Yazhe Wang

According to our database1, Yazhe Wang authored at least 39 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Auto-Tuning with Reinforcement Learning for Permissioned Blockchain Systems.
Proc. VLDB Endow., 2023

2022
A Cloud-Edge Collaborative Security Architecture for Industrial Digital Twin Systems.
Proceedings of the IEEE Smartworld, 2022

An atomic member addition mechanism for permissioned blockchain based on autonomous rollback.
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022

A highly reliable cross-domain identity authentication protocol based on blockchain in edge computing environment.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

FIK: Find Important Knobs for Permessioned Blockchain Hyperledger Fabric.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

2021
TRIPDECODER: Study Travel Time Attributes and Route Preferences of Metro Systems from Smart Card Data.
Trans. Data Sci., 2021

Analyzing Network Model for Organic Vegetable Distribution: A Case Study of Zhengzhou City.
Mob. Inf. Syst., 2021

Commercial hypervisor-based task sandboxing mechanisms are unsecured? But we can fix it!
J. Syst. Archit., 2021

Reviewing IoT Security via Logic Bugs in IoT Platforms and Systems.
IEEE Internet Things J., 2021

Potential Risk Detection System of Hyperledger Fabric Smart Contract based on Static Analysis.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

A Self-Sovereign Decentralized Identity Platform Based on Blockchain.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

Achieve Better Endorsement Balance on Blockchain Systems.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

A Novel Trojan Attack against Co-learning Based ASR DNN System.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

CallChain: Identity Authentication Based on Blockchain for Telephony Networks.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

2020
Prihook: Differentiated context-aware hook placement for different owners' smartphones.
Proceedings of the 19th IEEE International Conference on Trust, 2020

A Machine Learning-Assisted Compartmentalization Scheme for Bare-Metal Systems.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

LAPE: A Lightweight Attestation of Program Execution Scheme for Bare-Metal Systems.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

2019
Logic Bugs in IoT Platforms and Systems: A Review.
CoRR, 2019

A Probability Prediction Based Mutable Control-Flow Attestation Scheme on Embedded Platforms.
Proceedings of the 18th IEEE International Conference On Trust, 2019

SwiftFabric: Optimizing Fabric Private Data Transaction Flow TPS.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

Pre-authorization Usage Control Mechanism for Cross-Domain in Cloud.
Proceedings of the Data Processing Techniques and Applications for Cyber-Physical Systems, 2019

Medical Protocol Security: DICOM Vulnerability Mining Based on Fuzzing Technology.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Understanding the effects of taxi ride-sharing - A case study of Singapore.
Comput. Environ. Urban Syst., 2018

Using IM-Visor to stop untrusted IME apps from stealing sensitive keystrokes.
Cybersecur., 2018

TripDecoder: Inferring Routes of Passengers of Mass Rapid Transit Systems by Smart Card Transaction Data.
Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018

2017
Visual Analysis of Android Malware Behavior Profile Based on PMCG_droid : A Pruned Lightweight APP Call Graph.
Proceedings of the Security and Privacy in Communication Networks, 2017

PMViewer: A Crowdsourcing Approach to Fine-Grained Urban PM2.5 Monitoring in China.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

SecHome: A Secure Large-Scale Smart Home System Using Hierarchical Identity Based Encryption.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

IM-Visor: A Pre-IME Guard to Prevent IME Apps from Stealing Sensitive Keystrokes Using TrustZone.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

2015
Should We Use the Sample? Analyzing Datasets Sampled from Twitter's Stream API.
ACM Trans. Web, 2015

UAuth: A Strong Authentication Method from Personal Devices to Multi-accounts.
EAI Endorsed Trans. Security Safety, 2015

VFA: A Variable-Factor Authentication Framework for Mobile Users.
J. Commun., 2015

Beyond Scale: An Efficient Framework for Evaluating Web Access Control Policies in the Era of Big Data.
Proceedings of the Advances in Information and Computer Security, 2015

Preserving privacy in social networks against connection fingerprint attacks.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015

2014
High utility K-anonymization for social network publishing.
Knowl. Inf. Syst., 2014

On macro and micro exploration of hashtag diffusion in Twitter.
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014

2013
Hypergraph index: an index for context-aware nearest neighbor query on social networks.
Soc. Netw. Anal. Min., 2013

2011
Context-Aware Nearest Neighbor Query on Social Networks.
Proceedings of the Social Informatics - Third International Conference, SocInfo 2011, 2011

Utility-Oriented K-Anonymization on Social Networks.
Proceedings of the Database Systems for Advanced Applications, 2011


  Loading...