Yuqing Zhang

According to our database1, Yuqing Zhang authored at least 175 papers between 1999 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
An Efficient and Parallel R-LWE Cryptoprocessor.
IEEE Trans. Circuits Syst. II Express Briefs, 2020

Identify Vulnerability Fix Commits Automatically Using Hierarchical Attention Network.
EAI Endorsed Trans. Security Safety, 2020

Vul-Mirror: A Few-Shot Learning Method for Discovering Vulnerable Code Clone.
EAI Endorsed Trans. Security Safety, 2020

Energy-efficient sensory data gathering based on compressed sensing in IoT networks.
J. Cloud Comput., 2020

Response Patterns of Vegetation Phenology along Urban-Rural Gradients in Urban Areas of Different Sizes.
Complexity, 2020

Monitoring and Simulation of Dynamic Spatiotemporal Land Use/Cover Changes.
Complexity, 2020

Secure IoT Data Outsourcing With Aggregate Statistics and Fine-Grained Access Control.
IEEE Access, 2020

Robust Video Object Segmentation via Propagating Seams and Matching Superpixels.
IEEE Access, 2020

2019
Comments on "Provably Secure Dynamic Id-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model".
IEEE Trans. Inf. Forensics Secur., 2019

The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved.
IEEE Internet Things J., 2019

ESDRA: An Efficient and Secure Distributed Remote Attestation Scheme for IoT Swarms.
IEEE Internet Things J., 2019

Securing Traffic-Related Messages Exchange Against Inside-and-Outside Collusive Attack in Vehicular Networks.
IEEE Internet Things J., 2019

One secure data integrity verification scheme for cloud storage.
Future Gener. Comput. Syst., 2019

Logic Bugs in IoT Platforms and Systems: A Review.
CoRR, 2019

Good Motive but Bad Design: Why ARM MPU Has Become an Outcast in Embedded Systems.
CoRR, 2019

Machine Learning Allows Calibration Models to Predict Trace Element Concentration in Soil with Generalized LIBS Spectra.
CoRR, 2019

Attack-Defense Quantification Based On Game-Theory.
CoRR, 2019

A revised CVSS-based system to improve the dispersion of vulnerability risk scores.
Sci. China Inf. Sci., 2019

Privacy Preserving Association Rule Mining: Taxonomy, Techniques, and Metrics.
IEEE Access, 2019

Towards the Detection of Inconsistencies in Public Security Vulnerability Reports.
Proceedings of the 28th USENIX Security Symposium, 2019

Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms.
Proceedings of the 28th USENIX Security Symposium, 2019

Attack-Defense Utility Quantification And Security Risk Assessment.
Proceedings of the 2019 IEEE SmartWorld, 2019

Research on the Impact of Attacks on Security Characteristics.
Proceedings of the 2019 IEEE SmartWorld, 2019

Security Analysis of Smart Home Based on Life Cycle.
Proceedings of the 2019 IEEE SmartWorld, 2019

Research on the Destructive Capability Metrics of Common Network Attacks.
Proceedings of the 2019 IEEE SmartWorld, 2019

FIoT: Detecting the Memory Corruption in Lightweight IoT Device Firmware.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Resource Analysis and Cost Modeling for End-to-End 5G Mobile Networks.
Proceedings of the Optical Network Design and Modeling, 2019

Semantically Secure and Verifiable Multi-keyword Search in Cloud Computing.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

A Blackboard Sharing Mechanism for Community Cyber Threat Intelligence Based on Multi-Agent System.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

A Hybrid Model for Optimal Defense Strategy Generation.
Proceedings of the 28th International Conference on Computer Communication and Networks, 2019

0-RTT Attack and Defense of QUIC Protocol.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

Identifying Privilege Separation Vulnerabilities in IoT Firmware with Symbolic Execution.
Proceedings of the Computer Security - ESORICS 2019, 2019

