems, 2018

Fog Computing Assisted Efficient Privacy Preserving Data Collection for Big Sensory Data.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Attribute-Based Access Control with Constant-Size Ciphertext in Cloud Computing.
IEEE Trans. Cloud Comput., 2017

MUSE: An Efficient and Accurate Verifiable Privacy-Preserving Multikeyword Text Search over Encrypted Cloud Data.
Secur. Commun. Networks, 2017

两层传感器网络中安全Top-k查询处理技术综述 (Overview of Secure Top-k Query Processing in Two-tiered Wireless Sensor Networks).
计算机科学, 2017

Anomaly-Tolerant Traffic Matrix Estimation via Prior Information Guided Matrix Completion.
IEEE Access, 2017

Secure MAX/MIN Queries in Two-Tiered Wireless Sensor Networks.
IEEE Access, 2017

A Verifiable Single Keyword Top-k Search Scheme against Insider Attacks over Cloud Data.
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017

2016
CSRQ: Communication-Efficient Secure Range Queries in Two-Tiered Sensor Networks.
Sensors, 2016

Random Secure Comparator Selection Based Privacy-Preserving MAX/MIN Query Processing in Two-Tiered Sensor Networks.
J. Sensors, 2016

VP<sup>2</sup>RQ: Efficient verifiable privacy-preserving range query processing in two-tiered wireless sensor networks.
Int. J. Distributed Sens. Networks, 2016

Constructing Maximum-Lifetime Data-Gathering Tree in WSNs Based on Compressed Sensing.
Int. J. Distributed Sens. Networks, 2016

2015
Correlation consistency constrained matrix completion for web service tag refinement.
Neural Comput. Appl., 2015

Efficient Verifiable Top-k Queries in Two-tiered Wireless Sensor Networks.
KSII Trans. Internet Inf. Syst., 2015

Switching Algorithm with Prediction Strategy for Maximizing Lifetime in Wireless Sensor Network.
Int. J. Distributed Sens. Networks, 2015

A Novel Cooperative ARQ Method for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

Probabilistic Trust Evaluation with Inaccurate Reputation Reports.
Int. J. Distributed Sens. Networks, 2015

Toward reliable data analysis for Internet of Things by Bayesian dynamic modeling and computation.
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015

2014
An Efficient Secure Data Aggregation Based on Homomorphic Primitives in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

LEDFD: A Low Energy Consumption Distributed Fault Detection Algorithm for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

Tag Completion and Refinement for Web Service via Low-Rank Matrix Completion.
Proceedings of the Trends and Applications in Knowledge Discovery and Data Mining, 2014

2013
Clustering facilitated web services discovery model based on supervised term weighting and adaptive metric learning.
Int. J. Web Eng. Technol., 2013

Precision-Enhanced and Encryption-Mixed Privacy-Preserving Data Aggregation in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

EMQP: An Energy-Efficient Privacy-Preserving MAX/MIN Query Processing in Tiered Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

EVTQ: An Efficient Verifiable Top-k Query Processing in Two-Tiered Wireless Sensor Networks.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

2012
Information Encryption Based on Virtual Optical Imaging System and Chen's Chaos.
Proceedings of the Web Information Systems and Mining - International Conference, 2012

A Code Dissemination Protocol of Low Energy Consumption.
Proceedings of the Web Information Systems and Mining - International Conference, 2012

A Novel Identity-Based Key Management and Encryption Scheme for Distributed System.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

A load-balanced data aggregation scheduling for duty-cycled wireless sensor networks.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

2011
Design and Analysis of a Secure Routing Protocol Algorithm for Wireless Sensor Networks.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011

2010
Web Service Generation through Program Slicing.
Int. J. Commun. Netw. Syst. Sci., 2010

WordNet-powered Web Services Discovery Using Kernel-Based Similarity Matching Mechanism.
Proceedings of the Fifth IEEE International Symposium on Service-Oriented System Engineering, 2010

2008
Di-GAFR: Directed Greedy Adaptive Face-Based Routing.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

2006
Combined Method for Nonlinear Systems of Equations.
Proceedings of the Computational Science, 2006

Performance Analysis of Block Jacobi Preconditioning Technique Based on Block Broyden Method.
Proceedings of the Computational Science, 2006

2005
A Scalable Security Architecture for Grid.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

A Novel Security Model Based on Virtual Organization for Grid.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

2004
A Grid Portal Model Based on Security and Storage Resource Proxy.
Proceedings of the Computational and Information Science, First International Symposium, 2004

2003
A Distributed Honeypot System for Grid Security.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003


  Loading...