学术信息网 西电导航 关于 使用说明 搜索 系统首页 登录 控制面板 收藏 闫峥的留言板
最新成果

  The following selected top-level papers first authored by me or by my students are accepted in 2023:

  • J. J. Li, P. Wang, Z. Yan*, Y. S. Yang, K. Zeng, “BGKey: Group Key Generation for Backscatter Communications among Multiple Device”, IEEE Transactions on Information Forensics and Security, 2023. Doi: 10.1109/TIFS.2023.3345650 (CCF A, IF: 7.231)
  • L. Y. Wang, W. X. Ding*, Z. Yan, S. Qiu, M. J. Wang, Z. G. Wan, "EDDAC: An Efficient and Decentralized Data Access Control Scheme with Attribute Privacy Preservation", IEEE Internet of Things Journal, 2023. Doi: DOI: 10.1109/JIOT.2023.3342314 (IF: 10.6)
  • Y. X. Cai, W. X, Ding*, Y. X. Xiao, Z. Yan, X. M. Liu, Z. G. Wan, “SecFed: A Secure and Efficient Federated Learning based on Multi-Key Homomorphic Encryption”, IEEE Transactions on Dependable and Secure Computing, February 2023. Doi: 10.1109/TDSC.2023.3336977 (CCF A, IF: 7.329)
  • X. Xu, Q. H. Zheng, Z. Yan*, M. Fan, A. Jia, Z. H. Zhou, H. J. Wang, T. Liu, "PatchDiscovery: Patch Presence Test for Identifying Binary Vulnerabilities Based on Key Basic Blocks", IEEE Transactions on Software Engineering, 2023. Doi: 10.1109/TSE.2023.3332732 (CCF A, IF: 9.322)
  • M. Kaveh*, Z. Yan, R. Jäntti, “Secrecy Performance Analysis of RIS-Aided Smart Grid Communications”, IEEE Transactions on Industrial Informatics, 2023. Doi: 10.1109/TII.2023.3333842 (IF: 12.3)
  • S. F. Fei, Z. Yan*, H. M. Xie, G. C. Liu, Sec-E2E: End-to-End Communication Security in LS-HetNets Based on Blockchain, IEEE Transactions on Network Science and Engineering, 2023. Doi: DOI: 10.1109/TNSE.2023.3307884. (IF: 5.033)
  • L. Peng, Z. Yan*, X. Q. Liang, X. X. Yu, “SecDedup: Secure Data Deduplication with Dynamic Auditing in the Cloud”, Information Sciences, Vol. 644, 119279, October 2023. Doi: https://doi.org/10.1016/j.ins.2023.119279 (IF: 8.233)
  • L. J. Gao, Z. Yan*, X. Q. Liang, X. Xu, J. Wang, W. X. Ding, L. T. Yang, “Taxonomy and Recent Advance of Game Theoretical Approaches in Adversarial Machine Learning: A Survey”, ACM Transaction on Sensor Networks, 2023. Doi: https://doi.org/10.1145/3600094 (CCF B, IF: 3.389)
  • H. N. Yuan, S. F. Fei, Z. Yan*, “Technologies of Blockchain Interoperability: A Survey”, Digital Communications and Networks, 2022. (IF: 6.348) (accepted)
  • X. X. Xie, J. L. Zhang, Z. Yan*, H. G. Wang, T. Y. Li, “Can Routing be Effectively Learned in Integrated Heterogeneous Networks?”, IEEE Network Magazine, 2022. (IF: 10.294) (accepted)
  • H. Bai, X. X. Yu, Z. Yan*, J. L. Zhang, L. T. Yang, “VeriORouting: Verification on Intelligent Routing Outsourced to the Cloud”, Information Sciences, Vol. 633, pp. 410-430, July 2023. Doi: 10.1016/j.ins.2023.03.039 (IF: 8.233) 
  • G. Liu, Z. Yan*, D. L. Wang, H. G. Wang, T. Y. Li, “DePTVM: Decentralized Pseudonym and Trust Value Management for Integrated Networks”, IEEE Transactions on Dependable and Secure Computing, February 2023. Doi: 10.1109/TDSC.2023.3246799 (CCF A, IF: 7.329)
