Yanchao Zhang

Orcid: 0000-0002-0137-0922

According to our database1, Yanchao Zhang authored at least 159 papers between 2004 and 2023.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2019, "for contributions to wireless and mobile security".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Simultaneous Data Dissemination Among WiFi and ZigBee Devices.
IEEE/ACM Trans. Netw., December, 2023

Corrigendum to "Real-time strawberry detection using deep neural networks on embedded system (rtsd-net): An edge AI application" [Comput. Electron. Agric. 192 (2022) 106586].
Comput. Electron. Agric., December, 2023

Secure UHF RFID Authentication With Smart Devices.
IEEE Trans. Wirel. Commun., July, 2023

SmartMagnet: Proximity-Based Access Control for IoT Devices With Smartphones and Magnets.
IEEE Trans. Mob. Comput., July, 2023

Study of convolutional neural network-based semantic segmentation methods on edge intelligence devices for field agricultural robot navigation line extraction.
Comput. Electron. Agric., June, 2023

Rhythmic RFID Authentication.
IEEE/ACM Trans. Netw., April, 2023

MagAuth: Secure and Usable Two-Factor Authentication With Magnetic Wrist Wearables.
IEEE Trans. Mob. Comput., 2023

Freshness Authentication for Outsourced Multi-Version Key-Value Stores.
IEEE Trans. Dependable Secur. Comput., 2023

PhyAuth: Physical-Layer Message Authentication for ZigBee Networks.
Proceedings of the 32nd USENIX Security Symposium, 2023

Planar to Spatial: a Synapse Reconstruction Method to Rebuild Voxel Connections for Anisotropic Serial EM Images.
Proceedings of the 20th IEEE International Symposium on Biomedical Imaging, 2023

DUO: Stealthy Adversarial Example Attack on Video Retrieval Systems via Frame-Pixel Search.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

mmLock: User Leaving Detection Against Data Theft via High-Quality mmWave Radar Imaging.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023

2022
SpecKriging: GNN-Based Secure Cooperative Spectrum Sensing.
IEEE Trans. Wirel. Commun., 2022

(In)secure Acoustic Mobile Authentication.
IEEE Trans. Mob. Comput., 2022

Supervoxel-based brain tumor segmentation with multimodal MRI images.
Signal Image Video Process., 2022

Indoor MIMO-VLC Using Angle Diversity Transmitters.
Sensors, 2022

DOT-M: A Dual Offline Transaction Scheme of Central Bank Digital Currency for Trusted Mobile Devices.
IACR Cryptol. ePrint Arch., 2022

A novel method for data augmentation: Nine Dot Moving Least Square (ND-MLS).
CoRR, 2022

Complete and accurate holly fruits counting using YOLOX object detection.
Comput. Electron. Agric., 2022

Two-step ResUp&Down generative adversarial network to reconstruct multispectral image from aerial RGB image.
Comput. Electron. Agric., 2022

Real-time strawberry detection using deep neural networks on embedded system (rtsd-net): An edge AI application.
Comput. Electron. Agric., 2022

RCID: Fingerprinting Passive RFID Tags via Wideband Backscatter.
Proceedings of the IEEE INFOCOM 2022, 2022

A Self-diagnostic Flame Monitoring System Incorporating Acoustic, Optical, and Electrostatic Sensors.
Proceedings of the IEEE International Instrumentation and Measurement Technology Conference, 2022

CFDA-M: Coarse-to-Fine Domain Adaptation for Mitochondria Segmentation via Patch-wise Image Alignment and Online Self-training.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2022

WearRF-CLA: Continuous Location Authentication with Wrist Wearables and UHF RFID.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Verifiable Query Processing Over Outsourced Social Graph.
IEEE/ACM Trans. Netw., 2021

Deep Learning-Guided Jamming for Cross-Technology Wireless Networks: Attack and Defense.
IEEE/ACM Trans. Netw., 2021

Hybrid-Attention Enhanced Two-Stream Fusion Network for Video Venue Prediction.
IEEE Trans. Multim., 2021

Fusion of Multispectral Aerial Imagery and Vegetation Indices for Machine Learning-Based Ground Classification.
Remote. Sens., 2021

A comprehensive review on recent applications of unmanned aerial vehicle remote sensing with various sensors for high-throughput plant phenotyping.
Comput. Electron. Agric., 2021

