Yang Xu
Yang Xu
College of Computer Science and Electronic Engineering, Hunan University, Changsha 410082, China
在 hnu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
A blockchain-based nonrepudiation network computing service scheme for industrial IoT
Y Xu, J Ren, G Wang, C Zhang, J Yang, Y Zhang
IEEE Transactions on Industrial Informatics 15 (6), 3632-3641, 2019
1112019
Towards secure network computing services for lightweight clients using blockchain
Y Xu, G Wang, J Yang, J Ren, Y Zhang, C Zhang
Wireless Communications and Mobile Computing 2018, 2018
952018
Blockchain Empowered Arbitrable Data Auditing Scheme for Network Storage as a Service
Y Xu, J Ren, Y Zhang, C Zhang, B Shen, Y Zhang
IEEE Transactions on Services Computing 13 (2), 289-300, 2020
742020
An adaptive and configurable protection framework against android privilege escalation threats
Y Xu, G Wang, J Ren, Y Zhang
Future Generation Computer Systems 92, 210-224, 2019
442019
A trusted routing scheme using blockchain and reinforcement learning for wireless sensor networks
J Yang, S He, Y Xu, L Chen, J Ren
Sensors 19 (4), 970, 2019
372019
A method of information protection for collaborative deep learning under GAN model attack
X Yan, B Cui, Y Xu, P Shi, Z Wang
IEEE/ACM Transactions on Computational Biology and Bioinformatics, 2019
342019
Blockchain-Enabled Accountability Mechanism Against Information Leakage in Vertical Industry Services
Y Xu, C Zhang, Q Zeng, G Wang, J Ren, Y Zhang
IEEE Transactions on Network Science and Engineering, 2020
282020
An efficient privacyenhanced attributebased access control mechanism
Y Xu, Q Zeng, G Wang, C Zhang, J Ren, Y Zhang
Concurrency and Computation: Practice and Experience 32 (5), e5556, 2020
262020
Trustworthy Network Anomaly Detection Based on an Adaptive Learning Rate and Momentum in IIoT
X Yan, Y Xu, X Xing, B Cui, Z Guo, T Guo
IEEE Transactions on Industrial Informatics 16 (9), 6182-6192, 2020
262020
A blockchain-enabled deduplicatable data auditing mechanism for network storage services
Y Xu, C Zhang, G Wang, Z Qin, Q Zeng
IEEE Transactions on Emerging Topics in Computing, 2020
252020
Learning URL Embedding for Malicious Website Detection
X Yan, Y Xu, B Cui, S Zhang, T Guo, C Li
IEEE Transactions on Industrial Informatics, 2020
172020
A feasible fuzzy-extended attribute-based access control technique
Y Xu, W Gao, Q Zeng, G Wang, J Ren, Y Zhang
Security and Communication Networks 2018, 2018
142018
Decentralized group key management for hierarchical access control using multilinear forms
W Zhou, Y Xu, G Wang
Concurrency and Computation: Practice and Experience 28 (3), 631-645, 2016
82016
Discretely modulated continuous-variable quantum key distribution with an untrusted entanglement source
Q Liao, G Xiao, CG Xu, Y Xu, Y Guo
Physical Review A 102 (3), 032604, 2020
62020
FABAC: A flexible fuzzy attribute-based access control mechanism
Y Xu, W Gao, Q Zeng, G Wang, J Ren, Y Zhang
International Conference on Security, Privacy and Anonymity in Computation …, 2017
62017
A privacy-preserving attribute-based access control scheme
Y Xu, Q Zeng, G Wang, C Zhang, J Ren, Y Zhang
International Conference on Security, Privacy and Anonymity in Computation …, 2018
42018
Multiway tree-based group key management using Chinese remainder theorem for multi-privileged group communications
Y Xu, W Zhou, GJ Wang
Journal of Applied Science and Engineering 17 (1), 81-92, 2014
42014
A Unified Predefined-Time Convergent and Robust ZNN Model for Constrained Quadratic Programming
Z Hu, L Xiao, J Dai, Y Xu, Q Zuo, C Liu
IEEE Transactions on Industrial Informatics 17 (3), 1998-2010, 2020
32020
Streaming computing technology for android applications: Design model and case study
B Mo, Y Xu, G Wang
International Conference on Algorithms and Architectures for Parallel …, 2015
32015
Research on Key Management for Multi-privileged Group Communications
W Zhou, Y Xu, G Wang
2015 IEEE Trustcom/BigDataSE/ISPA 1, 151-158, 2015
32015
系统目前无法执行此操作,请稍后再试。
文章 1–20