Yuqing Zhang

According to our database1, Yuqing Zhang authored at least 141 papers between 1999 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved.
IEEE Internet of Things Journal, 2019

One secure data integrity verification scheme for cloud storage.
Future Generation Comp. Syst., 2019

A revised CVSS-based system to improve the dispersion of vulnerability risk scores.
SCIENCE CHINA Information Sciences, 2019

Privacy Preserving Association Rule Mining: Taxonomy, Techniques, and Metrics.
IEEE Access, 2019

Randex: Mitigating Range Injection Attacks on Searchable Encryption.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
Security Measurements of Cyber Networks.
Security and Communication Networks, 2018

Privacy-preserving composite modular exponentiation outsourcing with optimal checkability in single untrusted cloud server.
J. Network and Computer Applications, 2018

Several classes of negabent functions over finite fields.
SCIENCE CHINA Information Sciences, 2018

An adaptive system for detecting malicious queries in web attacks.
SCIENCE CHINA Information Sciences, 2018

Alternative empirical Bayes models for adjusting for batch effects in genomic studies.
BMC Bioinformatics, 2018

Privacy-Preserving and Dynamic Multi-Attribute Conjunctive Keyword Search Over Encrypted Cloud Data.
IEEE Access, 2018

E-SC: Collusion-Resistant Secure Outsourcing of Sequence Comparison Algorithm.
IEEE Access, 2018

Efficient and Secure Top-k Queries With Top Order-Preserving Encryption.
IEEE Access, 2018

A Real-Time Method for Marking the Extent of a Lipid Plaque Based on IV-OCT Imaging.
Proceedings of the Cognitive Systems and Signal Processing - 4th International Conference, 2018

SCPN-based Game Model for Security Situational Awareness in the Intenet of Things.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys.
IEEE Trans. Services Computing, 2017

Driving Android apps to trigger target API invocations based on activity and GUI filtering.
SCIENCE CHINA Information Sciences, 2017

Avoiding monopolization: mutual-aid collusive attack detection in cooperative spectrum sensing.
SCIENCE CHINA Information Sciences, 2017

A static technique for detecting input validation vulnerabilities in Android apps.
SCIENCE CHINA Information Sciences, 2017

Application Research on Network Attacks and Defenses with Zachman Framework.
Proceedings of the Network and System Security - 11th International Conference, 2017

A Novel Approach to Network Security Situation Assessment Based on Attack Confidence.
Proceedings of the Network and System Security - 11th International Conference, 2017

Mixed Wavelet-Based Neural Network Model for Cyber Security Situation Prediction Using MODWT and Hurst Exponent Analysis.
Proceedings of the Network and System Security - 11th International Conference, 2017

One-tag checker: Message-locked integrity auditing on encrypted cloud deduplication storage.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

IoT S&P 2017: First Workshop on Internet of Things Security and Privacy.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

Predicting the Popularity of Online News Based on Multivariate Analysis.
Proceedings of the 2017 IEEE International Conference on Computer and Information Technology, 2017

2016
A privacy-preserving group authentication protocol for machine-type communication in LTE/LTE-A networks.
Security and Communication Networks, 2016

Efficient quantum dialogue using entangled states and entanglement swapping without information leakage.
Quantum Information Processing, 2016

SVC: Secure VANET-Assisted Remote Healthcare Monitoring System in Disaster Area.
TIIS, 2016

One-round Secure Key Exchange Protocol With Strong Forward Secrecy.
TIIS, 2016

New complementary sets of length 2m and size 4.
Adv. in Math. of Comm., 2016

Error estimates of two-level finite element method for Smagorinsky model.
Applied Mathematics and Computation, 2016

Security Analysis and Vulnerability Detection of Gesture-Based Lock in Android Applications.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Enhancing multi-label classification based on local label constraints and classifier chains.
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016

A Machine Learning Approach for Detecting Third-Party Trackers on the Web.
Proceedings of the Computer Security - ESORICS 2016, 2016

Stay in Your Cage! A Sound Sandbox for Third-Party Libraries on Android.
Proceedings of the Computer Security - ESORICS 2016, 2016

Call Me Back!: Attacks on System Server and System Apps in Android through Synchronous Callback.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

SecReach: Secure Reachability Computation on Encrypted Location Check-in Data.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
EasiND: Effective Neighbor Discovery Algorithms for Asynchronous and Asymmetric-Duty-Cycle Multi-channel Mobile WSNs.
Wireless Personal Communications, 2015

A privacy preserving authentication scheme for roaming services in global mobility networks.
Security and Communication Networks, 2015

Securing cooperative spectrum sensing against ISSDF attack using dynamic trust evaluation in cognitive radio networks.
Security and Communication Networks, 2015

Quantum controlled-not gate in the bad cavity regime.
Quantum Information Processing, 2015

ASVC: An Automatic Security Vulnerability Categorization Framework Based on Novel Features of Vulnerability Data.
JCM, 2015

