Yujue Wang

Orcid: 0000-0002-0951-8880

According to our database1, Yujue Wang authored at least 96 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Privacy-preserving federated learning based on partial low-quality data.
J. Cloud Comput., December, 2024

Industrial Wireless Internet Zero Trust Model: Zero Trust Meets Dynamic Federated Learning with Blockchain.
IEEE Wirel. Commun., April, 2024

Privacy-preserving blockchain-based contract signing with multi-party supervision.
Trans. Emerg. Telecommun. Technol., April, 2024

An Explainable Coarse-to-Fine Survival Analysis Method on Multi-Center Whole Slide Images.
IEEE Trans. Artif. Intell., March, 2024

A High-Efficiency and Incentive-Compatible Peer-to-Peer Energy Trading Mechanism.
IEEE Trans. Smart Grid, January, 2024

Semi-shadow file system: An anonymous files storage solution.
Peer Peer Netw. Appl., January, 2024

Optimizing an Abundance-Based Model for Satellite Remote Sensing of Phytoplankton Size Classes in the Bohai and Yellow Seas of China.
IEEE Trans. Geosci. Remote. Sens., 2024

2023
Security and privacy protection technologies in securing blockchain applications.
Inf. Sci., October, 2023

An efficient blockchain-based anonymous authentication and supervision system.
Peer Peer Netw. Appl., September, 2023

A Highly Compatible Verification Framework with Minimal Upgrades to Secure an Existing Edge Network.
ACM Trans. Internet Techn., August, 2023

Mapping depth-integrated microphytobenthic biomass on an estuarine tidal flat using Sentinel satellite data.
Int. J. Appl. Earth Obs. Geoinformation, August, 2023

Improved Certificateless Aggregate Signature Scheme Against Collusion Attacks for VANETs.
IEEE Syst. J., March, 2023

Fuzzy Cooperative Control for the Stabilization of the Rotating Inverted Pendulum System.
J. Adv. Comput. Intell. Intell. Informatics, 2023

Ciphertext-policy attribute-based encryption supporting policy-hiding and cloud auditing in smart health.
Comput. Stand. Interfaces, 2023

Blockchain-empowered security and privacy protection technologies for smart grid.
Comput. Stand. Interfaces, 2023

Distributed Key Derivation for Multi-Party Management of Blockchain Digital Assets.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Secure Multi-Keyword Retrieval with Integrity Guarantee for Outsourced ADS-B Data in Clouds.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

EduChain: A Blockchain-Based Privacy-Preserving Lifelong Education Platform.
Proceedings of the Database Systems for Advanced Applications, 2023

IoT-Assisted Blockchain-Based Car Rental System Supporting Traceability.
Proceedings of the Database Systems for Advanced Applications, 2023

Privacy-Preserving Blockchain Supervision with Responsibility Tracking.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2023

Secure Traffic Data Sharing in UAV-Assisted VANETs.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2023

Efficient and Revocable Anonymous Account Guarantee System Based on Blockchain.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2023

A Lightweight PUF-Based Group Authentication Scheme for Privacy-Preserving Metering Data Collection in Smart Grid.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2023

DCSS: A Smart Contract-based Data Continuous Storage Scheme.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023

Fast 2-out-of-n ECDSA Threshold Signature.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

Towards Privacy-Preserving and Practical Vaccine Supply Chain based on Blockchain.
Proceedings of the 18th Asia Joint Conference on Information Security, 2023

2022
Comprehensive Indicators for Evaluating and Seeking Elasto-Magnetic Parameters for High-Performance Cable Force Monitoring.
Sensors, 2022

Reconstruction of Monthly Surface Nutrient Concentrations in the Yellow and Bohai Seas from 2003-2019 Using Machine Learning.
Remote. Sens., 2022

SomaMutDB: a database of somatic mutations in normal human tissues.
Nucleic Acids Res., 2022

