Yulong Fu

Orcid: 0000-0002-1778-4943

According to our database1, Yulong Fu authored at least 34 papers between 2011 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft Biometrics.
Proceedings of the Information Security Practice and Experience, 2023

2022
Monocular Visual Pose Estimation for Flexible Drogue by Decoupling the Deformation.
IEEE Trans. Instrum. Meas., 2022

Optimized meta-VQE Algorithm for Better Trend Learning of Ground State Energy.
Proceedings of the 14th International Conference on Wireless Communications and Signal Processing, 2022

2021
CPPHA: Capability-Based Privacy-Protection Handover Authentication Mechanism for SDN-Based 5G HetNets.
IEEE Trans. Dependable Secur. Comput., 2021

A Survey on Trust Evaluation Based on Machine Learning.
ACM Comput. Surv., 2021

2020
Packet-Based Intrusion Detection Using Bayesian Topic Models in Mobile Edge Computing.
Secur. Commun. Networks, 2020

An Adaptive Security Data Collection and Composition Recognition method for security measurement over LTE/LTE-A networks.
J. Netw. Comput. Appl., 2020

LSAA: A Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks.
IEEE Internet Things J., 2020

2019
Monadic pseudo BCI-algebras and corresponding logics.
Soft Comput., 2019

Adaptive security-related data collection with context awareness.
J. Netw. Comput. Appl., 2019

Many-Objective Brain Storm Optimization Algorithm.
IEEE Access, 2019

A Security Formal Model for Multiple Channels Communication.
Proceedings of the 2019 IEEE SmartWorld, 2019

A Study and Enhancement to the Security of MANET AODV Protocol Against Black Hole Attacks.
Proceedings of the 2019 IEEE SmartWorld, 2019

Quantifiable Network Security Measurement: A Study Based on an Index System.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

Multi-objective Differential-Based Brain Storm Optimization for Environmental Economic Dispatch Problem.
Proceedings of the Brain Storm Optimization Algorithms: Concepts, 2019

2018
Data Fusion for Network Intrusion Detection: A Review.
Secur. Commun. Networks, 2018

A survey on network data collection.
J. Netw. Comput. Appl., 2018

EGHR: Efficient group-based handover authentication protocols for mMTC in 5G wireless networks.
J. Netw. Comput. Appl., 2018

A Study and Simulation Research of Blackhole Attack on Mobile AdHoc Network.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
An Automata Based Intrusion Detection Method for Internet of Things.
Mob. Inf. Syst., 2017

A secure SDN based multi-RANs architecture for future 5G networks.
Comput. Secur., 2017

Difference Brain Storm Optimization for Combined Heat and Power Economic Dispatch.
Proceedings of the Advances in Swarm Intelligence - 8th International Conference, 2017

An Attack to an Anonymous Certificateless Group Key Agreement Scheme and Its Improvement.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Survey on Big Data Analysis Algorithms for Network Security Measurement.
Proceedings of the Network and System Security - 11th International Conference, 2017

Trajectory prediction-based handover authentication mechanism for mobile relays in LTE-A high-speed rail networks.
Proceedings of the IEEE International Conference on Communications, 2017

2016
States on hyper MV-algebras.
J. Intell. Fuzzy Syst., 2016

2015
Model based security verification of protocol implementation.
J. Inf. Secur. Appl., 2015

2014
Security and Robustness by Protocol Testing.
IEEE Syst. J., 2014

Some results of convex fuzzy sublattices.
J. Intell. Fuzzy Syst., 2014

2013
Validation of security protocol implementations from security objectives.
Comput. Secur., 2013

A finite transition model for security protocol verification.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Using transition systems to model and verify the implementation of security protocol.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

2011
A Robustness Testing Method for Network Security.
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011

Network Securing against Threatening Requests.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011


  Loading...