学术信息网 西电导航 关于 使用说明 搜索 系统首页 登录 控制面板 收藏 闫峥的留言板
最新成果

The following selected top-level papers first authored by me or by my students are accepted in 2025:

  1. J. Wang, Z. Yan*, J. H. Lan, X. Y. Li, E. Bertino, "CAT: Can Trust be Predicted with Context-Awareness in Dynamic Heterogeneous Networks?", The 33rd Network and Distributed System Security Symposium (NDSS2026), San Diego, CA, USA, February 23-27, 2026. (CCF A, Security BIG4 Conference)
  2. X. Y. Jing, C. H. Zhang, Z. Yan*, Q. Z. Jiang, W. Pedrycz, M. J. Wang, C. Wang, “GeminiSketch: An Accurate and Efficient Sketch for Summarizing Temporal Graph Streams with Rolling-out Elimination”, IEEE 2026 42nd International Conference on Data Engineering (ICDE), Montreal, Canada, from May 4-8, 2026. (CCF A)
  3. Y. X. Tang, Y. J. Liu, J. H. Lan, Z. Yan*, E. Gelenbe, “A Comprehensive Survey on the Security of LLM-based Agents: Attacks, Defenses, and Applications”, Information Fusion, Volume 127, Part C, March 2026, 103941. Doi: 10.1016/j.inffus.2025.103941 (IF: 15.5)
  4. J. J. Li, Z. Yan*, Y. S. Yang, “PosGKG: Lightweight Position-based Group Key Generation and Management in BC Systems”, IEEE Transactions on Information Forensics and Security, Vol. 20, pp. 12035-12050, 2025. Doi: 10.1109/TIFS.2025.3626945 (CCF A, IF: 8)
  5. P. P. Han, Z. Yan*, L. T. Yang, E. Bertino, “OSwap: Preserving the Atomicity and Indistinguishability of n1 n2 Swap without Synchronous Blockchain Communication”, IEEE Transactions on Dependable and Secure Computing, February 2025. Doi: 10.1109/TDSC.2025.3607847 (CCF A, IF: 7.5)
  6. C. M. Shi, H. M. Xie, Z. Yan*, L. T. Yang, “A Survey on Off-chain Technologies”, ACM Computing Surveys, 2025. Doi: https://doi.org/10.1145/3765897 (IF: 28.0)
  7. Y. S. Yang, Z. Yan*, N. Y. Luo, J. J. Li, M. X. Dong and K. Ota, “HABC: A Mutual and Handover Authentication Scheme for Backscatter Communications with High Robustness”, IEEE Transactions on Information Forensics and Security, Vol. 20, pp. 7808-7823, 2025. Doi: 10.1109/TIFS.2025.3592548 (CCF A, IF: 8)
  8. Y. F. Zhang, B. X. Xie, Y. S. Yang, Z. Yan*, R. Jäntti, Z. Han, “AuthScatter: Accurate, Robust, and Scalable Mutual Authentication in Physical Layer for Backscatter Communications”, IEEE Transactions on Information Forensics and Security, Vol. 20, pp. 6937-6952, March 2025. Doi: 10.1109/TIFS.2025.3585453 (CCF A, IF: 8)
  9. X. Y. Jing, Q. H Cao, Z. Yan*, W. Pedrycz, P. Wang, “LocalSketch: An Accurate and Efficient Sketch for Range Spread Measurement”, IEEE Transactions on Dependable and Secure Computing, June 30, 2025. Doi: 10.1109/TDSC.2025.3584123 (CCF A, IF: 7.5)
  10. Z. T. Zhang, H. X. Han, Z. Yan*, E. Gelenbe, “A Survey of Cross-Shard Transaction Allocation Optimization and Processing Mechanisms”, IEEE Communications Surveys and Tutorials, 2025. Doi: 10.1109/COMST.2025.3580442 (IF: 34.4)
  11. H. X. He, S. F. Fei, Z. Yan*, “Advancing 5G Security and Privacy with AI: A Survey”, ACM Computing Surveys, 2025. Doi: https://doi.org/10.1145/3744555 (IF: 23.8)
  12. H. K. Zhang, Z. Yan*, “QuickEn: A Data Encryption Device for High-performance Storage”, the Journal of Supercomputing, June 1st, 2025. Doi: 10.1007/s11227-025-07532-z (IF: 2.5)
  13. Y. F. Zhang, Z. Yan*, J. Wang, Y. S. Yang, Z. Li, R. Jäntti, “Artificial Noise Management for Securing Backscatter Communication Networks: Current Advances, Open Challenges, and Future Directions”, IEEE Network Magazine, 2024. Doi: 10.1109/MNET.2025.3570547 (IF: 6.8)
  14. Z. Z. Li, J. H. Lan, Z. Yan*, E. Gelenbe, “Backdoor Attacks and Defense Mechanisms in Federated Learning: A Survey”, Information Fusion, Volume 123, November 2025, 103248. Doi: https://doi.org/10.1016/j.inffus.2025.103248 (IF: 14.8)
