default search action
Yong Yu 0002
Person information
- unicode name: 禹勇
- affiliation: Shaanxi Normal University, School of Computer Science, Xi'an, China
- affiliation (former): University of Electronic Science and Technology of China, School of Computer Science and Engineering, Chengdu, China
- affiliation (former): University of Wollongong, School of Computer Science and Software Engineering, NSW, Australia
- affiliation (PhD 2008): Xidian University, Xi'an, China
Other persons with the same name
- Yong Yu — disambiguation page
- Yong Yu 0001 — Shanghai Jiao Tong University, Department of Computer Science, Apex Data and Knowledge Management Lab, China
- Yong Yu 0003 — Kagoshima University, Department of Mechanical Engineering, Japan (and 2 more)
- Yong Yu 0004 — University of Houston, Department of Physics, TX, USA
- Yong Yu 0005 — Broadcom Corporation, Andover, MA, USA (and 1 more)
- Yong Yu 0006 — Ecole Normale Supérieure de Cachan, France (and 1 more)
- Yong Yu 0007 — Harbin Institute of Technology, School of Electrical Engineering and Automation, China
- Yong Yu 0008 — Hong Kong Polytechnic University, Business Division, Institute of Textiles and Clothing, Hong Kong
- Yong Yu 0009 — Yunnan University, School of Software, Kunming, China
- Yong Yu 0010 — Beihang University, School of Mechanical Engineering and Automation, Beijing, China
- Yong Yu 0011 — Chinese Academy of Sciences, Suzhou Institute of Biomedical Engineering and Technology, China
- Yong Yu 0012 — Chinese University of Hong Kong, Department of Mathematics, Hong Kong
- Yong Yu 0013 — Xi'an Research Institute of High-Tech, Department of Automation, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j119]Zongyang Zhang, Lingyue Zhang, Zhuo Wang, Yichen Li, Rongxing Lu, Yong Yu:
Chronos: An Efficient Asynchronous Byzantine Ordered Consensus. Comput. J. 67(3): 1153-1162 (2024) - [j118]Qiming Yu, Shilei Liao, Lianhai Wang, Yong Yu, Lingyue Zhang, Yanqi Zhao:
A regulated anonymous cryptocurrency with batch linkability. Comput. Stand. Interfaces 87: 103770 (2024) - [j117]Yichao Lu, Huilin Li, Le Gao, Jiaxin Yu, Yong Yu, Hexing Su:
Self-tallying e-voting with public traceability based on blockchain. Comput. Stand. Interfaces 88: 103795 (2024) - [j116]Jinhui Liu, Bo Tang, Guishan Dong, Yong Yu:
iPMRSS: An Improved privacy-preserving medical record searching scheme for intelligent diagnosis in IoMT. Expert Syst. Appl. 239: 122230 (2024) - [j115]Jinhui Liu, Shunyu Dong, Jiaming Wen, Bo Tang, Yong Yu:
TBSCrowd: A Blockchain-Assisted Privacy-Preserving Mobile Crowdsourcing Scheme From Threshold Blind Signatures. IEEE Internet Things J. 11(11): 19344-19354 (2024) - [j114]Hexing Su, Le Gao, Zhimin Wang, Yong Yu, Jin Hong, Yongqiao Gao:
A Hierarchical Full-Resolution Fusion Network and Topology-Aware Connectivity Booster for Retinal Vessel Segmentation. IEEE Trans. Instrum. Meas. 73: 1-16 (2024) - [j113]Baobao Chai, Jiguo Yu, Biwei Yan, Yong Yu, Shengling Wang:
