学术信息网 西电导航 关于 使用说明 搜索 系统首页 登录 控制面板 收藏 姚青松的留言板
部分学术论文
  1. Xuewen Dong; Zijie Di; Liangmin Wang; Qingsong Yao; Guangxia Li; Yulong Shen, Load Balancing of Double Queues and Utility-Workload Tradeoff in Heterogeneous Mobile Edge Computing, IEEE Transactions on Wireless Communications, 2022. (CCF B)

  2. Xinghui Zhu, Zijie Di, Qingsong Yao, Xuewen Dong, Jiandong Wang, Yulong Shen, Performance-Power Tradeoff in Heterogeneous SaaS Clouds with Trustworthiness Guarantee, IEEE Transactions on Computers, PP(1-14), 2022, doi: 10.1109/TC.2022.3214626. (CCF A)

  3. Ziyu Wang, Cong Sun, Qingsong Yao, Duo Ding, Jianfeng Ma, Delica: Decentralized Lightweight Collective Attestation for Disruptive IoT Networks, ICPADS, 2021,  pp. 364-371. (CCF C)

  4. Xuewen Dong, Liangmin Wang, Qingsong Yao, Yongzhi Wang, Junwei Zhang, Yulong Shen, Towards flexible and truthful incentive for multichannel allocation in DSA. IEEE Transactions on Vehicular Technology, PP(99), 1-1, 2021.(SCI, 中科院2区) 

  5. Xuewen Dong, Zhichao You, Tom Luan, Qingsong Yao, Yulong Shen, Jianfeng Ma, Optimal Mobile Crowdsensing Incentive under Sensing Inaccuracy, IEEE Internet of Things Journal, 2020. (SCI, 中科院1区)

  6. Xuewen Dong, Qiao Kang, Qingsong Yao*, Di Lu, Yang Xu, Jia Liu, Towards Primary User Sybil-proofness for Online Spectrum Auction in Dynamic Spectrum Access, IEEE INFOCOM, 2020. (CCF A)

  7. Qingsong Yao, Jianfeng Ma, Rui Li, Xinghua Li, Jinku Li, Jiao Liu, Energy-aware RFID authentication in Edge Computing, IEEE ACCESS, 2019. (中科院2区)

  8. Qingsong Yao, Jianfeng Ma, Sun Cong, Xinghua Li, Jinku Li, Attack gives me power: DoS-defending constant-time privacy-preserving authentication of low-cost devices such as backscattering RFID tags, ACM MobiHoc MSCC Workshop, 2016.

  9. Cong Sun, Qingsong Yao, Jianfeng Ma, Certia: Certifying Interface Automata for Cyber-Physical Systems, smartcomp, 2017.

  10. Cong Sun, Jianfeng Ma, Qingsong Yao, On the architecture and development life cycle of secure cyber-physical systems, Journal of Communications and Information Networks, 2016. (invited)

  11. Xinghua Li, Jiajia Liu, Qingsong Yao, Jianfeng Ma, Efficient and Consistent Key Extraction Based on Received Signal Strength for Vehicular Ad Hoc Networks, IEEE ACCESS, 2017. (中科院2区)

  12. Xindi Ma, Jianfeng Ma, Sheng Gao, Qingsong Yao, APDL: A Practical Privacy-Preserving Deep Learning Model for Smart Devices, International Conference on Mobile Ad-Hoc and Sensor Networks (MSN), 2017. (CCF C)

  13. Shan Chang、Li Lu、Xiaoqing Liu、Hui Song、Qingsong Yao ,Vulnerability aware graphs for RFID protocol security benchmarking,Journal of Computer and System Sciences, 2014. Volume 81, Issue 6, September 2015. (CCF B)

  14. 高胜, 马建峰, 姚青松, 孙聪, LBSs中面向协同位置隐私保护的群组最近邻查询, 通信学报, 2015.

  15. Cong Sun, Ning Xi, Jinku Li, Qingsong Yao, Jianfeng Ma, Verifying Secure Interface Composition for Component-based System Designs, pp. 359-366, APSEC, Dec. 1-4, 2014. (CCF C)

  16. 焦郑达, 马建峰, 孙聪, 姚青松, 新的车辆远程诊断授权协议, 通信学报, 2014.

  17. Qingsong Yao, Jinsong Han, Saiyu Qi, Zhuo liu, Shan Chang, and Jianfeng Ma, “MAP: Towards Authentication for Multiple-tags”, International Journal of Distributed Sensor Networks, 2013.

  18. Qingsong Yao, Jinsong Han, Yong Qi, Lei Yang, and Yunhao liu, “Privacy leakage in access mode: revisiting private RFID authentication protocols”, in Proceedings of the 40th Annual International Conference on Parallel Processing (ICPP), Chinese Taipei, pp. 713-721, 2011. (CCF B).

  19. Qingsong Yao, Jinsong Han, Saiyu Qi, and Zhuo liu, “MAP: Authenticating multiple tags”, in Proceedings of the 8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS), Valencia, Spain, pp. 332-340, 2011. (CCF C). 

  20. Yong Qi, Qingsong Yao, Ying Chen, and Xiao Zhong, “Study on RFID authentication protocol theory”, China Communications, vol. 8, iss. 1, pp. 65-71, 2011.

  21. Qingsong Yao, Yong Qi, Ying Chen, and Xiao Zhong, “A desynchronization tolerant RFID private authentication protocol”, in Proceedings of the 5th International Conference on Wireless Algorithms, Systems and Applications (WASA), Beijing, China, pp. 120-124, 2010. (CCF C)

  22. Lei Yang, Jinsong Han, Yong Qi, Cheng Wang, Zhuo Liu, Qingsong Yao, Ying Chen, and Xiao Zhong, “Utilizing RF interference to enable private estimation in RFID systems”, in Proceedings of the 16th International Conference on Parallel and Distributed Systems (ICPADS), Shanghai, China, pp. 83-90, 2010.  (CCF C)

  23. Qingsong Yao, Yong Qi, Jinsong Han, Jizhong Zhao, Xiangyang Li, and Yunhao Liu, “Randomizing RFID private authentication”, in Proceedings of the 7th IEEE International Conference on Pervasive Computing and Communications (IEEE PerCom), Galveston, Texas, pp. 243-252, 2009. (CCF B).

  24. Qingsong Yao, Yong Qi, and Jizhong Zhao, and Jinsong Han, “An enhanced synchronization approach for RFID private authentication”, the 2nd IEEE International Workshop on Wireless Network Algorithm and Theory (IEEE WiNA), co-located with IEEE MASS 2009, Macau SAR, China, pp. 959-964, 2009.

  25. Qingsong Yao, Shan Chang, Yong Qi, and Ming Li, “New programming model for pervasive computing”, in Proceedings of the 5th IEEE International Conference on e-Business Engineering (IEEE ICEBE), Xi’an, China, pp. 325-332, 2008.

  26. 齐勇,姚青松,韩劲松,赵季中,李向阳,刘云浩,一种射频识别隐私认证方法:中国,专利号:200910023866.3[P].2010-02-10.