Kan Yang

Orcid: 0000-0003-4234-9596

Affiliations:
  • University of Memphis, Department of Computer Science, TN, USA
  • University of Waterloo, Department of Electrical and Computer Engineering, ON, Canada (2014 - 2016)
  • City University of Hong Kong, Department of Computer Science, Hong Kong (PhD 2013)


According to our database1, Kan Yang authored at least 77 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Blockchain-Based Portable Authenticated Data Transmission for Mobile Edge Computing: A Universally Composable Secure Solution.
IEEE Trans. Computers, April, 2024

PBFL: Privacy-Preserving and Byzantine-Robust Federated-Learning-Empowered Industry 4.0.
IEEE Internet Things J., February, 2024

Guest Editorial Special Issue on Recent Advances of Security, Privacy, and Trust in Mobile Crowdsourcing.
IEEE Internet Things J., January, 2024

Towards Fair, Robust and Efficient Client Contribution Evaluation in Federated Learning.
CoRR, 2024

2023
A Novel Blockchain-Assisted Aggregation Scheme for Federated Learning in IoT Networks.
IEEE Internet Things J., October, 2023

Blockchain-based cloud-edge clock calibration in IoT.
Peer Peer Netw. Appl., May, 2023

Clustered Federated Multitask Learning on Non-IID Data With Enhanced Privacy.
IEEE Internet Things J., February, 2023

Efficient and Provably Secure Data Selective Sharing and Acquisition in Cloud-Based Systems.
IEEE Trans. Inf. Forensics Secur., 2023

Decentralized Compromise-Tolerant Public Key Management Ecosystem with Threshold Validation.
IACR Cryptol. ePrint Arch., 2023

Privacy-Preserving Cross-Facility Early Warning for Unknown Epidemics.
IACR Cryptol. ePrint Arch., 2023

Beyond Security: Achieving Fairness in Mailmen-Assisted Timed Data Delivery.
IACR Cryptol. ePrint Arch., 2023

Multi-Criteria Client Selection and Scheduling with Fairness Guarantee for Federated Learning Service.
CoRR, 2023

FedTruth: Byzantine-Robust and Backdoor-Resilient Federated Learning Framework.
CoRR, 2023

2022
Delegating Authentication to Edge: A Decentralized Authentication Architecture for Vehicular Networks.
IEEE Trans. Intell. Transp. Syst., 2022

Reputation-Based Truth Discovery With Long-Term Quality of Source in Internet of Things.
IEEE Internet Things J., 2022

A new RFID ultra-lightweight authentication protocol for medical privacy protection in smart living.
Comput. Commun., 2022

2021
Privacy-Preserving Task Recommendation Services for Crowdsourcing.
IEEE Trans. Serv. Comput., 2021

PROTECT: Efficient Password-Based Threshold Single-Sign-On Authentication for Mobile Users against Perpetual Leakage.
IEEE Trans. Mob. Comput., 2021

Anonymous and Privacy-Preserving Federated Learning With Industrial Big Data.
IEEE Trans. Ind. Informatics, 2021

Proxy-Free Privacy-Preserving Task Matching with Efficient Revocation in Crowdsourcing.
IEEE Trans. Dependable Secur. Comput., 2021

PMAB: A Public Mutual Audit Blockchain for Outsourced Data in Cloud Storage.
Secur. Commun. Networks, 2021

Secure and Efficient Task Matching with Multi-keyword in Multi-requester and Multi-worker Crowdsourcing.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

A Trust-aware Fog Offloading Game with Long-term Trustworthiness of Users.
Proceedings of the IEEE Global Communications Conference, 2021

2020
Experience Blocking Ratio Based Game Theoretic Approach for Spectrum Sharing in Heterogeneous Networks.
IEEE Trans. Netw. Sci. Eng., 2020

VerifyNet: Secure and Verifiable Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2020

A Weight-based k-prototypes Algorithm for Anomaly Detection in Smart Grid.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Secure and Verifiable Inference in Deep Neural Networks.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Enabling Efficient and Geometric Range Query With Access Control Over Encrypted Spatial Data.
IEEE Trans. Inf. Forensics Secur., 2019

Blockchain-Based Decentralized Trust Management in Vehicular Networks.
IEEE Internet Things J., 2019

SybSub: Privacy-Preserving Expressive Task Subscription With Sybil Detection in Crowdsourcing.
IEEE Internet Things J., 2019

Blockchain-Based Secure Time Protection Scheme in IoT.
IEEE Internet Things J., 2019

Data Security Issues in Deep Learning: Attacks, Countermeasures, and Opportunities.
IEEE Commun. Mag., 2019

