Selected Recent Publications
- P. P. Han, Z. Yan*, L. T. Yang, E. Bertino, “P2C2T: Preserving the Privacy of Cross-Chain Transfer”, The 46th IEEE Symposium on Security and Privacy (S&P 2025), San Francisco, CA, 2025. (CCF A, 14.3% acceptance rate)
- J. H. Lan, J. Wang, B. C. Yan, Z. Yan*, E. Bertino, “FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge”, The 45th IEEE Symposium on Security and Privacy (S&P 2024), San Francisco, CA, 2024. (CCF A, 14.9% acceptance rate)
- Y. S. Yang, J. J. Li, N. Y. Luo, Z. Yan*, Y. F. Zhang, K. Zeng, “BatchAuth: A Physical Layer Batch Authentication Scheme for Multiple Backscatter Devices”, IEEE Transactions on Information Forensics and Security, Vol. 19, pp. 9452-9466, 2024. Doi: 10.1109/TIFS.2024.3473322 (CCF A, IF: 6.3)
- J. Wang, Z. Yan*, J. H. Lan, E. Bertino, W. Pedrycz, “TrustGuard: GNN-based Robust and Explainable Trust Evaluation with Dynamicity Support”, IEEE Transactions on Dependable and Secure Computing, Vol. 21, Issue 5, pp. 4433-4450, 2024. Doi: 10.1109/TDSC.2024.3353548 (CCF A, IF: 7.329)
- H. M. Xie, Z. Yan*, “SPCEX: Secure and Privacy-preserving Cryptocurrency Exchange”, IEEE Transactions on Dependable and Secure Computing, Vol. 21, Issue 5, pp. 4404 – 4417, Sept.-Oct. 2024. Doi: 10.1109/TDSC.2024.3353541 (CCF A, IF: 7.329)
- J. J. Li, P. Wang, Z. Yan*, Y. S. Yang, K. Zeng, “BGKey: Group Key Generation for Backscatter Communications among Multiple Device”, IEEE Transactions on Information Forensics and Security, 2023. Doi: 10.1109/TIFS.2023.3345650 (CCF A, IF: 7.231)
- Y. X. Cai, W. X, Ding*, Y. X. Xiao, Z. Yan, X. M. Liu, Z. G. Wan, “SecFed: A Secure and Efficient Federated Learning based on Multi-Key Homomorphic Encryption”, IEEE Transactions on Dependable and Secure Computing, February 2023. Doi: 10.1109/TDSC.2023.3336977 (CCF A, IF: 7.329)
- S. F. Fei, Z. Yan*, H. M. Xie, G. C. Liu, “Sec-E2E: End-to-End Communication Security in LS-HetNets Based on Blockchain”, IEEE Transactions on Network Science and Engineering, Vol. 11, Issue 1, pp. 761-778, January-February 2023. Doi: DOI: 10.1109/TNSE.2023.3307884. (IF: 6.6)
- X. Xu, Q. H. Zheng, Z. Yan*, M. Fan, A. Jia, Z. H. Zhou, H. J. Wang, T. Liu, "PatchDiscovery: Patch Presence Test for Identifying Binary Vulnerabilities Based on Key Basic Blocks", IEEE Transactions on Software Engineering, 2023. Doi: 10.1109/TSE.2023.3332732 (CCF A, IF: 9.322)
- M. Kaveh*, Z. Yan, R. Jäntti, “Secrecy Performance Analysis of RIS-Aided Smart Grid Communications”, IEEE Transactions on Industrial Informatics, 2023. Doi: 10.1109/TII.2023.3333842 (IF: 12.3)
- X. K. Zhou*, X. Z. Zheng, X. S. Cui, J. H. Shi, W. Liang, Z. Yan, L. T. Yang, S. Shimizu, K. I. Wang, “Digital Twin Enhanced Federated Reinforcement Learning with Lightweight Knowledge Distillation in Mobile Networks”, IEEE Journal on Selected Areas in Communications, Vol. 41, Issue 10, pp. 3191-3211, 2023. Doi: 10.1109/JSAC.2023.3310046 (CCF A, IF: 13.081)
- Y. X. Chen*, Q. H. Zheng, Z. Yan, “Efficient Bi-objective SQL Optimization for Enclaved Cloud Databases with Differentially-Private Padding”, ACM Transactions on Database Systems, Vol. 48, No. 2, 6:1-40, May 2023. https://doi.org/10.1145/3597021 (CCF A, IF: 3.121)
- G. Liu, Z. Yan*, D. L. Wang, H. G. Wang, T. Y. Li, “DePTVM: Decentralized Pseudonym and Trust Value Management for Integrated Networks”, IEEE Transactions on Dependable and Secure Computing, February 2023. Doi: 10.1109/TDSC.2023.3246799 (CCF A, IF: 7.329)
