关注
Yang Xu
Yang Xu
College of Computer Science and Electronic Engineering, Hunan University, Changsha 410082, China
在 hnu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
A blockchain-based nonrepudiation network computing service scheme for industrial IoT
Y Xu, J Ren, G Wang, C Zhang, J Yang, Y Zhang
IEEE Transactions on Industrial Informatics 15 (6), 3632-3641, 2019
1762019
Blockchain Empowered Arbitrable Data Auditing Scheme for Network Storage as a Service
Y Xu, J Ren, Y Zhang, C Zhang, B Shen, Y Zhang
IEEE Transactions on Services Computing 13 (2), 289-300, 2020
1302020
Towards secure network computing services for lightweight clients using blockchain
Y Xu, G Wang, J Yang, J Ren, Y Zhang, C Zhang
Wireless Communications and Mobile Computing 2018, 2018
1132018
A trusted routing scheme using blockchain and reinforcement learning for wireless sensor networks
J Yang, S He, Y Xu, L Chen, J Ren
Sensors 19 (4), 970, 2019
862019
Blockchain-Enabled Accountability Mechanism Against Information Leakage in Vertical Industry Services
Y Xu, C Zhang, Q Zeng, G Wang, J Ren, Y Zhang
IEEE Transactions on Network Science and Engineering, 2020
662020
A blockchain-enabled deduplicatable data auditing mechanism for network storage services
Y Xu, C Zhang, G Wang, Z Qin, Q Zeng
IEEE Transactions on Emerging Topics in Computing 9 (3), 1421-1432, 2020
632020
Trustworthy Network Anomaly Detection Based on an Adaptive Learning Rate and Momentum in IIoT
X Yan, Y Xu, X Xing, B Cui, Z Guo, T Guo
IEEE Transactions on Industrial Informatics 16 (9), 6182-6192, 2020
582020
A method of information protection for collaborative deep learning under GAN model attack
X Yan, B Cui, Y Xu, P Shi, Z Wang
IEEE/ACM Transactions on Computational Biology and Bioinformatics 18 (3 …, 2019
552019
An efficient privacyenhanced attributebased access control mechanism
Y Xu, Q Zeng, G Wang, C Zhang, J Ren, Y Zhang
Concurrency and Computation: Practice and Experience 32 (5), e5556, 2020
542020
An adaptive and configurable protection framework against android privilege escalation threats
Y Xu, G Wang, J Ren, Y Zhang
Future Generation Computer Systems 92, 210-224, 2019
492019
Learning URL Embedding for Malicious Website Detection
X Yan, Y Xu, B Cui, S Zhang, T Guo, C Li
IEEE Transactions on Industrial Informatics, 2020
432020
A blockchain-based multi-cloud storage data auditing scheme to locate faults
C Zhang, Y Xu, Y Hu, J Wu, J Ren, Y Zhang
IEEE Transactions on Cloud Computing, 2021
302021
Hierarchical bidirectional RNN for safety-enhanced B5G heterogeneous networks
Y Xu, X Yan, Y Wu, Y Hu, W Liang, J Zhang
IEEE Transactions on Network Science and Engineering 8 (4), 2946-2957, 2021
232021
Discretely modulated continuous-variable quantum key distribution with an untrusted entanglement source
Q Liao, G Xiao, CG Xu, Y Xu, Y Guo
Physical Review A 102 (3), 032604, 2020
192020
A feasible fuzzy-extended attribute-based access control technique
Y Xu, W Gao, Q Zeng, G Wang, J Ren, Y Zhang
Security and Communication Networks 2018, 2018
162018
Trustworthy target tracking with collaborative deep reinforcement learning in EdgeAI-aided IoT
J Zhang, MZA Bhuiyan, X Yang, AK Singh, DF Hsu, E Luo
IEEE Transactions on Industrial Informatics 18 (2), 1301-1309, 2021
122021
Deep neural network security collaborative filtering scheme for service recommendation in intelligent cyber-physical systems
W Liang, S Xie, J Cai, J Xu, Y Hu, Y Xu, M Qiu
IEEE Internet of Things Journal, 2021
112021
A unified predefined-time convergent and robust ZNN model for constrained quadratic programming
Z Hu, L Xiao, J Dai, Y Xu, Q Zuo, C Liu
IEEE Transactions on Industrial Informatics 17 (3), 1998-2010, 2020
112020
Decentralized group key management for hierarchical access control using multilinear forms
W Zhou, Y Xu, G Wang
Concurrency and Computation: Practice and Experience 28 (3), 631-645, 2016
102016
A trustworthy industrial data management scheme based on redactable blockchain
C Zhang, Z Ni, Y Xu, E Luo, L Chen, Y Zhang
Journal of Parallel and Distributed Computing 152, 167-176, 2021
82021
系统目前无法执行此操作,请稍后再试。
文章 1–20