BSCDA: Blockchain-Based Secure Cross-Domain Data Access Scheme for Internet of Things. IEEE Trans. Netw. Serv. Manag. 21(4): 4006-4023 (2024) - [j112]Lianhai Wang, Huilin Li, Yannan Li, Yong Yu, Xiaojiang Du:
Self-Tallying Voting with Blockchain in Wireless Network Environment. IEEE Wirel. Commun. 31(5): 142-147 (2024) - [c41]Chengzhe Lai, Xinwei Zhang, Haodi Zhang, Guanjie Li, Yong Yu, Dong Zheng:
GAN Augmentation-Based Continuous Authentication for Vehicular Digital Twin. ICC 2024: 5220-5225 - 2023
- [j111]Jinhui Liu, Tianyi Han, Maolin Tan, Bo Tang, Wei Hu, Yong Yu:
A Publicly Verifiable E-Voting System Based on Biometrics. Cryptogr. 7(4): 62 (2023) - [j110]Jinhui Liu, Jiaming Wen, Bowen Zhang, Shunyu Dong, Bo Tang, Yong Yu:
A post quantum secure multi-party collaborative signature with deterability in the Industrial Internet of Things. Future Gener. Comput. Syst. 141: 663-676 (2023) - [j109]Huilin Li, Yu Sun, Yong Yu, Dawei Li, Zhenyu Guan, Jianwei Liu:
Privacy-Preserving Cross-Silo Federated Learning Atop Blockchain for IoT. IEEE Internet Things J. 10(24): 21176-21186 (2023) - [j108]Qian Zhang, Yong Yu, Huilin Li, Jiguo Yu, Lei Wang:
Trustworthy sealed-bid auction with low communication cost atop blockchain. Inf. Sci. 631: 202-217 (2023) - [j107]Jinhui Li, Yanle Li, Hao Yuan, Zinan Cheng, Yong Yu, Shahid Ghafoor, Fangyi Li:
Multi-stage finite element modeling of the deformation behavior during ultrasonic-assisted incremental sheet forming. J. Comput. Sci. 72: 102077 (2023) - [j106]Yihao Guo, Minghui Xu, Dongxiao Yu, Yong Yu, Rajiv Ranjan, Xiuzhen Cheng:
Cross-Channel: Scalable Off-Chain Channels Supporting Fair and Atomic Cross-Chain Operations. IEEE Trans. Computers 72(11): 3231-3244 (2023) - [j105]Wei Liu, Zhiguo Wan, Jun Shao, Yong Yu:
HyperMaze: Towards Privacy-Preserving and Scalable Permissioned Blockchain. IEEE Trans. Dependable Secur. Comput. 20(1): 360-376 (2023) - [c40]Haibin Zhang, Sisi Duan, Chao Liu, Boxin Zhao, Xuanji Meng, Shengli Liu, Yong Yu, Fangguo Zhang, Liehuang Zhu:
Practical Asynchronous Distributed Key Generation: Improved Efficiency, Weaker Assumption, and Standard Model. DSN 2023: 568-581 - 2022
- [j104]Jinhui Liu, Yong Yu, Hongliang Bi, Yanqi Zhao, Shijia Wang, Huanguo Zhang:
Post quantum secure fair data trading with deterability based on machine learning. Sci. China Inf. Sci. 65(7): 1-2 (2022) - [j103]Min Xie, Yong Yu, Ruonan Chen, Huilin Li, Jianguo Wei, Qilong Sun:
Accountable outsourcing data storage atop blockchain. Comput. Stand. Interfaces 82: 103628 (2022) - [j102]Yiting Huang, Yong Yu, Huilin Li, Yannan Li, Aikui Tian:
Blockchain-based continuous data integrity checking protocol with zero-knowledge privacy protection. Digit. Commun. Networks 8(5): 604-613 (2022) - [j101]Junbin Shi, Qiming Yu, Yong Yu, Lianhai Wang, Wenzheng Zhang:
Privacy protection in social applications: A ciphertext policy attribute-based encryption with keyword search. Int. J. Intell. Syst. 37(12): 12152-12168 (2022) - [j100]Yanqi Zhao, Xiaoyi Yang, Yong Yu, Baodong Qin, Xiaojiang Du, Mohsen Guizani:
