共发表论文410+篇,其中第一和通信作者270多篇,单篇论文最高他引量为1400+。
独立编著一本关于信任模型和管理的英文专著,独立撰写一部关于实用自治信任管理的英文专著。主编国际会议录12部。
114项授权专利(58项US/EU/JP国际专利授权,23项国际专利群)及50项PCT专利(独立发明30项);24项美国专利申请、27项欧盟专利申请、46项中国专利申请。
若干授权国际专利已被国际标准采纳,一些专利技术已广泛应用 。
在国际会议及欧美等知名高校特邀报告60余次。
Google Scholar: https://scholar.google.com/citations?user=Q0FDt9gAAAAJ&hl=zh-CN&oi=sra
DBLP: https://dblp.org/pid/43/180-2.html
1. W.X. Ding, Z. Yan*, R. H. Deng, “Privacy-Preserving Data Processing with Flexible Access Control”, IEEE Trans on Dependable and Secure Computing, 2017. Doi: 10.1109/TDSC.2017.2786247 (IF: 2.926)
2. M.J. Wang, Z. Yan*, “Privacy-Preserving Authentication and Key Agreement Protocols for D2D Group Communications", IEEE Transactions on Industrial Informatics, 2017. (IF: 6.764) Doi: 10.1109/TII.2017.2778090
3. Zhuo Wei, Yongdong Wu, Zheng Yan, Yanjiang Yang, Qingqi Pei, Yajuan Xie, Jian Weng, “AutoPrivacy: Automatic Privacy Protection and Tagging Suggestion for Mobile Social Photo”, Computers and Security, 2017. (accepted)
4. Jun Feng, Laurence T. Yang, Guohui Dai, Jinjun Chen, and Zheng Yan, “An Improved Secure High-Order-Lanczos Based Orthogonal Tensor SVD for Cyber-Physical-Social Big Data Reduction”, IEEE Trans. On Big Data, 2017. (accepted)
5. X.Q. Liang, Z. Yan*, A Survey on Game Theoretical Methods in Human-Machine Networks , Future Generation Computer Systems, 2017. (invited paper) (IF: 3.997) Doi: 10.1016/j.future.2017.10.051
6. Linfeng Wei, Weiqi Luo, Jian Weng, Yanjun Zhong, Xiaoqian Zhang, and Zheng Yan, “Machine Learning-based Malicious Application Detection of Android”, IEEE Access, 2017. Doi: 10.1109/ACCESS.2017.2771470
7. W. Feng, Z. Yan*, H.R. Zhang, K. Zeng, Y. Xiao, T. Hou, “Survey on Security, Privacy and Trust in Mobile Crowdsourcing”, IEEE Internet of Things Journal, 2017. Doi: 10.1109/JIOT.2017.2765699 (IF: 7.596)
8. F.Y. Tian, P. Zhang, Z. Yan*, “A Survey on C-RAN Security”, IEEE Access, 2017. Doi: 10.1109/ACCESS.2017.2717852
9. W.X. Ding, Z. Yan*, R.H. Deng, “Encrypted Data Processing with Homomorphic Re-Encryption”, Information Sciences, 2017. Doi: 10.1016/j.ins.2017.05.004
10. Rui Li, Qinghua Zheng, Xiuqi Li, Zheng Yan, “Multi-Objective Optimization for Rebalancing Virtual Machine Placement”, Future Generation Computer Systems, 2017. (accepted) (IF: 3.997)
11. Y.L. Fu, Z. Yan, H. Li, X.L. Xin, J. Cao, “A Secure SDN based Multi-RANs Architecture for Future 5G Networks”, Computers and Security, 2017. (accepted) (IF: 2.849)
12. Z. Yan*, L.F. Zhang, W.X. Ding, Q.H. Zheng, “Heterogeneous Data Storage Management with Deduplication in Cloud Computing”, IEEE Transactions on Big Data, 2017. Doi: 10.1109/TBDATA.2017.2701352
13. Z. Yan*, J. Liu, L.T. Yang, N. Chawla, “Big Data Fusion in Internet of Things, Information Fusion”, April, 2017. Doi: 10.1016/j.inffus.2017.04.005
14. P. Yan, Z. Yan*, “A Survey on Dynamic Mobile Malware Detection”, Software Quality Journal, 2017. DOI: 10.1007/s11219-017-9368-4
15. X.X.Yu, Z. Yan*, A.V. Vasilakos,“A Survey of Verifiable Computation”, Mobile Networks and Applications, Springer, 2017. (accepted)
16. Z Yan*, X.X. Yu, W.X. Ding, Context-Aware Verifiable Cloud Computing, IEEE Access, 2016. (accepted)
17. M.J. Wang, Z. Yan*, V. Niemi, “UAKA-D2D: Universal Authentication and Key Agreement Protocol in D2D Communications", Mobile Networks and Applications, Springer, 2017. (accepted)
18. W. Feng, Z. Yan*, H.M. Xie, "Anonymous Authentication on Trust in Pervasive Social Networking Based on Group Signature", IEEE Access, 2017.
