学术信息网 西电导航 关于 使用说明 搜索 系统首页 登录 控制面板 收藏 梁雪芹的留言板
学术论文

所有发表论文情况见 Google Scholar 

  1. Rong Han, Xueqin Liang*, and Zheng Yan. A Two-layer Game-based Incentive Mechanism for Decentralized Crowdsourcing. In Globecom 2022, December 4 - 8, 2022, in Rio de Janeiro, Brazil. (CCF C,接收)

  2. Rong Han, Zheng Yan, Xueqin Liang*, and Laurence Tianruo Yang. How Can Incentive Mechanisms and Blockchain Benefit with Each Other? A Survey. ACM Computing Surveys, 2022. http://dx.doi.org/10.1145/3539604. (中科院1区)

  3. Kangde Liu, Zheng Yan, Xueqin Liang*, Raimo Kantola, and Chuangyue Hu. A Survey on Blockchain-enabled Federated Learning and its Prospects with Digital Twin. Digital Communications and Networks, 2022, accepted. (中科院1区)

  4. Xueqin Liang, Zheng Yan, and Raimo Kantola. GAIMMO: A Grade-driven Auction-based Incentive Mechanism with Multiple Objectives for Crowdsourcing Managed by Blockchain. IEEE Internet of Things Journal, vol. 9, no. 18, pp. 17488-17502, 2022. (中科院1区)

  5. Xueqin Liang, Zheng Yan, Robert Huijie Deng, and Qinghua Zheng. Investigating the Adoption of Hybrid Encrypted Cloud Data Deduplication with Game Theory. IEEE Transactions on Parallel and Distributed Systems, vol. 32, no. 3, pp. 587-600, March 2021. (CCF A)

  6. Xueqin Liang, Zheng Yan, and Robert H. Deng. Game Theoretical Study on Client-Controlled Cloud Data Deduplication. Computers & Security, vol. 91, 101730, 14 pages, April 2020. (CCF B)

  7. Xueqin Liang, Zheng Yan, Xiaofeng Chen, Laurence Tianruo Yang, Wenjing Lou, and Thomas Y. Hou. Game Theoretical Analysis on Encrypted Cloud Data Deduplication. IEEE Transactions on Industrial Informatics, vol. 15, no. 10, pp. 5778-5789, June 2019. (中科院1区)

  8. Xueqin Liang and Zheng Yan. A Survey on Game Theoretical Methods in Human-Machine Networks. Future Generation Computer Systems, vol. 92, pp. 674-693, March 2019. (中科院2区)
  9. Xueqin Liang, Zheng Yan, Wenxiu Ding and Robert Huijie Deng. Game Theoretical Study on a Client-Controlled Deduplication Scheme. In the 16th IEEE International Conference on Ubiquitous Intelligence and Computing (UIC 2019), Leicester, UK, pp. 1154-1161, 19-23 August 2019. (CCF C)

  10. Xuyang Jing, Zheng Yan, Xueqin Liang, and Witold Pedrycz. Network Traffic Fusion and Analysis against DDoS Flooding Attacks with a Novel Reversible Sketch. Information Fusion, vol. 51, pp. 100–113, 2019. (中科院1区)