Yuanyu Zhang

Orcid: 0000-0002-3248-5909

According to our database1, Yuanyu Zhang authored at least 58 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Achieving Covertness and Secrecy: The Interplay Between Detection and Eavesdropping Attacks.
IEEE Internet Things J., January, 2024

Dealing with Imbalanced Classes in Bot-IoT Dataset.
CoRR, 2024

2023
Opportunistic Wiretapping/Jamming: A New Attack Model in Millimeter-Wave Wireless Networks.
IEEE Trans. Wirel. Commun., December, 2023

Two-branch 3D convolution neural network for gait recognition.
Signal Image Video Process., October, 2023

Secrecy, Covertness and Authentication in Wireless Communications - Physical Layer Security Approach
Wireless Networks, Springer, ISBN: 978-3-031-38464-6, 2023

PRAM: A Practical Sybil-Proof Auction Mechanism for Dynamic Spectrum Access With Untruthful Attackers.
IEEE Trans. Mob. Comput., 2023

Object-Oriented Clustering Approach to Detect Evolutions of ENSO-Related Precipitation Anomalies over Tropical Pacific Using Remote Sensing Products.
Remote. Sens., 2023

Bayesian A/B Testing with Covariates.
Proceedings of the IEEE International Conference on Data Mining, 2023

3D Convolution-Based Radio Frequency Fingerprinting for Satellite Authentication.
Proceedings of the IEEE Global Communications Conference, 2023

2022
BCA: Bilinear Convolutional Neural Networks and Attention Networks for legal question answering.
AI Open, January, 2022

Secure Millimeter-Wave Ad Hoc Communications Using Physical Layer Security.
IEEE Trans. Inf. Forensics Secur., 2022

Block diffusion delay attack and its countermeasures in a Bitcoin network.
Int. J. Netw. Manag., 2022

An Incentivization Mechanism with Validator Voting Profile in Proof-of-Stake-Based Blockchain.
IEICE Trans. Commun., 2022

Dynamical community detection and spatiotemporal analysis in multilayer spatial interaction networks using trajectory data.
Int. J. Geogr. Inf. Sci., 2022

CHChain: Secure and parallel crowdsourcing driven by hybrid blockchain.
Future Gener. Comput. Syst., 2022

Opportunistic Wiretapping/Jamming: A New Attack Model in Millimeter-Wave Wireless Networks.
CoRR, 2022

Class Continuous LOD Algorithm for Lightweight WebGL Rendering Optimization.
Proceedings of the International Conference on Networking and Network Applications, 2022

2021
Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things.
Sensors, 2021

Attribute-Based Access Control for Smart Cities: A Smart-Contract-Driven Framework.
IEEE Internet Things J., 2021

A Process-Oriented Approach to Identify Evolutions of Sea Surface Temperature Anomalies with a Time-Series of a Raster Dataset.
ISPRS Int. J. Geo Inf., 2021

Trust-aware buffer-aided relay selection for secure communications in cooperative wireless systems.
Comput. Networks, 2021

Buffer-aided relay selection for secure communication in two-hop wireless networks with limited packet lifetime.
Ad Hoc Networks, 2021

Wiretapping or Jamming: On Eavesdropper Attacking Strategy in mmWave Ad Hoc Networks.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

Intelligent Mining Pool Selection in the Case of Unobservable Block Withholding Attack.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

Cost-Efficient Blockchain-Based Access Control for the Internet of Things.
Proceedings of the IEEE Global Communications Conference, 2021

2020
On covert throughput performance of two-way relay covert wireless communications.
Wirel. Networks, 2020

Exploiting Smart Contracts for Capability-Based Access Control in the Internet of Things.
Sensors, 2020

Secrecy transmission capacity in mobile <i>ad hoc</i> networks with security-aware Aloha protocol.
IET Commun., 2020

Achieving Covertness and Secrecy: A New Paradigm for Secure Wireless Communication.
CoRR, 2020

