Yanqin Zhu

According to our database1, Yanqin Zhu authored at least 41 papers between 2005 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
基于伪梯度提升决策树的内网防御算法 (Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree).
计算机科学, 2018

On the optimal flow allocation and information theoretically secure network coding design for multiple multicasts.
Int. J. Commun. Syst., 2018

Secure Online/Offline Multi-Authority Attribute-Based Encryption for Resource-Constrained Devices in Cloud Computing.
Proceedings of the 2018 IEEE SmartWorld, 2018

Research of Node Incentive Strategy in Selfish Opportunistic Network.
Proceedings of the 17th IEEE/ACIS International Conference on Computer and Information Science, 2018

2017
Routing algorithm based on ant colony optimization for mobile social network.
Proceedings of the 18th IEEE/ACIS International Conference on Software Engineering, 2017

A centralized HIDS framework for private cloud.
Proceedings of the 18th IEEE/ACIS International Conference on Software Engineering, 2017

Efficient Decentralized Attribute-Based Encryption with Outsourced Computation for Mobile Cloud Computing.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Optimal Cache Management and Routing for Secure Content Delivery in Information-Centric Networks with Network Coding.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Intrusion Detection System Based on Gaussian Mixture Model Using Hadoop Framework.
Proceedings of the 5th International Conference on Applied Computing and Information Technology, 2017

Privacy-preserving online/offline and outsourced multi-authority attribute-based encryption.
Proceedings of the 16th IEEE/ACIS International Conference on Computer and Information Science, 2017

2016
Network coding with crowdsourcing-based trajectory estimation for vehicular networks.
J. Netw. Comput. Appl., 2016

Joint Selection of Providers and the New Comer for Optimal Repair in Distributed Storage Network with Network Coding.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Optimal Flow Allocation and Linear Network Coding Design for Multiple Multicasts under the Requirements of Information Theoretical Security.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Optimal Transmission Topology Construction and Secure Linear Network Coding Design for Multicast with Integral Link Rates.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

Optimal Rate Allocation and Linear Network Coding Design for Secure Multicast with Multiple Streams.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

2015
Semi-progressive Network Coding Algorithm on Multi-core Processor.
J. Comput., 2015

Network Coding-Based Real-Time Retransmission Scheme in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

An efficient communication relay placement algorithm for content-centric wireless mesh networks.
Int. J. Commun. Syst., 2015

On the Optimal Provider Selection for Repair in Distributed Storage System with Network Coding.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
Knowledge Barter-Auctioning: An Incentive for Quality of User-Generated Content in Online Communities.
Proceedings of the 2014 International Conference on Social Computing, Beijing, China, August 04, 2014

Stimulating High Quality Social Media through Knowledge Barter-Auctioning.
Proceedings of the 2014 International Conference on Social Computing, Beijing, China, August 04, 2014

An Efficient Short Null Keys Based Scheme for Securing Network Coding Against Pollution Attacks.
Proceedings of the Frontiers in Internet Technologies, 2014

Multi-user Searchable Encryption with Coarser-Grained Access Control without Key Sharing.
Proceedings of the International Conference on Cloud Computing and Big Data, 2014

2013
How Much Delay Has to Be Tolerated in a Mobile Social Network?
Int. J. Distributed Sens. Networks, 2013

Improved Message Diffusion Model for Node Coverage Problem of Ad Hoc Network Based on Node Visit Times.
Int. J. Distributed Sens. Networks, 2013

MCNC: Data Aggregation and Dissemination in Vehicular Ad hoc Networks Using Multicast Network Coding.
Int. J. Distributed Sens. Networks, 2013

Data Dissemination in Mobile Wireless Sensor Network Using Trajectory-Based Network Coding.
Int. J. Distributed Sens. Networks, 2013

Nash bargaining between friends for cooperative data distribution in a social peer-to-peer swarming system.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2013

SNKC: An Efficient On-the-Fly Pollution Detection Scheme for Content Distribution with Network Coding.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Practical and Secure Outsourcing of Linear Algebra in the Cloud.
Proceedings of the International Conference on Advanced Cloud and Big Data, 2013

2012
Cocktail method for BitTorrent traffic identification in real time.
J. Comput., 2012

An Efficient Reliable Communication Scheme in Wireless Sensor Networks Using Linear Network Coding.
Int. J. Distributed Sens. Networks, 2012

Admission Control Strategy of Serving Peers in P2P VoD Systems.
Proceedings of the 13th ACIS International Conference on Software Engineering, 2012

2010
An Omnibus Identification of BitTorrent Traffic in a Stub Network.
Proceedings of the Third International Symposium on Parallel Architectures, 2010

Leakage-resilient identity-based encryption scheme.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

2008
Trust Mechanism in Distributed Access Control Model of P2P Networks.
Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science, 2008

2007
Design of PMI Supporting Self-administrative Sub-role Based Delegation.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

Design of Multi-signature Scheme in Wireless Networks.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

2006
A Role-based PMI Authentication Model and its Application.
Proceedings of the Seventh International Conference on Software Engineering, 2006

Enhancing Undergraduates' Capabilities of Practice and Innovation to Meet the Regional Needs.
Proceedings of the 5th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2006) and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering, 2006

2005
The design and application of dynamic fuzzy expert database system.
Proceedings of the 2005 IEEE International Conference on Granular Computing, 2005


  Loading...