  • Y. J. Liu, J. Wang, Z. Yan*, Z. G. Wan, R. Jäntti, “A Survey on Blockchain-based Trust Management for Internet of Things”, IEEE Internet of Things Journal, Vol. 10, Issue 7, pp. 5898-5922, 2023. Doi: 10.1109/JIOT.2023.3237893 (IF: 10.238)
  • J. J. Li, P. Wang, L. Jiao, Z. Yan*, K. Zeng, Y. S. Yang, “Security Analysis of Triangle Channel-based Physical Layer Key Generation in Wireless Backscatter Communications”, IEEE Transactions on Information Forensics and Security, Vol. 18, pp. 948-964, 2023. Doi: 10.1109/TIFS.2022.3224852 (CCF A, IF: 7.231)
  • H. Han, X. Y. Jing, Z. Yan*, W. Pedrycz, “ExtendedSketch+: Super Host Identification and Network Host Trust Evaluation with Memory Efficiency and High Accuracy”, Information Fusion, Vol. 92, pp. 300-312, 2023. Doi: https://doi.org/10.1016/j.inffus.2022.12.009 (IF: 17.564)
  • Y. S. Yang, Z. Yan*, K. Zeng, P. Wang, J. J. Li, “Physical Layer Authentication in Backscatter Communication: a Review”, IEEE Wireless Communications Magazine, 2022. (IF: 12.777) (Accepted)
  • M. J. Wang, D. S. Zhao, Z. Yan*, H. G. Wang. T. Y. Li, “XAuth: Secure and Privacy-Preserving Cross-Domain Handover Authentication for 5G HetNets”, IEEE Internet of Things Journal, Vol. 10, Issue 7, pp. 5962-5976, April 2023. Doi: 10.1109/JIOT.2022.3223223 (IF: 10.238)

The following selected top-level papers first authored by me or by my students are accepted in 2022:

  • D. Liu, Z. Yan, W. X. Ding*, Y. X. Cai, Y. X. Chen, Z. G. Wan, “ESMAC: Efficient and Secure Multi-owner Access Control with TEE in Multi-level Data Processing”, IEEE Transactions on Dependable and Secure Computing, 2022. Doi: 10.1109/TDSC.2022.3215977 (CCF A, IF: 7.329)
  • Z. Liu, C. Z. Hu, C. Shan*, Z. Yan, “ADCaDeM: A Novel Method of Calculating Attack Damage Based on Differential Manifolds”, IEEE Transactions on Dependable and Secure Computing, October 2022. Doi: 10.1109/TDSC.2022.3214809 (CCF A, IF: 7.329)
  • H. M. Xie, S. F. Fei, Z. Yan*, Y. Xiao, “SofitMix: A Secure Offchain-Supported Bitcoin-Compatible Mixing Protocol”, IEEE Transactions on Dependable and Secure Computing, October 2022. Doi: 10.1109/TDSC.2022.3213824 (CCF A, IF: 6.791)
  • R. Zhang, Z. Yan*, X. R. Wang, R. H. Deng, “LiVoAuth: Liveness Detection in Voiceprint Authentication with Random Challenges and Detection Modes”, IEEE Transactions on Industrial Informatics, October 2022. Doi: 10.1109/TII.2022.3213830 (IF: 11.648)
  • Z. Yan*, L. T. Yang, T. Y. Li, Y. Miche, S. Yu, S. Yau, “Special Issue Editorial: Trust, Security and Privacy of 6G”, IEEE Network Magazine, July/August 2022.
  • Z. Yan*, Q. H. Zheng, Y. L. Wu, Y. L. Zhao, M. Atiquzzaman, “Blockchain-enabled Technologies for Cyber-Physical Systems and Big Data Applications”, Digital Communications and Networks (Elsevier), Issue 5, 2022.
