Yuefei Zhu

Orcid: 0000-0002-9559-8783

According to our database1, Yuefei Zhu authored at least 78 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Diverse Metrics for Robust LBS Privacy: Distance, Semantics, and Temporal Factors.
Sensors, February, 2024

MMCo: using multimodal deep learning to detect malicious traffic with noisy labels.
Frontiers Comput. Sci., February, 2024

MCRe: A Unified Framework for Handling Malicious Traffic With Noise Labels Based on Multidimensional Constraint Representation.
IEEE Trans. Inf. Forensics Secur., 2024

2023
BoAu: Malicious traffic detection with noise labels based on boundary augmentation.
Comput. Secur., 2023

Meta-TFEN: A Multi-Modal Deep Learning Approach for Encrypted Malicious Traffic Detection.
Proceedings of the 33rd International Telecommunication Networks and Applications Conference, 2023

Towards Efficient and Privacy-Preserving Anomaly Detection of Blockchain-Based Cryptocurrency Transactions.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

2022
Anomaly Detection as a Service: An Outsourced Anomaly Detection Scheme for Blockchain in a Privacy-Preserving Manner.
IEEE Trans. Netw. Serv. Manag., December, 2022

Minipatch: Undermining DNN-Based Website Fingerprinting With Adversarial Patches.
IEEE Trans. Inf. Forensics Secur., 2022

Gene Fingerprinting: Cracking Encrypted Tunnel with Zero-Shot Learning.
IEICE Trans. Inf. Syst., 2022

2021
Exploiting side-channel leaks in web traffic of incremental search.
Comput. Secur., 2021

A Patch Analysis Method Based on Multi-firmware Comparison.
Proceedings of the ISEEIE 2021: International Symposium on Electrical, Electronics and Information Engineering, Seoul Republic of Korea, February 19, 2021

2020
Enhancing network intrusion detection classifiers using supervised adversarial training.
J. Supercomput., 2020

Recognizing the Data Type of Firmware Data Segments With Deep Learning.
IEEE Access, 2020

2018
A Domain Name Model of Anonymous Network Hidden Service.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks.
IEEE Access, 2017

Traffic Identification of Mobile Apps Based on Variational Autoencoder Network.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

2016
基于协同地址碰撞的隐蔽认证方法 (Cooperative Address Knocking Based Covert Authentication).
计算机科学, 2016

2015
Designing Truthful Spectrum Auctions for Multi-hop Secondary Networks.
IEEE Trans. Mob. Comput., 2015

2014
Core-Selecting Secondary Spectrum Auctions.
IEEE J. Sel. Areas Commun., 2014

A note on Weil's multiplicative character sum.
Finite Fields Their Appl., 2014

Adaptive ±1 Steganography in Extended Noisy Region.
Comput. J., 2014

High-Payload Image-Hiding Scheme Based on Best-Block Matching and Multi-layered Syndrome-Trellis Codes.
Proceedings of the Web Information Systems Engineering - WISE 2014, 2014

A Method of Multiple Encryption and Sectional Encryption Protocol Reverse Engineering.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2013
Method Based on GSCPN for Network Vulnerability Analysis.
J. Softw., 2013

Designing Two-Dimensional Spectrum Auctions for Mobile Secondary Users.
IEEE J. Sel. Areas Commun., 2013

An Efficient Proof of Retrievability Scheme for Fully Homomorphic Encrypted Data.
J. Networks, 2013

A Framework for Automated Security Proof and its Application to OAEP.
J. Networks, 2013

Cryptanalysis and enhancements of efficient three-party password-based key exchange scheme.
Int. J. Commun. Syst., 2013

Enhancements of a three-party password-based authenticated key exchange protocol.
Int. Arab J. Inf. Technol., 2013

Core-selecting combinatorial auction design for secondary spectrum markets.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

2012
Robust smart-cards-based user authentication scheme with user anonymity.
Secur. Commun. Networks, 2012

A Secure Lightweight RFID Binding Proof Protocol for Medication Errors and Patient Safety.
J. Medical Syst., 2012

Symbolic computation in block cipher with application to PRESENT.
IACR Cryptol. ePrint Arch., 2012

Improved side channel attack on the block cipher NOEKEON.
IACR Cryptol. ePrint Arch., 2012

Truthful spectrum auction design for secondary networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

2011
Cryptanalysis and Enhancements of Three-Party Authenticated Key Exchange Protocol using ECC.
J. Inf. Sci. Eng., 2011

