Zheng Yan

According to our database1, Zheng Yan
  • authored at least 75 papers between 2008 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Data collection for attack detection and security measurement in Mobile Ad Hoc Networks: A survey.
J. Network and Computer Applications, 2018

Flexible data access control in D2D communications.
Future Generation Comp. Syst., 2018

IEEE Access Special Section Editorial: Trust Management in Pervasive Social Networking (TruPSN).
IEEE Access, 2018

LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey.
IEEE Access, 2018

2017
Flexible Data Access Control Based on Trust and Reputation in Cloud Computing.
IEEE Trans. Cloud Computing, 2017

Protect Pervasive Social Networking Based on Two-Dimensional Trust Levels.
IEEE Systems Journal, 2017

Guest Editorial Data Mining in Cyber, Physical, and Social Computing.
IEEE Systems Journal, 2017

A Survey of Verifiable Computation.
MONET, 2017

Editorial: Mobile Multimedia Communications.
MONET, 2017

UAKA-D2D: Universal Authentication and Key Agreement Protocol in D2D Communications.
MONET, 2017

A Survey on Security in D2D Communications.
MONET, 2017

An Automata Based Intrusion Detection Method for Internet of Things.
Mobile Information Systems, 2017

Cryptography and Data Security in Cloud Computing.
Inf. Sci., 2017

Encrypted data processing with Homomorphic Re-Encryption.
Inf. Sci., 2017

Fusing and mining opinions for reputation generation.
Information Fusion, 2017

Privacy-preserving trust management for unwanted traffic control.
Future Generation Comp. Syst., 2017

A secure SDN based multi-RANs architecture for future 5G networks.
Computers & Security, 2017

Context-Aware Verifiable Cloud Computing.
IEEE Access, 2017

A Survey on C-RAN Security.
IEEE Access, 2017

From Cloud to Fog Computing: A Review and a Conceptual Live VM Migration Framework.
IEEE Access, 2017

Anonymous Authentication on Trust in Pervasive Social Networking Based on Group Signature.
IEEE Access, 2017

Survey on Big Data Analysis Algorithms for Network Security Measurement.
Proceedings of the Network and System Security - 11th International Conference, 2017

Secure Encrypted Data Deduplication with Ownership Proof and User Revocation.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2017

An Orchestrated Security Platform for Internet of Robots.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

CDController: A Cloud Data Access Control System Based on Reputation.
Proceedings of the 2017 IEEE International Conference on Computer and Information Technology, 2017

2016
Editorial: Trust Management for Multimedia Big Data.
TOMCCAP, 2016

Trustworthy Authentication on Scalable Surveillance Video with Background Model Support.
TOMCCAP, 2016

Deduplication on Encrypted Big Data in Cloud.
IEEE Trans. Big Data, 2016

A security and trust framework for virtualized networks and software-defined networking.
Security and Communication Networks, 2016

Key technologies for 5G, the next generation of mobile networks and services.
Int. J. Communication Systems, 2016

Two Schemes of Privacy-Preserving Trust Evaluation.
Future Generation Comp. Syst., 2016

Encrypted Data Management with Deduplication in Cloud Computing.
IEEE Cloud Computing, 2016

Secure Pervasive Social Communications Based on Trust in a Distributed Way.
IEEE Access, 2016

A Survey on Future Internet Security Architectures.
IEEE Access, 2016

Game Theoretical Analysis on System Adoption and Acceptance: A Review.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

Security and Privacy in Big Data Lifetime: A Review.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

A Survey on Software-Defined Networking Security.
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016

2015
Editorial: Recent Advances on the Next Generation of Mobile Networks and Services.
MONET, 2015

Controlling Cloud Data Access Based on Reputation.
MONET, 2015

Trustworthy data fusion and mining in Internet of Things.
Future Generation Comp. Syst., 2015

TruSMS: A trustworthy SMS spam control system based on trust management.
Future Generation Comp. Syst., 2015

Security in D2D Communications: A Review.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Scheme to Manage Encrypted Data Storage with Deduplication in Cloud.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
A generic solution for unwanted traffic control through trust management.
The New Review of Hypermedia and Multimedia, 2014

A survey on trust management for Internet of Things.
J. Network and Computer Applications, 2014

Editorial: Special issue on trust in cyber, physical and social computing.
Computers & Security, 2014

Analysis on the acceptance of Global Trust Management for unwanted traffic control based on game theory.
Computers & Security, 2014

Personal Data Access Based on Trust Assessment in Mobile Social Networking.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Implementation of a Trust-Behavior Based Reputation System for Mobile Applications.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

A Scheme to Secure Instant Community Data Access Based on Trust and Contexts.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

An Analytic Hierarchy Process Algorithm for Cloud Based Wi-Fi Offloading.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

A Review on Privacy-Preserving Data Mining.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

2013
Exploring the impact of trust information visualization on mobile application usage.
Personal and Ubiquitous Computing, 2013

A Research Model for Trustworthy Pervasive Social Networking.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Unwanted Content Control via Trust Management in Pervasive Social Networking.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Game Theoretical Analysis of the Acceptance of Global Trust Management for Unwanted Traffic Control.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Implementation of an SMS Spam Control System Based on Trust Management.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Secure pervasive social networking based on multi-dimensional trust levels.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
TruBeRepec: a trust-behavior-based reputation and recommender system for mobile applications.
Personal and Ubiquitous Computing, 2012

An approach of secure and fashionable recognition for pervasive face-to-face social communications.
Proceedings of the 8th IEEE International Conference on Wireless and Mobile Computing, 2012

Unwanted Traffic Control via Hybrid Trust Management.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Implementation of an Evaluation Platform for Unwanted Traffic Control via Trust Management.
Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, 2012

2011
AdPriRec: A Context-Aware Recommender System for User Privacy in MANET Services.
Proceedings of the Ubiquitous Intelligence and Computing - 8th International Conference, 2011

Building up Trusted Identity Management in Mobile Heterogeneous Environment.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Theoretical Issues in the Study of Trust in Human-Computer Interaction.
Proceedings of the IEEE 10th International Conference on Trust, 2011

A Research Model for Human-Computer Trust Interaction.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Unwanted Traffic Control via Global Trust Management.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Implementation of a Reputation System for Pervasive Social Networking.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Trust Behavior Based Recommender System for Software Usage.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011

A QoS-aware system for mobile cloud computing.
Proceedings of the 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, 2011

2010
Security via Trusted Communications.
Proceedings of the Handbook of Information and Communication Security, 2010

Effects of Displaying Trust Information on Mobile Application Usage.
Proceedings of the Autonomic and Trusted Computing - 7th International Conference, 2010

2009
Exploring Trust of Mobile Applications Based on User Behaviors.
Proceedings of the Trusted Systems, First International Conference, 2009

A Methodology towards Usable Trust Management.
Proceedings of the Autonomic and Trusted Computing, 6th International Conference, 2009

2008
A User Behavior Based Trust Model for Mobile Applications.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008


  Loading...