Improving the Performance of Infrared and Visible Image Fusion Based on Latent Low-Rank Representation Nested With Rolling Guided Image Filtering.
IEEE Access, 2021

Infrared and Visible Image Fusion Method Based on ResNet in a Nonsubsampled Contourlet Transform Domain.
IEEE Access, 2021

GFU-Net: A Deep Learning Approach for Automatic Metal Crack Detection.
Proceedings of the Neural Computing for Advanced Applications, 2021

Secure Outsourced Top-k Selection Queries against Untrusted Cloud Service Providers.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

Differential Privacy-Preserving User Linkage across Online Social Networks.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

Your Home is Insecure: Practical Attacks on Wireless Home Alarm Systems.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

Bidirectional Underwater Blue-green Laser Communication Based on OFDM Modulation.
Proceedings of the ICCNS 2021: The 11th International Conference on Communication and Network Security, Weihai, China, December 3, 2021

DroneKey: A Drone-Aided Group-Key Generation Scheme for Large-Scale IoT Networks.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
IndoorWaze: A Crowdsourcing-Based Context-Aware Indoor Navigation System.
IEEE Trans. Wirel. Commun., 2020

Unified trade-off optimization of quantum Otto heat engines with squeezed thermal reservoirs.
Quantum Inf. Process., 2020

Automatic feature extraction in X-ray image based on deep learning approach for determination of bone age.
Future Gener. Comput. Syst., 2020

Research on Improved S Transform for the Feature Extraction of Power Quality Disturbance Signal.
IEEE Access, 2020

Countering cross-technology jamming attack.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

RF-Rhythm: Secure and Usable Two-Factor RFID Authentication.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

KV-Fresh: Freshness Authentication for Outsourced Multi-Version Key-Value Stores.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

2019
Strawberry Yield Prediction Based on a Deep Neural Network Using High-Resolution Aerial Orthoimages.
Remote. Sens., 2019

Bioinformatics Study of Osteoclastogenesis Inhibitory Factor and Receptor Activator of NF-κB Ligand Expression in Ovariectomized Osteoporosis Rat Model Using Probiotics Preparation.
J. Medical Imaging Health Informatics, 2019

A new tool wear monitoring method based on multi-scale PCA.
J. Intell. Manuf., 2019

Automated spectral feature extraction from hyperspectral images to differentiate weedy rice and barnyard grass from a rice crop.
Comput. Electron. Agric., 2019

Protecting User Privacy: An Approach for Untraceable Web Browsing History and Unambiguous User Profiles.
Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining, 2019

Parallel inclusive communication for connecting heterogeneous IoT devices at the edge.
Proceedings of the 17th Conference on Embedded Networked Sensor Systems, 2019

SocialDistance: how far are you from verified users in online social media?
Proceedings of the International Symposium on Quality of Service, 2019

Secure indoor positioning against signal strength attacks via optimized multi-voting.
Proceedings of the International Symposium on Quality of Service, 2019

WristUnlock: Secure and Usable Smartphone Unlocking with Wrist Wearables.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
Privacy-Preserving Crowdsourced Spectrum Sensing.
IEEE/ACM Trans. Netw., 2018

SpecGuard: Spectrum Misuse Detection in Dynamic Spectrum Access Systems.
IEEE Trans. Mob. Comput., 2018

The Rise of Social Botnets: Attacks and Countermeasures.
IEEE Trans. Dependable Secur. Comput., 2018

Beware of What You Share: Inferring User Locations in Venmo.
IEEE Internet Things J., 2018

Near ground platform development to simulate UAV aerial spraying and its spraying test under different conditions.
Comput. Electron. Agric., 2018

EyeTell: Video-Assisted Touchscreen Keystroke Inference from Eye Movements.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Proximity-Proof: Secure and Usable Mobile Two-Factor Authentication.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018

Privacy-Preserving Social Media Data Outsourcing.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Secure Crowdsourced Indoor Positioning Systems.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Progress on III-V-Bi Alloys and Light Emitting Devices.
Proceedings of the 2018 20th International Conference on Transparent Optical Networks (ICTON), 2018

Securing Social Media User Data: An Adversarial Approach.
Proceedings of the 29th on Hypertext and Social Media, 2018

Secure RSS-Fingerprint-Based Indoor Positioning: Attacks and Countermeasures.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
3D Surface Features Scanning System with UAV-Carried Line Laser.
Proceedings of the Machine Learning and Intelligent Communications, 2017