A Novel Automatic Severity Vulnerability Assessment Framework.
JCM, 2015

Lightweight handover authentication with location privacy-preserving in mobile wireless networks.
IJES, 2015

TrackerDetector: A system to detect third-party trackers through machine learning.
Computer Networks, 2015

XAS: Cross-API scripting attacks in social ecosystems.
SCIENCE CHINA Information Sciences, 2015

Hot Topics Extraction from Chinese Micro-blog Based on Sentence.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

A Microblog Data Acquisition Method Based on Follow-Group Mode.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

IVDroid: Static Detection for Input Validation Vulnerability in Android Inter-component Communication.
Proceedings of the Information Security Practice and Experience, 2015

Repost Number Prediction of Micro-blog on Sina Weibo Using Time Series Fitting and Regression Analysis.
Proceedings of the International Conference on Identification, 2015

A fuzzing test for dynamic vulnerability detection on Android Binder mechanism.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Fast and Secure Handover Authentication Scheme Based on Ticket for WiMAX and WiFi Heterogeneous Networks.
Wireless Personal Communications, 2014

On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in Multicloud Storage.
IEEE Trans. Parallel Distrib. Syst., 2014

Using fuzzy comprehensive evaluation method to establish a credible spectrum sensing and allocation model.
Security and Communication Networks, 2014

An anonymous data aggregation scheme for smart grid systems.
Security and Communication Networks, 2014

Static detection of logic vulnerabilities in Java web applications.
Security and Communication Networks, 2014

Securing Cooperative Spectrum Sensing against Rational SSDF Attack in Cognitive Radio Networks.
TIIS, 2014

Some classes of monomial complete permutation polynomials over finite fields of characteristic two.
Finite Fields and Their Applications, 2014

Function Escalation Attack.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Propagation regularity of hot topics in Sina Weibo based on SIR model - A simulation research.
Proceedings of the IEEE Computers, 2014

Hot topics detected from micro-bloggings based on word co-occurrence model.
Proceedings of the IEEE Computers, 2014

POSTER: Recommendation-based Third-Party Tracking Monitor to Balance Privacy with Personalization.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

AraTRM: Attack Resistible Ant-based Trust and Reputation Model.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

A Soft Decision Scheme against Intermittent SSDF Attack in Cooperative Spectrum Sensing.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

2013
GHAP: An Efficient Group-based Handover Authentication Mechanism for IEEE 802.16m Networks.
Wireless Personal Communications, 2013

Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud.
IEEE Trans. Parallel Distrib. Syst., 2013

IKE vulnerability discovery based on fuzzing.
Security and Communication Networks, 2013

Structurized grammar-based fuzz testing for programs with highly structured inputs.
Security and Communication Networks, 2013

Verifiable symmetric polynomial-based key distribution schemes.
Security and Communication Networks, 2013

A privacy-preserving acceleration authentication protocol for mobile pay-TV systems.
Security and Communication Networks, 2013

A new certificateless authenticated key agreement protocol for SIP with different KGCs.
Security and Communication Networks, 2013

A simple and robust anonymous two-factor authenticated key exchange protocol.
Security and Communication Networks, 2013

RPFuzzer: A Framework for Discovering Router Protocols Vulnerabilities Based on Fuzzing.
TIIS, 2013

A New Roaming Authentication Framework For Wireless Communication.
TIIS, 2013

A Lightweight Three-Party Privacy-preserving Authentication Key Exchange Protocol Using Smart Card.
TIIS, 2013

EasiND: Neighbor Discovery in Duty-Cycled Asynchronous Multichannel Mobile WSNs.
IJDSN, 2013

Defend against Collusive SSDF Attack Using Trust in Cooperative Spectrum Sensing Environment.
Proceedings of the 12th IEEE International Conference on Trust, 2013

A new framework against privilege escalation attacks on android.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Fuzzing the ActionScript virtual machine.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

trend of online flash XSS vulnerabilities.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks.
IEEE Trans. Dependable Sec. Comput., 2012

Improving VRSS-based vulnerability prioritization using analytic hierarchy process.
Journal of Systems and Software, 2012

Efficient (n, t, n) secret sharing schemes.
Journal of Systems and Software, 2012

Construction of Near-Complementary Sequences with Low PMEPR for Peak Power Control in OFDM.
IEICE Transactions, 2012

A Novel Group-Based Handover Authentication Scheme with Privacy Preservation for Mobile WiMAX Networks.
IEEE Communications Letters, 2012

An efficient handover authentication scheme with privacy preservation for IEEE 802.16m network.
Computers & Security, 2012

Dealing with dishonest recommendation: The trials in reputation management court.
Ad Hoc Networks, 2012

BlendFuzz: A Model-Based Framework for Fuzz Testing Programs with Grammatical Inputs.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Analysis and Improvements of Two Identity Based Anonymous Signcryption Schemes for Multiple Receivers.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Static Detection of Logic Vulnerabilities in Java Web Applications.
Proceedings of the 11th IEEE International Conference on Trust, 2012

The Analysis of Mobility Models in MANETs with Two-Hop Relay Algorithm.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