  • P. Wang, H. C. Gao, X. Y. Guo, C. X. Xiao, F. Q. Qi, Z. Yan, “An Experimental Investigation of Text-based CAPTCHA Attacks and Their Robustness”, ACM Computing Surveys, 2022. Doi: https://doi.acm.org?doi=3559754 (accepted) (IF: 10.28)
  • J. Wang, Z. Yan*, H. G. Wang, T. Y. Li, W. Pedrycz, “A Survey on Trust Models in Heterogeneous Networks”, IEEE Communications Surveys and Tutorials, 2022. Doi: 10.1109/COMST.2022.3192978 (IF: 33.84)
  • P. Wang, Z. Yan*, K. Zeng, “BCAuth: Physical Layer Enhanced Authentication and Attack Tracing for Backscatter Communications”, IEEE Transactions on Information Forensics and Security, Vol. 17, pp. 2818-2834, 2022. Doi: 10.1109/TIFS.2022.3195407 (CCF A, IF: 7.231)
  • R. Han, Z. Yan, X. Q. Liang*, L. T. Yang, “How Can Incentive Mechanisms and Blockchain Benefit with Each Other? A Survey”, ACM Computing Surveys, 2022. https://doi.acm.org?doi=3539604 (IF: 10.28)
  • X. Y. Jing, J. J. Zhao, Z. Yan*, W. Pedrycz, X. Li, “Granular Classifier: Building Traffic Granules for Encrypted Traffic Classification Based on Granular Computing”, Digital Communications and Networks, 2022. (accepted) (IF: 6.797)
  • J. H. Lan, R. Zhang, Z. Yan*, J. Wang, Y. Chen, R. H. Hou, “Adversarial Attacks and Defenses on Speaker Recognition Systems: A Survey”, Journal of Systems Architecture, Vol. 127, 102526, June 2022. https://doi.org/10.1016/j.sysarc.2022. (IF: 3.777, CCF B)
  • S. S. Liu, Z. Yan*, “Efficient Privacy Protection Protocols for 5G-Enabled Positioning in Industrial IoT”, IEEE Internet of Things Journal, Vol. 9, Issue 19, pp. 18527-18538, October 1 2022. Doi: 0.1109/JIOT.2022.3161148 (IF: 9.936)
  • P. Wang*, Z. Yan, N. Wang, K. Zeng, “Optimal Resource Allocation for Secure Multi-device Wirelessly Powered Backscatter Communications with Artificial Noise”, IEEE Transactions on Wireless Communications, Vol. 21, Issue 9, pp. 7794-7809, September 2022. Doi: 10.1109/TWC.2022.3162137 (IF: 7.016)
  • H. X. Han, S. F. Fei, Z. Yan*, X. K. Zhou, “A Survey on Blockchain-based Integrity Auditing for Cloud Data”, Digital Communications and Networks, 2022. (accepted) (IF: 6.797)
  • X. Q. Liang, Z. Yan*, K. Raimo, “GAIMMO: A Grade-driven Auction-based Incentive Mechanism with Multiple Objectives for Decentralized Crowdsourcing”, IEEE Internet of Things Journal, Vol. 9, Issue 18, pp. 17488-17502, September 15 2022. Doi: 10.1109/JIOT.2022.3155631 (IF: 9.936)
  • K. D. Liu, Z. Yan, X. Q. Liang*, R. Kantola, C. Y. Hu, “A Survey on Blockchain-enabled Federated Learning and its Prospects with Digital Twins”, Digital Communications and Networks, 2022. (accepted) (IF: 6.797)
  • R. Zhang, Z. Yan*, X. R. Wang, R. H. Deng, “VOLERE: Leakage Resilient User Authentication Based on Personal Voice Challenges”, IEEE Transactions on Dependable and Secure Computing, 2022. Doi: 10.1109/TDSC.2022.3147504 (CCF A, IF: 7.329)
  • Z. Yan*, X. R. Qian, S. S. Liu, R. H. Deng, “Privacy Protection in 5G Positioning and Location-Based Services Based on SGX”, ACM Transaction on Sensor Networks, 2022. Doi: https://doi.org/10.1145/3512892 (IF: 3.52)
  • X. X. Yu, H. Bai, Z. Yan*, R. Zhang, “VeriDedup: A Verifiable Cloud Data Deduplication Scheme with Integrity and Duplication Proof”, IEEE Transactions on Dependable and Secure Computing, 2021. Doi: 10.1109/TDSC.2022.3141521 (CCF A, IF: 7.329)
  • H. Han, Z. Yan*, X. Y. Jing, W. Pedrycz, “Applications of Sketches in Network Traffic Measurement: A Survey”, Information Fusion, Vol. 82, pp. 58-85, 2022. Doi: 10.1016/j.inffus.2021.12.007 (IF: 12.975)
