Yang Xu

Orcid: 0000-0002-3194-8369

Affiliations:
  • Hunan University, College of Computer Science and Electronic Engineering, Changsha, China
  • Central South University, School of Information Science and Engineering, Changsha, China (former)


According to our database1, Yang Xu authored at least 43 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Domain Embedding Model for Botnet Detection Based on Smart Blockchain.
IEEE Internet Things J., 2024

2023
A decentralized trust management mechanism for crowdfunding.
Inf. Sci., August, 2023

TRUCON: Blockchain-Based Trusted Data Sharing With Congestion Control in Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., March, 2023

C-FDRL: Context-Aware Privacy-Preserving Offloading Through Federated Deep Reinforcement Learning in Cloud-Enabled IoT.
IEEE Trans. Ind. Informatics, 2023

A Blockchain-Based Model Migration Approach for Secure and Sustainable Federated Learning in IoT Systems.
IEEE Internet Things J., 2023

2022
A blockchain-based trustworthy collaborative power trading scheme for 5G-enabled social internet of vehicles.
Digit. Commun. Networks, December, 2022

Trustworthy Target Tracking With Collaborative Deep Reinforcement Learning in EdgeAI-Aided IoT.
IEEE Trans. Ind. Informatics, 2022

Zeroing Neural Networks for Dynamic Quaternion-Valued Matrix Inversion.
IEEE Trans. Ind. Informatics, 2022

A Blockchain-Based Multi-Cloud Storage Data Auditing Scheme to Locate Faults.
IEEE Trans. Cloud Comput., 2022

Quantitative understanding serial-parallel hybrid sfc services: a dependability perspective.
Peer-to-Peer Netw. Appl., 2022

AntiConcealer: Reliable Detection of Adversary Concealed Behaviors in EdgeAI-Assisted IoT.
IEEE Internet Things J., 2022

Blockchain-Based Trustworthy Energy Dispatching Approach for High Renewable Energy Penetrated Power Systems.
IEEE Internet Things J., 2022

Deep Neural Network Security Collaborative Filtering Scheme for Service Recommendation in Intelligent Cyber-Physical Systems.
IEEE Internet Things J., 2022

TrustBuilder: A non-repudiation scheme for IoT cloud applications.
Comput. Secur., 2022

2021
Blockchain-Enabled Accountability Mechanism Against Information Leakage in Vertical Industry Services.
IEEE Trans. Netw. Sci. Eng., 2021

Hierarchical Bidirectional RNN for Safety-Enhanced B5G Heterogeneous Networks.
IEEE Trans. Netw. Sci. Eng., 2021

A Unified Predefined-Time Convergent and Robust ZNN Model for Constrained Quadratic Programming.
IEEE Trans. Ind. Informatics, 2021

A Blockchain-Enabled Deduplicatable Data Auditing Mechanism for Network Storage Services.
IEEE Trans. Emerg. Top. Comput., 2021

A Method of Information Protection for Collaborative Deep Learning under GAN Model Attack.
IEEE ACM Trans. Comput. Biol. Bioinform., 2021

A trustworthy industrial data management scheme based on redactable blockchain.
J. Parallel Distributed Comput., 2021

On the Characterization and Risk Assessment of AI-Powered Mobile Cloud Applications.
Comput. Stand. Interfaces, 2021

Revocable Data Sharing Methodology Based on SGX and Blockchain.
Proceedings of the Network and System Security - 15th International Conference, 2021

2020
Blockchain Empowered Arbitrable Data Auditing Scheme for Network Storage as a Service.
IEEE Trans. Serv. Comput., 2020

Trustworthy Network Anomaly Detection Based on an Adaptive Learning Rate and Momentum in IIoT.
IEEE Trans. Ind. Informatics, 2020

Learning URL Embedding for Malicious Website Detection.
IEEE Trans. Ind. Informatics, 2020

An efficient privacy-enhanced attribute-based access control mechanism.
Concurr. Comput. Pract. Exp., 2020

2019
A Blockchain-Based Nonrepudiation Network Computing Service Scheme for Industrial IoT.
IEEE Trans. Ind. Informatics, 2019

A Trusted Routing Scheme Using Blockchain and Reinforcement Learning for Wireless Sensor Networks.
Sensors, 2019

An adaptive and configurable protection framework against android privilege escalation threats.
Future Gener. Comput. Syst., 2019

2018
Towards Secure Network Computing Services for Lightweight Clients Using Blockchain.
Wirel. Commun. Mob. Comput., 2018

A Feasible Fuzzy-Extended Attribute-Based Access Control Technique.
Secur. Commun. Networks, 2018

A Succinct Provable Data Possession Mechanism for Lightweight Clients in Network Computing.
Proceedings of the 2018 IEEE SmartWorld, 2018

A Privacy-Preserving Attribute-Based Access Control Scheme.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

2017
FABAC: A Flexible Fuzzy Attribute-Based Access Control Mechanism.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

PCSD: A Tool for Android Malware Detection.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

An Adaptive Android Security Extension against Privilege Escalation Attacks.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

2016
Decentralized group key management for hierarchical access control using multilinear forms.
Concurr. Comput. Pract. Exp., 2016

2015
Research on Key Management for Multi-privileged Group Communications.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Weight-Based Batch Rekeying Scheme for Dynamic Multi-privileged Group Communications.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

An Illegal Indirect Access Prevention Method in Transparent Computing System.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Streaming Computing Technology for Android Applications: Design Model and Case Study.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Design and Implementation of Streaming Application Execution Platform in Android.
Proceedings of the 12th Web Information System and Application Conference, 2015

2013
Distributed Group Key Management Using Multilinear Forms for Multi-privileged Group Communications.
Proceedings of the 12th IEEE International Conference on Trust, 2013


  Loading...