Yong Zeng

Orcid: 0000-0003-2551-7009

Affiliations:
  • Xidian University, School of Cyber Engineering, Xian, China


According to our database1, Yong Zeng authored at least 69 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Eyes See Hazy while Algorithms Recognize Who You Are.
ACM Trans. Priv. Secur., 2024

2023
DLPriv: Deep Learning Based Dynamic Location Privacy Mechanism for LBS in Internet-of-Vehicles.
Proceedings of the International Conference on Networking and Network Applications, 2023

Topological Loss on Graph Auto-Encoders.
Proceedings of the International Conference on Networking and Network Applications, 2023

Encrypted Voice Traffic Fingerprinting: An Adaptive Network Traffic Feature Encoding Model.
Proceedings of the IEEE International Conference on Communications, 2023

Social Networks Based Robust Federated Learning for Encrypted Traffic Classification.
Proceedings of the IEEE International Conference on Communications, 2023

Multi-User Delay Alignment Modulation for Millimeter Wave Massive MIMO.
Proceedings of the IEEE Global Communications Conference, 2023

MT-CNN: A Classification Method of Encrypted Traffic Based on Semi-Supervised Learning.
Proceedings of the IEEE Global Communications Conference, 2023

2022
Sliding window based ON/OFF flow watermarking on Tor.
Comput. Commun., 2022

Differential Preserving in XGBoost Model for Encrypted Traffic Classification.
Proceedings of the International Conference on Networking and Network Applications, 2022

Layered classification method for darknet traffic based on Weighted K-NN.
Proceedings of the International Conference on Networking and Network Applications, 2022

Representing the Topology of Complex Networks Based on Graph Embedding.
Proceedings of the International Conference on Networking and Network Applications, 2022

Trajectory Obfuscation and Detection in Internet-of-vehicles.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

2021
GNS: Forge High Anonymity Graph by Nonlinear Scaling Spectrum.
Secur. Commun. Networks, 2021

A Differential Privacy Topology Scheme for Average Path Length Query.
J. Inf. Sci. Eng., 2021

Cold-start Recommendation Method Based on Homomorphic Encryption.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

LPDBN: A Privacy Preserving Scheme for Deep Belief Network.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

Covert Wireless Communications in the Presence of an Active Adversary.
Proceedings of the ICC 2021, 2021

Pri-PGD: Forging privacy-preserving graph towards spectral-based graph neural network.
Proceedings of the IEEE Global Communications Conference, 2021

Graph Embedding Based on Euclidean Distance Matrix and its Applications.
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021

2020
Covert Wireless Communication in IoT Network: From AWGN Channel to THz Band.
IEEE Internet Things J., 2020

Feel Vibration: Challenge-Response Mobile Authentication with Covert Channel.
Proceedings of the 20th IEEE International Conference on Communication Technology, 2020

Perosonalized Differentially Private Location Collection Method with Adaptive GPS Discretization.
Proceedings of the Cyber Security - 17th China Annual Conference, 2020

Spectrum Privacy Preserving for Social Networks: A Personalized Differential Privacy Approach.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

2019
Cooperative Jamming for Secrecy of Wireless Communications.
J. Inf. Sci. Eng., 2019

Social Tie Based Cooperative Jamming for D2D Communications in the Internet of Things.
J. Inf. Sci. Eng., 2019

Hiding Communications in AWGN Channels and THz Band with Interference Uncertainty.
CoRR, 2019

Challenges in Covert Wireless Communications with Active Warden on AWGN channels.
CoRR, 2019

Edge Weight Differential Privacy Based Spectral Query Algorithm.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Security Mechanisms to Provide Convoy Member Co-presence Authentication in Vehicle Platooning.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Research on Resolution Limit of Community Detection in Location-Based Social Networks.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Adaptive N-Gram Model Based Differentially Private Trajectory Synthesis Method.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Collective Influence Based Privacy Preservation for Social Networks.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

