Zheng Yang

Orcid: 0000-0001-8610-9936

Affiliations:
  • Southwest University, Chongqing, China
  • University of Helsinki, Secure System Group, Finland
  • Chongqing University of Technology, School of Computer Science and Engineering, China


According to our database1, Zheng Yang authored at least 56 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
ADAM: An Adaptive DDoS Attack Mitigation Scheme in Software-Defined Cyber-Physical System.
IEEE Trans. Ind. Informatics, June, 2023

HMACCE: Establishing Authenticated and Confidential Channel From Historical Data for Industrial Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2023

TAP: Transparent and Privacy-Preserving Data Services.
Proceedings of the 32nd USENIX Security Symposium, 2023

Catch Me If You Can: A New Low-Rate DDoS Attack Strategy Disguised by Feint.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location.
IACR Cryptol. ePrint Arch., 2022

LARP: A Lightweight Auto-Refreshing Pseudonym Protocol for V2X.
IACR Cryptol. ePrint Arch., 2022

New stability results of generalized impulsive functional differential equations.
Sci. China Inf. Sci., 2022

If You Can't Beat Them, Pay Them: Bitcoin Protection Racket is Profitable.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
PLCrypto: A Symmetric Cryptographic Library for Programmable Logic Controllers.
IACR Trans. Symmetric Cryptol., 2021

Building Low-Interactivity Multifactor Authenticated Key Exchange for Industrial Internet of Things.
IEEE Internet Things J., 2021

Stability of delayed switched systems via Razumikhin technique and application to switched neural networks.
IMA J. Math. Control. Inf., 2021

Enabling isolation and recovery in PLC redundancy framework of metro train systems.
Int. J. Inf. Sec., 2021

Opportunities and Challenges in Securing Critical Infrastructures Through Cryptography.
IEEE Secur. Priv., 2021

Transparent Electricity Pricing with Privacy.
Proceedings of the Computer Security - ESORICS 2021, 2021

Lightweight Delegated Authentication with Identity Fraud Detection for Cyber-physical Systems.
Proceedings of the 7th ACM on Cyber-Physical System Security Workshop, 2021

Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Faster Authenticated Key Agreement With Perfect Forward Secrecy for Industrial Internet-of-Things.
IEEE Trans. Ind. Informatics, 2020

Faster privacy-preserving location proximity schemes for circles and polygons.
IET Inf. Secur., 2020

Stability of delayed switched systems with state-dependent switching.
IEEE CAA J. Autom. Sinica, 2020

LiS: Lightweight Signature Schemes for Continuous Message Authentication in Cyber-Physical Systems.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
A Novel Authenticated Key Agreement Protocol With Dynamic Credential for WSNs.
ACM Trans. Sens. Networks, 2019

Towards Modeling Privacy in WiFi Fingerprinting Indoor Localization and its Application.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019

HMAKE: Legacy-Compliant Multi-factor Authenticated Key Exchange from Historical Data.
IACR Cryptol. ePrint Arch., 2019

IBWH: An Intermittent Block Withholding Attack with Optimal Mining Reward Rate.
Proceedings of the Information Security - 22nd International Conference, 2019

An Improved Unbounded HIBE Scheme in the Prime Order Setting.
Proceedings of the Fuzzy Systems and Data Mining V, 2019

PILOT: Practical Privacy-Preserving Indoor Localization Using OuTsourcing.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

Proof of aliveness.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Stability of switched neural networks with time-varying delays.
Neural Comput. Appl., 2018

A new strong security model for stateful authenticated group key exchange.
Int. J. Inf. Sec., 2018

On the security of a provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks.
Int. J. Distributed Sens. Networks, 2018

Cryptanalysis of a generic one-round key exchange protocol with strong security.
IET Inf. Secur., 2018

The Death and Rebirth of Privacy-Preserving WiFi Fingerprint Localization with Paillier Encryption.
IACR Cryptol. ePrint Arch., 2018

Two-message Key Exchange with Strong Security from Ideal Lattices.
IACR Cryptol. ePrint Arch., 2018

Faster Privacy-Preserving Location Proximity Schemes.
IACR Cryptol. ePrint Arch., 2018

New constructions for (multiparty) one-round key exchange with strong security.
Sci. China Inf. Sci., 2018

Modeling Privacy in WiFi Fingerprinting Indoor Localization.
Proceedings of the Provable Security, 2018

On Security Analysis of Generic Dynamic Authenticated Group Key Exchange.
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018

Received Signal Strength Quantization for Secure Indoor Positioning via Fingerprinting.
Proceedings of the 8th International Conference on Localization and GNSS, 2018

2017
Synchronization of Chaotic Systems with Time Delays via Periodically Intermittent Control.
J. Circuits Syst. Comput., 2017

Randomized authentication primitive problem in key exchange with strong security.
J. Inf. Secur. Appl., 2017

SignORKE: improving pairing-based one-round key exchange without random oracles.
IET Inf. Secur., 2017

A note on the strong authenticated key exchange with auxiliary inputs.
Des. Codes Cryptogr., 2017

Simpler Generic Constructions for Strongly Secure One-round Key Exchange from Weaker Assumptions.
Comput. J., 2017

New Proof for BKP IBE Scheme and Improvement in the MIMC Setting.
Proceedings of the Information Security Practice and Experience, 2017

2016
On security analysis of an after-the-fact leakage resilient key exchange protocol.
Inf. Process. Lett., 2016

Stability of neural networks with delay and variable-time impulses.
Neurocomputing, 2016

Towards Modelling Perfect Forward Secrecy for One-round Group Key Exchange.
Int. J. Netw. Secur., 2016

A Lightweight Generic Compiler for Authenticated Key Exchange from Non-interactive Key Exchange with Auxiliary Input.
Int. J. Netw. Secur., 2016

Modeling the propagation of mobile malware on complex networks.
Commun. Nonlinear Sci. Numer. Simul., 2016

2015
Towards modelling perfect forward secrecy in two-message authenticated key exchange under ephemeral-key revelation.
Secur. Commun. Networks, 2015

A practical strongly secure one-round authenticated key exchange protocol without random oracles.
Secur. Commun. Networks, 2015

On constructing practical multi-recipient key-encapsulation with short ciphertext and public key.
Secur. Commun. Networks, 2015

An efficient strongly secure authenticated key exchange protocol without random oracles.
Secur. Commun. Networks, 2015

A new efficient signcryption scheme in the standard model.
Secur. Commun. Networks, 2015

2014
Authenticated key exchange with synchronized state.
Secur. Commun. Networks, 2014

2013
Modelling Simultaneous Mutual Authentication for Authenticated Key Exchange.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013


  Loading...