学术信息网 西电导航 关于 使用说明 搜索 系统首页 登录 控制面板 收藏 闫峥的留言板
学术成果

共发表论文410+篇,其中第一和通信作者270多篇,单篇论文最高他引量为1400+。

独立编著一本关于信任模型和管理的英文专著,独立撰写一部关于实用自治信任管理的英文专著。主编国际会议录12部。

114项授权专利(58项US/EU/JP国际专利授权,23项国际专利群)及50项PCT专利(独立发明30项);24项美国专利申请、27项欧盟专利申请、46项中国专利申请。

若干授权国际专利已被国际标准采纳,一些专利技术已广泛应用 。

在国际会议及欧美等知名高校特邀报告60余次。

近期代表性著作(部分)
  1. P. P. Han, Z. Yan*, L. T. Yang, E. Bertino, “P2C2T: Preserving the Privacy of Cross-Chain Transfer”, The 46th IEEE Symposium on Security and Privacy (S&P 2025), San Francisco, CA, 2025. (CCF A, 14.3% acceptance rate)
  2. J. H. Lan, J. Wang, B. C. Yan, Z. Yan*, E. Bertino, “FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge”, The 45th IEEE Symposium on Security and Privacy (S&P 2024), San Francisco, CA, 2024. (CCF A, 14.9% acceptance rate)
  3. Y. S. Yang, J. J. Li, N. Y. Luo, Z. Yan*, Y. F. Zhang, K. Zeng, “BatchAuth: A Physical Layer Batch Authentication Scheme for Multiple Backscatter Devices”, IEEE Transactions on Information Forensics and Security, Vol. 19, pp. 9452-9466, 2024. Doi: 10.1109/TIFS.2024.3473322 (CCF A, IF: 6.3)
  4. J. Wang, Z. Yan*, J. H. Lan, E. Bertino, W. Pedrycz, “TrustGuard: GNN-based Robust and Explainable Trust Evaluation with Dynamicity Support”, IEEE Transactions on Dependable and Secure Computing, Vol. 21, Issue 5, pp. 4433-4450, 2024. Doi: 10.1109/TDSC.2024.3353548 (CCF A, IF: 7.329)
  5. H. M. Xie, Z. Yan*, “SPCEX: Secure and Privacy-preserving Cryptocurrency Exchange”, IEEE Transactions on Dependable and Secure Computing, Vol. 21, Issue 5, pp. 4404 – 4417, Sept.-Oct. 2024. Doi: 10.1109/TDSC.2024.3353541 (CCF A, IF: 7.329)
  6. J. J. Li, P. Wang, Z. Yan*, Y. S. Yang, K. Zeng, “BGKey: Group Key Generation for Backscatter Communications among Multiple Device”, IEEE Transactions on Information Forensics and Security, 2023. Doi: 10.1109/TIFS.2023.3345650 (CCF A, IF: 7.231)
  7. Y. X. Cai, W. X, Ding*, Y. X. Xiao, Z. Yan, X. M. Liu, Z. G. Wan, “SecFed: A Secure and Efficient Federated Learning based on Multi-Key Homomorphic Encryption”, IEEE Transactions on Dependable and Secure Computing, February 2023. Doi: 10.1109/TDSC.2023.3336977 (CCF A, IF: 7.329)
  8. X. Xu, Q. H. Zheng, Z. Yan*, M. Fan, A. Jia, Z. H. Zhou, H. J. Wang, T. Liu, "PatchDiscovery: Patch Presence Test for Identifying Binary Vulnerabilities Based on Key Basic Blocks", IEEE Transactions on Software Engineering, 2023. Doi: 10.1109/TSE.2023.3332732 (CCF A, IF: 9.322)
  9. M. Kaveh*, Z. Yan, R. Jäntti, “Secrecy Performance Analysis of RIS-Aided Smart Grid Communications”, IEEE Transactions on Industrial Informatics, 2023. Doi: 10.1109/TII.2023.3333842 (IF: 12.3)
  10. X. K. Zhou*, X. Z. Zheng, X. S. Cui, J. H. Shi, W. Liang, Z. Yan, L. T. Yang, S. Shimizu, K. I. Wang, “Digital Twin Enhanced Federated Reinforcement Learning with Lightweight Knowledge Distillation in Mobile Networks”, IEEE Journal on Selected Areas in Communications, Vol. 41, Issue 10, pp. 3191-3211, 2023. Doi: 10.1109/JSAC.2023.3310046 (CCF A, IF: 13.081)
  11. Y. X. Chen*, Q. H. Zheng, Z. Yan, “Efficient Bi-objective SQL Optimization for Enclaved Cloud Databases with Differentially-Private Padding”, ACM Transactions on Database Systems, Vol. 48, No. 2, 6:1-40, May 2023. https://doi.org/10.1145/3597021 (CCF A, IF: 3.121)
  12. G. Liu, Z. Yan*, D. L. Wang, H. G. Wang, T. Y. Li, “DePTVM: Decentralized Pseudonym and Trust Value Management for Integrated Networks”, IEEE Transactions on Dependable and Secure Computing, February 2023. Doi: 10.1109/TDSC.2023.3246799 (CCF A, IF: 7.329)
  13. J. J. Li, P. Wang, L. Jiao, Z. Yan*, K. Zeng, Y. S. Yang, “Security Analysis of Triangle Channel-based Physical Layer Key Generation in Wireless Backscatter Communications”, IEEE Transactions on Information Forensics and Security, Vol. 18, pp. 948-964, 2023. Doi: 10.1109/TIFS.2022.3224852 (CCF A, IF: 7.231)
  14. H. Han, X. Y. Jing, Z. Yan*, W. Pedrycz, “ExtendedSketch+: Super Host Identification and Network Host Trust Evaluation with Memory Efficiency and High Accuracy”, Information Fusion, Vol. 92, pp. 300-312, 2023. Doi: https://doi.org/10.1016/j.inffus.2022.12.009 (IF: 17.564)
