Xidian Meeting Xidian Guide About Help Search Home Login Control Panel AddBookMark Yan Zheng's MessageBoard
New Achievements

The following selected top-level papers first authored by me or by my students are accepted in 2023:

  1. J. H. Lan, J. Wang, B. C. Yan, Z. Yan*, E. Bertino, “FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge”, The 45th IEEE Symposium on Security and Privacy (S&P 2024), San Francisco, CA, 2024. (CCF A, 14.9% acceptance rate, Security BIG4 Conference)
  2. J. J. Li, P. Wang, Z. Yan*, Y. S. Yang, K. Zeng, “BGKey: Group Key Generation for Backscatter Communications among Multiple Device”, IEEE Transactions on Information Forensics and Security, 2023. Doi: 10.1109/TIFS.2023.3345650 (CCF A, IF: 7.231)
  3. X. Xu, Q. H. Zheng, Z. Yan*, M. Fan, A. Jia, Z. H. Zhou, H. J. Wang, T. Liu, "PatchDiscovery: Patch Presence Test for Identifying Binary Vulnerabilities Based on Key Basic Blocks", IEEE Transactions on Software Engineering, 2023. Doi: 10.1109/TSE.2023.3332732 (CCF A, IF: 9.322)
  4. M. Kaveh*, Z. Yan, R. Jäntti, “Secrecy Performance Analysis of RIS-Aided Smart Grid Communications”, IEEE Transactions on Industrial Informatics, 2023. Doi: 10.1109/TII.2023.3333842 (IF: 12.3)
  5. S. F. Fei, Z. Yan*, H. M. Xie, G. C. Liu, Sec-E2E: End-to-End Communication Security in LS-HetNets Based on Blockchain, IEEE Transactions on Network Science and Engineering, 2023. Doi: DOI: 10.1109/TNSE.2023.3307884. (IF: 5.033)
  6. X. M. Liu, H. M. Xie, Z. Yan*, X. Q. Liang, “A Survey on Blockchain Sharding”, ISA Transactions, 2023. Doi: 10.1016/j.isatra.2023.06.029 (IF: 5.911)
  7. L. Peng, Z. Yan*, X. Q. Liang, X. X. Yu, “SecDedup: Secure Data Deduplication with Dynamic Auditing in the Cloud”, Information Sciences, Vol. 644, 119279, October 2023. Doi: https://doi.org/10.1016/j.ins.2023.119279 (IF: 8.233)
  8. Y. X. Chen*, Q. H. Zheng, Z. Yan, “Efficient Bi-objective SQL Optimization for Enclaved Cloud Databases with Differentially-Private Padding”, ACM Transactions on Database Systems, Vol. 48, No. 2, 6:1-40, May 2023. https://doi.org/10.1145/3597021 (CCF A, IF: 3.121)
  9. L. J. Gao, Z. Yan*, X. Q. Liang, X. Xu, J. Wang, W. X. Ding, L. T. Yang, “Taxonomy and Recent Advance of Game Theoretical Approaches in Adversarial Machine Learning: A Survey”, ACM Transaction on Sensor Networks, 2023. Doi: https://doi.org/10.1145/3600094 (CCF B, IF: 3.389)
  10. H. N. Yuan, S. F. Fei, Z. Yan*, “Technologies of Blockchain Interoperability: A Survey”, Digital Communications and Networks, 2022. (IF: 6.348) (accepted)
  11. X. X. Xie, J. L. Zhang, Z. Yan*, H. G. Wang, T. Y. Li, “Can Routing be Effectively Learned in Integrated Heterogeneous Networks?”, IEEE Network Magazine, 2022. (IF: 10.294) (accepted)
  12. R. Y. Yin, Z. Yan, X. Q. Liang*, H. M. Xie, and Z. G. Wan, “A Survey on Privacy Preservation Techniques for Blockchain Interoperability”, Journal of Systems Architecture, Vol. 140, 102892, April 29, 2023. Doi: https://doi.org/10.1016/j.sysarc.2023.102892 (IF: 5.836, CCF B)