- Y. S. Yang, Z. Yan*, K. Zeng, P. Wang, J. J. Li, “Physical Layer Authentication in Backscatter Communication: a Review”, IEEE Wireless Communications Magazine, 2022. (IF: 12.777) (Accepted)
- J. J. Li, P. Wang, L. Jiao, Z. Yan*, K. Zeng, Y. S. Yang, “Security Analysis of Triangle Channel-based Physical Layer Key Generation in Wireless Backscatter Communications”, IEEE Transactions on Information Forensics and Security, Vol. 18, pp. 948-964, 2023. Doi: 10.1109/TIFS.2022.3224852 (CCF A, IF: 7.231)
- D. Liu, Z. Yan, W. X. Ding*, Y. X. Cai, Y. X. Chen, Z. G. Wan, “ESMAC: Efficient and Secure Multi-owner Access Control with TEE in Multi-level Data Processing”, IEEE Transactions on Dependable and Secure Computing, October 2022. Doi: 10.1109/TDSC.2022.3215977 (CCF A, IF: 7.329)
- H. M. Xie, S. F. Fei, Z. Yan*, Y. Xiao, “SofitMix: A Secure Offchain-Supported Bitcoin-Compatible Mixing Protocol”, IEEE Transactions on Dependable and Secure Computing, October 2022. Doi: 10.1109/TDSC.2022.3213824 (CCF A, IF: 6.791)
- R. Zhang, Z. Yan*, X. R. Wang, R. H. Deng, “LiVoAuth: Liveness Detection in Voiceprint Authentication with Random Challenges and Detection Modes”, IEEE Transactions on Industrial Informatics, October 2022. Doi: 10.1109/TII.2022.3213830 (IF: 11.648)
- J. Wang, Z. Yan*, H. G. Wang, T. Y. Li, W. Pedrycz, “A Survey on Trust Models in Heterogeneous Networks”, IEEE Communications Surveys and Tutorials, Vol. 24, Issue 4, pp. 2127-2162, 4th quarter 2022. Doi: 10.1109/COMST.2022.3192978 (IF: 33.84)
- P. Wang, Z. Yan*, K. Zeng, “BCAuth: Physical Layer Enhanced Authentication and Attack Tracing for Backscatter Communications”, IEEE Transactions on Information Forensics and Security, Vol. 17, pp. 2818-2834, 2022. Doi: 10.1109/TIFS.2022.3195407 (CCF A, IF: 7.231)
- R. Han, Z. Yan, X. Q. Liang*, L. T. Yang, “How Can Incentive Mechanisms and Blockchain Benefit with Each Other? A Survey”, ACM Computing Surveys, Vol. 55, Issue 7, Article No. 136, pp. 1-38, 2023. https://doi.acm.org?doi=3539604 (IF: 14.324)
- S. S. Liu, Z. Yan*, “Efficient Privacy Protection Protocols for 5G-Enabled Positioning in Industrial IoT”, IEEE Internet of Things Journal, Vol. 9, Issue 19, pp. 18527-18538, October 1 2022. Doi: 0.1109/JIOT.2022.3161148 (IF: 9.936)
- P. Wang*, Z. Yan, N. Wang, K. Zeng, “Optimal Resource Allocation for Secure Multi-device Wirelessly Powered Backscatter Communications with Artificial Noise”, IEEE Transactions on Wireless Communications, Vol. 21, Issue 9, pp. 7794-7809, September 2022. Doi: 10.1109/TWC.2022.3162137 (IF: 7.016)
- X. Q. Liang, Z. Yan*, K. Raimo, “GAIMMO: A Grade-driven Auction-based Incentive Mechanism with Multiple Objectives for Decentralized Crowdsourcing”, IEEE Internet of Things Journal, Vol. 9, Issue 18, pp. 17488-17502, September 15 2022. Doi: 10.1109/JIOT.2022.3155631 (IF: 9.936)
- R. Zhang, Z. Yan*, X. R. Wang, R. H. Deng, “VOLERE: Leakage Resilient User Authentication Based on Personal Voice Challenges”, IEEE Transactions on Dependable and Secure Computing, 2022. Doi: 10.1109/TDSC.2022.3147504 (CCF A, IF: 7.329)
- Z. Yan*, X. R. Qian, S. S. Liu, R. H. Deng, “Privacy Protection in 5G Positioning and Location-Based Services Based on SGX”, ACM Transaction on Sensor Networks, Vol. 18, No. 3, 41:1-41:19, 2022. Doi: https://doi.org/10.1145/3512892 (IF: 3.52,CCF B)