  15. Y. S. Yang, Z. Yan*, K. Zeng, P. Wang, J. J. Li, “Physical Layer Authentication in Backscatter Communication: a Review”, IEEE Wireless Communication Magazine, 2022. (IF: 12.777) (Accepted)
  16. M. J. Wang, D. S. Zhao, Z. Yan*, H. G. Wang. T. Y. Li, “XAuth: Secure and Privacy-Preserving Cross-Domain Handover Authentication for 5G HetNets”, IEEE Internet of Things Journal, 2022. Doi: 10.1109/JIOT.2022.3223223 (IF: 10.238)
  17. D. Liu, Z. Yan, W. X. Ding*, Y. X. Cai, Y. X. Chen, Z. G. Wan, “ESMAC: Efficient and Secure Multi-owner Access Control with TEE in Multi-level Data Processing”, IEEE Transactions on Dependable and Secure Computing, 2022. Doi: 10.1109/TDSC.2022.3215977 (CCF A, IF: 7.329)
  18. Z. Liu, C. Z. Hu, C. Shan*, Z. Yan, “ADCaDeM: A Novel Method of Calculating Attack Damage Based on Differential Manifolds”, IEEE Transactions on Dependable and Secure Computing, October 2022. Doi: 10.1109/TDSC.2022.3214809 (CCF A, IF: 7.329)
  19. H. M. Xie, S. F. Fei, Z. Yan*, Y. Xiao, “SofitMix: A Secure Offchain-Supported Bitcoin-Compatible Mixing Protocol”, IEEE Transactions on Dependable and Secure Computing, October 2022. Doi: 10.1109/TDSC.2022.3213824 (CCF A, IF: 6.791)
  20. R. Zhang, Z. Yan*, X. R. Wang, R. H. Deng, “LiVoAuth: Liveness Detection in Voiceprint Authentication with Random Challenges and Detection Modes”, IEEE Transactions on Industrial Informatics, October 2022. Doi: 10.1109/TII.2022.3213830 (IF: 11.648)
  21. Z. Yan*, L. T. Yang, T. Y. Li, Y. Miche, S. Yu, S. Yau, “Special Issue Editorial: Trust, Security and Privacy of 6G”, IEEE Network Magazine, July/August 2022.
  22. P. Wang, H. C. Gao, X. Y. Guo, C. X. Xiao, F. Q. Qi, Z. Yan, “An Experimental Investigation of Text-based CAPTCHA Attacks and Their Robustness”, ACM Computing Surveys, 2022. Doi: https://doi.acm.org?doi=3559754 (accepted) (IF: 10.28)
  23. K. Yan, X. Chen, X. K. Zhou, Z. Yan, and J. Ma, “Physical Model Informed Fault Detection and Diagnosis of Air Handling Units Based on Transformer Generative Adversarial Network,” IEEE Transactions on Industrial Informatics, July. 2022. Doi: 10.1109/TII.2022.3193733 (IF: 11.648)
  24. J. Wang, Z. Yan*, H. G. Wang, T. Y. Li, W. Pedrycz, “A Survey on Trust Models in Heterogeneous Networks”, IEEE Communications Surveys and Tutorials, 2022. Doi: 10.1109/COMST.2022.3192978 (IF: 33.84)
  25. P. Wang, Z. Yan*, K. Zeng, “BCAuth: Physical Layer Enhanced Authentication and Attack Tracing for Backscatter Communications”, IEEE Transactions on Information Forensics and Security, Vol. 17, pp. 2818-2834, 2022. Doi: 10.1109/TIFS.2022.3195407 (CCF A, IF: 7.231)
  26. R. Han, Z. Yan, X. Q. Liang*, L. T. Yang, “How Can Incentive Mechanisms and Blockchain Benefit with Each Other? A Survey”, ACM Computing Surveys, 2022. https://doi.acm.org?doi=3539604 (IF: 10.28)
  27. S. S. Liu, Z. Yan*, “Efficient Privacy Protection Protocols for 5G-Enabled Positioning in Industrial IoT”, IEEE Internet of Things Journal, Vol. 9, Issue 19, pp. 18527-18538, October 1 2022. Doi: 0.1109/JIOT.2022.3161148 (IF: 9.936)
  28. P. Wang*, Z. Yan, N. Wang, K. Zeng, “Optimal Resource Allocation for Secure Multi-device Wirelessly Powered Backscatter Communications with Artificial Noise”, IEEE Transactions on Wireless Communications, Vol. 21, Issue 9, pp. 7794-7809, September 2022. Doi: 10.1109/TWC.2022.3162137 (IF: 7.016)
  29. X. Q. Liang, Z. Yan*, K. Raimo, “GAIMMO: A Grade-driven Auction-based Incentive Mechanism with Multiple Objectives for Decentralized Crowdsourcing”, IEEE Internet of Things Journal, Vol. 9, Issue 18, pp. 17488-17502, September 15 2022. Doi: 10.1109/JIOT.2022.3155631 (IF: 9.936)
  30. Y. Z. Jia, B. W. Liu, W. C. Dou, X. L. Xu, X. K. Zhou*, L. Y. Qi, Z. Yan*, “CroApp: A CNN-Based Resource Optimization Approach in Edge Computing Environment”, IEEE Transactions on Industrial Informatics, Vol.18, Issue 9, pp. 6300-6307, September 2022. Doi: 10.1109/TII.2022.3154473 (IF: 10.215)
