A blockchain-based decentralized federated learning framework with committee consensus Y Li, C Chen, N Liu, H Huang, Z Zheng, Q Yan IEEE Network 35 (1), 234-241, 2020 | 524 | 2020 |
Privacy leakage analysis in online social networks Y Li, Y Li, Q Yan, RH Deng Computers & Security 49, 239-254, 2015 | 104 | 2015 |
Understanding OSN-based facial disclosure against face authentication systems Y Li, K Xu, Q Yan, Y Li, RH Deng Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 86 | 2014 |
Communication-efficient and cross-chain empowered federated learning for artificial intelligence of things J Kang, X Li, J Nie, Y Liu, M Xu, Z Xiong, D Niyato, Q Yan IEEE Transactions on Network Science and Engineering 9 (5), 2966-2977, 2022 | 84 | 2022 |
On limitations of designing leakage-resilient password systems: Attacks, principles and usability Q Yan, J Han, Y Li, RH Deng Proceedings of the 19th Annual Network & Distributed System Security Symposium, 2012 | 82* | 2012 |
Comparing mobile privacy protection through cross-platform applications J Han, Q Yan, D Gao, J Zhou, RH Deng Proceedings of the 20th Annual Network & Distributed System Security Symposium, 2013 | 73 | 2013 |
Designing leakage-resilient password entry on touchscreen mobile devices Q Yan, J Han, Y Li, J Zhou, RH Deng Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 68 | 2013 |
Seeing your face is not enough: An inertial sensor-based liveness detection for face authentication Y Li, Y Li, Q Yan, H Kong, RH Deng Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 62 | 2015 |
Empirical study of face authentication systems under OSNFD attacks Y Li, Y Li, K Xu, Q Yan, RH Deng IEEE Transactions on Dependable and Secure Computing 15 (2), 231-245, 2016 | 36 | 2016 |
ModCon: A model-based testing platform for smart contracts Y Liu, Y Li, SW Lin, Q Yan Proceedings of the 28th ACM Joint Meeting on European Software Engineering …, 2020 | 35 | 2020 |
Towards semantically secure outsourcing of association rule mining on categorical data J Lai, Y Li, RH Deng, J Weng, C Guan, Q Yan Information Sciences 267, 267-286, 2014 | 35 | 2014 |
Launching generic attacks on ios with approved third-party applications J Han, SM Kywe, Q Yan, F Bao, R Deng, D Gao, Y Li, J Zhou Applied Cryptography and Network Security: 11th International Conference …, 2013 | 35 | 2013 |
Secure and reliable transfer learning framework for 6G-enabled Internet of Vehicles M Xu, DT Hoang, J Kang, D Niyato, Q Yan, DI Kim IEEE Wireless Communications 29 (4), 132-139, 2022 | 31 | 2022 |
A software-based root-of-trust primitive on multicore platforms Q Yan, J Han, Y Li, RH Deng, T Li Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011 | 26 | 2011 |
Insights into malware detection and prevention on mobile phones Q Yan, Y Li, T Li, R Deng Security Technology: International Conference, SecTech 2009, Held as Part of …, 2009 | 25 | 2009 |
Leakage-resilient password entry: challenges, design, and evaluation Q Yan, J Han, Y Li, J Zhou, RH Deng Computers & Security 48, 196-211, 2015 | 21 | 2015 |
Semi-supervised federated learning with non-iid data: Algorithm and system design Z Zhang, S Ma, J Nie, Y Wu, Q Yan, X Xu, D Niyato 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th …, 2021 | 20 | 2021 |
FL-market: Trading private models in federated learning S Zheng, Y Cao, M Yoshikawa, H Li, Q Yan 2022 IEEE International Conference on Big Data (Big Data), 1525-1534, 2022 | 19 | 2022 |
Decentralized Incentive-based multi-energy trading mechanism for CCHP-based MG cluster J Guo, J Tan, Y Li, H Gu, X Liu, Y Cao, Q Yan, D Xu International Journal of Electrical Power & Energy Systems 133, 107138, 2021 | 18 | 2021 |
On the potential of limitation-oriented malware detection and prevention techniques on mobile phones Q Yan, RH Deng, Y Li, T Li International journal of security and its applications 4 (1), 21, 2010 | 17 | 2010 |