Yunhua He

Orcid: 0000-0001-8971-3936

According to our database1, Yunhua He authored at least 45 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Cross-Chain Trusted Service Quality Computing Scheme for Multichain-Model-Based 5G Network Slicing SLA.
IEEE Internet Things J., July, 2023

A Sparse Protocol Parsing Method for IIoT Based on BPSO-vote-HMM Hybrid Model.
IEEE/ACM Trans. Netw., April, 2023

AQRS: Anti-quantum ring signature scheme for secure epidemic control with blockchain.
Comput. Networks, April, 2023

A Privacy and Efficiency-Oriented Data Sharing Mechanism for IoTs.
IEEE Trans. Big Data, February, 2023

A Game Theory-Based Incentive Mechanism for Collaborative Security of Federated Learning in Energy Blockchain Environment.
IEEE Internet Things J., 2023

An Efficient Blockchain-based Privacy-Preserving Authentication Scheme in VANET.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

An Efficient and Verifiable Polynomial Cross-chain Outsourcing Calculation Scheme for IoT.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

2022
Privacy-Preserving Query Scheme (PPQS) for Location-Based Services in Outsourced Cloud.
Secur. Commun. Networks, 2022

A Cross-Chain Trusted Reputation Scheme for a Shared Charging Platform Based on Blockchain.
IEEE Internet Things J., 2022

A forward-secure and efficient authentication protocol through lattice-based group signature in VANETs scenarios.
Comput. Networks, 2022

VMT: Secure VANETs Message Transmission Scheme with Encryption and Blockchain.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

SBA-GT: A Secure Bandwidth Allocation Scheme with Game Theory for UAV-Assisted VANET Scenarios.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

LFS-AS: Lightweight Forward Secure Aggregate Signature for e-Health Scenarios.
Proceedings of the IEEE International Conference on Communications, 2022

Industrial IoT Network Security Situation Prediction Based on Improved SSA-BiLSTM.
Proceedings of the Wireless Sensor Networks - 16th China Conference, 2022

2021
A blockchain-based privacy-preserving 5G network slicing service level agreement audit scheme.
EURASIP J. Wirel. Commun. Netw., 2021

A survey: applications of blockchain in the Internet of Vehicles.
EURASIP J. Wirel. Commun. Netw., 2021

A Lattice-Based Ring Signature Scheme to Secure Automated Valet Parking.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

A Blockchain based Privacy-Preserving Reputation Scheme for Cloud Service.
Proceedings of the ICC 2021, 2021

2020
Accuracy enhancement for the front-end tracking algorithm of RGB-D SLAM.
Intell. Serv. Robotics, 2020

Destination Prediction-Based Scheduling Algorithms for Message Delivery in IoVs.
IEEE Access, 2020

Segmented Trajectory Clustering-Based Destination Prediction in IoVs.
IEEE Access, 2020

A Blockchain Based Privacy-Preserving Cloud Service Level Agreement Auditing Scheme.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

A Survey: Applications of Blockchains in the Internet of Vehicles.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

LSTM-Based Communication Scheduling Mechanism for Energy Harvesting RSUs in IoVs.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

A Sparse Protocol Parsing Method for IIoT Protocols Based on HMM hybrid model.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
Abnormal Behavior Detection Scheme of UAV Using Recurrent Neural Networks.
IEEE Access, 2019

A Location Predictive Model Based on 2D Angle Data for HAPS Using LSTM.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

Trajectory Prediction of UAV in Smart City using Recurrent Neural Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Deep Memory Network with Auxiliary Sequences for Chinese Implied Sentiment Analysis.
Proceedings of the Wireless Sensor Networks - 13th China Conference, 2019

An Anonymous Blockchain-Based Logging System for Cloud Computing.
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019

2018
On the Secrecy Capacity of 5G New Radio Networks.
Wirel. Commun. Mob. Comput., 2018

A Blockchain Based Privacy-Preserving Incentive Mechanism in Crowdsensing Applications.
IEEE Access, 2018

A Blockchain Based Truthful Incentive Mechanism for Distributed P2P Applications.
IEEE Access, 2018

The Wi-Fi Device Authentication Method Based on Information Hiding.
Proceedings of the 15th International Symposium on Pervasive Systems, 2018

2017
A Bitcoin Based Incentive Mechanism for Distributed P2P Applications.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Poster: Towards Fully Distributed User Authentication with Blockchain.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Poster: Smart-Contract Based Incentive Mechanism for K-Anonymity Privacy Protection in LBSs.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Large-scale Election Based On Blockchain.
Proceedings of the 2017 International Conference on Identification, 2017

2016
An optimal query strategy for protecting location privacy in location-based services.
Peer-to-Peer Netw. Appl., 2016

An Enhanced Structure-Based De-anonymization of Online Social Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

Side-channel information leakage of encrypted video stream in video surveillance systems.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

A Lightweight Location Privacy-Preserving Scheme for WiFi Fingerprint-Based Localization.
Proceedings of the International Conference on Identification, 2016

2015
Security and privacy in localization for underwater sensor networks.
IEEE Commun. Mag., 2015

2014
A Game Theory-Based Analysis of Data Privacy in Vehicular Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

An optimal privacy-preserving mechanism for crowdsourced traffic monitoring.
Proceedings of the 10th ACM International Workshop on Foundations of Mobile Computing, 2014


  Loading...