Yuyan Guo

Orcid: 0000-0002-3006-4334

According to our database1, Yuyan Guo authored at least 25 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Revocable Blockchain-Aided Attribute-Based Encryption With Escrow-Free in Cloud Storage.
IEEE Trans. Computers, July, 2023

Fuzzy Logic System-Based Robust Adaptive Control of AUV with Target Tracking.
Int. J. Fuzzy Syst., February, 2023

2022
Efficient CP-ABE Scheme With Shared Decryption in Cloud Storage.
IEEE Trans. Computers, 2022

Finite-Time Deterministic Learning Command Filtered Control for Hypersonic Flight Vehicle.
IEEE Trans. Aerosp. Electron. Syst., 2022

Improvement of Energy Detection with Cooperative Sensing.
Proceedings of the International Conference on Artificial Intelligence, 2022

2021
Terminal Sliding Mode Control of MEMS Gyroscopes With Finite-Time Learning.
IEEE Trans. Neural Networks Learn. Syst., 2021

Anonymous Authentication and Key Agreement Scheme Combining the Group Key for Vehicular Ad Hoc Networks.
Complex., 2021

2020
Certificate-Based Encryption Resilient to Continual Leakage in the Standard Model.
Secur. Commun. Networks, 2020

Robust adaptive control of hypersonic flight vehicle with asymmetric AOA constraint.
Sci. China Inf. Sci., 2020

2019
Efficient identity-based multi-bit proxy re-encryption over lattice in the standard model.
J. Inf. Secur. Appl., 2019

Composite learning adaptive sliding mode control for AUV target tracking.
Neurocomputing, 2019

Vision Information and Laser Module Based UAV Target Tracking.
Proceedings of the IECON 2019, 2019

An Efficient Proxy Re-Signature Over Lattices.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019

Identity-Based Encryption Resilient to Continual Leakage Without Random Oracles.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019

2018
Airborne Wireless Sensor Networks for Airplane Monitoring System.
Wirel. Commun. Mob. Comput., 2018

Provably secure certificate-based encryption with leakage resilience.
Theor. Comput. Sci., 2018

Neural Back-Stepping Control of Hypersonic Flight Vehicle with Actuator Fault.
J. Control. Sci. Eng., 2018

Identity-Based Multi-bit Proxy Re-encryption Over Lattice in the Standard Model.
Proceedings of the Frontiers in Cyber Security - First International Conference, 2018

2017
Disturbance observer based control of quadrotors with SLFN.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

2016
Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage.
Secur. Commun. Networks, 2016

Hierarchical attribute-based encryption with continuous auxiliary inputs leakage.
Secur. Commun. Networks, 2016

Continuous leakage-resilient certificate-based encryption.
Inf. Sci., 2016

Robust Adaptive Neural Fault-Tolerant Control of Hypersonic Flight Vehicle.
Proceedings of the Cognitive Systems and Signal Processing, 2016

2015
A Novel Measurement Matrix Based on Regression Model for Block Compressed Sensing.
J. Math. Imaging Vis., 2015

2009
Strand Space Model of Amended NS Protocol and Its Analysis.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009


  Loading...