Buffer-aided relay selection for secure two-hop wireless networks with decode-and-forward relays and a diversity-combining eavesdropper.
Ad Hoc Networks, 2020

A Parallel-Attention Model for Tumor Named Entity Recognition in Spanish.
Proceedings of the Iberian Languages Evaluation Forum (IberLEF 2020) co-located with 36th Conference of the Spanish Society for Natural Language Processing (SEPLN 2020), 2020

On Eavesdropping Region Characterization in Hybrid Wireless Communications.
Proceedings of the International Conference on Networking and Network Applications, 2020

IOTA-Based Access Control Framework for the Internet of Things.
Proceedings of the 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services, 2020

Mining Pool Selection Problem in the Presence of Block Withholding Attack.
Proceedings of the IEEE International Conference on Blockchain, 2020

2019
Friendship-based cooperative jamming for secure communication in Poisson networks.
Wirel. Networks, 2019

Mode Selection and Spectrum Partition for D2D Inband Communications: A Physical Layer Security Perspective.
IEEE Trans. Commun., 2019

Smart Contract-Based Access Control for the Internet of Things.
IEEE Internet Things J., 2019

Secure Communication in Two-Hop Buffer-Aided Networks with Limited Packet Lifetime.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Using Ethereum Blockchain for Distributed Attribute-Based Access Control in the Internet of Things.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Capability-Based Access Control for the Internet of Things: An Ethereum Blockchain-Based Scheme.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
On Security-Delay Trade-Off in Two-Hop Wireless Networks With Buffer-Aided Relay Selection.
IEEE Trans. Wirel. Commun., 2018

On Secure Wireless Communications for Service Oriented Computing.
IEEE Trans. Serv. Comput., 2018

Exact secrecy throughput capacity study in mobile ad hoc networks.
Ad Hoc Networks, 2018

Air Flow Measurement and Management for Improving Cooling and Energy Efficiency in Raised-Floor Data Centers: A Survey.
IEEE Access, 2018

2017
A Robust Text Classifier Based on Denoising Deep Neural Network in the Analysis of Big Data.
Sci. Program., 2017

Structural technology research on symptom data of Chinese medicine.
Proceedings of the 19th IEEE International Conference on e-Health Networking, 2017

2016
On Secure Wireless Communications for IoT Under Eavesdropper Collusion.
IEEE Trans Autom. Sci. Eng., 2016

Friendship-based Cooperative Jamming for Secure Communication in Poisson Networks.
CoRR, 2016

Optimal Relay-Destination Pair Selection Mechanism for Secure Communications in Wireless Cooperative Relay Networks.
Proceedings of the International Conference on Networking and Network Applications, 2016

The Delay-Security Trade-Off in Two-Hop Buffer-Aided Relay Wireless Network.
Proceedings of the International Conference on Networking and Network Applications, 2016

Exact Secrecy Throughput of MANETs with Guard Zone.
Proceedings of the International Conference on Networking and Network Applications, 2016

Link Selection for Secure Two-Hop Transmissions in Buffer-Aided Relay Wireless Networks.
Proceedings of the International Conference on Networking and Network Applications, 2016

Cyber-Enabled Traditional Chinese Medicine.
Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2016

2015
Eavesdropper-Tolerance Capability in Two-Hop Wireless Networks via Cooperative Jamming.
Ad Hoc Sens. Wirel. Networks, 2015

An Energy-Efficient Data Collection Scheme in Body Area Nanonetworks.
Proceedings of the Third International Symposium on Computing and Networking, 2015

2014
Exploring Relay Cooperation for Secure and Reliable Transmission in Two-HopWireless Networks.
EAI Endorsed Trans. Scalable Inf. Syst., 2014

Transmission protocol for secure big data in two-hop wireless networks with cooperative jamming.
Inf. Sci., 2014

2013
On Eavesdropper-Tolerance Capability of Two-Hop Wireless Networks.
CoRR, 2013


  Loading...