1. Z. Yan*, X.Y. Jing, W. Pedrycz, “Fusing and Mining Opinions for Reputation Generation”, Information Fusion, 2016. (accepted) (IF: 4.353)
2. Z. Yan*, W.Y. Shi, “CloudFile: A Cloud Data Access Control System based on Mobile Social Trust”, Journal of Network and Computer Applications, 2016. Doi: 10.1016/j.jnca.2016.11.016. (IF: 2.331)
3. Z. Yan*, W.X. Ding, X.X. Yu, H.Q. Zhu, R. H. Deng, “Deduplication on Encrypted Big Data in Cloud”, IEEE Transactions on Big Data, vol. 2, no. 2, pp. 138-150, April-June 2016. Doi: 10.1109/TBDATA.2016.2587659
4. C.Y. Huang, Z. Yan*, N. Li, M. J. Wang, “Secure Pervasive Social Communications based on Trust in a Distributed Way”, IEEE Access, 2016.
5. L.J. Gao, Z. Yan*, L.T. Yang "Game Theoretical Analysis on Acceptance of a Cloud Data Access Control System Based on Reputation", IEEE Transactions on Cloud Computing, 2016. (accepted)
6. F. Tong, Z. Yan*, A Hybrid Approach of Mobile Malware Detection in Android, Journal of Parallel and Distributed Computing, 2016. Doi: 10.1016/j.jpdc.2016.10.012 (IF: 1.320)
7. Z. Yan*, R.H. Deng, V. Varadharajan, “Cryptography and Data Security in Cloud Computing”, Information Sciences, 2016. (IF: 4.098)
8. Z. Yan*, V. Niemi, L.T. Yang, “Key Technologies for 5G, the Next Generation of Mobile Networks and Services”, International Journal of Communication Systems, 2016. Doi: 10.1002/dac.3226
9. J. Liu, Z. Yan, A.V. Vasilakos, and L.T. Yang, “Data Mining in Cyber, Physical and Social Computing”, IEEE Systems Journal, 2016.
10. W.X. Ding, Z. Yan*, R. H. Deng, “A Survey on Future Internet Security Architectures”, IEEE Access, 2016. Doi: 10.1109/ACCESS.2016.2596705 (IF: 1.27) (invited)
11. Z. Yan*, J. Liu, R.H. Deng, F. Herrera, “Trust Management for Multimedia Big Data”, ACM Transactions on Multimedia Computing Communications and Applications, vol. 12, no. 4s, Article 57, 2 pages, August 2016. Doi: http://dx.doi.org/10.1145/2978431 (IF: 2.46)
12. L.F. Zhang, Z. Yan*, R. Kantola, “Privacy-Preserving Trust Management for Unwanted Traffic Control”, Future Generation Computer Systems, 2016. Doi: 10.1016/j.future.2016.06.036 (IF: 2.43)
13. Z. Yan*, M.J. Wang, Y.X. Li, A.V. Vasilakos, “Encrypted Data Management with Deduplication in Cloud Computing”, IEEE Cloud Computing Magazine, 3(2), pp. 28-35, 2016.
14. M.J. Wang, Z. Yan*, “A Survey on Security in D2D Communications”, Mobile Networks and Applications, Springer, 2016. Doi: 10.1007/s11036-016-0741-5 (IF: 1.538)
15. Z. Yan*, W. Feng, P. Wang, “Anonymous Authentication for Trustworthy Pervasive Social Networking”, IEEE Transactions on Computational Social Systems, 2(3), pp. 88-98, Feb. 2016. Doi:10.1109/TCSS.2016.2519463
16. Zhuo Wei, Z. Yan, Yongdong, Wu, R. H. Deng, “Trustworthy Authentication on Scalable Surveillance Video with Background Model Support”, ACM Transactions on Multimedia Computing Communications and Applications, accepted, 2016. (IF: 2.46)
17. L. Kuang, L.T. Yang, S.C. Rho, Z. Yan, K. Qiu, “An Efficient Tensor-based fr[ant]amework for Software-defined Big Data Center”, ACM Transactions on Multimedia Computing Communications and Applications, 2016. (IF: 2.46)