Yang Shi

Orcid: 0000-0003-3905-2257

Affiliations:
  • Tongji University, School of Software Engineering, Shanghai, China
  • Pudong CS&S Co., Ltd., Shanghai, China (2005 - 2011)
  • Tongji University, Shanghai, China (PhD 2005)


According to our database1, Yang Shi authored at least 36 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Leveraging Deep Learning for IoT Transceiver Identification.
Entropy, August, 2023

DualTaxoVec: Web user embedding and taxonomy generation.
Knowl. Based Syst., 2023

Meaningful image encryption algorithm based on compressive sensing and integer wavelet transform.
Frontiers Comput. Sci., 2023

Category tree distance: a taxonomy-based transaction distance for web user analysis.
Data Min. Knowl. Discov., 2023

2022
Image encryption scheme based on blind signature and an improved Lorenz system.
Expert Syst. Appl., 2022

Threshold EdDSA Signature for Blockchain-based Decentralized Finance Applications.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

Efficiently Obfuscating Proxy Signature for Protecting Signing Keys on Untrusted Cloud Servers.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

2021
A blockchain-based authority management framework in traceability systems.
Int. J. Comput. Sci. Eng., 2021

Happer: Unpacking Android Apps via a Hardware-Assisted Approach.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Secure and Efficient White-box Encryption Scheme for Data Protection against Shared Cache Attacks in Cloud Computing.
Proceedings of the 32nd IEEE International Symposium on Software Reliability Engineering, 2021

BlockDL: Privacy-Preserving and Crowd-Sourced Deep Learning Through Blockchain.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

2020
SDSRS: A Novel White-Box Cryptography Scheme for Securing Embedded Devices in IIoT.
IEEE Trans. Ind. Informatics, 2020

Image encryption and hiding algorithm based on compressive sensing and random numbers insertion.
Signal Process., 2020

CMBIoV: Consensus Mechanism for Blockchain on Internet of Vehicles.
Proceedings of the Blockchain and Trustworthy Systems - Second International Conference, 2020

2019
A Light-Weight White-Box Encryption Scheme for Securing Distributed Embedded Devices.
IEEE Trans. Computers, 2019

Obfuscatable Anonymous Authentication Scheme for Mobile Crowd Sensing.
IEEE Syst. J., 2019

A Blockchain-Based Trustable Framework for IoT Data Storage and Access.
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019

2018
Identity-based undetachable digital signature for mobile agents in electronic commerce.
Soft Comput., 2018

Intrusion-Resilient Undetachable Digital Signature for Mobile-Agent-Based Collaborative Business Systems.
Proceedings of the 22nd IEEE International Conference on Computer Supported Cooperative Work in Design, 2018

2017
An Obfuscatable Designated Verifier Signature Scheme.
IEEE Trans. Emerg. Top. Comput., 2017

Light-weight white-box encryption scheme with random padding for wearable consumer electronic devices.
IEEE Trans. Consumer Electron., 2017

An Obfuscatable Aggregatable Signcryption Scheme for Unattended Devices in IoT Systems.
IEEE Internet Things J., 2017

A Novel DAL Scheme With Shared-Locking for Semantic Conflict Prevention in Unconstrained Real-Time Collaborative Programming.
IEEE Access, 2017

Shared-locking for semantic conflict prevention in real-time collaborative programming.
Proceedings of the 21st IEEE International Conference on Computer Supported Cooperative Work in Design, 2017

Balancing Conflict Prevention and Concurrent Work in Real-Time Collaborative Programming.
Proceedings of the 12th Chinese Conference on Computer Supported Cooperative Work and Social Computing, 2017

A Hybrid Approach of HTTP Anomaly Detection.
Proceedings of the Web and Big Data, 2017

2016
Key-Insulated Undetachable Digital Signature Scheme and Solution for Secure Mobile Agents in Electronic Commerce.
Mob. Inf. Syst., 2016

Protecting Encrypted Signature Functions Against Intrusions on Computing Devices by Obfuscation.
IEEE Access, 2016

A Split Smart Swap Clustering for Clutter Problem in Web Mapping System.
Proceedings of the 2016 IEEE/WIC/ACM International Conference on Web Intelligence, 2016

A Comparative Study on EM Algorithms for Color-Texture Image Segmentation.
Proceedings of the 7th International Conference on Computing Communication and Networking Technologies, 2016

An ultra-lightweight white-box encryption scheme for securing resource-constrained IoT devices.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
A Lightweight White-Box Symmetric Encryption Algorithm against Node Capture for WSNs.
Sensors, 2015

A grid-growing clustering algorithm for geo-spatial data.
Pattern Recognit. Lett., 2015

On Security of a White-Box Implementation of SHARK.
Proceedings of the Information Security - 18th International Conference, 2015

2014
A lightweight white-box symmetric encryption algorithm against node capture for WSNs.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

2013
A Secure Implementation of a Symmetric Encryption Algorithm in White-Box Attack Contexts.
J. Appl. Math., 2013


  Loading...