  • W. T. Wei, J. Wang, Z. Yan*, W. X. Ding, “EPMDroid: Efficient and Privacy-preserving Malware Detection Based on SGX through Data Fusion”, Information Fusion, Vol. 82, pp. 43-57, 2022. Doi: 10.1016/j.inffus.2021.12.006 (IF: 12.975)
  • X. Y. Jing, Z. Yan*, H. Han, W. Pedrycz, “ExtendedSketch: Fusing Network Traffic for Super Host Identification with a Memory Efficient Sketch”, IEEE Transactions on Dependable and Secure Computing, 2021. Doi: 10.1109/TDSC.2021.3111328. (CCF A, IF: 7.329)
  • J. L. Zhang, Z. Yan*, S. F. Fei, M. J. Wang, T. Y. Li, H. G. Wang, “Is Today’s End-to-End Communication Security Enough for 5G and Its Beyond?”, IEEE Network Magazine, Vol. 36, No. 1, pp. 105-112, Jan./Feb. 2022. Doi: 10.1109/MNET.101.2100189 (IF: 10.693)
  • Y. L. Li, S. S. Liu, Z. Yan*, R. H. Deng, “Secure 5G Positioning with Truth Discovery, Attack Detection and Tracing”, IEEE Internet of Things Journal, 2021. Doi: 10.1109/JIOT.2021.3088852 (IF: 9.936)
  • Dr. Xueqin Liang achieved IEEE TCSC Outstanding Ph.D. Dissertation Award 2021
  • X. Q. Liang, Z. Yan*, X. F. Chen, L. T. Yang, W. J. Lou, Y. T. Hou, “Game Theoretical Analysis on Encrypted Cloud Data Deduplication” IEEE Transactions on Industrial Informatics, 2019. Doi: 10.1109/TII.2019.2920402 (IF: 7.377)
  • D. Liu, Z. Yan, W.X. Ding*, M. Atiquzzaman, “A Survey on Secure Data Analytics in Edge Computing”, IEEE Internet of Things Journal, Vol. 6, No. 3, pp. 4946-4967, June 2019. Doi: 10.1109/JIOT.2019.2897619 (IF: 9.515)
  • X.Y. Jing, J.J. Zhao, Q.H. Zheng, Z. Yan*, W. Pedrycz, “A Reversible Sketch-based Method for Detecting and Mitigating Amplification Attacks”, Journal of Network and Computer Applications, Vol. 142, pp. 15-24, Sept. 2019. Doi: 10.1016/j.jnca.2019.06.007 (IF: 5.273)
  • R. Zhang, Z. Yan*, “A Survey on Biometric Authentication: towards Secure and Privacy-Preserving Identification”, IEEE Access, Vol. 7, No. 1, pp. 5994-6009, 2019. Doi: 10.1109/ACCESS.2018.2889996 (IF: 4.098)
  • W. Feng, Z. Yan*, “MCS-Chain: Decentralized and Trustworthy Mobile Crowdsourcing Based on Blockchain”, Future Generation Computer Systems, vol. 95, pp. 649-666, June 2019. (IF: 5.768)
  • X.Y. Jing, Z. Yan*, W. Pedrycz, “Security Data Collection and Data Analytics in the Internet: A Survey”, IEEE Communications Surveys and Tutorials, vol. 21, issue 1, pp. 586-618, first quarter 2019. Doi: 10.1109/COMST.2018.2863942 (IF: 22.973)
  • W.X Ding, X.Y. Jing, Z. Yan*, L.T. Yang, “A Survey on Data Fusion in Internet of Things: Towards Secure and Privacy-Preserving Fusion”, Information Fusion, vol. 51, pp. 129-144, 2019. Doi: 10.1016/j.inffus.2018.12.001 (IF: 10.716)
  • X.X. Yu, Z. Yan*, R. Zhang, “Verifiable Outsourced Computation over Encrypted Data”, Information Sciences, Vol. 479, pp. 372-385, April 2019. Doi: 10.1016/j.ins.2018.12.022 (IF: 5.524)
  • X.Y. Jing, Z. Yan*, X.Q. Liang, W. Pedrycz, “Network Traffic Fusion and Analysis against DDoS Flooding Attacks with a Novel Reversible Sketch”, vol. 51, pp. 100-113, Information Fusion, Nov. 2019. https://doi.org/10.1016/j.inffus.2018.10.013 (IF: 10.716)
  • H.M. Xie, Z. Yan*, Z. Yao, M. Atiquzzaman, “Data Collection for Security Measurement in Wireless Sensor Networks: A Survey”, IEEE Internet of Things Journal, Vol. 6, No. 2, pp. 2205-2224, April 2019. Doi: 10.1109/JIOT.2018.2883403 (IF: 9.515)
  • H.Q. Lin, Z. Yan*, Y.L. Fu, “Adaptive Security-Related Data Collection with Context Awareness”, Journal of Network and Computer Applications, Vol. 126, pp. 88-103, Jan. 2019. Doi: 10.1016/j.jnca.2018.11.002 (IF: 5.273)
  • D.H. Zhou, Z. Yan*, Y.L. Fu, Z. Yao, “A Survey on Network Data Collection”, Journal of Network and Computer Applications, Vo. 116, pp. 9-23, Aug. 2018.
