Zhen Yang

Orcid: 0000-0002-9657-0854

According to our database1, Zhen Yang authored at least 24 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Class-Aware Adversarial Unsupervised Domain Adaptation for Linguistic Steganalysis.
IEEE Trans. Inf. Forensics Secur., 2025

Linguistic Steganalysis via Text Dual Attention Fusing Statistical and Multi-Layer Semantic Features.
IEEE Signal Process. Lett., 2025

Domain-Assisted Few-Shot Linguistic Steganalysis in Imbalanced Class Scenarios.
IEEE Signal Process. Lett., 2025

Enforcing cryptographic distributed-VCS access control with no trust on servers.
J. Inf. Secur. Appl., 2025

Provably Robust and Secure Steganography in Asymmetric Resource Scenario.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

Clustering-Driven Pseudo-Labeling in Source-Free Domain Adaptation for Linguistic Steganalysis.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2025

2023
SHIELD: A Specialized Dataset for Hybrid Blind Forensics of World Leaders.
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023

2022
Fake Face Images Detection and Identification of Celebrities Based on Semantic Segmentation.
IEEE Signal Process. Lett., 2022

Protecting World Leader Using Facial Speaking Pattern Against Deepfakes.
IEEE Signal Process. Lett., 2022

CBFF: A cloud-blockchain fusion framework ensuring data accountability for multi-cloud environments.
J. Syst. Archit., 2022

T-GRU: conTextual Gated Recurrent Unit model for high quality Linguistic Steganography.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022

LiTIV: A Lightweight Traceable Data Integrity Verification Scheme for Version Control Systems.
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022

Attribute-based encryption with outsourced computation for access control in IoTs.
Proceedings of the ASSE 2022: 3rd Asia Service Sciences and Software Engineering Conference, Macao, February 24, 2022

2021
A Multi-grained Log Auditing Scheme for Cloud Data Confidentiality.
Mob. Networks Appl., 2021

A Blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing.
J. Syst. Archit., 2021

UEPF:A blockchain based Uniform Encoding and Parsing Framework in multi-cloud environments.
KSII Trans. Internet Inf. Syst., 2021

LBAC: A lightweight blockchain-based access control scheme for the internet of things.
Inf. Sci., 2021

Chapter Six - Protecting personal sensitive data security in the cloud with blockchain.
Adv. Comput., 2021

Fast Detection of Heterogeneous Parallel Steganography for Streaming Voice.
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021

A Vehicle Intrusion Detection System Based on Time Interval and Data Fields.
Proceedings of the Artificial Intelligence and Security - 7th International Conference, 2021

2019
An access control scheme with fine-grained time constrained attributes based on smart contract and trapdoor.
Proceedings of the 26th International Conference on Telecommunications, 2019

A No-Pairing Proxy Re-Encryption Scheme for Data Sharing in Untrusted Cloud.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Multicast Multipath TCP for Reliable Communication in Wireless Scenarios.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

2017
Ensuring reliable logging for data accountability in untrusted cloud storage.
Proceedings of the IEEE International Conference on Communications, 2017


  Loading...