Xidian Meeting Xidian Guide About Help Search Home Login Control Panel AddBookMark Yan Zheng's MessageBoard
Publications
  • 380+ peer-reviewed scientific and technical articles including 230+ English journal articles; 2 solely authored books; 11 conference proceedings, and 16 book chapters. 260+ journal and conference papers were first or correspondingly authored. Many paper articles were published in highly reputable journals and conferences, such as IEEE SP, IEEE TIFS, IEEE TII, IEEE TDSC, IEEE TVT, IEEE TPDS, IEEE TCYB, ACM TOMM, ACM TPCS, IEEE IoT, IEEE TCC, IEEE TBD, IEEE TCSS, JCSS, Information Sciences, Information Fusion, IEEE INFOCOM, ICSE, IEEE GLOBECOM, IEEE ICC, etc.  (refer to full publication list)
  • 107 granted patents (56 US/EP/JP patents) and 50 PCT patent applications (30 sole inventions). 130+ patents and patent applications have been adopted by telecom industry. A co-author of Nokia’s proposal for DVB-CPCM standard. Several granted patents have been adopted by international standards (e.g., ISO/IEC M3W, TCG, and DVB-CPCM); 
  • More than 40 invited talks at international conferences, world famous companies, and reputable universities; one talk at Future Internet SHOK Review Seminar in Feb. 2011, Finland. 
Selected Recent Publications
  1. J. H. Lan, J. Wang, B. C. Yan, Z. Yan*, E. Bertino, “FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge”, The 45th IEEE Symposium on Security and Privacy (S&P 2024), San Francisco, CA, 2024. (CCF A, 14.9% acceptance rate, Security BIG4 Conference)
  2. J. J. Li, P. Wang, Z. Yan*, Y. S. Yang, K. Zeng, “BGKey: Group Key Generation for Backscatter Communications among Multiple Device”, IEEE Transactions on Information Forensics and Security, 2023. Doi: 10.1109/TIFS.2023.3345650 (CCF A, IF: 7.231)
  3. Y. X. Cai, W. X, Ding*, Y. X. Xiao, Z. Yan, X. M. Liu, Z. G. Wan, “SecFed: A Secure and Efficient Federated Learning based on Multi-Key Homomorphic Encryption”, IEEE Transactions on Dependable and Secure Computing, February 2023. Doi: 10.1109/TDSC.2023.3336977 (CCF A, IF: 7.329)
  4. X. Xu, Q. H. Zheng, Z. Yan*, M. Fan, A. Jia, Z. H. Zhou, H. J. Wang, T. Liu, "PatchDiscovery: Patch Presence Test for Identifying Binary Vulnerabilities Based on Key Basic Blocks", IEEE Transactions on Software Engineering, 2023. Doi: 10.1109/TSE.2023.3332732 (CCF A, IF: 9.322)
  5. M. Kaveh*, Z. Yan, R. Jäntti, “Secrecy Performance Analysis of RIS-Aided Smart Grid Communications”, IEEE Transactions on Industrial Informatics, 2023. Doi: 10.1109/TII.2023.3333842 (IF: 12.3)
  6. X. K. Zhou*, X. Z. Zheng, X. S. Cui, J. H. Shi, W. Liang, Z. Yan, L. T. Yang, S. Shimizu, K. I. Wang, “Digital Twin Enhanced Federated Reinforcement Learning with Lightweight Knowledge Distillation in Mobile Networks”, IEEE Journal on Selected Areas in Communications, Vol. 41, Issue 10, pp. 3191-3211, 2023. Doi: 10.1109/JSAC.2023.3310046 (CCF A, IF: 13.081)
  7. Y. X. Chen*, Q. H. Zheng, Z. Yan, “Efficient Bi-objective SQL Optimization for Enclaved Cloud Databases with Differentially-Private Padding”, ACM Transactions on Database Systems, Vol. 48, No. 2, 6:1-40, May 2023. https://doi.org/10.1145/3597021 (CCF A, IF: 3.121)
  8. G. Liu, Z. Yan*, D. L. Wang, H. G. Wang, T. Y. Li, “DePTVM: Decentralized Pseudonym and Trust Value Management for Integrated Networks”, IEEE Transactions on Dependable and Secure Computing, February 2023. Doi: 10.1109/TDSC.2023.3246799 (CCF A, IF: 7.329)