  31. R. Zhang, Z. Yan*, X. R. Wang, R. H. Deng, “VOLERE: Leakage Resilient User Authentication Based on Personal Voice Challenges”, IEEE Transactions on Dependable and Secure Computing, 2022. Doi: 10.1109/TDSC.2022.3147504 (CCF A, IF: 7.329)
  32. X. K. Zhou, W. Liang, J. J. Ma, Z. Yan, K. I. Wang, “2D Federated Learning for Personalized Human Activity Recognition in Cyber-Physical-Social Systems”, IEEE Transactions on Network Science and Engineering, 2022. Doi: 10.1109/TNSE.2022.3144699 (IF: 3.894)
  33. Z. Yan*, X. R. Qian, S. S. Liu, R. H. Deng, “Privacy Protection in 5G Positioning and Location-Based Services Based on SGX”, ACM Transaction on Sensor Networks, 2022. Doi: https://doi.org/10.1145/3512892 (IF: 3.52)
  34. X. X. Yu, H. Bai, Z. Yan*, R. Zhang, “VeriDedup: A Verifiable Cloud Data Deduplication Scheme with Integrity and Duplication Proof”, IEEE Transactions on Dependable and Secure Computing, 2021. Doi: 10.1109/TDSC.2022.3141521 (CCF A, IF: 7.329)
  35. H. Han, Z. Yan*, X. Y. Jing, W. Pedrycz, “Applications of Sketches in Network Traffic Measurement: A Survey”, Information Fusion, Vol. 82, pp. 58-85, 2022. Doi: 10.1016/j.inffus.2021.12.007 (IF: 12.975)
  36. W. T. Wei, J. Wang, Z. Yan*, W. X. Ding, “EPMDroid: Efficient and Privacy-preserving Malware Detection Based on SGX through Data Fusion”, Information Fusion, Vol. 82, pp. 43-57, 2022. Doi: 10.1016/j.inffus.2021.12.006 (IF: 12.975)
  37. X. Y. Jing, Z. Yan*, H. Han, W. Pedrycz, "ExtendedSketch: Fusing Network Traffic for Super Host Identification with a Memory Efficient Sketch", IEEE Transactions on Dependable and Secure Computing, 2021. Doi: 10.1109/TDSC.2021.3111328. (CCF A, IF: 7.329)
  38. J. L. Zhang, Z. Yan*, S. F. Fei, M. J. Wang, T. Y. Li, H. G. Wang, “Is Today’s End-to-End Communication Security Enough for 5G and Its Beyond?”, IEEE Network Magazine, 2021. Doi: 10.1109/MNET.101.2100189 (IF: 10.693)
  39. Y. L. Li, S. S. Liu, Z. Yan*, R. H. Deng, “Secure 5G Positioning with Truth Discovery, Attack Detection and Tracing”, IEEE Internet of Things Journal, 2021. Doi: 10.1109/JIOT.2021.3088852 (IF: 9.936)
  40. Z. Yan*, Q. H. Zheng, L. T. Yang, R. H. Deng, “Data Fusion for Trust Evaluation”, Information Fusion, Vol. 76, pp. 187-188, December 2021. https://doi.org/10.1016/j.inffus.2021.05.007 (IF: 13.669)
  41. X. Y. Jing, H. Han, Z. Yan*, W. Pedrycz, "SuperSketch: A Multi-Dimensional Reversible Data Structure to Compress Network Traffic for Super Host Identification", IEEE Transactions on Dependable and Secure Computing, 2021. Doi: 10.1109/TDSC.2021.3072295 (CCF A, IF: 7.329)
  42. S. F. Fei, Z. Yan*, W. X. Ding, H. M. Xie, “Security Vulnerabilities of SGX and Countermeasures: A Survey”, ACM Computing Surveys, Vol. 54, Issue 6, article No. 126, pp. 1-36, July 2021. Doi: http://dx.doi.org/10.1145/3456631 (IF: 6.131)
  43. D. S. Zhao, Z. Yan, M. J. Wang*, P. Zhang, B. Song, “Is 5G Handover Secure and Private? A Survey”, IEEE Internet of Things Journal, Vol. 8, Issue 16, pp. 12855-12879, August 2021. Doi: 10.1109/JIOT.2021.3068463 (IF: 9.936)
  44. J. J. Zhao, X. Y. Jing, Z. Yan*, W. Pedrycz, “Network Traffic Classification for Data Fusion: A Survey”, Information Fusion, Vol. 72, pp. 22-47, August 2021. Doi: https://doi.org/10.1016/j.inffus.2021.02.009 (IF: 13.669)
  45. G. Liu, Z. Yan*, W. Feng, X. Y. Jing, Y. X. Chen, M. Atiquzzaman, “SeDID: An SGX-enabled Decentralized Intrusion Detection Framework for Network Trust Evaluation”, Information Fusion, Vol. 70, pp. 100-114, June 2021. https://doi.org/10.1016/j.inffus.2021.01.003 (IF: 13.669)
  46. X. Y. Jing, Z. Yan*, Y. H. Shen, W. Pedrycz, J. Yang, “A Group-based Distance Learning Method for Semi-supervised Fuzzy Clustering”, IEEE Transactions on Cybernetics, 2020. Doi: 0.1109/TCYB.2020.3023373. (IF: 11.470)
  47. X. Q. Liang, Z. Yan*, R. H. Deng, Q. H. Zheng, “Investigating the Adoption of Hybrid Encrypted Cloud Data Deduplication with Game Theory”, IEEE Transactions on Parallel and Distributed Systems, Vol. 32, Issue 3, pp. 587-600, 2020. Doi: 10.1109/TPDS.2020.3028685 (CCF A, IF: 4.640)