  • G.Q. Li, Z. Yan, Y.L. Fu*, H.L. Chen, “Data Fusion for Network Intrusion Detection: A review", Security and Communication Networks, 2018. vol. 2018, Article ID 8210614, 16 pages, 2018. https://doi.org/10.1155/2018/8210614/.
  • K. Xu, W.D. Zhang, Z. Yan*, “A Privacy-Preserving Mobile Application Recommender System Based on Trust Evaluation”, Journal of Computational Science, 26, pp. 87-107, May 2018. Doi: 10.1016/j.jocs.2018.04.001
  • Z. Yao, Z. Yan*, “A Trust Management Framework for Software-Defined Network Applications”, Concurrency and Computation Practice and Experiences, 2018. Doi: 10.1002/cpe.4518
  • H.Q. Lin, Z. Yan*, Y. Chen, L.F. Zhang, “A Survey on Network Security-Related Data Collection Technologies, IEEE Access. (Accepted) (IF: 3.224)
  • Z. Yan*, P. Wang, W. Feng, “A Novel Scheme of Anonymous Authentication on Trust in Pervasive Social Networking”, Information Sciences, 2018. Doi: 10.1016/j.ins.2018.02.037 (IF: 5.524)
  • G. Liu, Z. Yan*, A. W. Pedryczc, “Data Collection for Attack Detection and Security Measurement in Mobile Ad Hoc Networks: A Survey”, Journal of Network and Computer Applications, Vol. 105, pp. 105-122, march 2018. Doi: https://doi.org/10.1016/j.jnca.2018.01.004 (IF: 5.273)
  • L.M. He, Z. Yan*, M. Atiquzzaman, “LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey”, IEEE Access, Vol. 6, Issue 1, pp. 4220-4242, 2018. Doi: 10.1109/ACCESS.2018.2792534
  • N. Li, Z. Yan*, M. J. Wang, L. T. Yang, “Securing Communication Data in Pervasive Social Networking based on Trust with KP-ABE”, ACM Trans. on Cyber-Physical Systems, 2017. (accepted)
  • 15/11/2017, Z. Yan*, W.X. Ding, X.X. Yu, H.Q. Zhu, R. H. Deng, “Deduplication on Encrypted Big Data in Cloud”, IEEE Transactions on Big Data, vol. 2, no. 2, pp. 138-150, April-June 2016. Doi: 10.1109/TBDATA.2016.2587659 achieves **The 2017 IEEE ComSoc TCBD Best Journal Paper Award**
  • 01/11/2017, X.Q. Liang, Z. Yan*, A Survey on Game Theoretical Methods in Human-Machine Networks, Future Generation Computer Systems, 2017. (invited paper) (IF: 3.997) Doi: 10.1016/j.future.2017.10.051
  • 20/10/2017, W. Feng, Z. Yan*, H.R. Zhang, K. Zeng, Y. Xiao, T. Hou, “Survey on Security, Privacy and Trust in Mobile Crowdsourcing”, IEEE Internet of Things Journal, 2017. Doi: 10.1109/JIOT.2017.2765699 (IF: 7.596) 中科院1区
  • 05/10/2017, Congratulations to Tian Fengyu, Yan Ping and Xie Haomeng to achieve National Scholarship Awards.
  • 01/10/2017, N. Li, Z. Yan*, M. J. Wang, L. T. Yang, “Securing Communication Data in Pervasive Social Networking based on Trust with KP-ABE”, ACM Trans. on Cyber-Physical Systems, 2017. (accepted)
  • 04/09/2017, Z. Yan*, H. M. Xie, P. Zhang, B. B. Gupta, “Flexible Data Access Control in D2D Communications”, Future Generation Computer Systems, 2017. (accepted) (IF: 3.997)
  • 01/09/2017, Congratulations to Ding Wenxiu to achieve the scholarship granted by Network Security Fundation!中国互联网发展基金会网络安全专项基金 网络安全奖学金评选结果公示,恭喜丁文秀同学当选!
  • 25/08/2017, 陈寒露,闫峥,付玉龙,基于串并行结构网络安全数据处理方法及系统、社交网络,申请号201710740993.X,申请日期:25.08.2017.