  9. Y. S. Yang, Z. Yan*, K. Zeng, P. Wang, J. J. Li, “Physical Layer Authentication in Backscatter Communication: a Review”, IEEE Wireless Communications Magazine, 2022. (IF: 12.777) (Accepted)
  10. J. J. Li, P. Wang, L. Jiao, Z. Yan*, K. Zeng, Y. S. Yang, “Security Analysis of Triangle Channel-based Physical Layer Key Generation in Wireless Backscatter Communications”, IEEE Transactions on Information Forensics and Security, Vol. 18, pp. 948-964, 2023. Doi: 10.1109/TIFS.2022.3224852 (CCF A, IF: 7.231)
  11. D. Liu, Z. Yan, W. X. Ding*, Y. X. Cai, Y. X. Chen, Z. G. Wan, “ESMAC: Efficient and Secure Multi-owner Access Control with TEE in Multi-level Data Processing”, IEEE Transactions on Dependable and Secure Computing, October 2022. Doi: 10.1109/TDSC.2022.3215977 (CCF A, IF: 7.329)
  12. H. M. Xie, S. F. Fei, Z. Yan*, Y. Xiao, “SofitMix: A Secure Offchain-Supported Bitcoin-Compatible Mixing Protocol”, IEEE Transactions on Dependable and Secure Computing, October 2022. Doi: 10.1109/TDSC.2022.3213824 (CCF A, IF: 6.791)
  13. R. Zhang, Z. Yan*, X. R. Wang, R. H. Deng, “LiVoAuth: Liveness Detection in Voiceprint Authentication with Random Challenges and Detection Modes”, IEEE Transactions on Industrial Informatics, October 2022. Doi: 10.1109/TII.2022.3213830 (IF: 11.648)
  14. J. Wang, Z. Yan*, H. G. Wang, T. Y. Li, W. Pedrycz, “A Survey on Trust Models in Heterogeneous Networks”, IEEE Communications Surveys and Tutorials, Vol. 24, Issue 4, pp. 2127-2162, 4th quarter 2022. Doi: 10.1109/COMST.2022.3192978 (IF: 33.84)
  15. P. Wang, Z. Yan*, K. Zeng, “BCAuth: Physical Layer Enhanced Authentication and Attack Tracing for Backscatter Communications”, IEEE Transactions on Information Forensics and Security, Vol. 17, pp. 2818-2834, 2022. Doi: 10.1109/TIFS.2022.3195407 (CCF A, IF: 7.231)
  16. R. Han, Z. Yan, X. Q. Liang*, L. T. Yang, “How Can Incentive Mechanisms and Blockchain Benefit with Each Other? A Survey”, ACM Computing Surveys, Vol. 55, Issue 7, Article No. 136, pp. 1-38, 2023. https://doi.acm.org?doi=3539604 (IF: 14.324)
  17. S. S. Liu, Z. Yan*, “Efficient Privacy Protection Protocols for 5G-Enabled Positioning in Industrial IoT”, IEEE Internet of Things Journal, Vol. 9, Issue 19, pp. 18527-18538, October 1 2022. Doi: 0.1109/JIOT.2022.3161148 (IF: 9.936)
  18. P. Wang*, Z. Yan, N. Wang, K. Zeng, “Optimal Resource Allocation for Secure Multi-device Wirelessly Powered Backscatter Communications with Artificial Noise”, IEEE Transactions on Wireless Communications, Vol. 21, Issue 9, pp. 7794-7809, September 2022. Doi: 10.1109/TWC.2022.3162137 (IF: 7.016)
  19. X. Q. Liang, Z. Yan*, K. Raimo, “GAIMMO: A Grade-driven Auction-based Incentive Mechanism with Multiple Objectives for Decentralized Crowdsourcing”, IEEE Internet of Things Journal, Vol. 9, Issue 18, pp. 17488-17502, September 15 2022. Doi: 10.1109/JIOT.2022.3155631 (IF: 9.936)
  20. R. Zhang, Z. Yan*, X. R. Wang, R. H. Deng, “VOLERE: Leakage Resilient User Authentication Based on Personal Voice Challenges”, IEEE Transactions on Dependable and Secure Computing, 2022. Doi: 10.1109/TDSC.2022.3147504 (CCF A, IF: 7.329)
  21. Z. Yan*, X. R. Qian, S. S. Liu, R. H. Deng, “Privacy Protection in 5G Positioning and Location-Based Services Based on SGX”, ACM Transaction on Sensor Networks, Vol. 18, No. 3, 41:1-41:19, 2022. Doi: https://doi.org/10.1145/3512892 (IF: 3.52CCF B)
  22. X. X. Yu, H. Bai, Z. Yan*, R. Zhang, “VeriDedup: A Verifiable Cloud Data Deduplication Scheme with Integrity and Duplication Proof”, IEEE Transactions on Dependable and Secure Computing, Vol. 20, No. 1, pp. 680-694, 2023. Doi: 10.1109/TDSC.2022.3141521 (CCF A, IF: 7.329)