  15. L. J. Gao, F. Wu, J. Wang, Z. Yan*, W. Pedrycz, “Effective Data Truth Discovery Based on Fuzzy Clustering with Prior Constraints”, Information Sciences, submitted and under review, Vol. 717, 122290, November 2025. Doi: https://doi.org/10.1016/j.ins.2025.122290 (CCF B)
  16. J. L. Zhang, Z. Yan*, H. G. Wang, T. Y. Li, “CCRPS: Customized Cross-domain Routing with Privacy Preservation and Stable Quality-of-Experience Based on Deep Reinforcement Learning”, Information Sciences, Vol. 716, October, 2025, 122255. Doi: https://doi.org/10.1016/j.ins.2025.122255 (CCF B)
  17. T. X. Luo, J. Wang, Z. Yan*, E. Gelenbe, “Graph Neural Networks for Trust Evaluation: Evaluation Criteria, State-of-the-Art, and Future Directions”, IEEE Network Magazine, Vol. 39, Issue 4, pp. 37-46, 2025. Doi: 10.1109/MNET.2025.3551068 (IF: 6.8)
  18. Z. Yan*, T. Y. Li, V. Niemi, E. Bertino, “Guest Editorial: Trustworthy and Intelligent 6G”, IEEE Network, Vol. 39, Issue 2, pp. 69-71, March 2025. Doi: 10.1109/MNET.2025.3534396 (IF: 6.8)
  19. X. Y. Li, J. Wang, Z. Yan*, “Can Graph Neural Networks be Adequately Explained? A Survey”, ACM Computing Surveys, Vol. 57, Issue 5, Article No. 131, page 1-36, January 2025. Doi: https://doi.org/10.1145/3711122 (IF: 23.8)
  20. G. L. Zhou, Y. J. Liu, Z. Yan*, E. Gelenbe, “Is ChatGPT Trustworthy Enough? A Review”, IEEE Consumer Electronics Magazine, Vol. 14, Issue 5, pp. 28-39, September 2025. Doi: 10.1109/MCE.2024.3485257 (IF: 3.7)
  21. B. C. Yan, J. H. Lan, Z. Yan*, “Backdoor Attacks against Voice Recognition Systems: A Survey”, ACM Computing Surveys, Vol. 57, Issue 3, Article No. 78, pp. 1-35, 2025. Doi: 10.1145/3701985 (IF: 23.8)

The following selected top-level papers first authored by me or by my students are accepted in 2024:

  1. P. P. Han, Z. Yan*, L. T. Yang, E. Bertino, “P2C2T: Preserving the Privacy of Cross-Chain Transfer”, The 46th IEEE Symposium on Security and Privacy (S&P 2025), San Francisco, CA, 2025. (CCF A, 14.3% acceptance rate, Security BIG4 Conference)
  2. X. Y Jing, Q. H. Cao, C. H. Zhang, Z. Yan*, W. X. Ding, W. Pedrycz, and P. Wang, "TardySketch: A Framework for Cardinality Estimation Adaptable to Sliding Windows", IEEE 2025 41st International Conference on Data Engineering (ICDE), HongKong, May 19-23, 2025. (CCF A)
  3. Wei Feng, Danting Liu, Qianqian Wang, Wenqi Liang, Zheng Yan, “Scalable Federated One-Step Multi-View Clustering with Tensorized Regularization,” The 39th Annual AAAI Conference on Artificial Intelligence (AAAI’25), Philadelphia, Pennsylvania at the Pennsylvania Convention Center, Volume 39 Issue 16, pp. 16586-16594, February 25 - March 4, 2025. (CCF A)
  4. S. F. Fei, Z. Yan*, D. L. Wang, H. M. Xie, H. G. Wang, T. Y. Li, “B5G-NFM: Blockchain-based 5G Network Function Management with Enhanced Security and Privacy”, IEEE/ACM Transactions on Networking, Vol. 33, Issue: 3, pp. 1128-1143, June 2025. Doi: 10.1109/TON.2024.3522133 (CCF A, IF: 3)
  5. X. Y. Li, J. Wang, Z. Yan*, “Can Graph Neural Networks be Adequately Explained? A Survey”, ACM Computing Surveys, Vol. 57, Issue 5, Article No. 131, page 1-36, January 2025. Doi: https://doi.org/10.1145/3711122 (IF: 23.8)
  6. S. B. Zhang, Y. M. Pan, Q. Liu, Z. Yan, K. K. R. Choo, G. J. Wang, “Backdoor Attacks and Defenses Targeting Multi-Domain AI Models: A Comprehensive Review”, ACM Computing Surveys, Vol. 57, Issue 4, Article 87, pp. 1-35, 2025. Doi: https://doi.org/10.1145/3704725 (IF: 23.8)
  7. B. C. Yan, J. H. Lan, Z. Yan*, “Backdoor Attacks against Voice Recognition Systems: A Survey”, ACM Computing Surveys, Vol. 57, Issue 3, Article No. 78, pp. 1-35, 2025. Doi: 10.1145/3701985 (IF: 23.8)
  8. Y. S. Yang, J. J. Li, N. Y. Luo, Z. Yan*, Y. F. Zhang, K. Zeng, “BatchAuth: A Physical Layer Batch Authentication Scheme for Multiple Backscatter Devices”, IEEE Transactions on Information Forensics and Security, Vol. 19, pp. 9452-9466, 2024. Doi: 10.1109/TIFS.2024.3473322 (CCF A, IF: 6.3)