  48. Y. X. Chen*. Q. H. Zheng, Z. Yan, D. Liu, “QShield: Protecting Outsourced Cloud Data Queries with Multi-user Access Control Based on SGX”, IEEE Transactions on Parallel and Distributed Systems, Vol. 32, Issue 2, pp. 485-499, Feb. 2021. Doi: 10.1109/TPDS.2020.3024880 (CCF A, IF: 4.640)
  49. W. Feng, Z. Yan*, L. T. Yang, Q. H. Zheng, “Anonymous Authentication on Trust in Blockchain-Based Mobile Crowdsourcing”, IEEE Internet of Things Journal, 2020. Doi: 10.1109/JIOT.2020.3018878 (IF: 9.936)
  50. Z. Yan*, L. Peng, W. Feng, L. T. Yang, “Social-Chain: Decentralized Trust Evaluation Based on Blockchain in Pervasive Social Networking”, ACM Transactions on Internet Technology (TOIT), Vol. 21, Issue 1, pp. 1-28, 2021. (CCF B, IF: 3.750)
  51. J. W. Wang, X. Y. Jing, Z. Yan*, Y. L. Fu, W. Pedrycz, L. T. Yang, “A Survey on Trust Evaluation Based on Machine Learning”, ACM Computing Surveys, 53, 5, Article 107, August 2020, 36 pages. https://doi.org/10.1145/3408292. (IF: 6.131)
  52. T. Meng, X. Y. Jing, Z. Yan*, W. Pedrycz, “A Survey on Machine Learning for Data Fusion”, Information Fusion, Vol. 57, pp. 115-129, May 2020. Doi: 10.1016/j.inffus.2019.06.007 (IF: 10.716) (ESI Highly Cited Paper)
  53. X.Q. Liang, Z. Yan*, X.F. Chen, L.T. Yang, W.J. Lou, Y.T. Hou, “Game Theoretical Analysis on Encrypted Cloud Data Deduplication”, IEEE Transactions on Industrial Informatics, 2019, Doi: 10.1109/TII.2019.2920402. (IF: 7.377, 中科院SCI 1区)
  54. X.Y. Jing, Z. Yan*, W. Pedrycz, “Security Data Collection and Data Analytics in the Internet: A Survey”, IEEE Communications Surveys and Tutorials, vol. 21, issue 1, pp. 586-618, first quarter 2019. (IF: 22.973, 中科院SCI 1区)
  55. X.Y. Jing, Z. Yan*, X.Q. Liang, W. Pedrycz, “Network Traffic Fusion and Analysis against DDoS Flooding Attacks with a Novel Reversible Sketch”, vol. 51, pp. 100-113, Information Fusion, Nov. 2019. (IF: 10.716, 中科院SCI 1区) https://doi.org/10.1016/j.inffus.2018.10.013
  56. P. Wang, N. Wang, M. Dabaghchian, K. Zeng, Z. Yan, “Optimal Resource Allocation for Secure Multi-User Wireless Powered Backscatter Communication with Artificial Noise”, IEEE Infocom 2019. (CCF A)
  57. Z. Yan*, P. Wang, W. Feng, “A Novel Scheme of Anonymous Authentication on Trust in Pervasive Social Networking”, Information Sciences, Vol. 445-446, pp. 79-96, June 2018. Doi:10.1016/j.ins.2018.02.037 (IF: 5.524, 中科院SCI 2)
  58. W.X. Ding, Z. Yan*, R. H. Deng, “Privacy-Preserving Data Processing with Flexible Access Control”, IEEE Transactions on Dependable and Secure Computing, 2017. Doi: 10.1109/TDSC.2017.2786247 (IF: 6.404, CCF A)
  59. M.J. Wang, Z. Yan*, “Privacy-Preserving Authentication and Key Agreement Protocols for D2D Group Communications", IEEE Transactions on Industrial Informatics, Vol. 14, issue 8, pp. 3637-3647, August 2018. (IF: 7.377, 中科院SCI 1) Doi: 10.1109/TII.2017.2778090
  60. W. Feng, Z. Yan*, H.R. Zhang, K. Zeng, Y. Xiao, T. Hou, “Survey on Security, Privacy and Trust in Mobile Crowdsourcing”, IEEE Internet of Things Journal, Vol. 5 No. 4, pp. 2971-2992, August, 2018. Doi: 10.1109/JIOT.2017.2765699 (IF: 9.515, 中科院SCI 1区)
  61. Z. Yan*, X.Y. Jing, W. Pedrycz, “Fusing and Mining Opinions for Reputation Generation”, Information Fusion, Vol. 36, pp. 172-184, July 2017.  (IF: 10.716, 中科院SCI 1区)
  62. Z. Yan*, W.X. Ding, X.X. Yu, H.Q. Zhu, R. H. Deng, “Deduplication on Encrypted Big Data in Cloud”, IEEE Transactions on Big Data, vol. 2, no. 2, pp. 138-150, April-June 2016. Doi: 10.1109/TBDATA.2016.2587659 (IEEE ComSoc TCBD 2017 最佳期刊论文奖
  63. Z. Yan*, P. Zhang, A.V. Vasilakos, “A Survey on Trust Management for Internet of Things”, Journal of Network and Computer Applications, 42 (2014), pp. 120–134, 2014.Doi: 10.1016/j.jnca.2014.01.014i (IF: 5.273, ESI高被引, 中科院SCI 2)
  64. Z. Yan*, M.J. Wang, “Protect Pervasive Social Networking based on Two Dimensional Trust Levels”, IEEE Systems Journal, Vol. 11, Issue 1, pp. 207-218, March 2017.  Doi: 10.1109/JSYST.2014.2347259. (IF: 4.463, 中科院SCI 2)
  65. Z. Yan*, C. Prehofer, “Autonomic Trust Management for a Component Based Software System”, IEEE Transactions on Dependable and Secure Computing, Vol. 8, No. 6, pp. 810-823, 2011. (IF: 6.404, CCF A)

