Jingyu Feng

According to our database1, Jingyu Feng authored at least 29 papers between 2010 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Blockchain-Based Data Management and Edge-Assisted Trusted Cloaking Area Construction for Location Privacy Protection in Vehicular Networks.
IEEE Internet Things J., 2021

Blockchain-assisted Undisclosed IIoT Vulnerabilities Trusted Sharing Protection with Dynamic Token.
CoRR, 2021

2020
A Comprehensive Survey on Local Differential Privacy toward Data Statistics and Analysis.
Sensors, 2020

Towards random-honest miners selection and multi-blocks creation: Proof-of-negotiation consensus mechanism in blockchain networks.
Future Gener. Comput. Syst., 2020

A Comprehensive Survey on Local Differential Privacy Toward Data Statistics and Analysis in Crowdsensing.
CoRR, 2020

An Efficient and Secure Data Integrity Auditing Scheme with Traceability for Cloud-Based EMR.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
Securing Cooperative Spectrum Sensing against DC-SSDF Attack Using Trust Fluctuation Clustering Analysis in Cognitive Radio Networks.
Wirel. Commun. Mob. Comput., 2019

Securing Traffic-Related Messages Exchange Against Inside-and-Outside Collusive Attack in Vehicular Networks.
IEEE Internet Things J., 2019

Ensuring Honest Data Collection Against Collusive CSDF Attack With Binary-Minmaxs Clustering Analysis in Mobile Crowd Sensing.
IEEE Access, 2019

PoTN: A Novel Blockchain Consensus Protocol with Proof-of-Trust Negotiation in Distributed IoT Networks.
Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, 2019

2018
Securing Cooperative Spectrum Sensing Against Collusive False Feedback Attack in Cognitive Radio Networks.
IEEE Trans. Veh. Technol., 2018

Securing Cooperative Spectrum Sensing Against Collusive SSDF Attack using XOR Distance Analysis in Cognitive Radio Networks.
Sensors, 2018

2017
Avoiding monopolization: mutual-aid collusive attack detection in cooperative spectrum sensing.
Sci. China Inf. Sci., 2017

Securing multi-channel selection using distributed trust in cognitive radio ad hoc networks.
Ad Hoc Networks, 2017

2016
Supporting secure spectrum sensing data transmission against SSDH attack in cognitive radio ad hoc networks.
J. Netw. Comput. Appl., 2016

Supporting Trusted Soft Decision Scheme Using Volatility Decay in Cooperative Spectrum Sensing.
KSII Trans. Internet Inf. Syst., 2016

2015
Securing cooperative spectrum sensing against ISSDF attack using dynamic trust evaluation in cognitive radio networks.
Secur. Commun. Networks, 2015

Behave Well: How to Win a Pop Vacant Band via Cooperative Spectrum Sensing.
KSII Trans. Internet Inf. Syst., 2015

2014
Securing Cooperative Spectrum Sensing against Rational SSDF Attack in Cognitive Radio Networks.
KSII Trans. Internet Inf. Syst., 2014

Social Incentives for Cooperative Spectrum Sensing in Distributed Cognitive Radio Networks.
KSII Trans. Internet Inf. Syst., 2014

A Soft Decision Scheme against Intermittent SSDF Attack in Cooperative Spectrum Sensing.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

2013
Defend against Collusive SSDF Attack Using Trust in Cooperative Spectrum Sensing Environment.
Proceedings of the 12th IEEE International Conference on Trust, 2013

2012
An efficient handover authentication scheme with privacy preservation for IEEE 802.16m network.
Comput. Secur., 2012

Dealing with dishonest recommendation: The trials in reputation management court.
Ad Hoc Networks, 2012

2011
Security Issues and Solutions of the Key Management Protocols in IEEE 802.16j Multi-Hop Relay Network.
IEICE Trans. Commun., 2011

EKMP: An enhanced key management protocol for IEEE 802.16m.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

2010
A Trust Management Model Based on Bi-evaluation in P2P Networks.
IEICE Trans. Inf. Syst., 2010

A Study of Mutual Authentication for P2P Trust Management.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Coping with Traitor Attacks in Reputation Models for Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2010


  Loading...