Yang Xu
Yang Xu
College of Computer Science and Electronic Engineering, Hunan University, Changsha 410082, China
Verified email at hnu.edu.cn
Title
Cited by
Cited by
Year
A blockchain-based nonrepudiation network computing service scheme for industrial IoT
Y Xu, J Ren, G Wang, C Zhang, J Yang, Y Zhang
IEEE Transactions on Industrial Informatics 15 (6), 3632-3641, 2019
1052019
Towards secure network computing services for lightweight clients using blockchain
Y Xu, G Wang, J Yang, J Ren, Y Zhang, C Zhang
Wireless Communications and Mobile Computing 2018, 2018
932018
Blockchain Empowered Arbitrable Data Auditing Scheme for Network Storage as a Service
Y Xu, J Ren, Y Zhang, C Zhang, B Shen, Y Zhang
IEEE Transactions on Services Computing 13 (2), 289-300, 2020
662020
An adaptive and configurable protection framework against android privilege escalation threats
Y Xu, G Wang, J Ren, Y Zhang
Future Generation Computer Systems 92, 210-224, 2019
432019
A trusted routing scheme using blockchain and reinforcement learning for wireless sensor networks
J Yang, S He, Y Xu, L Chen, J Ren
Sensors 19 (4), 970, 2019
342019
A method of information protection for collaborative deep learning under GAN model attack
X Yan, B Cui, Y Xu, P Shi, Z Wang
IEEE/ACM Transactions on Computational Biology and Bioinformatics, 2019
332019
An efficient privacy‐enhanced attribute‐based access control mechanism
Y Xu, Q Zeng, G Wang, C Zhang, J Ren, Y Zhang
Concurrency and Computation: Practice and Experience 32 (5), e5556, 2020
252020
Blockchain-Enabled Accountability Mechanism Against Information Leakage in Vertical Industry Services
Y Xu, C Zhang, Q Zeng, G Wang, J Ren, Y Zhang
IEEE Transactions on Network Science and Engineering, 2020
252020
Trustworthy Network Anomaly Detection Based on an Adaptive Learning Rate and Momentum in IIoT
X Yan, Y Xu, X Xing, B Cui, Z Guo, T Guo
IEEE Transactions on Industrial Informatics 16 (9), 6182-6192, 2020
242020
A blockchain-enabled deduplicatable data auditing mechanism for network storage services
Y Xu, C Zhang, G Wang, Z Qin, Q Zeng
IEEE Transactions on Emerging Topics in Computing, 2020
222020
Learning URL Embedding for Malicious Website Detection
X Yan, Y Xu, B Cui, S Zhang, T Guo, C Li
IEEE Transactions on Industrial Informatics, 2020
152020
A feasible fuzzy-extended attribute-based access control technique
Y Xu, W Gao, Q Zeng, G Wang, J Ren, Y Zhang
Security and Communication Networks 2018, 2018
142018
Decentralized group key management for hierarchical access control using multilinear forms
W Zhou, Y Xu, G Wang
Concurrency and Computation: Practice and Experience 28 (3), 631-645, 2016
82016
FABAC: A flexible fuzzy attribute-based access control mechanism
Y Xu, W Gao, Q Zeng, G Wang, J Ren, Y Zhang
International Conference on Security, Privacy and Anonymity in Computation …, 2017
62017
Discretely modulated continuous-variable quantum key distribution with an untrusted entanglement source
Q Liao, G Xiao, CG Xu, Y Xu, Y Guo
Physical Review A 102 (3), 032604, 2020
52020
A privacy-preserving attribute-based access control scheme
Y Xu, Q Zeng, G Wang, C Zhang, J Ren, Y Zhang
International Conference on Security, Privacy and Anonymity in Computation …, 2018
42018
Multiway tree-based group key management using Chinese remainder theorem for multi-privileged group communications
Y Xu, W Zhou, GJ Wang
Journal of Applied Science and Engineering 17 (1), 81-92, 2014
42014
Streaming computing technology for android applications: Design model and case study
B Mo, Y Xu, G Wang
International Conference on Algorithms and Architectures for Parallel …, 2015
32015
Research on Key Management for Multi-privileged Group Communications
W Zhou, Y Xu, G Wang
2015 IEEE Trustcom/BigDataSE/ISPA 1, 151-158, 2015
32015
Distributed group key management using multilinear forms for multi-privileged group communications
W Zhou, Y Xu, G Wang
2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013
32013
The system can't perform the operation now. Try again later.
Articles 1–20