 

成果及引用详见:

    Google Scholar: https://scholar.google.com/citations?user=Q0FDt9gAAAAJ&hl=zh-CN&oi=sra

    DBLP: https://dblp.org/pid/43/180-2.html

2018/2019年部分成果
  1. X. Q. Liang, Z. Yan*, X. F. Chen, L. T. Yang, W. J. Lou, Y. T. Hou, “Game Theoretical Analysis on Encrypted Cloud Data Deduplication” IEEE Transactions on Industrial Informatics, 2019. Doi: 10.1109/TII.2019.2920402 (IF: 5.43)
  2. Z. Yan*, J. Liu, L. T. Yang, W. Pedrycz, “Data Fusion in Heterogeneous Networks”, Information Fusion, vol. 53, pp. 1-3, 2020. Doi: 10.1016/j.inffus.2019.06.007
  3. Zheng Yan*, Venu Govindaraju, Qinghua Zheng, Yan Wang, “Special Session on Trusted Computing”, IEEE Access, 2019.
  4. X.Y. Jing, J.J. Zhao, Q.H. Zheng, Z. Yan*, W. Pedrycz, “A Reversible Sketch-based Method for Detecting and Mitigating Amplification Attacks”, Journal of Network and Computer Applications, Vol. 142, pp. 15-24, Sept. 2019. Doi: 10.1016/j.jnca.2019.06.007
  5. D. Liu, Z. Yan, W.X. Ding*, M. Atiquzzaman, “A Survey on Secure Data Analytics in Edge Computing”, IEEE Internet of Things Journal, 2019. Doi: 10.1109/JIOT.2019.2897619
  6. S.S Liu, A. Liu*, Z. Yan*, W. Feng, “Efficient LBS Queries with Mutual Privacy Preservation in IoV”, Vehicular Communications, 2019. Doi: https://doi.org/10.1016/j.vehcom.2019.03.001
  7. Yulei Wu, Zheng Yan*, Kim-Kwang Raymond Choo, Laurence T. Yang, “Special Session: Internet-of-Things (IoT) Big Data Trust Management”, IEEE Access, 2019.
  8. Rafik Hamza, Zheng Yan*, Khan Muhammad, Paolo Bellavista, Faiza Titouna, “A privacy-preserving cryptosystem for IoT E-healthcare”, Information Sciences, 2019. https://doi.org/10.1016/j.ins.2019.01.070
  9. R. Zhang, Z. Yan*, “A Survey on Biometric Authentication: towards Secure and Privacy-Preserving Identification”, IEEE Access, Vol. 7, No. 1, pp. 5994-6009, 2019. Doi: 10.1109/ACCESS.2018.2889996
  10. W. Feng, Z. Yan*, “MCS-Chain: Decentralized and Trustworthy Mobile Crowdsourcing Based on Blockchain”, Future Generation Computer Systems, vol. 95, pp. 649-666, June 2019.
  11. X.Y. Jing, Z. Yan*, W. Pedrycz, “Security Data Collection and Data Analytics in the Internet: A Survey”, IEEE Communications Surveys and Tutorials, vol. 21, issue 1, pp. 586-618, first quarter 2019. Doi: 10.1109/COMST.2018.2863942 (IF: 20.23)
  12. W.X Ding, X.Y. Jing, Z. Yan*, L.T. Yang, “A Survey on Data Fusion in Internet of Things: Towards Secure and Privacy-Preserving Fusion”, Information Fusion, vol. 51, pp. 129-144, 2019. Doi: 10.1016/j.inffus.2018.12.001
  13. X.X. Yu, Z. Yan*, R. Zhang, “Verifiable Outsourced Computation over Encrypted Data”, Information Sciences, Vol. 479, pp. 372-385, April 2019. Doi: 10.1016/j.ins.2018.12.022
  14. L.T. Yang, "HO-OTSVD: A Novel Tensor Decomposition and Its Incremental Computation for Cyber-Physical-Social Networks (CPSN)", IEEE Transactions on Network Science and Engineering, 2018. (accepted)
  15. B. B. Gupta, Tyson Brooks, Zheng Yan*, Shingo Yamaguchi, Yogachandran Rahulamathavan, Special Issue on Recent Advances in Computational Intelligence Paradigms for Security and Privacy for Fog and Mobile Edge Computing, IEEE Access, 2018.
  16. Jianfei Ruan, Z. Yan*, Bo Dong, Qinghua Zheng, Buyue Qian, “Identifying Suspicious Groups of Affiliated-Transaction-based Tax Evasion in Big Data”, Information Sciences, 407, pp. 508-532, 2019. Doi: 10.1016/j.ins.2018.11.00
  17. X.Y. Jing, Z. Yan*, X.Q. Liang, W. Pedrycz, “Network Traffic Fusion and Analysis against DDoS Flooding Attacks with a Novel Reversible Sketch”, vol. 51, pp. 100-113, Information Fusion, Nov. 2019. https://doi.org/10.1016/j.inffus.2018.10.013
  18. H.M. Xie, Z. Yan*, Z. Yao, M. Atiquzzaman, “Data Collection for Security Measurement in Wireless Sensor Networks: A Survey”, IEEE Internet of Things Journal, 2018. Doi: 10.1109/JIOT.2018.2883403
  19. H.Q. Lin, Z. Yan*, Y.L. Fu, “Adaptive Security-Related Data Collection with Context Awareness”, Journal of Network and Computer Applications, Vol. 126, pp. 88-103, Jan. 2019. Doi: 10.1016/j.jnca.2018.11.002
  20. Kai Fan, Shangyang Wang, Yanhui Ren, Kan Yang, Zheng Yan, Hui Li, Yintang Yang, “Blockchain-based Secure Time Protection Scheme in IoT”, IEEE Internet of Things Journal, 2018. Doi: 10.1109/JIOT.2018.2874222
  21. Jun Feng, Laurence T. Yang, Qing Zhu, Yang Xiang, Jinjun Chen, Zheng Yan, “Secure Outsourced Principal Eigentensor Computation for Cyber-Physical-Social Systems”, IEEE Transactions on Sustainable Computing, 2018. Doi: 10.1109/TSUSC.2018.2881241
  22. F.Y. Tian, Z. Yan*, X. Q. Liang, P. Zhang, “Trusted Cooperation among Virtual Base Stations in C-RAN”, IEEE Access, Vol. 6, Issue 1, pp. 57787-57801, Dec. 2018. Doi: 10.1109/ACCESS.2018.2873758 (IF: 3.557)
  23. S.S. Liu, L.F. Zhang, Z. Yan*, "Predict Pairwise Trust based on Machine Learning in Online Social Networks: A Survey", IEEE Access, vol. 6, issue 1, pp. 51297-51318, December 2018. Doi: 10.1109/ACCESS.2018.2869699