  13. H. Bai, X. X. Yu, Z. Yan*, J. L. Zhang, L. T. Yang, “VeriORouting: Verification on Intelligent Routing Outsourced to the Cloud”, Information Sciences, Vol. 633, pp. 410-430, July 2023. Doi: 10.1016/j.ins.2023.03.039 (IF: 8.233) 
  14. G. Liu, Z. Yan*, D. L. Wang, H. G. Wang, T. Y. Li, “DePTVM: Decentralized Pseudonym and Trust Value Management for Integrated Networks”, IEEE Transactions on Dependable and Secure Computing, February 2023. Doi: 10.1109/TDSC.2023.3246799 (CCF A, IF: 7.329)
  15. Y. J. Liu, J. Wang, Z. Yan*, Z. G. Wan, R. Jäntti, “A Survey on Blockchain-based Trust Management for Internet of Things”, IEEE Internet of Things Journal, Vol. 10, Issue 7, pp. 5898-5922, 2023. Doi: 10.1109/JIOT.2023.3237893 (IF: 10.238)
  16. J. J. Li, P. Wang, L. Jiao, Z. Yan*, K. Zeng, Y. S. Yang, “Security Analysis of Triangle Channel-based Physical Layer Key Generation in Wireless Backscatter Communications”, IEEE Transactions on Information Forensics and Security, Vol. 18, pp. 948-964, 2023. Doi: 10.1109/TIFS.2022.3224852 (CCF A, IF: 7.231)
  17. H. Han, X. Y. Jing, Z. Yan*, W. Pedrycz, “ExtendedSketch+: Super Host Identification and Network Host Trust Evaluation with Memory Efficiency and High Accuracy”, Information Fusion, Vol. 92, pp. 300-312, 2023. Doi: https://doi.org/10.1016/j.inffus.2022.12.009 (IF: 17.564)

The following selected top-level papers first authored by me or by my students are accepted in 2022:

  1. D. Liu, Z. Yan, W. X. Ding*, Y. X. Cai, Y. X. Chen, Z. G. Wan, “ESMAC: Efficient and Secure Multi-owner Access Control with TEE in Multi-level Data Processing”, IEEE Transactions on Dependable and Secure Computing, 2022. Doi: 10.1109/TDSC.2022.3215977 (CCF A, IF: 7.329)
  2. Z. Liu, C. Z. Hu, C. Shan*, Z. Yan, “ADCaDeM: A Novel Method of Calculating Attack Damage Based on Differential Manifolds”, IEEE Transactions on Dependable and Secure Computing, October 2022. Doi: 10.1109/TDSC.2022.3214809 (CCF A, IF: 7.329)
  3. H. M. Xie, S. F. Fei, Z. Yan*, Y. Xiao, “SofitMix: A Secure Offchain-Supported Bitcoin-Compatible Mixing Protocol”, IEEE Transactions on Dependable and Secure Computing, October 2022. Doi: 10.1109/TDSC.2022.3213824 (CCF A, IF: 6.791)
  4. R. Zhang, Z. Yan*, X. R. Wang, R. H. Deng, “LiVoAuth: Liveness Detection in Voiceprint Authentication with Random Challenges and Detection Modes”, IEEE Transactions on Industrial Informatics, October 2022. Doi: 10.1109/TII.2022.3213830 (IF: 11.648)
  5. Z. Yan*, L. T. Yang, T. Y. Li, Y. Miche, S. Yu, S. Yau, “Special Issue Editorial: Trust, Security and Privacy of 6G”, IEEE Network Magazine, July/August 2022.
  6. Z. Yan*, Q. H. Zheng, Y. L. Wu, Y. L. Zhao, M. Atiquzzaman, “Blockchain-enabled Technologies for Cyber-Physical Systems and Big Data Applications”, Digital Communications and Networks (Elsevier), Issue 5, 2022.