2018
HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems.
IEEE Trans. Ind. Informatics, 2018

Exploiting Social Network to Enhance Human-to-Human Infection Analysis without Privacy Leakage.
IEEE Trans. Dependable Secur. Comput., 2018

Querying in Internet of Things with Privacy Preserving: Challenges, Solutions and Opportunities.
IEEE Netw., 2018

Anonymous Privacy-Preserving Task Matching in Crowdsourcing.
IEEE Internet Things J., 2018

TKSE: Trustworthy Keyword Search Over Encrypted Data With Two-Side Verifiability via Blockchain.
IEEE Access, 2018

SybMatch: Sybil Detection for Privacy-Preserving Task Matching in Crowdsourcing.
Proceedings of the IEEE Global Communications Conference, 2018

2017
PN Ranging Based on Noncommensurate Sampling: Zero-Bias Mitigation Methods.
IEEE Trans. Aerosp. Electron. Syst., 2017

Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms.
Inf. Sci., 2017

Identifying the Most Valuable Workers in Fog-Assisted Spatial Crowdsourcing.
IEEE Internet Things J., 2017

An Efficient and Fine-Grained Big Data Access Control Scheme With Privacy-Preserving Policy.
IEEE Internet Things J., 2017

Multi-message Authentication over Noisy Channel with Secure Channel Codes.
CoRR, 2017

Achieving efficient and privacy-preserving truth discovery in crowd sensing systems.
Comput. Secur., 2017

Security and Privacy in Smart City Applications: Challenges and Solutions.
IEEE Commun. Mag., 2017

Optimal Control Theory-Based Epidemic Information Spreading Scheme for Mobile Social Users With Energy Constraint.
IEEE Access, 2017

A blockchain-based reputation system for data credibility assessment in vehicular networks.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

QoE loss probability based game-theoretic approach for spectrum sharing in heterogeneous networks.
Proceedings of the IEEE International Conference on Communications, 2017

CryptMDB: A practical encrypted MongoDB over big data.
Proceedings of the IEEE International Conference on Communications, 2017

2016
Exploiting Secure and Energy-Efficient Collaborative Spectrum Sensing for Cognitive Radio Sensor Networks.
IEEE Trans. Wirel. Commun., 2016

Optimal Reliability in Energy Harvesting Industrial Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2016

Design of Analytical Model and Algorithm for Optimal Roadside AP Placement in VANETs.
IEEE Trans. Veh. Technol., 2016

Time-Domain Attribute-Based Access Control for Cloud-Based Video Content Sharing: A Cryptographic Approach.
IEEE Trans. Multim., 2016

Big data-driven optimization for mobile networks toward 5G.
IEEE Netw., 2016

2015
Security and privacy for mobile healthcare networks: from a quality of protection perspective.
IEEE Wirel. Commun., 2015

Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud.
IEEE Trans. Parallel Distributed Syst., 2015

Security and privacy in mobile crowdsourcing networks: challenges and opportunities.
IEEE Commun. Mag., 2015

Dynamic bandwidth allocation in mobile social networks with multiple homing access.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015

Identity-preserving public auditing for shared cloud data.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015

Exploiting mobile social behaviors for Sybil detection.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Generalized pattern matching string search on encrypted data in cloud systems.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

2014
Security for Cloud Storage Systems.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-7873-7, 2014

Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage.
IEEE Trans. Parallel Distributed Syst., 2014

Privacy-Preserving Data Publish-Subscribe Service on Cloud-based Platforms.
IACR Cryptol. ePrint Arch., 2014

Enabling efficient access control with dynamic policy updating for big data in the cloud.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

2013
An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing.
IEEE Trans. Parallel Distributed Syst., 2013

DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems.
IEEE Trans. Inf. Forensics Secur., 2013

DAC-MACS: Effective data access control for multi-authority cloud storage systems.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Multi-path Routing and Stream Scheduling with Spatial Multiplexing and Interference Cancellation in MIMO Networks.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

Energy Saving Virtual Machine Allocation in Cloud Computing.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

Attribute-based fine-grained access control with efficient revocation in cloud storage systems.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Data storage auditing service in cloud computing: challenges, methods and opportunities.
World Wide Web, 2012

Attributed-Based Access Control for Multi-authority Systems in Cloud Storage.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012

2010
Minimum AP Placement for WLAN with Rate Adaptation Using Physical Interference Model.
Proceedings of the Global Communications Conference, 2010

A Distributed Collaborative Relay Protocol for Multi-Hop WLAN Accesses.
Proceedings of the Global Communications Conference, 2010

Threshold Key Redistribution for Dynamic Change of Authentication Group in Wireless Mesh Networks.
Proceedings of the Global Communications Conference, 2010

2008
Building QKD Networks Based On a Novel QKD Scheme.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008


  Loading...