  24. Zheng Yan*, Kai Zeng, Yu Xiao, Thomas Hou, Pierangela Samarati, Special Issue on Trust, Security and Privacy in Crowdsourcing, IEEE Internet of Things Journal, Vol. 5, Issue 4, pp. 2880-2883, 2018. Doi: 10.1109/JIOT.2018.2860302
  25. Z. Yan*, L. Peng, “Trust Evaluation Based on Blockchain in Pervasive Social Networking,” IEEE Blockchain Technical Briefs, Sept. 2018.
  26. D.H. Zhou, Z. Yan*, Y.L. Fu, Z. Yao, “A Survey on Network Data Collection”, Journal of Network and Computer Applications, Vo. 116, pp. 9-23, Aug. 2018. Doi: 10.1016/j.jnca.2018.05.004 (IF: 3.5)
  27. Haoran Yuan, Xiaofeng Chen, Tao Jiang, Xiaoyu Zhang, Zheng Yan, Yang Xiang, “DedupDUM: Secure and scalable data deduplication with dynamic user management”, Information Sciences, 2018. DOI: 10.1016/j.ins.2018.05.024
  28. Zheng Yan*, Yuqing Zhang, Raymond Choo, Yang Xiang, “Editorial: Security Measurements of Cyber Networks”, Security and Communication Networks (Wiley), vol. 2018, article ID 6545314, 3 pages, 2018. https://doi.org/10.1155/2018/6545314
  29. G.Q. Li, Z. Yan, Y.L. Fu*, H.L. Chen, “Data Fusion for Network Intrusion Detection: A review", Security and Communication Networks, 2018. vol. 2018, Article ID 8210614, 16 pages, 2018. https://doi.org/10.1155/2018/8210614/.
  30. K. Xu, W.D. Zhang, Z. Yan*, “A Privacy-Preserving Mobile Application Recommender System Based on Trust Evaluation”, Journal of Computational Science, 26, pp. 87-107, May 2018. Doi: 10.1016/j.jocs.2018.04.001 (IF: 1.748)
  31. Z. Yao, Z. Yan*, “A Trust Management Framework for Software-Defined Network Applications”, Concurrency and Computation Practice and Experiences, 2018. Doi: 10.1002/cpe.4518 (IF: 1.133)
  32. H.Q. Lin, Z. Yan*, Y. Chen, L.F. Zhang, “A Survey on Network Security-Related Data Collection Technologies”, IEEE Access, vol. 6, issue 1, pp. 18345-18365, Dec. 2018. Doi: 10.1109/ACCESS.2018.2817921 (IF: 3.224)
  33. Z. Yan*, P. Wang, W. Feng, “A Novel Scheme of Anonymous Authentication on Trust in Pervasive Social Networking”, Information Sciences, Vol. 445-446, pp. 79-96, June 2018. Doi: 10.1016/j.ins.2018.02.037 (IF: 4.305)
  34. Qingchen Zhang, Laurence T. Yang, Z. Yan, Zhikui Chen, Peng Li, “An Efficient Deep Learning Model to Predict Cloud Workload for Industry Informatics”, IEEE Transactions on Industrial Informatics”, Vol. 14, No. 7, pp.3170-3178, July 2018. Doi: 10.1109/TII.2018.2808910 (IF: 6.764)
  35. G. Liu, Z. Yan*, W. Pedryczc, “Data Collection for Attack Detection and Security Measurement in Mobile Ad Hoc Networks: A Survey”, Journal of Network and Computer Applications, Vol. 105, pp. 105-122, march 2018. Doi: https://doi.org/10.1016/j.jnca.2018.01.004 (IF: 3.500)
  36. L.M. He, Z. Yan*, M. Atiquzzaman, “LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey”, IEEE Access, Vol. 6, Issue 1, pp. 4220-4242, 2018. Doi: 10.1109/ACCESS.2018.2792534
  37. N. Li, Z. Yan*, M. J. Wang, L. T. Yang, “Securing Communication Data in Pervasive Social Networking based on Trust with KP-ABE”, ACM Trans. on Cyber-Physical Systems, Vol. 3, Issue 1, 23 page, article 9, Sept. 2018. (https://doi.org/10.1145/3145624)
  38. W.X. Ding, Z. Yan*, R. H. Deng, “Privacy-Preserving Data Processing with Flexible Access Control”, IEEE Trans on Dependable and Secure Computing, 2017. Doi: 10.1109/TDSC.2017.2786247 (IF: 4.410)
  39. M.J. Wang, Z. Yan*, “Privacy-Preserving Authentication and Key Agreement Protocols for D2D Group Communications", IEEE Transactions on Industrial Informatics, Vol. 14, issue 8, pp. 3637-3647, August 2018. (IF: 6.764) Doi: 10.1109/TII.2017.2778090
  40. Zhuo Wei, Yongdong Wu, Yanjiang Yang, Zheng Yan, Qingqi Pei, Yajuan Xie, Jian Weng, “AutoPrivacy: Automatic Privacy Protection and Tagging Suggestion for Mobile Social Photo”, Computers and Security, Vol. 76, pp. 341-353, Jan. 2018. https://doi.org/10.1016/j.cose.2017.12.002 (IF: 2.849)
  41. Jun Feng, Laurence T. Yang, Guohui Dai, Jinjun Chen, and Zheng Yan, “An Improved Secure High-Order-Lanczos Based Orthogonal Tensor SVD for Cyber-Physical-Social Big Data Reduction”, IEEE Trans. on Big Data, 2017. Doi: 10.1109/TBDATA.2018.2881441
  42. X.Q. Liang, Z. Yan*, “A Survey on Game Theoretical Methods in Human-Machine Networks”, Future Generation Computer Systems, 92(2019), pp. 674-693, 2019. (invited paper) (IF: 3.997) Doi: 10.1016/j.future.2017.10.051
  43. Linfeng Wei, Weiqi Luo, Jian Weng, Yanjun Zhong, Xiaoqian Zhang, and Zheng Yan, “Machine Learning-based Malicious Application Detection of Android”, 5(1), pp. 25591-25601, IEEE Access, 2017. Doi: 10.1109/ACCESS.2017.2771470
  44. W. Feng, Z. Yan*, H.R. Zhang, K. Zeng, Y. Xiao, T. Hou, “A Survey on Security, Privacy and Trust in Mobile Crowdsourcing”, IEEE Internet of Things Journal, Vol. 5 No. 4, pp. 2971-2992, August, 2018. Doi: 10.1109/JIOT.2017.2765699 (IF: 7.596) (invited)