  7. P. Wang, H. C. Gao, X. Y. Guo, C. X. Xiao, F. Q. Qi, Z. Yan, “An Experimental Investigation of Text-based CAPTCHA Attacks and Their Robustness”, ACM Computing Surveys, 2022. Doi: https://doi.acm.org?doi=3559754 (accepted) (IF: 10.28)
  8. J. Wang, Z. Yan*, H. G. Wang, T. Y. Li, W. Pedrycz, “A Survey on Trust Models in Heterogeneous Networks”, IEEE Communications Surveys and Tutorials, 2022. Doi: 10.1109/COMST.2022.3192978 (IF: 33.84)
  9. P. Wang, Z. Yan*, K. Zeng, “BCAuth: Physical Layer Enhanced Authentication and Attack Tracing for Backscatter Communications”, IEEE Transactions on Information Forensics and Security, Vol. 17, pp. 2818-2834, 2022. Doi: 10.1109/TIFS.2022.3195407 (CCF A, IF: 7.231)
  10. R. Han, Z. Yan, X. Q. Liang*, L. T. Yang, “How Can Incentive Mechanisms and Blockchain Benefit with Each Other? A Survey”, ACM Computing Surveys, 2022. https://doi.acm.org?doi=3539604 (IF: 10.28)
  11. X. Y. Jing, J. J. Zhao, Z. Yan*, W. Pedrycz, X. Li, “Granular Classifier: Building Traffic Granules for Encrypted Traffic Classification Based on Granular Computing”, Digital Communications and Networks, 2022. (accepted) (IF: 6.797)
  12. J. H. Lan, R. Zhang, Z. Yan*, J. Wang, Y. Chen, R. H. Hou, “Adversarial Attacks and Defenses on Speaker Recognition Systems: A Survey”, Journal of Systems Architecture, Vol. 127, 102526, June 2022. https://doi.org/10.1016/j.sysarc.2022. (IF: 3.777, CCF B)
  13. S. S. Liu, Z. Yan*, “Efficient Privacy Protection Protocols for 5G-Enabled Positioning in Industrial IoT”, IEEE Internet of Things Journal, Vol. 9, Issue 19, pp. 18527-18538, October 1 2022. Doi: 0.1109/JIOT.2022.3161148 (IF: 9.936)
  14. P. Wang*, Z. Yan, N. Wang, K. Zeng, “Optimal Resource Allocation for Secure Multi-device Wirelessly Powered Backscatter Communications with Artificial Noise”, IEEE Transactions on Wireless Communications, Vol. 21, Issue 9, pp. 7794-7809, September 2022. Doi: 10.1109/TWC.2022.3162137 (IF: 7.016)
  15. H. X. Han, S. F. Fei, Z. Yan*, X. K. Zhou, “A Survey on Blockchain-based Integrity Auditing for Cloud Data”, Digital Communications and Networks, 2022. (accepted) (IF: 6.797)
  16. X. Q. Liang, Z. Yan*, K. Raimo, “GAIMMO: A Grade-driven Auction-based Incentive Mechanism with Multiple Objectives for Decentralized Crowdsourcing”, IEEE Internet of Things Journal, Vol. 9, Issue 18, pp. 17488-17502, September 15 2022. Doi: 10.1109/JIOT.2022.3155631 (IF: 9.936)
  17. K. D. Liu, Z. Yan, X. Q. Liang*, R. Kantola, C. Y. Hu, “A Survey on Blockchain-enabled Federated Learning and its Prospects with Digital Twins”, Digital Communications and Networks, 2022. (accepted) (IF: 6.797)
  18. R. Zhang, Z. Yan*, X. R. Wang, R. H. Deng, “VOLERE: Leakage Resilient User Authentication Based on Personal Voice Challenges”, IEEE Transactions on Dependable and Secure Computing, 2022. Doi: 10.1109/TDSC.2022.3147504 (CCF A, IF: 7.329)
  19. Z. Yan*, X. R. Qian, S. S. Liu, R. H. Deng, “Privacy Protection in 5G Positioning and Location-Based Services Based on SGX”, ACM Transaction on Sensor Networks, 2022. Doi: https://doi.org/10.1145/3512892 (IF: 3.52)
  20. X. X. Yu, H. Bai, Z. Yan*, R. Zhang, “VeriDedup: A Verifiable Cloud Data Deduplication Scheme with Integrity and Duplication Proof”, IEEE Transactions on Dependable and Secure Computing, 2021. Doi: 10.1109/TDSC.2022.3141521 (CCF A, IF: 7.329)
  21. H. Han, Z. Yan*, X. Y. Jing, W. Pedrycz, “Applications of Sketches in Network Traffic Measurement: A Survey”, Information Fusion, Vol. 82, pp. 58-85, 2022. Doi: 10.1016/j.inffus.2021.12.007 (IF: 12.975)