  9. Z. Li, L. Zhang, C. Liu, S. Le, J. Chen, Kang G. Shin, Z. Yan, and J. Liu, “Interference Recycling: Effective Utilization of Interference for Enhancing Data Transmission,” IEEE Trans. Mobile Computing, 2024. Doi: 10.1109/TMC.2024.3467339 (CCF A, IF: 7.9)
  10. K. Huang, Z. Z. Xu, S. Yang, H. Y. Sun, X. J. Li, Z. Yan, Y. Q. Zhang*, “Evolving Paradigms in Automated Program Repair: Taxonomy, Challenges, and Opportunities”, ACM Computing Surveys, Vol. 57, Issue 2, Article No.: 36, pp.1–43, 2025. Doi: 10.1145/3696450 (IF: 23.8)
  11. Y. Liu, Z. Li*, Kang G. Shin, Z. Yan, “iCoding: Countermeasure Against Interference and Eavesdropping in Wireless Communications”, IEEE Transaction on Information Forensics & Security, Vol. 19, pp. 9188-9203, 2024. Doi: 10.1109/TIFS.2024.3468902 (CCF A, IF: 7.231)
  12. Z. Li, S. W. Le, J. Chen, K. G. Shin, J. Liu, Z. Yan, R. Jäntti,Decomposed and Distributed Modulation to Achieve Secure Transmission”, IEEE Transactions on Mobile Computing, 2023. Doi: 10.1109/TMC.2024.3391344 (CCF A, IF: 7.9)
  13. J. J. Li, Y. S. Yang, Z. Yan*, “AI-based Physical Layer Key Generation in Wireless Communications: Current Advances, Open Challenges, and Future Directions”, IEEE Wireless Communications Magazine, 2024. (IF: 12.777) (accepted)
  14. Z. Li, C. Y. Liu, L. J. Zhang, K. G. Shin, J. Liu, Z. Yan, R. Jäntti, “Exploiting Interference with an Intelligent Reflecting Surface to Enhance Data Transmission”, IEEE Transactions on Wireless Communications, 2024. Doi: 10.1109/TWC.2024.3366229 (IF: 10.4)
  15. J. Wang, Z. Yan*, J. H. Lan, E. Bertino, W. Pedrycz, “TrustGuard: GNN-based Robust and Explainable Trust Evaluation with Dynamicity Support”, IEEE Transactions on Dependable and Secure Computing, Vol. 21, Issue 5, pp. 4433-4450, 2024. Doi: 10.1109/TDSC.2024.3353548 (CCF A, IF: 7.329)
  16. H. M. Xie, Z. Yan*, “SPCEX: Secure and Privacy-preserving Cryptocurrency Exchange”, IEEE Transactions on Dependable and Secure Computing, Vol. 21, Issue 5, pp. 4404 – 4417, Sept.-Oct. 2024. Doi: 10.1109/TDSC.2024.3353541 (CCF A, IF: 7.329)
  17. J. J. Li, P. Wang, Z. Yan*, Y. S. Yang, K. Zeng, “BGKey: Group Key Generation for Backscatter Communications among Multiple Devices”, IEEE Transactions on Information Forensics and Security, Vol. 19, pp. 2470-2486, 2024. Doi: 10.1109/TIFS.2023.3345650 (CCF A, IF: 7.231)
  18. Y. X. Cai, W. X, Ding*, Y. X. Xiao, Z. Yan, X. M. Liu, Z. G. Wan, “SecFed: A Secure and Efficient Federated Learning based on Multi-Key Homomorphic Encryption”, IEEE Transactions on Dependable and Secure Computing, February 2023. Doi: 10.1109/TDSC.2023.3336977 (CCF A, IF: 7.329)
  19. X. Xu, Q. H. Zheng, Z. Yan*, M. Fan, A. Jia, Z. H. Zhou, H. J. Wang, T. Liu, "PatchDiscovery: Patch Presence Test for Identifying Binary Vulnerabilities Based on Key Basic Blocks", IEEE Transactions on Software Engineering, 2023. Doi: 10.1109/TSE.2023.3332732 (CCF A, IF: 9.322)
  20. G. Liu, Z. Yan*, D. L. Wang, H. G. Wang, T. Y. Li, “DePTVM: Decentralized Pseudonym and Trust Value Management for Integrated Networks”, IEEE Transactions on Dependable and Secure Computing, Vol. 21, Issue 1, pp. 110-124, Jan. – Feb. 2024. Doi: 10.1109/TDSC.2023.3246799 (CCF A, IF: 7.329)

The following selected top-level papers first authored by me or by my students are accepted in 2023:

  1. J. H. Lan, J. Wang, B. C. Yan, Z. Yan*, E. Bertino, “FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge”, The 45th IEEE Symposium on Security and Privacy (S&P 2024), San Francisco, CA, 2024. (CCF A, 14.9% acceptance rate, Security BIG4 Conference)
  2. J. J. Li, P. Wang, Z. Yan*, Y. S. Yang, K. Zeng, “BGKey: Group Key Generation for Backscatter Communications among Multiple Device”, IEEE Transactions on Information Forensics and Security, 2023. Doi: 10.1109/TIFS.2023.3345650 (CCF A, IF: 7.231)