A novel lightweight authentication scheme with anonymity for roaming service in global mobility networks.
Int. J. Netw. Manag., 2011

Improved two-factor authenticated key exchange protocol.
Int. Arab J. Inf. Technol., 2011

2010
New Efficient Searchable Encryption Schemes from Bilinear Pairings.
Int. J. Netw. Secur., 2010

Comments on an Efficient Secret Broadcast in the Broadcasting Networks.
IEEE Commun. Lett., 2010

Security analysis of a cocktail protocol with the authentication and key agreement on the UMTS.
IEEE Commun. Lett., 2010

Multi-Session Data Gathering with Compressive Sensing for Large-Scale Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2010

2009
Client-to-client Password-Based Authenticated Key Establishment in a Cross-Realm Setting.
J. Networks, 2009

Efficient Solution to Password-based Key Exchange for Large Groups.
J. Networks, 2009

Automatic Approach of Provable Security and its Application for OAEP+.
IACR Cryptol. ePrint Arch., 2009

Efficient Hybrid Password-Based Authenticated Group Key Exchange.
Proceedings of the Advances in Data and Web Management, Joint International Conferences, 2009

A Framework for Authenticated Key Exchange in the Standard Model.
Proceedings of the Information Security Practice and Experience, 2009

2008
Proof of Forward Security for Password-based Authenticated Key Exchange.
Int. J. Netw. Secur., 2008

A New-Style Domain Integrating Management of Windows and UNIX.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

Forward Secure Password-Based Authenticated Key Distribution in the Three-Party Setting.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2008

Password-Authenticated Key Exchange between Clients in a Cross-Realm Setting.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2008

Collecting Internet Malware Based on Client-side Honeypot.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Constant-Round Password-Based Authenticated Key Exchange Protocol for Dynamic Groups.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

2007
Security Arguments for a Class of ID-based Signatures.
IACR Cryptol. ePrint Arch., 2007

Universally Composable Key-evolving Signature.
IACR Cryptol. ePrint Arch., 2007

Efficient Public Key Encryption with Keyword Search Schemes from Pairings.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

Forward Security for an Efficient Password-Based Authenticated Key Exchange.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

Certified E-Mail Protocol in the ID-Based Setting.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2006
Universally Composable Three-Party Key Distribution.
IACR Cryptol. ePrint Arch., 2006

Efficient Public Key Encryption with Keyword Search Schemes from Pairings.
IACR Cryptol. ePrint Arch., 2006

An Efficient ID-based Proxy Signature Scheme from Pairings.
IACR Cryptol. ePrint Arch., 2006

Hybrid Protocol For Password-based Key Exchange in Three-party Setting.
IACR Cryptol. ePrint Arch., 2006

Self-Updating Hash Chains and Their Implementations.
Proceedings of the Web Information Systems, 2006

Efficient Augmented Password-Based Encrypted Key Exchange Protocol.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006

Resource Efficient Hardware Design for RSA.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

A Tamper-resistance Key Pre-distribution Scheme for Wireless Sensor Networks.
Proceedings of the Grid and Cooperative Computing Workshops, 2006

Practical Password-Based Authenticated Key Exchange Protocol.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

A Lightweight Scheme for Trust Relationship Establishment in Ubiquitous Sensor Networks.
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006

2005
A criterion for primitive polynomials over Galois rings.
Discret. Math., 2005

An Efficient Scheme of Merging Multiple Public Key Infrastructures in ERP.
Proceedings of the Advances in Web-Age Information Management, 2005

A New Public Key Certificate Revocation Scheme Based on One-Way Hash Chain.
Proceedings of the Advances in Web-Age Information Management, 2005

An Improved Algorithm for uP + vQ on a Family of Elliptic Curves.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

A Practical Scheme of Merging Multiple Public Key Infrastructures in E-commerce.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

Provable Security of ID-Based Proxy Signature Schemes.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

An ID-Based Verifiable Encrypted Signature Scheme Based on Hess's Scheme .
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

An ID-Based Optimistic Fair Signature Exchange Protocol from Pairings.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
An Efficient Key-Evolving Signature Scheme Based on Pairing.
Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2004), 2004

An Improved Algorithm for uP + vQ Using JSF<sup>1</sup><sub>3</sub>.
Proceedings of the Applied Cryptography and Network Security, 2004


  Loading...