  22. W. T. Wei, J. Wang, Z. Yan*, W. X. Ding, “EPMDroid: Efficient and Privacy-preserving Malware Detection Based on SGX through Data Fusion”, Information Fusion, Vol. 82, pp. 43-57, 2022. Doi: 10.1016/j.inffus.2021.12.006 (IF: 12.975)
  23. X. Y. Jing, Z. Yan*, H. Han, W. Pedrycz, “ExtendedSketch: Fusing Network Traffic for Super Host Identification with a Memory Efficient Sketch”, IEEE Transactions on Dependable and Secure Computing, 2021. Doi: 10.1109/TDSC.2021.3111328. (CCF A, IF: 7.329)
  24. J. L. Zhang, Z. Yan*, S. F. Fei, M. J. Wang, T. Y. Li, H. G. Wang, “Is Today’s End-to-End Communication Security Enough for 5G and Its Beyond?”, IEEE Network Magazine, Vol. 36, No. 1, pp. 105-112, Jan./Feb. 2022. Doi: 10.1109/MNET.101.2100189 (IF: 10.693)
  25. Y. L. Li, S. S. Liu, Z. Yan*, R. H. Deng, “Secure 5G Positioning with Truth Discovery, Attack Detection and Tracing”, IEEE Internet of Things Journal, 2021. Doi: 10.1109/JIOT.2021.3088852 (IF: 9.936)

Past Announcement

  1. Dr. Xueqin Liang achieved IEEE TCSC Outstanding Ph.D. Dissertation Award 2021
  2. X. Q. Liang, Z. Yan*, X. F. Chen, L. T. Yang, W. J. Lou, Y. T. Hou, “Game Theoretical Analysis on Encrypted Cloud Data Deduplication” IEEE Transactions on Industrial Informatics, 2019. Doi: 10.1109/TII.2019.2920402 (IF: 7.377)
  3. D. Liu, Z. Yan, W.X. Ding*, M. Atiquzzaman, “A Survey on Secure Data Analytics in Edge Computing”, IEEE Internet of Things Journal, Vol. 6, No. 3, pp. 4946-4967, June 2019. Doi: 10.1109/JIOT.2019.2897619 (IF: 9.515)
  4. X.Y. Jing, J.J. Zhao, Q.H. Zheng, Z. Yan*, W. Pedrycz, “A Reversible Sketch-based Method for Detecting and Mitigating Amplification Attacks”, Journal of Network and Computer Applications, Vol. 142, pp. 15-24, Sept. 2019. Doi: 10.1016/j.jnca.2019.06.007 (IF: 5.273)
  5. R. Zhang, Z. Yan*, “A Survey on Biometric Authentication: towards Secure and Privacy-Preserving Identification”, IEEE Access, Vol. 7, No. 1, pp. 5994-6009, 2019. Doi: 10.1109/ACCESS.2018.2889996 (IF: 4.098)
  6. W. Feng, Z. Yan*, “MCS-Chain: Decentralized and Trustworthy Mobile Crowdsourcing Based on Blockchain”, Future Generation Computer Systems, vol. 95, pp. 649-666, June 2019. (IF: 5.768)
  7. X.Y. Jing, Z. Yan*, W. Pedrycz, “Security Data Collection and Data Analytics in the Internet: A Survey”, IEEE Communications Surveys and Tutorials, vol. 21, issue 1, pp. 586-618, first quarter 2019. Doi: 10.1109/COMST.2018.2863942 (IF: 22.973)
  8. W.X Ding, X.Y. Jing, Z. Yan*, L.T. Yang, “A Survey on Data Fusion in Internet of Things: Towards Secure and Privacy-Preserving Fusion”, Information Fusion, vol. 51, pp. 129-144, 2019. Doi: 10.1016/j.inffus.2018.12.001 (IF: 10.716)
  9. X.X. Yu, Z. Yan*, R. Zhang, “Verifiable Outsourced Computation over Encrypted Data”, Information Sciences, Vol. 479, pp. 372-385, April 2019. Doi: 10.1016/j.ins.2018.12.022 (IF: 5.524)
  10. X.Y. Jing, Z. Yan*, X.Q. Liang, W. Pedrycz, “Network Traffic Fusion and Analysis against DDoS Flooding Attacks with a Novel Reversible Sketch”, vol. 51, pp. 100-113, Information Fusion, Nov. 2019. https://doi.org/10.1016/j.inffus.2018.10.013 (IF: 10.716)
  11. H.M. Xie, Z. Yan*, Z. Yao, M. Atiquzzaman, “Data Collection for Security Measurement in Wireless Sensor Networks: A Survey”, IEEE Internet of Things Journal, Vol. 6, No. 2, pp. 2205-2224, April 2019. Doi: 10.1109/JIOT.2018.2883403 (IF: 9.515)
  12. H.Q. Lin, Z. Yan*, Y.L. Fu, “Adaptive Security-Related Data Collection with Context Awareness”, Journal of Network and Computer Applications, Vol. 126, pp. 88-103, Jan. 2019. Doi: 10.1016/j.jnca.2018.11.002 (IF: 5.273)
  13. D.H. Zhou, Z. Yan*, Y.L. Fu, Z. Yao, “A Survey on Network Data Collection”, Journal of Network and Computer Applications, Vo. 116, pp. 9-23, Aug. 2018.