A Topology Based Differential Privacy Scheme for Average Path Length Query.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Reconfigurable Pseudo-Random Number Generator Based on Cellular Automata.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Listen!: Audio-based Smart IoT Device Pairing Protocol.
Proceedings of the 19th IEEE International Conference on Communication Technology, 2019

Cooperative Jamming Strategy Based on Community Detection for Two-Hop Communication Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
Covert Wireless Communications in IoT Systems: Hiding Information in Interference.
IEEE Wirel. Commun., 2018

Jensen-Shannon Divergence Based Secure Authentication Method on Smart Phones.
J. Inf. Sci. Eng., 2018

Covert Wireless Communications with Active Eavesdropper on AWGN Channels.
CoRR, 2018

True Random Number Generation Using Process Scheduling of Android Systems.
Proceedings of the International Conference on Networking and Network Applications, 2018

Cooperative Jamming for Secrecy of Wireless Communications.
Proceedings of the International Conference on Networking and Network Applications, 2018

Preserving Privacy for Hubs and Links in Social Networks.
Proceedings of the International Conference on Networking and Network Applications, 2018

Exploiting Social Tie and SIR Characteristic for Cooperative Jamming: A Game Model in a Two-layer Network.
Proceedings of the International Conference on Networking and Network Applications, 2018

On Covert Communication with Interference Uncertainty.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

2017
The Sound and the Fury: Hiding Communications in Noisy Wireless Networks with Interference Uncertainty.
CoRR, 2017

A Secure Authentication Method of Intelligent Terminals Based on Jensen-Shannon Divergence.
Proceedings of the International Conference on Networking and Network Applications, 2017

Modeling Key Infection in Large-Scale Sensor Networks.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Multi-hop Based Centrality of a Path in Complex Network.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

A Survey of Network Reconstruction on Social Network.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

Centrality Based Privacy Preserving for Weighted Social Networks.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

Analysis and Improvement of True Random Number Generator Based on Autonomous Boolean Network.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

2016
Cooperative Jammer Placement for Physical Layer Security Enhancement.
IEEE Netw., 2016

2015
On Key Evolution over Wireless Channels.
Int. J. Distributed Sens. Networks, 2015

2014
Reliable Enhanced Secure Code Dissemination with Rateless Erasure Codes in WSNs.
J. Softw., 2014

Study on the Pass Rate of NIST SP800-22 Statistical Test Suite.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2013
Fault and Intrusion Tolerance of Complex Networks: A Controllability View.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
Secrecy Transfer.
Int. J. Distributed Sens. Networks, 2012

Out-of-Order-Delivery-Tolerant Secure Code Dissemination with Fountain Codes in Wireless Sensor Networks.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

2011
A security testing approach for WSN protocols based on object-oriented attack model.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

An Automated Black-box Testing Approach for WSN Security Protocols.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
An Improvement on a Three-party Password-based Key Exchange Protocol Using Weil Pairing.
Int. J. Netw. Secur., 2010

Efficient secure multicast route using genetic algorithms for wireless sensor and actor networks.
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010

2009
Multi-path Protocol for High Data Confidentiality and Reliability in Wireless Sensor Networks Using Non-dominated Dynamic Compensation.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009

A Hardware-Oriented Fast Encryption Keystream Generator for Digital Rights Management.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

2008
Adaptive Algorithms to Mitigate Inefficiency in Reliability Differentiation Mechanisms for Wireless Sensor Networks.
Proceedings of the MSN 2008, 2008

2006
Computing the <i>k</i>-Error <i>N</i>-Adic Complexity of a Sequence of Period <i>p</i><sup><i>n</i></sup>.
Proceedings of the Sequences and Their Applications, 2006

2005
Sampling Distance Analysis of Gigantic Data Mining for Intrusion Detection Systems.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

Stability of the Linear Complexity of the Generalized Self-shrinking Sequences.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2003
Pseudorandom number generators based on evolutionary algorithm.
Proceedings of the IEEE Congress on Evolutionary Computation, 2003


  Loading...