Verifiable social data outsourcing.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Your face your heart: Secure mobile face authentication with photoplethysmograms.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

POWERFUL: Mobile app fingerprinting via power analysis.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

2016
SecureFind: Secure and Privacy-Preserving Object Finding via Mobile Crowdsourcing.
IEEE Trans. Wirel. Commun., 2016

TrueTop: A Sybil-Resilient System for User Influence Measurement on Twitter.
IEEE/ACM Trans. Netw., 2016

Development of a Near Ground Remote Sensing System.
Sensors, 2016

Privacy-Preserving Spatiotemporal Matching for Secure Device-to-Device Communications.
IEEE Internet Things J., 2016

A State Decision Tree based Backtracking Algorithm for Multi-Sensitive Attribute Privacy Preserving.
Int. J. Interdiscip. Telecommun. Netw., 2016

Extracting Influential Nodes in Social Networks on Local Weight Aspect.
Int. J. Interdiscip. Telecommun. Netw., 2016

VISIBLE: Video-Assisted Keystroke Inference from Tablet Backside Motion.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

A secure hierarchical deduplication system in cloud storage.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

PriStream: Privacy-preserving distributed stream monitoring of thresholded PERCENTILE statistics.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Secure outsourced skyline query processing via untrusted cloud service providers.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Your Age Is No Secret: Inferring Microbloggers' Ages via Content and Interaction Analysis.
Proceedings of the Tenth International Conference on Web and Social Media, 2016

PriExpress: Privacy-preserving express delivery with fine-grained attribute-based access control.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

iLock: Immediate and Automatic Locking of Mobile Devices against Data Theft.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

DPSense: Differentially Private Crowdsourced Spectrum Sensing.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks.
IEEE Trans. Wirel. Commun., 2015

Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers.
IEEE Trans. Dependable Secur. Comput., 2015

Your song your way: Rhythm-based two-factor authentication for multi-touch mobile devices.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

A secure and privacy-preserving payment system for Electric vehicles.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Your actions tell where you are: Uncovering Twitter users in a metropolitan area.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

SafeDSA: Safeguard Dynamic Spectrum Access against Fake Secondary Users.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
TIGHT: A Geographic Routing Protocol for Cognitive Radio Mobile Ad Hoc Networks.
IEEE Trans. Wirel. Commun., 2014

Secure Top-k Query Processing in Unattended Tiered Sensor Networks.
IEEE Trans. Veh. Technol., 2014

Vibration Sensor-Based Bearing Fault Diagnosis Using Ellipsoid-ARTMAP and Differential Evolution Algorithms.
Sensors, 2014

Force based tool wear monitoring system for milling process based on relevance vector machine.
Adv. Eng. Softw., 2014

SYNERGY: A game-theoretical approach for cooperative key generation in wireless networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

TouchIn: Sightless two-factor authentication on multi-touch mobile devices.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
Privacy-Preserving Profile Matching for Proximity-Based Mobile Social Networking.
IEEE J. Sel. Areas Commun., 2013

Verifiable Privacy-Preserving Aggregation in People-Centric Urban Sensing Systems.
IEEE J. Sel. Areas Commun., 2013

Privacy-preserving spatiotemporal matching.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Secure crowdsourcing-based cooperative pectrum sensing.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Social Spammer Detection in Microblogging.
Proceedings of the IJCAI 2013, 2013

On the impact of social botnets for spam distribution and digital-influence manipulation.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Distributed Privacy-Preserving Access Control in Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2012

Characterizing the Moisture Content of Tea with Diffuse Reflectance Spectroscopy Using Wavelet Transform and Multivariate Analysis.
Sensors, 2012

Secure Cooperative Data Storage and Query Processing in Unattended Tiered Sensor Networks.
IEEE J. Sel. Areas Commun., 2012

Secure top-k query processing via untrusted location-based service providers.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Fine-grained private matching for proximity-based mobile social networking.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

2011
AOS: an anonymous overlay system for mobile ad hoc networks.
Wirel. Networks, 2011

A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks.
IEEE Trans. Wirel. Commun., 2011

On the price of security in large-scale wireless ad hoc networks.
IEEE/ACM Trans. Netw., 2011

SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks.
IEEE Trans. Dependable Secur. Comput., 2011

Fast identification of the missing tags in a large RFID system.
Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, 2011

JR-SND: Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

LR-Seluge: Loss-Resilient and Secure Code Dissemination in Wireless Sensor Networks.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