Blockchain-Based Auditable Privacy-Preserving Data Classification for Internet of Things. IEEE Internet Things J. 9(4): 2468-2484 (2022) - [j99]Junbin Shi, Yong Yu, Qiming Yu, Huilin Li, Lianhai Wang:
Toward Data Security in 6G Networks: A Public-Key Searchable Encryption Approach. IEEE Netw. 36(4): 166-173 (2022) - [j98]Xiaoyi Yang, Yanqi Zhao, Qian Chen, Yong Yu, Xiaojiang Du, Mohsen Guizani:
Accountable and Verifiable Secure Aggregation for Federated Learning in IoT Networks. IEEE Netw. 36(5): 173-179 (2022) - [j97]Jinhui Liu, Yong Yu, Houzhen Wang, Huanguo Zhang:
Lattice-Based Self-Enhancement Authorized Accessible Privacy Authentication for Cyber-Physical Systems. Secur. Commun. Networks 2022: 8995704:1-8995704:9 (2022) - [j96]Yannan Li, Willy Susilo, Guomin Yang, Yong Yu, Dongxi Liu, Xiaojiang Du, Mohsen Guizani:
A Blockchain-Based Self-Tallying Voting Protocol in Decentralized IoT. IEEE Trans. Dependable Secur. Comput. 19(1): 119-130 (2022) - [j95]Jianbing Ni, Kuan Zhang, Yong Yu, Tingting Yang:
Identity-Based Provable Data Possession From RSA Assumption for Secure Cloud Storage. IEEE Trans. Dependable Secur. Comput. 19(3): 1753-1769 (2022) - [j94]Lianhai Wang, Yannan Li, Qiming Yu, Yong Yu:
Outsourced Data Integrity Checking with Practical Key Update in Edge-Cloud Resilient Networks. IEEE Wirel. Commun. 29(3): 56-62 (2022) - [c39]Yao Wang, Tao Gu, Tom H. Luan, Yong Yu:
Your Breath Doesn't Lie: Multi-user Authentication by Sensing Respiration Using mmWave Radar. SECON 2022: 64-72 - [i9]Yihao Guo, Minghui Xu, Dongxiao Yu, Yong Yu, Rajiv Ranjan, Xiuzhen Cheng:
Cross-Channel: Scalable Off-Chain Channels Supporting Fair and Atomic Cross-Chain Operations. CoRR abs/2212.07265 (2022) - [i8]Haibin Zhang, Sisi Duan, Chao Liu, Boxin Zhao, Xuanji Meng, Shengli Liu, Yong Yu, Fangguo Zhang, Liehuang Zhu:
Practical Asynchronous Distributed Key Generation: Improved Efficiency, Weaker Assumption, and Standard Model. IACR Cryptol. ePrint Arch. 2022: 1678 (2022) - 2021
- [j93]Yunyi Fang, Yanqi Zhao, Yong Yu, Hui Zhu, Xiaojiang Du, Mohsen Guizani:
Blockchain-based privacy-preserving valet parking for self-driving vehicles. Trans. Emerg. Telecommun. Technol. 32(4) (2021) - [j92]Jinhui Liu, Yong Yu, Bo Yang, Jianwei Jia, Qiqi Lai:
Cryptanalysis of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family. Int. J. Found. Comput. Sci. 32(1): 73-91 (2021) - [j91]Jinhui Liu, Yong Yu, Kai Li, Le Gao:
Post-Quantum Secure Ring Signatures for Security and Privacy in the Cybertwin-Driven 6G. IEEE Internet Things J. 8(22): 16290-16300 (2021) - [j90]Yu Zhan, Baocang Wang, Rongxing Lu, Yong Yu:
DRBFT: Delegated randomization Byzantine fault tolerance consensus protocol for blockchains. Inf. Sci. 559: 8-21 (2021) - [j89]Yan Li, Lingyan Li, Yanqi Zhao, Nadra Guizani, Yong Yu, Xiaojiang Du:
Toward Decentralized Fair Data Trading Based on Blockchain. IEEE Netw. 35(1): 304-310 (2021) - [j88]Yanqi Zhao, Yong Yu, Ruonan Chen, Yannan Li, Aikui Tian:
