Zhen Yang

Orcid: 0000-0002-6058-0217

Affiliations:
  • Beijing University of Technology, College of Computer Science, China
  • Beijing University of Posts and Telecommunications, China (former)


According to our database1, Zhen Yang authored at least 82 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SVFLC: Secure and Verifiable Federated Learning With Chain Aggregation.
IEEE Internet Things J., April, 2024

VDFChain: Secure and verifiable decentralized federated learning via committee-based blockchain.
J. Netw. Comput. Appl., March, 2024

A Systematic Literature Review of Reinforcement Learning-based Knowledge Graph Research.
Expert Syst. Appl., March, 2024

JOCP: A jointly optimized clustering protocol for industrial wireless sensor networks using double-layer selection evolutionary algorithm.
Concurr. Comput. Pract. Exp., 2024

2023
Physical Unclonable Function-Based Lightweight and Verifiable Data Stream Transmission for Industrial IoT.
IEEE Trans. Ind. Informatics, December, 2023

Evaluating the intelligence capability of smart homes: A conceptual modeling approach.
Data Knowl. Eng., November, 2023

Fast Secure Aggregation With High Dropout Resilience for Federated Learning.
IEEE Trans. Green Commun. Netw., September, 2023

A Resilient Group-Based Multisubset Data Aggregation Scheme for Smart Grid.
IEEE Internet Things J., August, 2023

Effective upper and lower bounds for a two-stage reentrant flexible flow shop scheduling problem.
Comput. Oper. Res., May, 2023

On the Comparisons of Decorrelation Approaches for Non-Gaussian Neutral Vector Variables.
IEEE Trans. Neural Networks Learn. Syst., April, 2023

Prior Knowledge Constrained Adaptive Graph Framework for Partial Label Learning.
ACM Trans. Intell. Syst. Technol., April, 2023

Efficient and Secure Federated Learning With Verifiable Weighted Average Aggregation.
IEEE Trans. Netw. Sci. Eng., 2023

AAIA: an efficient aggregation scheme against inverting attack for federated learning.
Int. J. Inf. Sec., 2023

Advances and Challenges of Multi-task Learning Method in Recommender System: A Survey.
CoRR, 2023

A novel subjective bias detection method based on multi-information fusion.
Proceedings of the 35th International Conference on Software Engineering and Knowledge Engineering, 2023

A Two-tier Shared Embedding Method for Review-based Recommender Systems.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

2022
Blockchain-Based Offline Auditing for the Cloud in Vehicular Networks.
IEEE Trans. Netw. Serv. Manag., 2022

SPR: Similarity pairwise ranking for personalized recommendation.
Knowl. Based Syst., 2022

FAC: A Music Recommendation Model Based on Fusing Audio and Chord Features (115).
Int. J. Softw. Eng. Knowl. Eng., 2022

A systematic literature review of methods and datasets for anomaly-based network intrusion detection.
Comput. Secur., 2022

An Effective Sarcasm Detection Approach Based on Sentimental Context and Individual Expression Habits.
Cogn. Comput., 2022

A novel POI recommendation model based on joint spatiotemporal effects and four-way interaction.
Appl. Intell., 2022

A Novel Network Alert Classification Model based on Behavior Semantic.
Proceedings of the 34th International Conference on Software Engineering and Knowledge Engineering, 2022

COAT: A Music Recommendation Model based on Chord Progression and Attention Mechanisms.
Proceedings of the 34th International Conference on Software Engineering and Knowledge Engineering, 2022

Data Poisoning Attacks to Session-Based Recommender Systems.
Proceedings of the 12th International Conference on Communication and Network Security, 2022

A Post-quantum Secure Aggregation for Federated Learning.
Proceedings of the 12th International Conference on Communication and Network Security, 2022

2021
Efficient Continuous Big Data Integrity Checking for Decentralized Storage.
IEEE Trans. Netw. Sci. Eng., 2021

A GAN and Feature Selection-Based Oversampling Technique for Intrusion Detection.
Secur. Commun. Networks, 2021

A Dynamic Membership Group-Based Multiple-Data Aggregation Scheme for Smart Grid.
IEEE Internet Things J., 2021

Efficient dynamic multi-replica auditing for the cloud with geographic location.
Future Gener. Comput. Syst., 2021

Blockchain-Based Continuous Auditing for Dynamic Data Sharing in Autonomous Vehicular Networks.
Computer, 2021

Extracting features from app descriptions based on POS and dependency.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

A Hybrid Music Recommendation Algorithm Based on Attention Mechanism.
Proceedings of the MultiMedia Modeling - 27th International Conference, 2021

Disk Failure Prediction with Multiple Channel Convolutional Neural Network.
Proceedings of the International Joint Conference on Neural Networks, 2021

Privacy-Preserving Verifiable Collaborative Learning with Chain Aggregation.
Proceedings of the 7th IEEE International Conference on Network Intelligence and Digital Content, 2021

Lightweight and Privacy-preserving Search over Encryption Blockchain.
Proceedings of the 7th IEEE International Conference on Network Intelligence and Digital Content, 2021

User Response-Based Fake News Detection on Social Media.
Proceedings of the Applied Informatics - Fourth International Conference, 2021

Integrating Heterogeneous Security Knowledge Sources for Comprehensive Security Analysis.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

2020
Hybrid simulated annealing and reduced variable neighbourhood search for an aircraft scheduling and parking problem.
Int. J. Prod. Res., 2020

BJUT at TREC 2020 Incident Streams Track.
Proceedings of the Twenty-Ninth Text REtrieval Conference, 2020