Randex: Mitigating Range Injection Attacks on Searchable Encryption.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

IoT S&P 2019: 2nd Workshop on the Internet of Things Security and Privacy.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Security Measurements of Cyber Networks.
Security and Communication Networks, 2018

Privacy-preserving composite modular exponentiation outsourcing with optimal checkability in single untrusted cloud server.
J. Netw. Comput. Appl., 2018

Phantom Device Attack: Uncovering the Security Implications of the Interactions among Devices, IoT Cloud, and Mobile Apps.
CoRR, 2018

The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved.
CoRR, 2018

Several classes of negabent functions over finite fields.
Sci. China Inf. Sci., 2018

An adaptive system for detecting malicious queries in web attacks.
Sci. China Inf. Sci., 2018

Alternative empirical Bayes models for adjusting for batch effects in genomic studies.
BMC Bioinform., 2018

Privacy-Preserving and Dynamic Multi-Attribute Conjunctive Keyword Search Over Encrypted Cloud Data.
IEEE Access, 2018

E-SC: Collusion-Resistant Secure Outsourcing of Sequence Comparison Algorithm.
IEEE Access, 2018

Efficient and Secure Top-k Queries With Top Order-Preserving Encryption.
IEEE Access, 2018

A Real-Time Method for Marking the Extent of a Lipid Plaque Based on IV-OCT Imaging.
Proceedings of the Cognitive Systems and Signal Processing - 4th International Conference, 2018

A Novel Improved System Based on CVSS.
Proceedings of the Communications, Signal Processing, and Systems, 2018

SCPN-based Game Model for Security Situational Awareness in the Intenet of Things.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys.
IEEE Trans. Serv. Comput., 2017

SecReach: Secure Reachability Computation on Encrypted Location Check-in Data.
IACR Cryptol. ePrint Arch., 2017

A Novel Approach for Security Situational Awareness in the Internet of Things.
CoRR, 2017

T-DB: Toward Fully Functional Transparent Encrypted Databases in DBaaS Framework.
CoRR, 2017

Adaptively Detecting Malicious Queries in Web Attacks.
CoRR, 2017

Driving Android apps to trigger target API invocations based on activity and GUI filtering.
Sci. China Inf. Sci., 2017

Avoiding monopolization: mutual-aid collusive attack detection in cooperative spectrum sensing.
Sci. China Inf. Sci., 2017

A static technique for detecting input validation vulnerabilities in Android apps.
Sci. China Inf. Sci., 2017

Application Research on Network Attacks and Defenses with Zachman Framework.
Proceedings of the Network and System Security - 11th International Conference, 2017

A Novel Approach to Network Security Situation Assessment Based on Attack Confidence.
Proceedings of the Network and System Security - 11th International Conference, 2017

Mixed Wavelet-Based Neural Network Model for Cyber Security Situation Prediction Using MODWT and Hurst Exponent Analysis.
Proceedings of the Network and System Security - 11th International Conference, 2017

One-tag checker: Message-locked integrity auditing on encrypted cloud deduplication storage.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

IoT S&P 2017: First Workshop on Internet of Things Security and Privacy.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

Predicting the Popularity of Online News Based on Multivariate Analysis.
Proceedings of the 2017 IEEE International Conference on Computer and Information Technology, 2017

2016
A privacy-preserving group authentication protocol for machine-type communication in LTE/LTE-A networks.
Security and Communication Networks, 2016

Efficient quantum dialogue using entangled states and entanglement swapping without information leakage.
Quantum Inf. Process., 2016

SVC: Secure VANET-Assisted Remote Healthcare Monitoring System in Disaster Area.
KSII Trans. Internet Inf. Syst., 2016

One-round Secure Key Exchange Protocol With Strong Forward Secrecy.
KSII Trans. Internet Inf. Syst., 2016

New complementary sets of length 2<sup>m</sup> and size 4.
Adv. Math. Commun., 2016