  3. X. Xu, Q. H. Zheng, Z. Yan*, M. Fan, A. Jia, Z. H. Zhou, H. J. Wang, T. Liu, "PatchDiscovery: Patch Presence Test for Identifying Binary Vulnerabilities Based on Key Basic Blocks", IEEE Transactions on Software Engineering, 2023. Doi: 10.1109/TSE.2023.3332732 (CCF A, IF: 9.322)
  4. M. Kaveh*, Z. Yan, R. Jäntti, “Secrecy Performance Analysis of RIS-Aided Smart Grid Communications”, IEEE Transactions on Industrial Informatics, 2023. Doi: 10.1109/TII.2023.3333842 (IF: 12.3)
  5. S. F. Fei, Z. Yan*, H. M. Xie, G. C. Liu, Sec-E2E: End-to-End Communication Security in LS-HetNets Based on Blockchain, IEEE Transactions on Network Science and Engineering, 2023. Doi: DOI: 10.1109/TNSE.2023.3307884. (IF: 5.033)
  6. X. M. Liu, H. M. Xie, Z. Yan*, X. Q. Liang, “A Survey on Blockchain Sharding”, ISA Transactions, 2023. Doi: 10.1016/j.isatra.2023.06.029 (IF: 5.911)
  7. L. Peng, Z. Yan*, X. Q. Liang, X. X. Yu, “SecDedup: Secure Data Deduplication with Dynamic Auditing in the Cloud”, Information Sciences, Vol. 644, 119279, October 2023. Doi: https://doi.org/10.1016/j.ins.2023.119279 (IF: 8.233)
  8. Y. X. Chen*, Q. H. Zheng, Z. Yan, “Efficient Bi-objective SQL Optimization for Enclaved Cloud Databases with Differentially-Private Padding”, ACM Transactions on Database Systems, Vol. 48, No. 2, 6:1-40, May 2023. https://doi.org/10.1145/3597021 (CCF A, IF: 3.121)
  9. L. J. Gao, Z. Yan*, X. Q. Liang, X. Xu, J. Wang, W. X. Ding, L. T. Yang, “Taxonomy and Recent Advance of Game Theoretical Approaches in Adversarial Machine Learning: A Survey”, ACM Transaction on Sensor Networks, 2023. Doi: https://doi.org/10.1145/3600094 (CCF B, IF: 3.389)
  10. H. N. Yuan, S. F. Fei, Z. Yan*, “Technologies of Blockchain Interoperability: A Survey”, Digital Communications and Networks, 2022. (IF: 6.348) (accepted)
  11. X. X. Xie, J. L. Zhang, Z. Yan*, H. G. Wang, T. Y. Li, “Can Routing be Effectively Learned in Integrated Heterogeneous Networks?”, IEEE Network Magazine, 2022. (IF: 10.294) (accepted)
  12. R. Y. Yin, Z. Yan, X. Q. Liang*, H. M. Xie, and Z. G. Wan, “A Survey on Privacy Preservation Techniques for Blockchain Interoperability”, Journal of Systems Architecture, Vol. 140, 102892, April 29, 2023. Doi: https://doi.org/10.1016/j.sysarc.2023.102892 (IF: 5.836, CCF B)
  13. H. Bai, X. X. Yu, Z. Yan*, J. L. Zhang, L. T. Yang, “VeriORouting: Verification on Intelligent Routing Outsourced to the Cloud”, Information Sciences, Vol. 633, pp. 410-430, July 2023. Doi: 10.1016/j.ins.2023.03.039 (IF: 8.233) 
  14. G. Liu, Z. Yan*, D. L. Wang, H. G. Wang, T. Y. Li, “DePTVM: Decentralized Pseudonym and Trust Value Management for Integrated Networks”, IEEE Transactions on Dependable and Secure Computing, February 2023. Doi: 10.1109/TDSC.2023.3246799 (CCF A, IF: 7.329)
  15. Y. J. Liu, J. Wang, Z. Yan*, Z. G. Wan, R. Jäntti, “A Survey on Blockchain-based Trust Management for Internet of Things”, IEEE Internet of Things Journal, Vol. 10, Issue 7, pp. 5898-5922, 2023. Doi: 10.1109/JIOT.2023.3237893 (IF: 10.238)
  16. J. J. Li, P. Wang, L. Jiao, Z. Yan*, K. Zeng, Y. S. Yang, “Security Analysis of Triangle Channel-based Physical Layer Key Generation in Wireless Backscatter Communications”, IEEE Transactions on Information Forensics and Security, Vol. 18, pp. 948-964, 2023. Doi: 10.1109/TIFS.2022.3224852 (CCF A, IF: 7.231)
  17. H. Han, X. Y. Jing, Z. Yan*, W. Pedrycz, “ExtendedSketch+: Super Host Identification and Network Host Trust Evaluation with Memory Efficiency and High Accuracy”, Information Fusion, Vol. 92, pp. 300-312, 2023. Doi: https://doi.org/10.1016/j.inffus.2022.12.009 (IF: 17.564)

The following selected top-level papers first authored by me or by my students are accepted in 2022:

  • D. Liu, Z. Yan, W. X. Ding*, Y. X. Cai, Y. X. Chen, Z. G. Wan, “ESMAC: Efficient and Secure Multi-owner Access Control with TEE in Multi-level Data Processing”, IEEE Transactions on Dependable and Secure Computing, 2022. Doi: 10.1109/TDSC.2022.3215977 (CCF A, IF: 7.329)
