Xidian Meeting Xidian Guide About Help Search Home Login Control Panel AddBookMark Yan Zheng's MessageBoard
  • 300+ peer-reviewed scientific and technical articles including 170+ English journal articles; 2 solely authored books; 9 conference proceedings, and 16 book chapters. 210+ journal and conference papers were first or correspondingly authored. Many paper articles were published in highly reputable journals and conferences, such as IEEE TII, IEEE TDSC, IEEE TVT, IEEE TPDS, IEEE TCYB, ACM TOMM, ACM TPCS, IEEE IoT, IEEE TCC, IEEE TBD, IEEE TCSS, JCSS, Information Sciences, Information Fusion, IEEE INFOCOM, IEEE GLOBECOM, IEEE ICC, etc.  (refer to full publication list)
  • 44 granted patents (35 US/EP/JP patents) and 50 PCT patent applications, 30 of which were solely invented. A co-author of Nokia’s proposal for DVB-CPCM standard. Several granted patents have been adopted by international standards (e.g., ISO/IEC M3W, TCG, and DVB-CPCM); 
  • More than 30 invited talks at conference and reputable universities; one talk at Future Internet SHOK Review Seminar in Feb. 2011, Finland. 



Selected Recent Journal Publications
  1. X. Y. Jing, Z. Yan*, Y. H. Shen, W. Pedrycz, J. Yang, “A Group-based Distance Learning Method for Semi-supervised Fuzzy Clustering”, IEEE Transactions on Cybernetics, 2020. Doi: 0.1109/TCYB.2020.3023373. (IF: 11.470)
  2. X. Q. Liang, Z. Yan*, R. H. Deng, Q. H. Zheng, “Investigating the Adoption of Hybrid Encrypted Cloud Data Deduplication with Game Theory”, IEEE Transactions on Parallel and Distributed Systems, Vol. 32, Issue 3, pp. 587-600, 2020. Doi: 10.1109/TPDS.2020.3028685 (CCF A, IF: 4.640)
  3. X.Q. Liang, Z. Yan*, X.F. Chen, L.T. Yang, W.J. Lou, Y.T. Hou, “Game Theoretical Analysis on Encrypted Cloud Data Deduplication”, IEEE Transactions on Industrial Informatics, 2019, Doi: 10.1109/TII.2019.2920402, Early Access. (SCI, EI) (中科院一区/JCR一区, IF: 7.377)
  4. X.Y. Jing, Z. Yan*, W. Pedrycz, “Security Data Collection and Data Analytics in the Internet: A Survey”, IEEE Communications Surveys and Tutorials, vol. 21, issue 1, pp. 586-618, first quarter 2019. (IF: 20.23, 中科院SCI 1区)
  5. X.Y. Jing, Z. Yan*, X.Q. Liang, W. Pedrycz, “Network Traffic Fusion and Analysis against DDoS Flooding Attacks with a Novel Reversible Sketch”, vol. 51, pp. 100-113, Information Fusion, Nov. 2019. (IF: 6.639, 中科院SCI 1区) https://doi.org/10.1016/j.inffus.2018.10.013
  6. P. Wang, N. Wang, M. Dabaghchian, K. Zeng, Z. Yan, “Optimal Resource Allocation for Secure Multi-User Wireless Powered Backscatter Communication with Artificial Noise”, IEEE Infocom 2019. (CCF A)
  7. Z. Yan*, P. Wang, W. Feng, “A Novel Scheme of Anonymous Authentication on Trust in Pervasive Social Networking”, Information Sciences, Vol. 445-446, pp. 79-96, June 2018. Doi:10.1016/j.ins.2018.02.037 (IF: 4.305, 中科院SCI 2)
  8. W.X. Ding, Z. Yan*, R. H. Deng, “Privacy-Preserving Data Processing with Flexible Access Control”, IEEE Transactions on Dependable and Secure Computing, 2017. Doi: 10.1109/TDSC.2017.2786247 (IF: 4.410, CCF A)
  9. M.J. Wang, Z. Yan*, “Privacy-Preserving Authentication and Key Agreement Protocols for D2D Group Communications", IEEE Transactions on Industrial Informatics, Vol. 14, issue 8, pp. 3637-3647, August 2018. (IF: 6.764, 中科院SCI 1) Doi: 10.1109/TII.2017.2778090
  10. W. Feng, Z. Yan*, H.R. Zhang, K. Zeng, Y. Xiao, T. Hou, “Survey on Security, Privacy and Trust in Mobile Crowdsourcing”, IEEE Internet of Things Journal, Vol. 5 No. 4, pp. 2971-2992, August, 2018. Doi: 10.1109/JIOT.2017.2765699 (IF: 7.596, 中科院SCI 1区)
  11. Z. Yan*, X.Y. Jing, W. Pedrycz, “Fusing and Mining Opinions for Reputation Generation”, Information Fusion, Vol. 36, pp. 172-184, July 2017.  (IF: 4.353, 中科院SCI 1区)
  12. Z. Yan*, W.X. Ding, X.X. Yu, H.Q. Zhu, R. H. Deng, “Deduplication on Encrypted Big Data in Cloud”, IEEE Transactions on Big Data, vol. 2, no. 2, pp. 138-150, April-June 2016. Doi: 10.1109/TBDATA.2016.2587659 (IEEE ComSoc TCBD 2017 最佳期刊论文奖)
  13. Z. Yan*, P. Zhang, A.V. Vasilakos, “A Survey on Trust Management for Internet of Things”, Journal of Network and Computer Applications, 42 (2014), pp. 120–134, 2014.Doi: 10.1016/j.jnca.2014.01.014i (IF: 3.50, ESI高被引, 中科院SCI 2)
  14. Z. Yan*, M.J. Wang, “Protect Pervasive Social Networking based on Two Dimensional Trust Levels”, IEEE Systems Journal, Vol. 11, Issue 1, pp. 207-218, March 2017.  Doi: 10.1109/JSYST.2014.2347259. (IF: 3.882, 中科院SCI 2)
  15. Z. Yan*, C. Prehofer, “Autonomic Trust Management for a Component Based Software System”, IEEE Transactions on Dependable and Secure Computing, Vol. 8, No. 6, pp. 810-823, 2011. (IF: 2.926, CCF A)