Error estimates of two-level finite element method for Smagorinsky model.
Appl. Math. Comput., 2016

Security Analysis and Vulnerability Detection of Gesture-Based Lock in Android Applications.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Enhancing multi-label classification based on local label constraints and classifier chains.
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016

A Machine Learning Approach for Detecting Third-Party Trackers on the Web.
Proceedings of the Computer Security - ESORICS 2016, 2016

Stay in Your Cage! A Sound Sandbox for Third-Party Libraries on Android.
Proceedings of the Computer Security - ESORICS 2016, 2016

Call Me Back!: Attacks on System Server and System Apps in Android through Synchronous Callback.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
EasiND: Effective Neighbor Discovery Algorithms for Asynchronous and Asymmetric-Duty-Cycle Multi-channel Mobile WSNs.
Wireless Personal Communications, 2015

A privacy preserving authentication scheme for roaming services in global mobility networks.
Security and Communication Networks, 2015

Securing cooperative spectrum sensing against ISSDF attack using dynamic trust evaluation in cognitive radio networks.
Security and Communication Networks, 2015

Quantum controlled-not gate in the bad cavity regime.
Quantum Inf. Process., 2015

ASVC: An Automatic Security Vulnerability Categorization Framework Based on Novel Features of Vulnerability Data.
J. Commun., 2015

A Novel Automatic Severity Vulnerability Assessment Framework.
J. Commun., 2015

Lightweight handover authentication with location privacy-preserving in mobile wireless networks.
IJES, 2015

TrackerDetector: A system to detect third-party trackers through machine learning.
Comput. Networks, 2015

XAS: Cross-API scripting attacks in social ecosystems.
Sci. China Inf. Sci., 2015

Hot Topics Extraction from Chinese Micro-blog Based on Sentence.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

A Microblog Data Acquisition Method Based on Follow-Group Mode.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

IVDroid: Static Detection for Input Validation Vulnerability in Android Inter-component Communication.
Proceedings of the Information Security Practice and Experience, 2015

Repost Number Prediction of Micro-blog on Sina Weibo Using Time Series Fitting and Regression Analysis.
Proceedings of the International Conference on Identification, 2015

A fuzzing test for dynamic vulnerability detection on Android Binder mechanism.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Fast and Secure Handover Authentication Scheme Based on Ticket for WiMAX and WiFi Heterogeneous Networks.
Wireless Personal Communications, 2014

On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in Multicloud Storage.
IEEE Trans. Parallel Distrib. Syst., 2014

Using fuzzy comprehensive evaluation method to establish a credible spectrum sensing and allocation model.
Security and Communication Networks, 2014

An anonymous data aggregation scheme for smart grid systems.
Security and Communication Networks, 2014

Static detection of logic vulnerabilities in Java web applications.
Security and Communication Networks, 2014

Securing Cooperative Spectrum Sensing against Rational SSDF Attack in Cognitive Radio Networks.
KSII Trans. Internet Inf. Syst., 2014

Some classes of monomial complete permutation polynomials over finite fields of characteristic two.
Finite Fields Their Appl., 2014

Function Escalation Attack.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Propagation regularity of hot topics in Sina Weibo based on SIR model - A simulation research.
Proceedings of the IEEE Computers, 2014

Hot topics detected from micro-bloggings based on word co-occurrence model.
Proceedings of the IEEE Computers, 2014

POSTER: Recommendation-based Third-Party Tracking Monitor to Balance Privacy with Personalization.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

AraTRM: Attack Resistible Ant-based Trust and Reputation Model.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

A Soft Decision Scheme against Intermittent SSDF Attack in Cooperative Spectrum Sensing.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

2013
GHAP: An Efficient Group-based Handover Authentication Mechanism for IEEE 802.16m Networks.
Wireless Personal Communications, 2013

Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud.
IEEE Trans. Parallel Distrib. Syst., 2013