2010
Editorial Special Section on Wireless Network Security and Privacy.
IEEE Trans. Veh. Technol., 2010

An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks.
IEEE Trans. Parallel Distributed Syst., 2010

PEACE: A Novel Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks.
IEEE Trans. Parallel Distributed Syst., 2010

A Coverage Inference Protocol for Wireless Sensor Networks.
IEEE Trans. Mob. Comput., 2010

Traffic Inference in Anonymous MANETs.
Proceedings of the Seventh Annual IEEE Communications Society Conference on Sensor, 2010

Wormhole-Resilient Secure Neighbor Discovery in Underwater Acoustic Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Verifiable Fine-Grained Top-k Queries in Tiered Sensor Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

PriSense: Privacy-Preserving Data Aggregation in People-Centric Urban Sensing Systems.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

2009
Localized algorithms for coverage boundary detection in wireless sensor networks.
Wirel. Networks, 2009

SPREAD: Improving network security by multipath routing in mobile ad hoc networks.
Wirel. Networks, 2009

Securing resource-constrained wireless ad hoc networks.
IEEE Wirel. Commun., 2009

Multi-User Broadcast Authentication in Wireless Sensor Networks.
IEEE Trans. Veh. Technol., 2009

On Address Privacy in Mobile Ad Hoc Networks.
Mob. Networks Appl., 2009

Secure multidimensional range queries in sensor networks.
Proceedings of the 10th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2009

DP<sup>2</sup>AC: Distributed Privacy-Preserving Access Control in Sensor Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Secure Range Queries in Tiered Sensor Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

2008
LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks.
IEEE Trans. Mob. Comput., 2008

Securing wireless sensor networks: A survey.
IEEE Commun. Surv. Tutorials, 2008

Opportunistic Cooperation with Receiver-Based Ratio Combining Strategy.
Proceedings of the Wireless Algorithms, 2008

Towards address privacy in mobile ad hoc networks.
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, 2008

Efficient user revocation for privacy-aware PKI.
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, 2008

Towards Secure Link Quality Measurement in Multihop Wireless Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
A secure incentive protocol for mobile ad hoc networks.
Wirel. Networks, 2007

A secure authentication and billing architecture for wireless mesh networks.
Wirel. Networks, 2007

A Fine-Grained Reputation System for Reliable Service Selection in Peer-to-Peer Networks.
IEEE Trans. Parallel Distributed Syst., 2007

Access control in wireless sensor networks.
Ad Hoc Networks, 2007

Multi-user Broadcast Authentication in Wireless Sensor Networks.
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007

Stochastic Channel Selection in Cognitive Radio Networks.
Proceedings of the Global Communications Conference, 2007

2006
A robust and energy-efficient data dissemination framework for wireless sensor networks.
Wirel. Networks, 2006

MASK: anonymous on-demand routing in mobile ad hoc networks.
IEEE Trans. Wirel. Commun., 2006

Securing Mobile Ad Hoc Networks with Certificateless Public Keys.
IEEE Trans. Dependable Secur. Comput., 2006

Location-based compromise-tolerant security mechanisms for wireless sensor networks.
IEEE J. Sel. Areas Commun., 2006

Secure localization and authentication in ultra-wideband sensor networks.
IEEE J. Sel. Areas Commun., 2006

ARSA: An Attack-Resilient Security Architecture for Multihop Wireless Mesh Networks.
IEEE J. Sel. Areas Commun., 2006

Energy conservation through resource-aware movement in heterogeneous mobile ad hoc networks.
J. Comb. Optim., 2006

Localized coverage boundary detection for wireless sensor networks.
Proceedings of the 3rd International ICST Conference on Quality of Service in Heterogeneous Wired/Wireless Networks, 2006

Energy-Efficient Coverage Measurement for Wireless Sensor Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
LLK: a link-layer key establishment scheme for wireless sensor networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

Securing sensor networks with location-based keys.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

Anonymous communications in mobile ad hoc networks.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

AC-PKI: anonymous and certificateless public-key infrastructure for mobile ad hoc networks.
Proceedings of IEEE International Conference on Communications, 2005

2004
SIP: a secure incentive protocol against selfishness in mobile ad hoc networks.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

Managing Wireless Sensor Networks with Supply Chain Strategy.
Proceedings of the 1st International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QSHINE 2004), 2004

Scalable and robust data dissemination in wireless sensor networks.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004


  Loading...