  14. G.Q. Li, Z. Yan, Y.L. Fu*, H.L. Chen, “Data Fusion for Network Intrusion Detection: A review", Security and Communication Networks, 2018. vol. 2018, Article ID 8210614, 16 pages, 2018. https://doi.org/10.1155/2018/8210614/.
  15. K. Xu, W.D. Zhang, Z. Yan*, “A Privacy-Preserving Mobile Application Recommender System Based on Trust Evaluation”, Journal of Computational Science, 26, pp. 87-107, May 2018. Doi: 10.1016/j.jocs.2018.04.001
  16. Z. Yao, Z. Yan*, “A Trust Management Framework for Software-Defined Network Applications”, Concurrency and Computation Practice and Experiences, 2018. Doi: 10.1002/cpe.4518
  17. H.Q. Lin, Z. Yan*, Y. Chen, L.F. Zhang, “A Survey on Network Security-Related Data Collection Technologies, IEEE Access. (Accepted) (IF: 3.224)
  18. Z. Yan*, P. Wang, W. Feng, “A Novel Scheme of Anonymous Authentication on Trust in Pervasive Social Networking”, Information Sciences, 2018. Doi: 10.1016/j.ins.2018.02.037 (IF: 5.524)
  19. G. Liu, Z. Yan*, A. W. Pedryczc, “Data Collection for Attack Detection and Security Measurement in Mobile Ad Hoc Networks: A Survey”, Journal of Network and Computer Applications, Vol. 105, pp. 105-122, march 2018. Doi: https://doi.org/10.1016/j.jnca.2018.01.004 (IF: 5.273)
  20. L.M. He, Z. Yan*, M. Atiquzzaman, “LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey”, IEEE Access, Vol. 6, Issue 1, pp. 4220-4242, 2018. Doi: 10.1109/ACCESS.2018.2792534
  21. N. Li, Z. Yan*, M. J. Wang, L. T. Yang, “Securing Communication Data in Pervasive Social Networking based on Trust with KP-ABE”, ACM Trans. on Cyber-Physical Systems, 2017. (accepted)
  22. 15/11/2017, Z. Yan*, W.X. Ding, X.X. Yu, H.Q. Zhu, R. H. Deng, “Deduplication on Encrypted Big Data in Cloud”, IEEE Transactions on Big Data, vol. 2, no. 2, pp. 138-150, April-June 2016. Doi: 10.1109/TBDATA.2016.2587659 achieves **The 2017 IEEE ComSoc TCBD Best Journal Paper Award**
  23. 01/11/2017, X.Q. Liang, Z. Yan*, A Survey on Game Theoretical Methods in Human-Machine Networks, Future Generation Computer Systems, 2017. (invited paper) (IF: 3.997) Doi: 10.1016/j.future.2017.10.051
  24. 20/10/2017, W. Feng, Z. Yan*, H.R. Zhang, K. Zeng, Y. Xiao, T. Hou, “Survey on Security, Privacy and Trust in Mobile Crowdsourcing”, IEEE Internet of Things Journal, 2017. Doi: 10.1109/JIOT.2017.2765699 (IF: 7.596) 中科院1区
  25. 05/10/2017, Congratulations to Tian Fengyu, Yan Ping and Xie Haomeng to achieve National Scholarship Awards.
  26. 01/10/2017, N. Li, Z. Yan*, M. J. Wang, L. T. Yang, “Securing Communication Data in Pervasive Social Networking based on Trust with KP-ABE”, ACM Trans. on Cyber-Physical Systems, 2017. (accepted)
  27. 04/09/2017, Z. Yan*, H. M. Xie, P. Zhang, B. B. Gupta, “Flexible Data Access Control in D2D Communications”, Future Generation Computer Systems, 2017. (accepted) (IF: 3.997)
  28. 01/09/2017, Congratulations to Ding Wenxiu to achieve the scholarship granted by Network Security Fundation!中国互联网发展基金会网络安全专项基金 网络安全奖学金评选结果公示,恭喜丁文秀同学当选!
  29. 25/08/2017, 陈寒露,闫峥,付玉龙,基于串并行结构网络安全数据处理方法及系统、社交网络,申请号201710740993.X,申请日期:25.08.2017.