IKE vulnerability discovery based on fuzzing.
Security and Communication Networks, 2013

Structurized grammar-based fuzz testing for programs with highly structured inputs.
Security and Communication Networks, 2013

Verifiable symmetric polynomial-based key distribution schemes.
Security and Communication Networks, 2013

A privacy-preserving acceleration authentication protocol for mobile pay-TV systems.
Security and Communication Networks, 2013

A new certificateless authenticated key agreement protocol for SIP with different KGCs.
Security and Communication Networks, 2013

A simple and robust anonymous two-factor authenticated key exchange protocol.
Security and Communication Networks, 2013

RPFuzzer: A Framework for Discovering Router Protocols Vulnerabilities Based on Fuzzing.
KSII Trans. Internet Inf. Syst., 2013

A New Roaming Authentication Framework For Wireless Communication.
KSII Trans. Internet Inf. Syst., 2013

A Lightweight Three-Party Privacy-preserving Authentication Key Exchange Protocol Using Smart Card.
KSII Trans. Internet Inf. Syst., 2013

EasiND: Neighbor Discovery in Duty-Cycled Asynchronous Multichannel Mobile WSNs.
Int. J. Distributed Sens. Networks, 2013

More Classes of Complete Permutation Polynomials over $\F_q$.
CoRR, 2013

Defend against Collusive SSDF Attack Using Trust in Cooperative Spectrum Sensing Environment.
Proceedings of the 12th IEEE International Conference on Trust, 2013

A new framework against privilege escalation attacks on android.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Fuzzing the ActionScript virtual machine.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

trend of online flash XSS vulnerabilities.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks.
IEEE Trans. Dependable Secur. Comput., 2012

Improving VRSS-based vulnerability prioritization using analytic hierarchy process.
J. Syst. Softw., 2012

Efficient (n, t, n) secret sharing schemes.
J. Syst. Softw., 2012

Construction of Near-Complementary Sequences with Low PMEPR for Peak Power Control in OFDM.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

A Novel Group-Based Handover Authentication Scheme with Privacy Preservation for Mobile WiMAX Networks.
IEEE Communications Letters, 2012

An efficient handover authentication scheme with privacy preservation for IEEE 802.16m network.
Comput. Secur., 2012

Dealing with dishonest recommendation: The trials in reputation management court.
Ad Hoc Networks, 2012

BlendFuzz: A Model-Based Framework for Fuzz Testing Programs with Grammatical Inputs.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Analysis and Improvements of Two Identity Based Anonymous Signcryption Schemes for Multiple Receivers.
Proceedings of the 11th IEEE International Conference on Trust, 2012

The Analysis of Mobility Models in MANETs with Two-Hop Relay Algorithm.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

An efficient handover authentication scheme with location privacy preserving for EAP-based wireless networks.
Proceedings of IEEE International Conference on Communications, 2012

A lightweight roaming authentication protocol for anonymous wireless communication.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

A research on vulnerability discovering for router protocols based on fuzzing.
Proceedings of the 7th International Conference on Communications and Networking in China, 2012

2011
Cryptanalysis of an Efficient Threshold Self-Healing Key Distribution Scheme.
IEEE Trans. Wireless Communications, 2011

Security Issues and Solutions of the Key Management Protocols in IEEE 802.16j Multi-Hop Relay Network.
IEICE Trans. Commun., 2011

VRSS: A new system for rating and scoring vulnerabilities.
Comput. Commun., 2011

EKMP: An enhanced key management protocol for IEEE 802.16m.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

Identity-Based Strong Key-Insulated Ring Signature Scheme in the Standard Model.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

A Privacy Preserving Handover Authentication Scheme for EAP-Based Wireless Networks.
Proceedings of the Global Communications Conference, 2011

2010
The multi-class schedule-based transit assignment model under network uncertainties.
Public Transp., 2010

A Trust Management Model Based on Bi-evaluation in P2P Networks.
IEICE Trans. Inf. Syst., 2010