  • Z. Liu, C. Z. Hu, C. Shan*, Z. Yan, “ADCaDeM: A Novel Method of Calculating Attack Damage Based on Differential Manifolds”, IEEE Transactions on Dependable and Secure Computing, October 2022. Doi: 10.1109/TDSC.2022.3214809 (CCF A, IF: 7.329)
  • H. M. Xie, S. F. Fei, Z. Yan*, Y. Xiao, “SofitMix: A Secure Offchain-Supported Bitcoin-Compatible Mixing Protocol”, IEEE Transactions on Dependable and Secure Computing, October 2022. Doi: 10.1109/TDSC.2022.3213824 (CCF A, IF: 6.791)
  • R. Zhang, Z. Yan*, X. R. Wang, R. H. Deng, “LiVoAuth: Liveness Detection in Voiceprint Authentication with Random Challenges and Detection Modes”, IEEE Transactions on Industrial Informatics, October 2022. Doi: 10.1109/TII.2022.3213830 (IF: 11.648)
  • Z. Yan*, L. T. Yang, T. Y. Li, Y. Miche, S. Yu, S. Yau, “Special Issue Editorial: Trust, Security and Privacy of 6G”, IEEE Network Magazine, July/August 2022.
  • Z. Yan*, Q. H. Zheng, Y. L. Wu, Y. L. Zhao, M. Atiquzzaman, “Blockchain-enabled Technologies for Cyber-Physical Systems and Big Data Applications”, Digital Communications and Networks (Elsevier), Issue 5, 2022.
  • P. Wang, H. C. Gao, X. Y. Guo, C. X. Xiao, F. Q. Qi, Z. Yan, “An Experimental Investigation of Text-based CAPTCHA Attacks and Their Robustness”, ACM Computing Surveys, 2022. Doi: https://doi.acm.org?doi=3559754 (accepted) (IF: 10.28)
  • J. Wang, Z. Yan*, H. G. Wang, T. Y. Li, W. Pedrycz, “A Survey on Trust Models in Heterogeneous Networks”, IEEE Communications Surveys and Tutorials, 2022. Doi: 10.1109/COMST.2022.3192978 (IF: 33.84)
  • P. Wang, Z. Yan*, K. Zeng, “BCAuth: Physical Layer Enhanced Authentication and Attack Tracing for Backscatter Communications”, IEEE Transactions on Information Forensics and Security, Vol. 17, pp. 2818-2834, 2022. Doi: 10.1109/TIFS.2022.3195407 (CCF A, IF: 7.231)
  • R. Han, Z. Yan, X. Q. Liang*, L. T. Yang, “How Can Incentive Mechanisms and Blockchain Benefit with Each Other? A Survey”, ACM Computing Surveys, 2022. https://doi.acm.org?doi=3539604 (IF: 10.28)
  • X. Y. Jing, J. J. Zhao, Z. Yan*, W. Pedrycz, X. Li, “Granular Classifier: Building Traffic Granules for Encrypted Traffic Classification Based on Granular Computing”, Digital Communications and Networks, 2022. (accepted) (IF: 6.797)
  • J. H. Lan, R. Zhang, Z. Yan*, J. Wang, Y. Chen, R. H. Hou, “Adversarial Attacks and Defenses on Speaker Recognition Systems: A Survey”, Journal of Systems Architecture, Vol. 127, 102526, June 2022. https://doi.org/10.1016/j.sysarc.2022. (IF: 3.777, CCF B)
  • S. S. Liu, Z. Yan*, “Efficient Privacy Protection Protocols for 5G-Enabled Positioning in Industrial IoT”, IEEE Internet of Things Journal, Vol. 9, Issue 19, pp. 18527-18538, October 1 2022. Doi: 0.1109/JIOT.2022.3161148 (IF: 9.936)
  • P. Wang*, Z. Yan, N. Wang, K. Zeng, “Optimal Resource Allocation for Secure Multi-device Wirelessly Powered Backscatter Communications with Artificial Noise”, IEEE Transactions on Wireless Communications, Vol. 21, Issue 9, pp. 7794-7809, September 2022. Doi: 10.1109/TWC.2022.3162137 (IF: 7.016)
  • H. X. Han, S. F. Fei, Z. Yan*, X. K. Zhou, “A Survey on Blockchain-based Integrity Auditing for Cloud Data”, Digital Communications and Networks, 2022. (accepted) (IF: 6.797)
  • X. Q. Liang, Z. Yan*, K. Raimo, “GAIMMO: A Grade-driven Auction-based Incentive Mechanism with Multiple Objectives for Decentralized Crowdsourcing”, IEEE Internet of Things Journal, Vol. 9, Issue 18, pp. 17488-17502, September 15 2022. Doi: 10.1109/JIOT.2022.3155631 (IF: 9.936)
  • K. D. Liu, Z. Yan, X. Q. Liang*, R. Kantola, C. Y. Hu, “A Survey on Blockchain-enabled Federated Learning and its Prospects with Digital Twins”, Digital Communications and Networks, 2022. (accepted) (IF: 6.797)