- X. X. Yu, H. Bai, Z. Yan*, R. Zhang, “VeriDedup: A Verifiable Cloud Data Deduplication Scheme with Integrity and Duplication Proof”, IEEE Transactions on Dependable and Secure Computing, Vol. 20, No. 1, pp. 680-694, 2023. Doi: 10.1109/TDSC.2022.3141521 (CCF A, IF: 7.329)
- W. T. Wei, J. Wang, Z. Yan*, W. X. Ding, “EPMDroid: Efficient and Privacy-preserving Malware Detection Based on SGX through Data Fusion”, Information Fusion, Vol. 82, pp. 43-57, 2022. Doi: 10.1016/j.inffus.2021.12.006 (IF: 12.975)
- X. Y. Jing, Z. Yan*, H. Han, W. Pedrycz, “ExtendedSketch: Fusing Network Traffic for Super Host Identification with a Memory Efficient Sketch”, IEEE Transactions on Dependable and Secure Computing, Vol. 19, Issue 6, pp. 3913-3924, Nov.-Dec. 2022. Doi: 10.1109/TDSC.2021.3111328. (CCF A, IF: 7.329)
- J. L. Zhang, Z. Yan*, S. F. Fei, M. J. Wang, T. Y. Li, H. G. Wang, “Is Today’s End-to-End Communication Security Enough for 5G and Its Beyond?”, IEEE Network Magazine, Vol. 36, No. 1, pp. 105-112, Jan./Feb. 2022. Doi: 10.1109/MNET.101.2100189 (IF: 10.693)
- X. Y. Jing, Z. Yan*, H. Han, W. Pedrycz, "ExtendedSketch: Fusing Network Traffic for Super Host Identification with a Memory Efficient Sketch", IEEE Transactions on Dependable and Secure Computing, 2021. Doi: 10.1109/TDSC.2021.3111328. (CCF A, IF: 7.329)
- J. L. Zhang, Z. Yan*, S. F. Fei, M. J. Wang, T. Y. Li, H. G. Wang, “Is Today’s End-to-End Communication Security Enough for 5G and Its Beyond?”, IEEE Network Magazine, 2021. Doi: 10.1109/MNET.101.2100189 (IF: 10.693)
- Y. L. Li, S. S. Liu, Z. Yan*, R. H. Deng, “Secure 5G Positioning with Truth Discovery, Attack Detection and Tracing”, IEEE Internet of Things Journal, 2021. Doi: 10.1109/JIOT.2021.3088852 (IF: 9.936)
- X. Y. Jing, H. Han, Z. Yan*, W. Pedrycz, "SuperSketch: A Multi-Dimensional Reversible Data Structure to Compress Network Traffic for Super Host Identification", IEEE Transactions on Dependable and Secure Computing, 2021. Doi: 10.1109/TDSC.2021.3072295 (CCF A, IF: 7.329)
- S. F. Fei, Z. Yan*, W. X. Ding, H. M. Xie, “Security Vulnerabilities of SGX and Countermeasures: A Survey”, ACM Computing Surveys, Vol. 54, Issue 6, article No. 126, pp. 1-36, July 2021. Doi: http://dx.doi.org/10.1145/3456631 (IF: 6.131)
- D. S. Zhao, Z. Yan, M. J. Wang*, P. Zhang, B. Song, “Is 5G Handover Secure and Private? A Survey”, IEEE Internet of Things Journal, Vol. 8, Issue 16, pp. 12855-12879, August 2021. Doi: 10.1109/JIOT.2021.3068463 (IF: 9.936)
- J. J. Zhao, X. Y. Jing, Z. Yan*, W. Pedrycz, “Network Traffic Classification for Data Fusion: A Survey”, Information Fusion, Vol. 72, pp. 22-47, August 2021. Doi: https://doi.org/10.1016/j.inffus.2021.02.009 (IF: 13.669)
- G. Liu, Z. Yan*, W. Feng, X. Y. Jing, Y. X. Chen, M. Atiquzzaman, “SeDID: An SGX-enabled Decentralized Intrusion Detection Framework for Network Trust Evaluation”, Information Fusion, Vol. 70, pp. 100-114, June 2021. https://doi.org/10.1016/j.inffus.2021.01.003 (IF: 13.669)
- P. Wang, L. Jiao, K. Zeng, Z. Yan*, “Physical Layer Key Generation between Backscatter Devices over Ambient RF Signals”, IEEE INFOCOM 2021, Virtual Conference, May 10 - 13, 2021. (CCF A) (19.8% acceptance rate)
- X. Xu, Q. H. Zheng, Z. Yan*, M. Fan, A. Jia, T. Liu, “Interpretation-enabled Software Reuse Detection Based on a Multi-Level Birthmark Model”, the 43rd International Conference on Software Engineering (ICSE 2021), Madrid, Spain, May 23-29, 2021. (CCF A)