A Fast Handover Authentication Mechanism Based on Ticket for IEEE 802.16m.
IEEE Communications Letters, 2010

A Client-Based and Server-Enhanced Defense Mechanism for Cross-Site Request Forgery.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Eliminating Human Specification in Static Analysis.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Secure and Efficient Generalized Signcryption Scheme Based on a Short ECDSA.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Coping with Traitor Attacks in Reputation Models for Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2010

Secure Signcryption Scheme Based on a Hybrid Encryption.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2009
An efficient and provable secure identity-based ring signcryption scheme.
Comput. Stand. Interfaces, 2009

A new provably secure authentication and key agreement protocol for SIP using ECC.
Comput. Stand. Interfaces, 2009

Provably Secure Password-Authenticated Group Key Exchange with Different Passwords under Standard Assumption.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

New ID-Based and Threshold Key Distribution Protocol in MANET Using a Multi-signcryption Scheme.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

An Integrated Approach to Worm Detection and Automatic Signature Generation.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Automatic Vulnerability Locating in Binary Patches.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

2008
An Efficient Identity-based Ring Signcryption Scheme.
IACR Cryptol. ePrint Arch., 2008

Cryptanalysis of a client-to-client password-authenticated key agreement protocol.
IACR Cryptol. ePrint Arch., 2008

A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography.
Comput. Commun., 2008

TFTP vulnerability finding technique based on fuzzing.
Comput. Commun., 2008

The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version.
Proceedings of the Provable Security, Second International Conference, 2008

Secure and Efficient Key Management Protocol in Ad Hoc Networks.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
Security Analysis of WAPI Authentication and Key Exchange Protocol.
IACR Cryptol. ePrint Arch., 2007

A New Security Model for Cross-Realm C2C-PAKE Protocol.
IACR Cryptol. ePrint Arch., 2007

Research on User Applying Mode for Video Conference System.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

A Provable Secure Key Management Program for Wireless Sensor Network.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2006
Common Program Analysis of Two-Party Security Protocols Using SMV.
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006

2005
Deep into the Framework for Different Coarse-grained P2P Computing Based on JXTA.
Proceedings of the 2005 International Conference on Semantics, 2005

Short Threshold Signature Schemes Without Random Oracles.
Proceedings of the Progress in Cryptology, 2005

Running-mode Analysis of the SSL Protocol.
Proceedings of The 2005 International Conference on Internet Computing, 2005

Research of Security Architecture for P2P Network Based on Trust Management System.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005

The Analysis of Peer-to-Peer Network Security.
Proceedings of The 2005 International Conference on Grid Computing and Applications, 2005

Using SMV for Cryptographic Protocol Analysis: A Case Study.
Proceedings of The 2005 International Conference on Foundations of Computer Science, 2005

An approach to the formal verification of the three-principal security protocols.
Proceedings of The 2005 International Conference on Security and Management, 2005

Running-mode Analysis of the Lu-Smolka-SET protocol.
Proceedings of The 2005 International Conference on E-Business, 2005

The Running-Mode Analysis of Two-Party Optimistic Fair Exchange Protocols.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
Running-mode analysis of the Security Socket Layer protocol.
ACM SIGOPS Oper. Syst. Rev., 2004

An approach to the formal verification of the three-principal cryptographic protocols.
ACM SIGOPS Oper. Syst. Rev., 2004

SAP2P: A P2P Network Security Architecture Based on Trust Management System.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2004

2003
Authentication and Access Control in P2P Network.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

2001
Using SMV for Cryptographic Protocol Analysis: A Case Study.
ACM SIGOPS Oper. Syst. Rev., 2001

1999
An Approach to the Formal Verification of the Two-Party Crypographic Protocols.
ACM SIGOPS Oper. Syst. Rev., 1999


  Loading...