Convolutional neural network-based automatic classification for incomplete antibody reaction intensity in solid phase anti-human globulin test image.
Medical Biol. Eng. Comput., 2022

Genetic Algorithm with Local Search for the Multi-Target Scheduling in Flexible Manufacturing System.
J. Circuits Syst. Comput., 2022

Multi-Party Electronic Contract Signing Protocol Based on Blockchain.
IEICE Trans. Inf. Syst., 2022

Nebula Graph: An open source distributed graph database.
CoRR, 2022

Cloud-assisted Road Condition Monitoring with Privacy Protection in VANETs.
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022

An efficient anonymous authentication and supervision system based on blockchain.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

A Privacy-Preserving Lightweight Energy Data Sharing Scheme Based on Blockchain for Smart Grid.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2022

A Privacy-Preserving Credit Bank Supervision Framework Based on Redactable Blockchain.
Proceedings of the Blockchain and Trustworthy Systems - 4th International Conference, 2022

Blockchain-Based UAV-Assisted Forest Supervision and Data Sharing.
Proceedings of the Blockchain and Trustworthy Systems - 4th International Conference, 2022

2021
Privacy-Preserving Lightweight Data Monitoring in Internet of Things Environments.
Wirel. Pers. Commun., 2021

CPPA-D: Efficient Conditional Privacy-Preserving Authentication Scheme With Double-Insurance in VANETs.
IEEE Trans. Veh. Technol., 2021

Quantitative Evaluation of the Effect of Temperature on Magnetic Barkhausen Noise.
Sensors, 2021

A Certificateless Pairing-Free Authentication Scheme for Unmanned Aerial Vehicle Networks.
Secur. Commun. Networks, 2021

Secure Multi-Keyword Search and Access Control over Electronic Health Records in Wireless Body Area Networks.
Secur. Commun. Networks, 2021

Anonymous and Traceable Authentication for Securing Data Sharing in Parking Edge Computing.
Peer-to-Peer Netw. Appl., 2021

Design and implementation of blockchain-based digital advertising media promotion system.
Peer-to-Peer Netw. Appl., 2021

Impossible Differential Cryptanalysis on ESF Algorithm with Simplified MILP Model.
KSII Trans. Internet Inf. Syst., 2021

Group authentication and key distribution for sensors in wireless body area network.
Int. J. Distributed Sens. Networks, 2021

Tracking changes in aquaculture ponds on the China coast using 30 years of Landsat images.
Int. J. Appl. Earth Obs. Geoinformation, 2021

An Efficient Certificateless Signcryption Scheme for Secure Communication in UAV Cluster Network.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

A PUF-based Lightweight Authenticated Metering Data Collection Scheme with Privacy Protection in Smart Grid.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

An Anti-forensic Method Based on RS Coding and Distributed Storage.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

Verifiable and Privacy-Preserving Ranked Multi-Keyword Search over Outsourced Data in Clouds.
Proceedings of the 15th IEEE International Conference on Big Data Science and Engineering, 2021

2020
Secure Metering Data Aggregation With Batch Verification in Industrial Smart Grid.
IEEE Trans. Ind. Informatics, 2020

Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud.
IEEE Trans. Inf. Forensics Secur., 2020

Secure server-aided data sharing clique with attestation.
Inf. Sci., 2020

Hyperparameter Optimization of ICS Intrusion Detection Classifier Based on Improved Hybrid Algorithm.
Proceedings of the Security and Privacy in Digital Economy, 2020

Group Authentication for Sensors in Wireless Body Area Network.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

Smart Watchdog: A Lightweight Defending Mechanism Against Adversarial Transfer Learning.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

An Aggregate Authentication Framework for Unmanned Aerial Vehicle Cluster Network.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

Evil Chaincode: APT Attacks Based on Smart Contract.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

Verifiable and Privacy-Preserving Outsourcing of Matrix Multiplications.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2020

Verifiable Decentralized Access Control for Distributed Databases.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2020