  • R. Zhang, Z. Yan*, X. R. Wang, R. H. Deng, “VOLERE: Leakage Resilient User Authentication Based on Personal Voice Challenges”, IEEE Transactions on Dependable and Secure Computing, 2022. Doi: 10.1109/TDSC.2022.3147504 (CCF A, IF: 7.329)
  • Z. Yan*, X. R. Qian, S. S. Liu, R. H. Deng, “Privacy Protection in 5G Positioning and Location-Based Services Based on SGX”, ACM Transaction on Sensor Networks, 2022. Doi: https://doi.org/10.1145/3512892 (IF: 3.52)
  • X. X. Yu, H. Bai, Z. Yan*, R. Zhang, “VeriDedup: A Verifiable Cloud Data Deduplication Scheme with Integrity and Duplication Proof”, IEEE Transactions on Dependable and Secure Computing, 2021. Doi: 10.1109/TDSC.2022.3141521 (CCF A, IF: 7.329)
  • H. Han, Z. Yan*, X. Y. Jing, W. Pedrycz, “Applications of Sketches in Network Traffic Measurement: A Survey”, Information Fusion, Vol. 82, pp. 58-85, 2022. Doi: 10.1016/j.inffus.2021.12.007 (IF: 12.975)
  • W. T. Wei, J. Wang, Z. Yan*, W. X. Ding, “EPMDroid: Efficient and Privacy-preserving Malware Detection Based on SGX through Data Fusion”, Information Fusion, Vol. 82, pp. 43-57, 2022. Doi: 10.1016/j.inffus.2021.12.006 (IF: 12.975)
  • X. Y. Jing, Z. Yan*, H. Han, W. Pedrycz, “ExtendedSketch: Fusing Network Traffic for Super Host Identification with a Memory Efficient Sketch”, IEEE Transactions on Dependable and Secure Computing, 2021. Doi: 10.1109/TDSC.2021.3111328. (CCF A, IF: 7.329)
  • J. L. Zhang, Z. Yan*, S. F. Fei, M. J. Wang, T. Y. Li, H. G. Wang, “Is Today’s End-to-End Communication Security Enough for 5G and Its Beyond?”, IEEE Network Magazine, Vol. 36, No. 1, pp. 105-112, Jan./Feb. 2022. Doi: 10.1109/MNET.101.2100189 (IF: 10.693)

The following selected top-level papers first authored by me or by my students are accepted before 2022:

  • Y. L. Li, S. S. Liu, Z. Yan*, R. H. Deng, “Secure 5G Positioning with Truth Discovery, Attack Detection and Tracing”, IEEE Internet of Things Journal, 2021. Doi: 10.1109/JIOT.2021.3088852 (IF: 9.936)
  • Dr. Xueqin Liang achieved IEEE TCSC Outstanding Ph.D. Dissertation Award 2021
  • X. Q. Liang, Z. Yan*, X. F. Chen, L. T. Yang, W. J. Lou, Y. T. Hou, “Game Theoretical Analysis on Encrypted Cloud Data Deduplication” IEEE Transactions on Industrial Informatics, 2019. Doi: 10.1109/TII.2019.2920402 (IF: 7.377)
  • D. Liu, Z. Yan, W.X. Ding*, M. Atiquzzaman, “A Survey on Secure Data Analytics in Edge Computing”, IEEE Internet of Things Journal, Vol. 6, No. 3, pp. 4946-4967, June 2019. Doi: 10.1109/JIOT.2019.2897619 (IF: 9.515)
  • X.Y. Jing, J.J. Zhao, Q.H. Zheng, Z. Yan*, W. Pedrycz, “A Reversible Sketch-based Method for Detecting and Mitigating Amplification Attacks”, Journal of Network and Computer Applications, Vol. 142, pp. 15-24, Sept. 2019. Doi: 10.1016/j.jnca.2019.06.007 (IF: 5.273)
  • R. Zhang, Z. Yan*, “A Survey on Biometric Authentication: towards Secure and Privacy-Preserving Identification”, IEEE Access, Vol. 7, No. 1, pp. 5994-6009, 2019. Doi: 10.1109/ACCESS.2018.2889996 (IF: 4.098)
  • W. Feng, Z. Yan*, “MCS-Chain: Decentralized and Trustworthy Mobile Crowdsourcing Based on Blockchain”, Future Generation Computer Systems, vol. 95, pp. 649-666, June 2019. (IF: 5.768)
  • X.Y. Jing, Z. Yan*, W. Pedrycz, “Security Data Collection and Data Analytics in the Internet: A Survey”, IEEE Communications Surveys and Tutorials, vol. 21, issue 1, pp. 586-618, first quarter 2019. Doi: 10.1109/COMST.2018.2863942 (IF: 22.973)
  • W.X Ding, X.Y. Jing, Z. Yan*, L.T. Yang, “A Survey on Data Fusion in Internet of Things: Towards Secure and Privacy-Preserving Fusion”, Information Fusion, vol. 51, pp. 129-144, 2019. Doi: 10.1016/j.inffus.2018.12.001 (IF: 10.716)
  • X.X. Yu, Z. Yan*, R. Zhang, “Verifiable Outsourced Computation over Encrypted Data”, Information Sciences, Vol. 479, pp. 372-385, April 2019. Doi: 10.1016/j.ins.2018.12.022 (IF: 5.524)