  30. 06/05/2017, F.Y. Tian, P. Zhang, Z. Yan*, “A Survey on C-RAN Security”, IEEE Access, 2017. Doi: 10.1109/ACCESS.2017.2717852
  31. 06/05/2017, W.X. Ding, Z. Yan*, R.H. Deng, “Encrypted Data Processing with Homomorphic Re-Encryption”, Information Sciences, 2017 (accepted)
  32. 02/05/2017, Z. Yan*, L.F. Zhang, W.X. Ding, Q.H. Zheng, “Heterogeneous Data Storage Management with Deduplication in Cloud Computing”, IEEE Transactions on Big Data, 2017. Doi: 10.1109/TBDATA.2017.2701352
  33. 04/2017 finish the editorial of a special issue in Information Fusion. Z. Yan*, J. Liu, L.T. Yang, N. Chawla, “Big Data Fusion in Internet of Things, Information Fusion”, April, 2017. Doi: 10.1016/j.inffus.2017.04.005
  34. 18/04/2017, P. Yan, Z. Yan*, “A Survey on Dynamic Mobile Malware Detection”, Software Quality Journal, 2017. DOI: 10.1007/s11219-017-9368-4
  35. 17/04/2017, X.X. Yu,Z. Yan*, A.V. Vasilakos,“A Survey of Verifiable Computation”, Mobile Networks and Applications, Springer, 2017. (accepted)
  36. 03/02/2017, W. Feng, Z. Yan*, H.M. Xie, "Anonymous Authentication on Trust in Pervasive Social Networking Based on Group Signature", IEEE Access, 2017.(accepted)
  37. 31/01/2017, Z Yan*, X.X. Yu, W.X. Ding, Context-Aware Verifiable Cloud Computing, IEEE Access, 2016. (accepted)
  38. 19/01/2017, M.J. Wang, Z. Yan*, V. Niemi, “UAKA-D2D: Universal Authentication and Key Agreement Protocol in D2D Communications", Mobile Networks and Applications, Springer, 2017. (accepted)
  39. 03/01/2017, Prof. Zheng Yan was invited to serve as an editorial board member of Information Fusion (IF: 4.353)
  40. 19/12/2016, Prof. Zheng Yan was invited to serve as an editorial board member of Journal of Network and Computer Applications(IF: 2.331)
  41. 29/11/2016, achieved a US patent grant. Zheng Yan, An Approach of Secure Recognization for Pervasive Face-to-Face Social Communications,Country/type of grant: United States, Grant date 29-Nov-2016, Patent Number is 9509835.
  42. 21/11/2016, L.J. Gao, Z. Yan*, L.T. Yang "Game Theoretical Analysis on Acceptance of a Cloud Data Access Control System Based on Reputation", IEEE Transactions on Cloud Computing, 2016. (accepted)
  43. 17/11/2016, Z. Yan*, W.Y. Shi, “CloudFile: A Cloud Data Access Control System based on Mobile Social Trust”, Journal of Network and Computer Applications, 2016. Doi: 10.1016/j.jnca.2016.11.016. (accepted) (IF: 2.331)
  44. 15/11/2016, Congratulations to Ding Wenxiu to achieve national scholarship!
  45. 15/11/2016, Z. Yan*, X.Y. Jing, W. Pedrycz, “Fusing and Mining Opinions for Reputation Generation”, Information Fusion, 2016. (accepted) (IF: 4.353)
  46. 30/10/2016, Congratulations to Wang Mingjun to achieve the scholarship granted by Network Security Fundation!中国互联网发展基金会网络安全专项基金 网络安全奖学金评选结果公示,恭喜王明君同学当选!
  47. 13/10/2016, a paper about mobile malware detection authored by Tong Fei and Yan Zheng was accepted by Journal of Parallel and Distributed Computing. F. Tong, Z. Yan*, A Hybrid Approach of Mobile Malware Detection in Android, Journal of Parallel and Distributed Computing, 2016. Doi: 10.1016/j.jpdc.2016.10.012 (IF: 1.320)
  48. 11/10/2016, achieved a US patent invented by Yan Zheng. Zheng Yan, A method to securely access instant community data based on trust levels, contexts and time clock, Country/type of grant: United States, Grant date 11-Oct-2016, Patent Number is 9465950. Nokia Code: 77844, priority patent application number: PCT/CN2012/071982, Application date: 06-Mar-2012.
Research Guidance