  23. W. T. Wei, J. Wang, Z. Yan*, W. X. Ding, “EPMDroid: Efficient and Privacy-preserving Malware Detection Based on SGX through Data Fusion”, Information Fusion, Vol. 82, pp. 43-57, 2022. Doi: 10.1016/j.inffus.2021.12.006 (IF: 12.975)
  24. X. Y. Jing, Z. Yan*, H. Han, W. Pedrycz, “ExtendedSketch: Fusing Network Traffic for Super Host Identification with a Memory Efficient Sketch”, IEEE Transactions on Dependable and Secure Computing, Vol. 19, Issue 6, pp. 3913-3924, Nov.-Dec. 2022. Doi: 10.1109/TDSC.2021.3111328. (CCF A, IF: 7.329)
  25. J. L. Zhang, Z. Yan*, S. F. Fei, M. J. Wang, T. Y. Li, H. G. Wang, “Is Today’s End-to-End Communication Security Enough for 5G and Its Beyond?”, IEEE Network Magazine, Vol. 36, No. 1, pp. 105-112, Jan./Feb. 2022. Doi: 10.1109/MNET.101.2100189 (IF: 10.693)
  26. X. Y. Jing, Z. Yan*, H. Han, W. Pedrycz, "ExtendedSketch: Fusing Network Traffic for Super Host Identification with a Memory Efficient Sketch", IEEE Transactions on Dependable and Secure Computing, 2021. Doi: 10.1109/TDSC.2021.3111328. (CCF A, IF: 7.329)
  27. J. L. Zhang, Z. Yan*, S. F. Fei, M. J. Wang, T. Y. Li, H. G. Wang, “Is Today’s End-to-End Communication Security Enough for 5G and Its Beyond?”, IEEE Network Magazine, 2021. Doi: 10.1109/MNET.101.2100189 (IF: 10.693)
  28. Y. L. Li, S. S. Liu, Z. Yan*, R. H. Deng, “Secure 5G Positioning with Truth Discovery, Attack Detection and Tracing”, IEEE Internet of Things Journal, 2021. Doi: 10.1109/JIOT.2021.3088852 (IF: 9.936)
  29. X. Y. Jing, H. Han, Z. Yan*, W. Pedrycz, "SuperSketch: A Multi-Dimensional Reversible Data Structure to Compress Network Traffic for Super Host Identification", IEEE Transactions on Dependable and Secure Computing, 2021. Doi: 10.1109/TDSC.2021.3072295 (CCF A, IF: 7.329)
  30. S. F. Fei, Z. Yan*, W. X. Ding, H. M. Xie, “Security Vulnerabilities of SGX and Countermeasures: A Survey”, ACM Computing Surveys, Vol. 54, Issue 6, article No. 126, pp. 1-36, July 2021. Doi: http://dx.doi.org/10.1145/3456631 (IF: 6.131)
  31. D. S. Zhao, Z. Yan, M. J. Wang*, P. Zhang, B. Song, “Is 5G Handover Secure and Private? A Survey”, IEEE Internet of Things Journal, Vol. 8, Issue 16, pp. 12855-12879, August 2021. Doi: 10.1109/JIOT.2021.3068463 (IF: 9.936)
  32. J. J. Zhao, X. Y. Jing, Z. Yan*, W. Pedrycz, “Network Traffic Classification for Data Fusion: A Survey”, Information Fusion, Vol. 72, pp. 22-47, August 2021. Doi: https://doi.org/10.1016/j.inffus.2021.02.009 (IF: 13.669)
  33. G. Liu, Z. Yan*, W. Feng, X. Y. Jing, Y. X. Chen, M. Atiquzzaman, “SeDID: An SGX-enabled Decentralized Intrusion Detection Framework for Network Trust Evaluation”, Information Fusion, Vol. 70, pp. 100-114, June 2021. https://doi.org/10.1016/j.inffus.2021.01.003 (IF: 13.669)
  34. P. Wang, L. Jiao, K. Zeng, Z. Yan*, “Physical Layer Key Generation between Backscatter Devices over Ambient RF Signals”, IEEE INFOCOM 2021, Virtual Conference, May 10 - 13, 2021. (CCF A) (19.8% acceptance rate)
  35. X. Xu, Q. H. Zheng, Z. Yan*, M. Fan, A. Jia, T. Liu, “Interpretation-enabled Software Reuse Detection Based on a Multi-Level Birthmark Model”, the 43rd International Conference on Software Engineering (ICSE 2021), Madrid, Spain, May 23-29, 2021. (CCF A)
  36. X. Y. Jing, Z. Yan*, Y. H. Shen, W. Pedrycz, J. Yang, “A Group-based Distance Learning Method for Semi-supervised Fuzzy Clustering”, IEEE Transactions on Cybernetics, 2020. Doi: 0.1109/TCYB.2020.3023373. (IF: 11.470)