  • X.Y. Jing, Z. Yan*, X.Q. Liang, W. Pedrycz, “Network Traffic Fusion and Analysis against DDoS Flooding Attacks with a Novel Reversible Sketch”, vol. 51, pp. 100-113, Information Fusion, Nov. 2019. https://doi.org/10.1016/j.inffus.2018.10.013 (IF: 10.716)
  • H.M. Xie, Z. Yan*, Z. Yao, M. Atiquzzaman, “Data Collection for Security Measurement in Wireless Sensor Networks: A Survey”, IEEE Internet of Things Journal, Vol. 6, No. 2, pp. 2205-2224, April 2019. Doi: 10.1109/JIOT.2018.2883403 (IF: 9.515)
  • H.Q. Lin, Z. Yan*, Y.L. Fu, “Adaptive Security-Related Data Collection with Context Awareness”, Journal of Network and Computer Applications, Vol. 126, pp. 88-103, Jan. 2019. Doi: 10.1016/j.jnca.2018.11.002 (IF: 5.273)
  • D.H. Zhou, Z. Yan*, Y.L. Fu, Z. Yao, “A Survey on Network Data Collection”, Journal of Network and Computer Applications, Vo. 116, pp. 9-23, Aug. 2018.
  • G.Q. Li, Z. Yan, Y.L. Fu*, H.L. Chen, “Data Fusion for Network Intrusion Detection: A review", Security and Communication Networks, 2018. vol. 2018, Article ID 8210614, 16 pages, 2018. https://doi.org/10.1155/2018/8210614/.
  • K. Xu, W.D. Zhang, Z. Yan*, “A Privacy-Preserving Mobile Application Recommender System Based on Trust Evaluation”, Journal of Computational Science, 26, pp. 87-107, May 2018. Doi: 10.1016/j.jocs.2018.04.001
  • Z. Yao, Z. Yan*, “A Trust Management Framework for Software-Defined Network Applications”, Concurrency and Computation Practice and Experiences, 2018. Doi: 10.1002/cpe.4518
  • H.Q. Lin, Z. Yan*, Y. Chen, L.F. Zhang, “A Survey on Network Security-Related Data Collection Technologies, IEEE Access. (Accepted) (IF: 3.224)
  • Z. Yan*, P. Wang, W. Feng, “A Novel Scheme of Anonymous Authentication on Trust in Pervasive Social Networking”, Information Sciences, 2018. Doi: 10.1016/j.ins.2018.02.037 (IF: 5.524)
  • G. Liu, Z. Yan*, A. W. Pedryczc, “Data Collection for Attack Detection and Security Measurement in Mobile Ad Hoc Networks: A Survey”, Journal of Network and Computer Applications, Vol. 105, pp. 105-122, march 2018. Doi: https://doi.org/10.1016/j.jnca.2018.01.004 (IF: 5.273)
  • L.M. He, Z. Yan*, M. Atiquzzaman, “LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey”, IEEE Access, Vol. 6, Issue 1, pp. 4220-4242, 2018. Doi: 10.1109/ACCESS.2018.2792534
  • N. Li, Z. Yan*, M. J. Wang, L. T. Yang, “Securing Communication Data in Pervasive Social Networking based on Trust with KP-ABE”, ACM Trans. on Cyber-Physical Systems, 2017. (accepted)
  • 15/11/2017, Z. Yan*, W.X. Ding, X.X. Yu, H.Q. Zhu, R. H. Deng, “Deduplication on Encrypted Big Data in Cloud”, IEEE Transactions on Big Data, vol. 2, no. 2, pp. 138-150, April-June 2016. Doi: 10.1109/TBDATA.2016.2587659 achieves **The 2017 IEEE ComSoc TCBD Best Journal Paper Award**
  • 01/11/2017, X.Q. Liang, Z. Yan*, A Survey on Game Theoretical Methods in Human-Machine Networks, Future Generation Computer Systems, 2017. (invited paper) (IF: 3.997) Doi: 10.1016/j.future.2017.10.051
  • 20/10/2017, W. Feng, Z. Yan*, H.R. Zhang, K. Zeng, Y. Xiao, T. Hou, “Survey on Security, Privacy and Trust in Mobile Crowdsourcing”, IEEE Internet of Things Journal, 2017. Doi: 10.1109/JIOT.2017.2765699 (IF: 7.596) 中科院1区
  • 05/10/2017, Congratulations to Tian Fengyu, Yan Ping and Xie Haomeng to achieve National Scholarship Awards.
  • 01/10/2017, N. Li, Z. Yan*, M. J. Wang, L. T. Yang, “Securing Communication Data in Pervasive Social Networking based on Trust with KP-ABE”, ACM Trans. on Cyber-Physical Systems, 2017. (accepted)
  • 04/09/2017, Z. Yan*, H. M. Xie, P. Zhang, B. B. Gupta, “Flexible Data Access Control in D2D Communications”, Future Generation Computer Systems, 2017. (accepted) (IF: 3.997)
  • 01/09/2017, Congratulations to Ding Wenxiu to achieve the scholarship granted by Network Security Fundation!中国互联网发展基金会网络安全专项基金 网络安全奖学金评选结果公示,恭喜丁文秀同学当选!