An efficient handover authentication scheme with location privacy preserving for EAP-based wireless networks.
Proceedings of IEEE International Conference on Communications, 2012

A lightweight roaming authentication protocol for anonymous wireless communication.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

A research on vulnerability discovering for router protocols based on fuzzing.
Proceedings of the 7th International Conference on Communications and Networking in China, 2012

2011
Cryptanalysis of an Efficient Threshold Self-Healing Key Distribution Scheme.
IEEE Trans. Wireless Communications, 2011

Security Issues and Solutions of the Key Management Protocols in IEEE 802.16j Multi-Hop Relay Network.
IEICE Transactions, 2011

VRSS: A new system for rating and scoring vulnerabilities.
Computer Communications, 2011

EKMP: An enhanced key management protocol for IEEE 802.16m.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

Identity-Based Strong Key-Insulated Ring Signature Scheme in the Standard Model.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

A Privacy Preserving Handover Authentication Scheme for EAP-Based Wireless Networks.
Proceedings of the Global Communications Conference, 2011

2010
The multi-class schedule-based transit assignment model under network uncertainties.
Public Transport, 2010

A Trust Management Model Based on Bi-evaluation in P2P Networks.
IEICE Transactions, 2010

A Fast Handover Authentication Mechanism Based on Ticket for IEEE 802.16m.
IEEE Communications Letters, 2010

A Client-Based and Server-Enhanced Defense Mechanism for Cross-Site Request Forgery.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Eliminating Human Specification in Static Analysis.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Secure and Efficient Generalized Signcryption Scheme Based on a Short ECDSA.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Coping with Traitor Attacks in Reputation Models for Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2010

Secure Signcryption Scheme Based on a Hybrid Encryption.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2009
An efficient and provable secure identity-based ring signcryption scheme.
Computer Standards & Interfaces, 2009

A new provably secure authentication and key agreement protocol for SIP using ECC.
Computer Standards & Interfaces, 2009

Provably Secure Password-Authenticated Group Key Exchange with Different Passwords under Standard Assumption.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

New ID-Based and Threshold Key Distribution Protocol in MANET Using a Multi-signcryption Scheme.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

An Integrated Approach to Worm Detection and Automatic Signature Generation.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Automatic Vulnerability Locating in Binary Patches.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

2008
An Efficient Identity-based Ring Signcryption Scheme.
IACR Cryptology ePrint Archive, 2008

Cryptanalysis of a client-to-client password-authenticated key agreement protocol.
IACR Cryptology ePrint Archive, 2008

TFTP vulnerability finding technique based on fuzzing.
Computer Communications, 2008

The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version.
Proceedings of the Provable Security, Second International Conference, 2008

Secure and Efficient Key Management Protocol in Ad Hoc Networks.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
Security Analysis of WAPI Authentication and Key Exchange Protocol.
IACR Cryptology ePrint Archive, 2007

A New Provably Secure Authentication and Key Agreement Protocol for SIP Using ECC.
IACR Cryptology ePrint Archive, 2007

A New Security Model for Cross-Realm C2C-PAKE Protocol.
IACR Cryptology ePrint Archive, 2007

Research on User Applying Mode for Video Conference System.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

A Provable Secure Key Management Program for Wireless Sensor Network.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

A New Provably Secure Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-Key Cryptography.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2006
Common Program Analysis of Two-Party Security Protocols Using SMV.
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006

2005
Deep into the Framework for Different Coarse-grained P2P Computing Based on JXTA.
Proceedings of the 2005 International Conference on Semantics, 2005

Short Threshold Signature Schemes Without Random Oracles.
Proceedings of the Progress in Cryptology, 2005

Running-mode Analysis of the SSL Protocol.
Proceedings of The 2005 International Conference on Internet Computing, 2005

Research of Security Architecture for P2P Network Based on Trust Management System.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005

The Analysis of Peer-to-Peer Network Security.
Proceedings of The 2005 International Conference on Grid Computing and Applications, 2005

Using SMV for Cryptographic Protocol Analysis: A Case Study.
Proceedings of The 2005 International Conference on Foundations of Computer Science, 2005

An approach to the formal verification of the three-principal security protocols.
Proceedings of The 2005 International Conference on Security and Management, 2005

Running-mode Analysis of the Lu-Smolka-SET protocol.
Proceedings of The 2005 International Conference on E-Business, 2005

The Running-Mode Analysis of Two-Party Optimistic Fair Exchange Protocols.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
Running-mode analysis of the Security Socket Layer protocol.
Operating Systems Review, 2004

An approach to the formal verification of the three-principal cryptographic protocols.
Operating Systems Review, 2004

SAP2P: A P2P Network Security Architecture Based on Trust Management System.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2004

2003
Authentication and Access Control in P2P Network.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

2001
Using SMV for Cryptographic Protocol Analysis: A Case Study.
Operating Systems Review, 2001

1999
An Approach to the Formal Verification of the Two-Party Crypographic Protocols.
Operating Systems Review, 1999


  Loading...