 

2017年部分成果

1. W.X. Ding, Z. Yan*, R. H. Deng, “Privacy-Preserving Data Processing with Flexible Access Control”, IEEE Trans on Dependable and Secure Computing, 2017. Doi: 10.1109/TDSC.2017.2786247 (IF: 2.926)

2. M.J. Wang, Z. Yan*, “Privacy-Preserving Authentication and Key Agreement Protocols for D2D Group Communications", IEEE Transactions on Industrial Informatics, 2017. (IF: 6.764) Doi: 10.1109/TII.2017.2778090

3. Zhuo Wei, Yongdong Wu, Zheng Yan, Yanjiang Yang, Qingqi Pei, Yajuan Xie, Jian Weng, “AutoPrivacy: Automatic Privacy Protection and Tagging Suggestion for Mobile Social Photo”, Computers and Security, 2017. (accepted)

4. Jun Feng, Laurence T. Yang, Guohui Dai, Jinjun Chen, and Zheng Yan, “An Improved Secure High-Order-Lanczos Based Orthogonal Tensor SVD for Cyber-Physical-Social Big Data Reduction”, IEEE Trans. On Big Data, 2017. (accepted)

5. X.Q. Liang, Z. Yan*, A Survey on Game Theoretical Methods in Human-Machine Networks , Future Generation Computer Systems, 2017. (invited paper) (IF: 3.997) Doi: 10.1016/j.future.2017.10.051

6. Linfeng Wei, Weiqi Luo, Jian Weng, Yanjun Zhong, Xiaoqian Zhang, and Zheng Yan, “Machine Learning-based Malicious Application Detection of Android”, IEEE Access, 2017. Doi: 10.1109/ACCESS.2017.2771470

7. W. Feng, Z. Yan*, H.R. Zhang, K. Zeng, Y. Xiao, T. Hou, “Survey on Security, Privacy and Trust in Mobile Crowdsourcing”, IEEE Internet of Things Journal, 2017. Doi: 10.1109/JIOT.2017.2765699 (IF: 7.596)

8. F.Y. Tian, P. Zhang, Z. Yan*, “A Survey on C-RAN Security”, IEEE Access, 2017. Doi: 10.1109/ACCESS.2017.2717852

9. W.X. Ding, Z. Yan*, R.H. Deng, “Encrypted Data Processing with Homomorphic Re-Encryption”, Information Sciences, 2017. Doi: 10.1016/j.ins.2017.05.004

10. Rui Li, Qinghua Zheng, Xiuqi Li, Zheng Yan, “Multi-Objective Optimization for Rebalancing Virtual Machine Placement”, Future Generation Computer Systems, 2017. (accepted) (IF: 3.997)

11. Y.L. Fu, Z. Yan, H. Li, X.L. Xin, J. Cao, “A Secure SDN based Multi-RANs Architecture for Future 5G Networks”, Computers and Security, 2017. (accepted) (IF: 2.849)