- X. Y. Jing, Z. Yan*, Y. H. Shen, W. Pedrycz, J. Yang, “A Group-based Distance Learning Method for Semi-supervised Fuzzy Clustering”, IEEE Transactions on Cybernetics, 2020. Doi: 0.1109/TCYB.2020.3023373. (IF: 11.470)
- X. Q. Liang, Z. Yan*, R. H. Deng, Q. H. Zheng, “Investigating the Adoption of Hybrid Encrypted Cloud Data Deduplication with Game Theory”, IEEE Transactions on Parallel and Distributed Systems, Vol. 32, Issue 3, pp. 587-600, 2020. Doi: 10.1109/TPDS.2020.3028685 (CCF A, IF: 4.640)
- X.Q. Liang, Z. Yan*, X.F. Chen, L.T. Yang, W.J. Lou, Y.T. Hou, “Game Theoretical Analysis on Encrypted Cloud Data Deduplication”, IEEE Transactions on Industrial Informatics, 2019, Doi: 10.1109/TII.2019.2920402, Early Access. (SCI, EI) (中科院一区/JCR一区, IF: 7.377)
- X.Y. Jing, Z. Yan*, W. Pedrycz, “Security Data Collection and Data Analytics in the Internet: A Survey”, IEEE Communications Surveys and Tutorials, vol. 21, issue 1, pp. 586-618, first quarter 2019. (IF: 20.23, 中科院SCI 1区)
- X.Y. Jing, Z. Yan*, X.Q. Liang, W. Pedrycz, “Network Traffic Fusion and Analysis against DDoS Flooding Attacks with a Novel Reversible Sketch”, vol. 51, pp. 100-113, Information Fusion, Nov. 2019. (IF: 6.639, 中科院SCI 1区) https://doi.org/10.1016/j.inffus.2018.10.013
- P. Wang, N. Wang, M. Dabaghchian, K. Zeng, Z. Yan, “Optimal Resource Allocation for Secure Multi-User Wireless Powered Backscatter Communication with Artificial Noise”, IEEE INFOCOM 2019. (CCF A类)
- Z. Yan*, P. Wang, W. Feng, “A Novel Scheme of Anonymous Authentication on Trust in Pervasive Social Networking”, Information Sciences, Vol. 445-446, pp. 79-96, June 2018. Doi:10.1016/j.ins.2018.02.037 (IF: 4.305, 中科院SCI 2区)
- W.X. Ding, Z. Yan*, R. H. Deng, “Privacy-Preserving Data Processing with Flexible Access Control”, IEEE Transactions on Dependable and Secure Computing, 2017. Doi: 10.1109/TDSC.2017.2786247 (IF: 4.410, CCF A类)
- M.J. Wang, Z. Yan*, “Privacy-Preserving Authentication and Key Agreement Protocols for D2D Group Communications", IEEE Transactions on Industrial Informatics, Vol. 14, issue 8, pp. 3637-3647, August 2018. (IF: 6.764, 中科院SCI 1区) Doi: 10.1109/TII.2017.2778090
- W. Feng, Z. Yan*, H.R. Zhang, K. Zeng, Y. Xiao, T. Hou, “Survey on Security, Privacy and Trust in Mobile Crowdsourcing”, IEEE Internet of Things Journal, Vol. 5 No. 4, pp. 2971-2992, August, 2018. Doi: 10.1109/JIOT.2017.2765699 (IF: 7.596, 中科院SCI 1区)
- Z. Yan*, X.Y. Jing, W. Pedrycz, “Fusing and Mining Opinions for Reputation Generation”, Information Fusion, Vol. 36, pp. 172-184, July 2017. (IF: 4.353, 中科院SCI 1区)
- Z. Yan*, W.X. Ding, X.X. Yu, H.Q. Zhu, R. H. Deng, “Deduplication on Encrypted Big Data in Cloud”, IEEE Transactions on Big Data, vol. 2, no. 2, pp. 138-150, April-June 2016. Doi: 10.1109/TBDATA.2016.2587659 (IEEE ComSoc TCBD 2017 最佳期刊论文奖)
- Z. Yan*, P. Zhang, A.V. Vasilakos, “A Survey on Trust Management for Internet of Things”, Journal of Network and Computer Applications, 42 (2014), pp. 120–134, 2014.Doi: 10.1016/j.jnca.2014.01.014i (IF: 3.50, ESI高被引, 中科院SCI 2区)
- Z. Yan*, M.J. Wang, “Protect Pervasive Social Networking based on Two Dimensional Trust Levels”, IEEE Systems Journal, Vol. 11, Issue 1, pp. 207-218, March 2017. Doi: 10.1109/JSYST.2014.2347259. (IF: 3.882, 中科院SCI 2区)
- Z. Yan*, C. Prehofer, “Autonomic Trust Management for a Component Based Software System”, IEEE Transactions on Dependable and Secure Computing, Vol. 8, No. 6, pp. 810-823, 2011. (IF: 2.926, CCF A类)