  37. X. Q. Liang, Z. Yan*, R. H. Deng, Q. H. Zheng, “Investigating the Adoption of Hybrid Encrypted Cloud Data Deduplication with Game Theory”, IEEE Transactions on Parallel and Distributed Systems, Vol. 32, Issue 3, pp. 587-600, 2020. Doi: 10.1109/TPDS.2020.3028685 (CCF A, IF: 4.640)
  38. X.Q. Liang, Z. Yan*, X.F. Chen, L.T. Yang, W.J. Lou, Y.T. Hou, “Game Theoretical Analysis on Encrypted Cloud Data Deduplication”, IEEE Transactions on Industrial Informatics, 2019, Doi: 10.1109/TII.2019.2920402, Early Access. (SCI, EI) (中科院一区/JCR一区, IF: 7.377)
  39. X.Y. Jing, Z. Yan*, W. Pedrycz, “Security Data Collection and Data Analytics in the Internet: A Survey”, IEEE Communications Surveys and Tutorials, vol. 21, issue 1, pp. 586-618, first quarter 2019. (IF: 20.23, 中科院SCI 1区)
  40. X.Y. Jing, Z. Yan*, X.Q. Liang, W. Pedrycz, “Network Traffic Fusion and Analysis against DDoS Flooding Attacks with a Novel Reversible Sketch”, vol. 51, pp. 100-113, Information Fusion, Nov. 2019. (IF: 6.639, 中科院SCI 1区) https://doi.org/10.1016/j.inffus.2018.10.013
  41. P. Wang, N. Wang, M. Dabaghchian, K. Zeng, Z. Yan, “Optimal Resource Allocation for Secure Multi-User Wireless Powered Backscatter Communication with Artificial Noise”, IEEE INFOCOM 2019. (CCF A)
  42. Z. Yan*, P. Wang, W. Feng, “A Novel Scheme of Anonymous Authentication on Trust in Pervasive Social Networking”, Information Sciences, Vol. 445-446, pp. 79-96, June 2018. Doi:10.1016/j.ins.2018.02.037 (IF: 4.305, 中科院SCI 2)
  43. W.X. Ding, Z. Yan*, R. H. Deng, “Privacy-Preserving Data Processing with Flexible Access Control”, IEEE Transactions on Dependable and Secure Computing, 2017. Doi: 10.1109/TDSC.2017.2786247 (IF: 4.410, CCF A)
  44. M.J. Wang, Z. Yan*, “Privacy-Preserving Authentication and Key Agreement Protocols for D2D Group Communications", IEEE Transactions on Industrial Informatics, Vol. 14, issue 8, pp. 3637-3647, August 2018. (IF: 6.764, 中科院SCI 1) Doi: 10.1109/TII.2017.2778090
  45. W. Feng, Z. Yan*, H.R. Zhang, K. Zeng, Y. Xiao, T. Hou, “Survey on Security, Privacy and Trust in Mobile Crowdsourcing”, IEEE Internet of Things Journal, Vol. 5 No. 4, pp. 2971-2992, August, 2018. Doi: 10.1109/JIOT.2017.2765699 (IF: 7.596, 中科院SCI 1区)
  46. Z. Yan*, X.Y. Jing, W. Pedrycz, “Fusing and Mining Opinions for Reputation Generation”, Information Fusion, Vol. 36, pp. 172-184, July 2017.  (IF: 4.353, 中科院SCI 1区)
  47. Z. Yan*, W.X. Ding, X.X. Yu, H.Q. Zhu, R. H. Deng, “Deduplication on Encrypted Big Data in Cloud”, IEEE Transactions on Big Data, vol. 2, no. 2, pp. 138-150, April-June 2016. Doi: 10.1109/TBDATA.2016.2587659 (IEEE ComSoc TCBD 2017 最佳期刊论文奖)
  48. Z. Yan*, P. Zhang, A.V. Vasilakos, “A Survey on Trust Management for Internet of Things”, Journal of Network and Computer Applications, 42 (2014), pp. 120–134, 2014.Doi: 10.1016/j.jnca.2014.01.014i (IF: 3.50, ESI高被引, 中科院SCI 2)
  49. Z. Yan*, M.J. Wang, “Protect Pervasive Social Networking based on Two Dimensional Trust Levels”, IEEE Systems Journal, Vol. 11, Issue 1, pp. 207-218, March 2017.  Doi: 10.1109/JSYST.2014.2347259. (IF: 3.882, 中科院SCI 2)
  50. Z. Yan*, C. Prehofer, “Autonomic Trust Management for a Component Based Software System”, IEEE Transactions on Dependable and Secure Computing, Vol. 8, No. 6, pp. 810-823, 2011. (IF: 2.926, CCF A)
Citations

    Google Scholar: https://scholar.google.com/citations?user=Q0FDt9gAAAAJ&hl=zh-CN&oi=sra

    DBLP: https://dblp.org/pid/43/180-2.html