An Extended Knowledge Representation Learning Approach for Context-based Traceability Link Recovery.
Proceedings of the 32nd International Conference on Software Engineering and Knowledge Engineering, 2020

Predicting Polypharmacy Side Effects Based on an Enhanced Domain Knowledge Graph.
Proceedings of the Applied Informatics - Third International Conference, 2020

An Extended Knowledge Representation Learning Approach for Context-Based Traceability Link Recovery: Extended Abstract.
Proceedings of the 7th IEEE International Workshop on Artificial Intelligence for Requirements Engineering, 2020

2019
Toward Keyword Extraction in Constrained Information Retrieval in Vehicle Social Network.
IEEE Trans. Veh. Technol., 2019

ID-based dynamic replicated data auditing for the cloud.
Concurr. Comput. Pract. Exp., 2019

Decentralized Big Data Auditing for Smart City Environments Leveraging Blockchain Technology.
IEEE Access, 2019

Using Graph Embedding to Improve Requirements Traceability Recovery.
Proceedings of the Applied Informatics - Second International Conference, 2019

Exploring Semantics of Software Artifacts to Improve Requirements Traceability Recovery: A Hybrid Approach.
Proceedings of the 26th Asia-Pacific Software Engineering Conference, 2019

2018
External Expansion Risk Management: Enhancing Microblogging Filtering Using Implicit Query.
Wirel. Pers. Commun., 2018

Enhancing recommendation on extremely sparse data with blocks-coupled non-negative matrix factorization.
Neurocomputing, 2018

Cloud Information Retrieval: Model Description and Scheme Design.
IEEE Access, 2018

BJUT at TREC 2018: Incident Streams Track.
Proceedings of the Twenty-Seventh Text REtrieval Conference, 2018

2017
BJUT at TREC 2017: Real-Time Summarization Track.
Proceedings of The Twenty-Sixth Text REtrieval Conference, 2017

BJUT at TREC 2017: Tasks Track.
Proceedings of The Twenty-Sixth Text REtrieval Conference, 2017

2016
BJUT at TREC 2016: Real-Time Summarization Track.
Proceedings of The Twenty-Fifth Text REtrieval Conference, 2016

BJUT at TREC 2016 OpenSearch Track: Search Ranking Based on Clickthrough Data.
Proceedings of The Twenty-Fifth Text REtrieval Conference, 2016

BJUT at TREC 2016: LiveQA Track.
Proceedings of The Twenty-Fifth Text REtrieval Conference, 2016

2015
Design and analysis on trusted network equipment access authentication protocol.
Simul. Model. Pract. Theory, 2015

On monitoring and predicting mobile network traffic abnormality.
Simul. Model. Pract. Theory, 2015

Software Abnormal Behavior Detection Based on Function Semantic Tree.
IEICE Trans. Inf. Syst., 2015

Sensational Headline Identification By Normalized Cross Entropy-Based Metric.
Comput. J., 2015

BJUT at TREC 2015 Temporal Summarization Track.
Proceedings of The Twenty-Fourth Text REtrieval Conference, 2015

BJUT at TREC 2015 Microblog Track: Real-Time Filtering Using Knowledge Base.
Proceedings of The Twenty-Fourth Text REtrieval Conference, 2015

BJUT at TREC 2015 Microblog Track: Real-Time Filtering Using Non-negative Matrix Factorization.
Proceedings of The Twenty-Fourth Text REtrieval Conference, 2015

BJUT at TREC 2015 Contextual Suggestion Track.
Proceedings of The Twenty-Fourth Text REtrieval Conference, 2015

Finding the Right Social Media Site for Questions.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
Research on Software Trust Analysis Based on Behavior.
IEICE Trans. Inf. Syst., 2014

A Voting Optimized Strategy Based on ELM for Improving Classification of Motor Imagery BCI Data.
Cogn. Comput., 2014

BJUT at TREC 2014 Temporal Summarization Track.
Proceedings of The Twenty-Third Text REtrieval Conference, 2014

BJUT at TREC 2014 Microblog Track.
Proceedings of The Twenty-Third Text REtrieval Conference, 2014

BJUT at TREC 2014 Contextual Suggestion Track: Hybrid Recommendation Based on Open-web Information.
Proceedings of The Twenty-Third Text REtrieval Conference, 2014

A combined model for scan path in pedestrian searching.
Proceedings of the 2014 International Joint Conference on Neural Networks, 2014

2013
BJUT at TREC 2013 Microblog Track.
Proceedings of The Twenty-Second Text REtrieval Conference, 2013

BJUT at TREC 2013 Temporal Summarization Track.
Proceedings of The Twenty-Second Text REtrieval Conference, 2013

Modeling of Human Saccadic Scanpaths Based on Visual Saliency.
Proceedings of the Genetic and Evolutionary Computing, 2013

Bio-inspired Visual Attention Model and Saliency Guided Object Segmentation.
Proceedings of the Genetic and Evolutionary Computing, 2013

2011
A risk assessment model for the operating system of the DTV.
Proceedings of the 2011 International Conference on High Performance Computing & Simulation, 2011

An Emotional Face Evoked EEG Signal Recognition Method Based on Optimal EEG Feature and Electrodes Selection.
Proceedings of the Neural Information Processing - 18th International Conference, 2011

Bio-inspired Visual Saliency Detection and Its Application on Image Retargeting.
Proceedings of the Neural Information Processing - 18th International Conference, 2011

2010
An Approach to Texture Segmentation Analysis Based on Sparse Coding Model and EM Algorithm.
Proceedings of the Advances in Neural Networks, 2010

Framework of Web content filtering for IPv6.
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010

2009
Trusted Computing Based Mobile DRM Authentication Scheme.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009


  Loading...