12. Z. Yan*, L.F. Zhang, W.X. Ding, Q.H. Zheng, “Heterogeneous Data Storage Management with Deduplication in Cloud Computing”, IEEE Transactions on Big Data, 2017. Doi: 10.1109/TBDATA.2017.2701352

13. Z. Yan*, J. Liu, L.T. Yang, N. Chawla, “Big Data Fusion in Internet of Things, Information Fusion”, April, 2017. Doi: 10.1016/j.inffus.2017.04.005

14. P. Yan, Z. Yan*, “A Survey on Dynamic Mobile Malware Detection”, Software Quality Journal, 2017. DOI: 10.1007/s11219-017-9368-4

15. X.X.Yu, Z. Yan*, A.V. Vasilakos,“A Survey of Verifiable Computation”, Mobile Networks and Applications, Springer, 2017. (accepted)

16. Z Yan*, X.X. Yu, W.X. Ding, Context-Aware Verifiable Cloud Computing, IEEE Access, 2016. (accepted)

17. M.J. Wang, Z. Yan*, V. Niemi, “UAKA-D2D: Universal Authentication and Key Agreement Protocol in D2D Communications", Mobile Networks and Applications, Springer, 2017. (accepted)

18. W. Feng, Z. Yan*, H.M. Xie, "Anonymous Authentication on Trust in Pervasive Social Networking Based on Group Signature", IEEE Access, 2017.

2016年部分成果

1. Z. Yan*, X.Y. Jing, W. Pedrycz, “Fusing and Mining Opinions for Reputation Generation”, Information Fusion, 2016. (accepted) (IF: 4.353)

2. Z. Yan*, W.Y. Shi, “CloudFile: A Cloud Data Access Control System based on Mobile Social Trust”, Journal of Network and Computer Applications, 2016. Doi: 10.1016/j.jnca.2016.11.016. (IF: 2.331)

3. Z. Yan*, W.X. Ding, X.X. Yu, H.Q. Zhu, R. H. Deng, “Deduplication on Encrypted Big Data in Cloud”, IEEE Transactions on Big Data, vol. 2, no. 2, pp. 138-150, April-June 2016. Doi: 10.1109/TBDATA.2016.2587659

4. C.Y. Huang, Z. Yan*, N. Li, M. J. Wang, “Secure Pervasive Social Communications based on Trust in a Distributed Way”, IEEE Access, 2016.

5. L.J. Gao, Z. Yan*, L.T. Yang "Game Theoretical Analysis on Acceptance of a Cloud Data Access Control System Based on Reputation", IEEE Transactions on Cloud Computing, 2016. (accepted)

6. F. Tong, Z. Yan*, A Hybrid Approach of Mobile Malware Detection in Android, Journal of Parallel and Distributed Computing, 2016. Doi: 10.1016/j.jpdc.2016.10.012 (IF: 1.320)

7. Z. Yan*, R.H. Deng, V. Varadharajan, “Cryptography and Data Security in Cloud Computing”, Information Sciences, 2016. (IF: 4.098)

8. Z. Yan*, V. Niemi, L.T. Yang, “Key Technologies for 5G, the Next Generation of Mobile Networks and Services”, International Journal of Communication Systems, 2016. Doi: 10.1002/dac.3226

9. J. Liu, Z. Yan, A.V. Vasilakos, and L.T. Yang, “Data Mining in Cyber, Physical and Social Computing”, IEEE Systems Journal, 2016.

10. W.X. Ding, Z. Yan*, R. H. Deng, “A Survey on Future Internet Security Architectures”, IEEE Access, 2016. Doi: 10.1109/ACCESS.2016.2596705 (IF: 1.27) (invited)

11. Z. Yan*, J. Liu, R.H. Deng, F. Herrera, “Trust Management for Multimedia Big Data”, ACM Transactions on Multimedia Computing Communications and Applications, vol. 12, no. 4s, Article 57, 2 pages, August 2016. Doi: http://dx.doi.org/10.1145/2978431 (IF: 2.46)

12. L.F. Zhang, Z. Yan*, R. Kantola, “Privacy-Preserving Trust Management for Unwanted Traffic Control”, Future Generation Computer Systems, 2016. Doi: 10.1016/j.future.2016.06.036 (IF: 2.43)

13. Z. Yan*, M.J. Wang, Y.X. Li, A.V. Vasilakos, “Encrypted Data Management with Deduplication in Cloud Computing”, IEEE Cloud Computing Magazine, 3(2), pp. 28-35, 2016.

14. M.J. Wang, Z. Yan*, “A Survey on Security in D2D Communications”, Mobile Networks and Applications, Springer, 2016. Doi: 10.1007/s11036-016-0741-5 (IF: 1.538)

15. Z. Yan*, W. Feng, P. Wang, “Anonymous Authentication for Trustworthy Pervasive Social Networking”, IEEE Transactions on Computational Social Systems, 2(3), pp. 88-98, Feb. 2016. Doi:10.1109/TCSS.2016.2519463

16. Zhuo Wei, Z. Yan, Yongdong, Wu, R. H. Deng, “Trustworthy Authentication on Scalable Surveillance Video with Background Model Support”, ACM Transactions on Multimedia Computing Communications and Applications, accepted, 2016. (IF: 2.46)

17. L. Kuang, L.T. Yang, S.C. Rho, Z. Yan, K. Qiu, “An Efficient Tensor-based fr[ant]amework for Software-defined Big Data Center”, ACM Transactions on Multimedia Computing Communications and Applications, 2016. (IF: 2.46)