Yulong Fu
  This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Bibliography
  2025
QVecOpt: An Efficient Storage and Computing Opti-mization Framework for Large-scale Quantum State Simulation.
    
  
    CoRR, August, 2025
    
  
Distributed Shared Layered Storage Quantum Simulator: A novel quantum simulation system for efficient scaling and cost optimization.
    
  
    CoRR, August, 2025
    
  
Toward Seamless 6G and AI/ML Convergence: Architectural Enhancements and Security Challenges.
    
  
    IEEE Netw., July, 2025
    
  
    ACM Comput. Surv., January, 2025
    
  
AotmAuth: Atomic Function Module-Based 6G Authentication Protocol Combination Framework.
    
  
    IEEE Trans. Dependable Secur. Comput., 2025
    
  
    Comput. Networks, 2025
    
  
  2024
A Dynamic and Efficient Self-Certified Authenticated Group Key Agreement Protocol for VANET.
    
  
    IEEE Internet Things J., September, 2024
    
  
  2023
Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft Biometrics.
    
  
    Proceedings of the Information Security Practice and Experience, 2023
    
  
  2022
    IEEE Trans. Instrum. Meas., 2022
    
  
    Proceedings of the 14th International Conference on Wireless Communications and Signal Processing, 2022
    
  
  2021
CPPHA: Capability-Based Privacy-Protection Handover Authentication Mechanism for SDN-Based 5G HetNets.
    
  
    IEEE Trans. Dependable Secur. Comput., 2021
    
  
  2020
Packet-Based Intrusion Detection Using Bayesian Topic Models in Mobile Edge Computing.
    
  
    Secur. Commun. Networks, 2020
    
  
An Adaptive Security Data Collection and Composition Recognition method for security measurement over LTE/LTE-A networks.
    
  
    J. Netw. Comput. Appl., 2020
    
  
LSAA: A Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks.
    
  
    IEEE Internet Things J., 2020
    
  
  2019
    J. Netw. Comput. Appl., 2019
    
  
    Proceedings of the 2019 IEEE SmartWorld, 2019
    
  
A Study and Enhancement to the Security of MANET AODV Protocol Against Black Hole Attacks.
    
  
    Proceedings of the 2019 IEEE SmartWorld, 2019
    
  
    Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019
    
  
Multi-objective Differential-Based Brain Storm Optimization for Environmental Economic Dispatch Problem.
    
  
    Proceedings of the Brain Storm Optimization Algorithms: Concepts, 2019
    
  
  2018
EGHR: Efficient group-based handover authentication protocols for mMTC in 5G wireless networks.
    
  
    J. Netw. Comput. Appl., 2018
    
  
    Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
    
  
  2017
    Mob. Inf. Syst., 2017
    
  
    Comput. Secur., 2017
    
  
    Proceedings of the Advances in Swarm Intelligence - 8th International Conference, 2017
    
  
An Attack to an Anonymous Certificateless Group Key Agreement Scheme and Its Improvement.
    
  
    Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
    
  
    Proceedings of the Network and System Security - 11th International Conference, 2017
    
  
Trajectory prediction-based handover authentication mechanism for mobile relays in LTE-A high-speed rail networks.
    
  
    Proceedings of the IEEE International Conference on Communications, 2017
    
  
  2016
  2015
    J. Inf. Secur. Appl., 2015
    
  
  2014
  2013
    Comput. Secur., 2013
    
  
    Proceedings of the 6th International Conference on Security of Information and Networks, 2013
    
  
Using transition systems to model and verify the implementation of security protocol.
    
  
    Proceedings of the 6th International Conference on Security of Information and Networks, 2013
    
  
  2011
    Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011
    
  
    Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011