  • 25/08/2017, 陈寒露,闫峥,付玉龙,基于串并行结构网络安全数据处理方法及系统、社交网络,申请号201710740993.X,申请日期:25.08.2017.
  • 06/05/2017, F.Y. Tian, P. Zhang, Z. Yan*, “A Survey on C-RAN Security”, IEEE Access, 2017. Doi: 10.1109/ACCESS.2017.2717852
  • 06/05/2017, W.X. Ding, Z. Yan*, R.H. Deng, “Encrypted Data Processing with Homomorphic Re-Encryption”, Information Sciences, 2017 (accepted)
  • 02/05/2017, Z. Yan*, L.F. Zhang, W.X. Ding, Q.H. Zheng, “Heterogeneous Data Storage Management with Deduplication in Cloud Computing”, IEEE Transactions on Big Data, 2017. Doi: 10.1109/TBDATA.2017.2701352
  • Finish the editorial of special issue in Information Fusion. Z. Yan*, J. Liu, L.T. Yang, N. Chawla, “Big Data Fusion in Internet of Things, Information Fusion”, April, 2017. Doi: 10.1016/j.inffus.2017.04.005
  • 18/04/2017, P. Yan, Z. Yan*, “A Survey on Dynamic Mobile Malware Detection”, Software Quality Journal, 2017. DOI: 10.1007/s11219-017-9368-4
  • 17/04/2017, X.X. Yu,Z. Yan*, A.V. Vasilakos,“A Survey of Verifiable Computation”, Mobile Networks and Applications, Springer, 2017. (accepted)
  • SW Copyright application

1.     徐坤,闫峥,党田力,基于用户信任行为的App信任值生成仿真软件(TruBeRepec客户端) V1.0,04.2017

2.     王普,闫峥,史汪洋,藺华庆,李宁, FlexiFile:个人云数据访问控制系统, 03.2017.

3.     许广武,闫峥, 基于可信计算的虚拟化网络功能中信任保障系统软件V1.0, 03.2017.

  • 03/02/2017, W. Feng, Z. Yan*, H.M. Xie, "Anonymous Authentication on Trust in Pervasive Social Networking Based on Group Signature", IEEE Access, 2017. (accepted)
  • 31/012017, Z Yan*, X.X. Yu, W.X. Ding, Context-Aware Verifiable Cloud Computing, IEEE Access, 2016. (accepted)
  • 19/01/2017, M.J. Wang, Z. Yan*, V. Niemi, “UAKA-D2D: Universal Authentication and Key Agreement Protocol in D2D Communications", Mobile Networks and Applications, Springer, 2017. (accepted)
  • 25/12/2016, C.Y. Huang, Z. Yan*, N. Li, M. J. Wang, “Secure Pervasive Social Communications based on Trust in a Distributed Way”, IEEE Access, 2016. (Accepted)
  • 19/12/2016, Prof. Zheng Yan was invited to serve as an editorial board member of Journal of Network and Computer Applications(IF: 2.331)
  • 29/11/2016, achieved a US patent grant. Zheng Yan, An Approach of Secure Recognization for Pervasive Face-to-Face Social Communications,Country/type of grant: United States, Grant date 29-Nov-2016, Patent Number is 9509835.
  • 21/11/2016, L.J. Gao, Z. Yan*, L.T. Yang "Game Theoretical Analysis on Acceptance of a Cloud Data Access Control System Based on Reputation", IEEE Transactions on Cloud Computing, 2016. (accepted)
  • 17/11/2016, Z. Yan*, W.Y. Shi, “CloudFile: A Cloud Data Access Control System based on Mobile Social Trust”, Journal of Network and Computer Applications, 2016. Doi: 10.1016/j.jnca.2016.11.016. (accepted) (IF: 2.331)
  • 15/11/2016, Congratulations to Ding Wenxiu to achieve national scholarship!
  • 15/11/2016, Z. Yan*, X.Y. Jing, W. Pedrycz, “Fusing and Mining Opinions for Reputation Generation”, Information Fusion, 2016. (accepted) (IF: 4.353)
  • 30/10/2016, Congratulations to Wang Mingjun to achieve the scholarship granted by Network Security Fundation!中国互联网发展基金会网络安全专项基金 网络安全奖学金评选结果公示,恭喜王明君同学当选!
  • 13/10/2016, F. Tong, Z. Yan*, A Hybrid Approach of Mobile Malware Detection in Android, Journal of Parallel and Distributed Computing, 2016. Doi: 10.1016/j.jpdc.2016.10.012 (IF: 1.320)
  • 11/10/2016, achieved a US patent invented by Yan Zheng. Zheng Yan, A method to securely access instant community data based on trust levels, contexts and time clock, Country/type of grant: United States, Grant date 11-Oct-2016, Patent Number is 9465950. Nokia Code: 77844, priority patent application number: PCT/CN2012/071982, Application date: 06-Mar-2012.