  • 06/05/2017, F.Y. Tian, P. Zhang, Z. Yan*, “A Survey on C-RAN Security”, IEEE Access, 2017. Doi: 10.1109/ACCESS.2017.2717852
  • 06/05/2017, W.X. Ding, Z. Yan*, R.H. Deng, “Encrypted Data Processing with Homomorphic Re-Encryption”, Information Sciences, 2017 (accepted)
  • 02/05/2017, Z. Yan*, L.F. Zhang, W.X. Ding, Q.H. Zheng, “Heterogeneous Data Storage Management with Deduplication in Cloud Computing”, IEEE Transactions on Big Data, 2017. Doi: 10.1109/TBDATA.2017.2701352
  • Finish the editorial of special issue in Information Fusion. Z. Yan*, J. Liu, L.T. Yang, N. Chawla, “Big Data Fusion in Internet of Things, Information Fusion”, April, 2017. Doi: 10.1016/j.inffus.2017.04.005
  • 18/04/2017, P. Yan, Z. Yan*, “A Survey on Dynamic Mobile Malware Detection”, Software Quality Journal, 2017. DOI: 10.1007/s11219-017-9368-4
  • 17/04/2017, X.X. Yu,Z. Yan*, A.V. Vasilakos,“A Survey of Verifiable Computation”, Mobile Networks and Applications, Springer, 2017. (accepted)
  • SW Copyright application

1.     徐坤,闫峥,党田力,基于用户信任行为的App信任值生成仿真软件(TruBeRepec客户端) V1.0,04.2017

2.     王普,闫峥,史汪洋,藺华庆,李宁, FlexiFile:个人云数据访问控制系统, 03.2017.

3.     许广武,闫峥, 基于可信计算的虚拟化网络功能中信任保障系统软件V1.0, 03.2017.

  • 03/02/2017, W. Feng, Z. Yan*, H.M. Xie, "Anonymous Authentication on Trust in Pervasive Social Networking Based on Group Signature", IEEE Access, 2017. (accepted)
  • 31/012017, Z Yan*, X.X. Yu, W.X. Ding, Context-Aware Verifiable Cloud Computing, IEEE Access, 2016. (accepted)
  • 19/01/2017, M.J. Wang, Z. Yan*, V. Niemi, “UAKA-D2D: Universal Authentication and Key Agreement Protocol in D2D Communications", Mobile Networks and Applications, Springer, 2017. (accepted)
  • 25/12/2016, C.Y. Huang, Z. Yan*, N. Li, M. J. Wang, “Secure Pervasive Social Communications based on Trust in a Distributed Way”, IEEE Access, 2016. (Accepted)
  • 19/12/2016, Prof. Zheng Yan was invited to serve as an editorial board member of Journal of Network and Computer Applications(IF: 2.331)
  • 29/11/2016, achieved a US patent grant. Zheng Yan, An Approach of Secure Recognization for Pervasive Face-to-Face Social Communications,Country/type of grant: United States, Grant date 29-Nov-2016, Patent Number is 9509835.
  • 21/11/2016, L.J. Gao, Z. Yan*, L.T. Yang "Game Theoretical Analysis on Acceptance of a Cloud Data Access Control System Based on Reputation", IEEE Transactions on Cloud Computing, 2016. (accepted)
  • 17/11/2016, Z. Yan*, W.Y. Shi, “CloudFile: A Cloud Data Access Control System based on Mobile Social Trust”, Journal of Network and Computer Applications, 2016. Doi: 10.1016/j.jnca.2016.11.016. (accepted) (IF: 2.331)
  • 15/11/2016, Congratulations to Ding Wenxiu to achieve national scholarship!
  • 15/11/2016, Z. Yan*, X.Y. Jing, W. Pedrycz, “Fusing and Mining Opinions for Reputation Generation”, Information Fusion, 2016. (accepted) (IF: 4.353)
  • 30/10/2016, Congratulations to Wang Mingjun to achieve the scholarship granted by Network Security Fundation!中国互联网发展基金会网络安全专项基金 网络安全奖学金评选结果公示,恭喜王明君同学当选!
  • 13/10/2016, F. Tong, Z. Yan*, A Hybrid Approach of Mobile Malware Detection in Android, Journal of Parallel and Distributed Computing, 2016. Doi: 10.1016/j.jpdc.2016.10.012 (IF: 1.320)
  • 11/10/2016, achieved a US patent invented by Yan Zheng. Zheng Yan, A method to securely access instant community data based on trust levels, contexts and time clock, Country/type of grant: United States, Grant date 11-Oct-2016, Patent Number is 9465950. Nokia Code: 77844, priority patent application number: PCT/CN2012/071982, Application date: 06-Mar-2012.