Privacy-Preserving Multi-keyword Search over Outsourced Data for Resource-Constrained Devices.
Proceedings of the Blockchain and Trustworthy Systems - Second International Conference, 2020

2019
Privacy-Preserving Cloud-Based Road Condition Monitoring With Source Authentication in VANETs.
IEEE Trans. Inf. Forensics Secur., 2019

A Secure and Efficient Group Key Agreement Scheme for VANET.
Sensors, 2019

Securing messaging services through efficient signcryption with designated equality test.
Inf. Sci., 2019

MagneticSpy: Exploiting Magnetometer in Mobile Devices for Website and Application Fingerprinting.
CoRR, 2019

MagneticSpy: Exploiting Magnetometer in Mobile Devices for Website and Application Fingerprinting.
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, 2019

Research on Space Information Network Protocol.
Proceedings of the Space Information Networks - 4th International Conference, 2019

Vibrational Covert Channels using Low-Frequency Acoustic Signals.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

A Privacy-Preserving TPA-aided Remote Data Integrity Auditing Scheme in Clouds.
Proceedings of the Data Science, 2019

Wireless Communication Signal Strength Prediction Method Based on the K-nearest Neighbor Algorithm.
Proceedings of the Data Science, 2019

eRoc: A Distributed Blockchain System with Fast Consensus.
Proceedings of the 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2019

Histogram Publishing Algorithm Based on Sampling Sorting and Greedy Clustering.
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019

Privacy and Integrity Protection of Metering Data in Smart Grid.
Proceedings of the 14th Asia Joint Conference on Information Security, 2019

2018
Ownership-hidden group-oriented proofs of storage from pre-homomorphic signatures.
Peer-to-Peer Netw. Appl., 2018

Verifiably encrypted cascade-instantiable blank signatures to secure progressive decision management.
Int. J. Inf. Sec., 2018

2017
Online/Offline Provable Data Possession.
IEEE Trans. Inf. Forensics Secur., 2017

Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds.
IEEE Trans. Inf. Forensics Secur., 2017

Secure server-aided top-k monitoring.
Inf. Sci., 2017

CCA Secure encryption supporting authorized equality test on ciphertexts in standard model and its applications.
Inf. Sci., 2017

Probabilistic Public Key Encryption for Controlled Equijoin in Relational Databases.
Comput. J., 2017

2016
Security Implications of Transport Layer Protocols in Power Grid Synchrophasor Data Communication.
IEEE Trans. Smart Grid, 2016

Design of Tunnel Magnetoresistive-Based Circular MFL Sensor Array for the Detection of Flaws in Steel Wire Rope.
J. Sensors, 2016

Provably secure robust optimistic fair exchange of distributed signatures.
Future Gener. Comput. Syst., 2016

Versatile lightweight key distribution for big data privacy in vehicular ad hoc networks.
Concurr. Comput. Pract. Exp., 2016

Quantifying Uncertainties of Security and QoS for Design of Power Grid Communications Systems.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

2015
Practical (fully) distributed signatures provably secure in the standard model.
Theor. Comput. Sci., 2015

Further ideal multipartite access structures from integer polymatroids.
Sci. China Inf. Sci., 2015

Batch Blind Signatures on Elliptic Curves.
Proceedings of the Information Security Practice and Experience, 2015

Group-oriented Proofs of Storage.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Efficient Sub-/Inter-Group Key Distribution for ad hoc Networks.
Proceedings of the Network and System Security - 8th International Conference, 2014

Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage.
Proceedings of the Computer Security - ESORICS 2014, 2014

Practical Distributed Signatures in the Standard Model.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

2011
An Evidence-Based Trust Assessment Framework for Critical Infrastructure Decision Making.
Proceedings of the Critical Infrastructure Protection V, 2011

Feature extraction of vigilance level based on Heart Rate Variability of Electrocardiogram.
Proceedings of the 4th International Conference on Biomedical Engineering and Informatics, 2011


  Loading...