Toward Transparent and Accountable Privacy-Preserving Data Classification. IEEE Netw. 35(4): 184-189 (2021) - [j87]Yannan Li, Guomin Yang, Willy Susilo, Yong Yu, Man Ho Au, Dongxi Liu:
Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability. IEEE Trans. Dependable Secur. Comput. 18(2): 679-691 (2021) - [j86]Huilin Li, Yannan Li, Yong Yu, Baocang Wang, Kefei Chen:
A Blockchain-Based Traceable Self-Tallying E-Voting Protocol in AI Era. IEEE Trans. Netw. Sci. Eng. 8(2): 1019-1032 (2021) - [j85]Wu Chen, Yong Yu, Keke Gai, Jiamou Liu, Kim-Kwang Raymond Choo:
Time-Efficient Ensemble Learning with Sample Exchange for Edge Computing. ACM Trans. Internet Techn. 21(3): 76:1-76:17 (2021) - [j84]Yannan Li, Yong Yu, Willy Susilo, Zhiyong Hong, Mohsen Guizani:
Security and Privacy for Edge Intelligence in 5G and Beyond Networks: Challenges and Solutions. IEEE Wirel. Commun. 28(2): 63-69 (2021) - [j83]Qiliang Yang, Tao Wang, Wenbo Zhang, Bo Yang, Yong Yu, Haiyu Li, Jingyi Wang, Zirui Qiao:
PrivCrowd: A Secure Blockchain-Based Crowdsourcing Framework with Fine-Grained Worker Selection. Wirel. Commun. Mob. Comput. 2021: 3758782:1-3758782:17 (2021) - [c38]Yannan Li, Willy Susilo, Guomin Yang, Tran Viet Xuan Phuong, Yong Yu, Dongxi Liu:
Concise Mercurial Subvector Commitments: Definitions and Constructions. ACISP 2021: 353-371 - [c37]Yannan Li, Willy Susilo, Guomin Yang, Yong Yu, Tran Viet Xuan Phuong, Dongxi Liu:
Non-Equivocation in Blockchain: Double-Authentication-Preventing Signatures Gone Contractual. AsiaCCS 2021: 859-871 - 2020
- [j82]Ruonan Chen, Yannan Li, Yong Yu, Huilin Li, Xiaofeng Chen, Willy Susilo:
Blockchain-Based Dynamic Provable Data Possession for Smart Cities. IEEE Internet Things J. 7(5): 4143-4154 (2020) - [j81]Jinhui Liu, Lianhai Wang, Yong Yu:
Improved Security of a Pairing-Free Certificateless Aggregate Signature in Healthcare Wireless Medical Sensor Networks. IEEE Internet Things J. 7(6): 5256-5266 (2020) - [j80]Yannan Li, Yong Yu, Ruonan Chen, Xiaojiang Du, Mohsen Guizani:
IntegrityChain: Provable Data Possession for Decentralized Storage. IEEE J. Sel. Areas Commun. 38(6): 1205-1217 (2020) - [j79]Yong Yu, Junbin Shi, Huilin Li, Yannan Li, Xiaojiang Du, Mohsen Guizani:
Key-Policy Attribute-Based Encryption With Keyword Search in Virtualized Environments. IEEE J. Sel. Areas Commun. 38(6): 1242-1251 (2020) - [j78]Dong Zheng, Liang Xue, Chao Yu, Yannan Li, Yong Yu:
Toward Assured Data Deletion in Cloud Storage. IEEE Netw. 34(3): 101-107 (2020) - [j77]Gang Han, Yannan Li, Yong Yu, Kim-Kwang Raymond Choo, Nadra Guizani:
Blockchain-Based Self-Tallying Voting System with Software Updates in Decentralized IoT. IEEE Netw. 34(4): 166-172 (2020) - [j76]Yannan Li, Yong Yu, Chunwei Lou, Nadra Guizani, Lianhai Wang:
Decentralized Public Key Infrastructures atop Blockchain. IEEE Netw. 34(6): 133-139 (2020) - [j75]Jianbing Ni, Kuan Zhang, Yong Yu, Xiaodong Lin, Xuemin Sherman Shen:
Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing. IEEE Trans. Dependable Secur. Comput. 17(3): 581-594 (2020) - [j74]Yong Yu, Yannan Li, Bo Yang, Willy Susilo, Guomin Yang, Jian Bai:
Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage. IEEE Trans. Emerg. Top. Comput. 8(2): 377-390 (2020) - [j73]Yong Yu, Yanqi Zhao, Yannan Li, Xiaojiang Du, Lianhai Wang, Mohsen Guizani:
Blockchain-Based Anonymous Authentication With Selective Revocation for Smart Industrial Applications. IEEE Trans. Ind. Informatics 16(5): 3290-3300 (2020) - [j72]Xiaodong Lin, Mohsen Guizani, Xiaojiang Du, Cheng-Kang Chu, Yong Yu:
Advances of Security and Privacy Techniques in Emerging Wireless Networks. IEEE Wirel. Commun. 27(3): 8-9 (2020)
2010 – 2019
- 2019
- [j71]Yi Zhao, Yong Yu, Bo Yang:
Leakage Resilient CCA Security in Stronger Model: Branch Hidden ABO-LTFs and Their Applications. Comput. J. 62(4): 631-640 (2019) - [j70]Lingyue Zhang, Huilin Li, Yannan Li, Yong Yu, Man Ho Au, Baocang Wang:
An efficient linkable group signature for payer tracing in anonymous cryptocurrencies. Future Gener. Comput. Syst. 101: 29-38 (2019) - [j69]Yong Yu, Guomin Yang, Huaxiong Wang:
Preface: Special Issue Cryptography and Provable Security. Int. J. Found. Comput. Sci. 30(4): 489-492 (2019) - [j68]Yao Wang, Wandong Cai, Tao Gu, Wei Shao, Yannan Li, Yong Yu:
Secure Your Voice: An Oral Airflow-Based Continuous Liveness Detection for Voice Assistants. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 3(4): 157:1-157:28 (2019) - [j67]Yong Yu, Yujie Ding, Yanqi Zhao, Yannan Li, Yi Zhao, Xiaojiang Du, Mohsen Guizani:
LRCoin: Leakage-Resilient Cryptocurrency Based on Bitcoin for Data Trading in IoT. IEEE Internet Things J. 6(3): 4702-4710 (2019) - [j66]Yanqi Zhao, Yong Yu, Yannan Li, Gang Han, Xiaojiang Du:
Machine learning based privacy-preserving fair data trading in big data market. Inf. Sci. 478: 449-460 (2019) - [j65]Liang Xue, Yong Yu, Yannan Li, Man Ho Au, Xiaojiang Du, Bo Yang:
Efficient attribute-based encryption with attribute revocation for assured data deletion. Inf. Sci. 479: 640-650 (2019) - [j64]Yanqi Zhao, Yiming Liu, Aikui Tian, Yong Yu, Xiaojiang Du:
Blockchain based privacy-preserving software updates with proof-of-delivery for Internet of Things. J. Parallel Distributed Comput. 132: 141-149 (2019) - [j63]Yong Yu, Yi Mu:
Advances of Provable Security Techniques. J. Univers. Comput. Sci. 25(3): 154-157 (2019) - [j62]Yong Yu, Huilin Li, Ruonan Chen, Yanqi Zhao, Haomiao Yang, Xiaojiang Du:
Enabling Secure Intelligent Network with Cloud-Assisted Privacy-Preserving Machine Learning. IEEE Netw. 33(3): 82-87 (2019) - [j61]Yong Yu, Ruonan Chen, Huilin Li, Yannan Li, Aikui Tian:
Toward Data Security in Edge Intelligent IIoT. IEEE Netw. 33(5): 20-26 (2019) - [j60]Yannan Li, Willy Susilo, Guomin Yang, Yong Yu, Xiaojiang Du, Dongxi Liu, Nadra Guizani:
Toward Privacy and Regulation in Blockchain-Based Cryptocurrencies. IEEE Netw. 33(5): 111-117 (2019) - [j59]Tao Wang, Bo Yang, Guoyong Qiu, Lina Zhang, Yong Yu, Yanwei Zhou, Juncai Guo:
An Approach Enabling Various Queries on Encrypted Industrial Data Stream. Secur. Commun. Networks 2019: 6293970:1-6293970:12 (2019) - [j58]Tao Wang, Bo Yang, Hongyu Liu, Yong Yu, Guoyong Qiu, Zhe Xia:
An alternative approach to public cloud data auditing supporting data dynamics. Soft Comput. 23(13): 4939-4953 (2019) - [j57]Yannan Li, Yong Yu, Geyong Min, Willy Susilo, Jianbing Ni, Kim-Kwang Raymond Choo:
Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems. IEEE Trans. Dependable Secur. Comput. 16(1): 72-83 (2019) - [c36]Yong Yu, Jia Deng, Yanni Tang, Jiamou Liu, Wu Chen:
Decentralized Ensemble Learning Based on Sample Exchange among Multiple Agents. BSCI 2019: 57-66 - [c35]Yangguang Tian, Yingjiu Li, Binanda Sengupta, Nan Li, Yong Yu:
Anonymous Asynchronous Payment Channel from k-Time Accountable Assertion. CANS 2019: 512-524 - [c34]Qiliang Yang, Yanwei Zhou, Yong Yu:
Leakage-Resilient Certificateless Signcryption Scheme. GLOBECOM Workshops 2019: 1-6 - [c33]Wei Liu, Shuyue Hu, Jiamou Liu, Wu Chen, Siyuan Chen, Yong Yu:
Efficient and Robust Emergence of Conventions through Learning and Staying. ICA 2019: 14-19 - [c32]Jinhui Liu, Yong Yu:
Lattice Based Verifiably Encrypted Double Authentication Preventing Signatures. NSS 2019: 581-595 - [c31]Bin Yu, Jinhui Liu, Ming Lei, Yong Yu, Hao Chen:
Parallel Runtime Verification Approach for Alternate Execution of Multiple Threads. SOFL+MSVL 2019: 99-109 - [i7]Lingyue Zhang, Huilin Li, Yannan Li, Yanqi Zhao, Yong Yu:
An Efficient Linkable Group Signature for Payer Tracing in Anonymous Cryptocurrencies. CoRR abs/1902.03420 (2019) - [i6]Yannan Li, Willy Susilo, Guomin Yang, Yong Yu, Dongxi Liu, Mohsen Guizani:
A Blockchain-based Self-tallying Voting Scheme in Decentralized IoT. CoRR abs/1902.03710 (2019) - [i5]Yanqi Zhao, Yiming Liu, Yong Yu, Yannan Li:
Blockchain based Privacy-Preserving Software Updates with Proof-of-Delivery for Internet of Things. CoRR abs/1902.03712 (2019) - 2018
- [j56]Yanqi Zhao, Yannan Li, Qilin Mu, Bo Yang, Yong Yu:
Secure Pub-Sub: Blockchain-Based Fair Payment With Reputation for Reliable Cyber Physical Systems. IEEE Access 6: 12295-12303 (2018) - [j55]Qiqi Lai, Bo Yang, Yong Yu, Yuan Chen, Jian Bai:
Novel Smooth Hash Proof Systems Based on Lattices. Comput. J. 61(4): 561-574 (2018) - [j54]Jinhui Liu, Yong Yu, Bo Yang, Jianwei Jia, Shijia Wang, Houzhen Wang:
Structural Key Recovery of Simple Matrix Encryption Scheme Family. Comput. J. 61(12): 1880-1896 (2018) - [j53]Chiara Galdi, Michele Nappi, Jean-Luc Dugelay, Yong Yu:
Exploring New Authentication Protocols for Sensitive Data Protection on Smartphones. IEEE Commun. Mag. 56(1): 136-142 (2018) - [j52]Yong Yu, Yannan Li, Xiaojiang Du, Ruonan Chen, Bo Yang:
Content Protection in Named Data Networking: Challenges and Potential Solutions. IEEE Commun. Mag. 56(11): 82-87 (2018) - [j51]Yannan Li, Yong Yu, Bo Yang, Geyong Min, Huai Wu:
Privacy preserving cloud data auditing with efficient key update. Future Gener. Comput. Syst. 78: 789-798 (2018) - [j50]Yong Wang, Xiaoling Tao, Jianbing Ni, Yong Yu:
Data integrity checking with reliable data transfer for secure cloud storage. Int. J. Web Grid Serv. 14(1): 106-121 (2018) - [j49]Qiqi Lai, Bo Yang, Yong Yu, Zhe Xia, Yanwei Zhou, Yuan Chen:
Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes. J. Comput. Sci. Technol. 33(6): 1243-1260 (2018) - [j48]Yong Yu, Liang Xue, Yannan Li, Xiaojiang Du, Mohsen Guizani, Bo Yang:
Assured Data Deletion With Fine-Grained Access Control for Fog-Based Industrial Applications. IEEE Trans. Ind. Informatics 14(10): 4538-4547 (2018) - [j47]Jianbing Ni, Kuan Zhang, Yong Yu, Xiaodong Lin, Xuemin Shen:
Privacy-Preserving Smart Parking Navigation Supporting Efficient Driving Guidance Retrieval. IEEE Trans. Veh. Technol. 67(7): 6504-6517 (2018) - [j46]Yong Yu, Yannan Li, Junfeng Tian, Jianwei Liu:
Blockchain-Based Solutions to Security and Privacy Issues in the Internet of Things. IEEE Wirel. Commun. 25(6): 12-18 (2018) - [c30]Qiqi Lai, Bo Yang, Yong Yu, Yuan Chen, Liju Dong:
Anonymous Identity-Based Hash Proof System from Lattices in the Standard Model. ACISP 2018: 539-557 - [c29]Jinhui Liu, Yong Yu, Yannan Li, Yanqi Zhao, Xiaojiang Du:
An Efficient Anonymous Authentication Scheme Based on Double Authentication Preventing Signature for Mobile Healthcare Crowd Sensing. Inscrypt 2018: 626-636 - [c28]Yuyang Zhang, Ping Dong, Yong Yu, Xiaojiang Du, Hongbin Luo, Tao Zheng, Mohsen Guizani:
A Bignum Network Coding Scheme for Multipath Transmission in Vehicular Networks. GLOBECOM 2018: 206-212 - [c27]Yangguang Tian, Yingjiu Li, Yinghui Zhang, Nan Li, Guomin Yang, Yong Yu:
DSH: Deniable Secret Handshake Framework. ISPEC 2018: 341-353 - [c26]Jinhui Liu, Yong Yu, Yanqi Zhao, Jianwei Jia, Shijia Wang:
An Efficient Privacy Preserving Batch Authentication Scheme with Deterable Function for VANETs. NSS 2018: 288-303 - [i4]Yong Yu, Liang Xue, Yannan Li, Xiaojiang Du, Mohsen Guizani, Bo Yang:
Assured Data Deletion with Fine-grained Access Control for Fog-based Industrial Applications. CoRR abs/1804.02834 (2018) - [i3]Yong Yu, Yujie Ding, Yanqi Zhao, Yannan Li, Xiaojiang Du, Mohsen Guizani:
LRCoin: Leakage-resilient Cryptocurrency Based on Bitcoin for Data Trading in IoT. CoRR abs/1810.11175 (2018) - [i2]Yong Yu, Yannan Li, Xiaojiang Du, Ruonan Chen, Bo Yang:
Content Protection in Named Data Networking: Challenges and Potential Solutions. CoRR abs/1810.11179 (2018) - 2017
- [j45]Jianhong Zhang, Hongxin Meng, Yong Yu:
Achieving public verifiability and data dynamics for cloud data in the standard model. Clust. Comput. 20(3): 2641-2653 (2017) - [j44]Yong Yu, Atsuko Miyaji, Man Ho Au, Willy Susilo:
Cloud computing security and privacy: Standards and regulations. Comput. Stand. Interfaces 54: 1-2 (2017) - [j43]Hongyu Liu, Yi Mu, Jining Zhao, Chunxiang Xu, Huaqun Wang, Leiting Chen, Yong Yu:
Identity-based provable data possession revisited: Security analysis and generic construction. Comput. Stand. Interfaces 54: 10-19 (2017) - [j42]Yangguang Tian, Guomin Yang, Yi Mu, Shiwei Zhang, Kaitai Liang, Yong Yu:
One-Round Attribute-Based Key Exchange in the Multi-Party Setting. Int. J. Found. Comput. Sci. 28(6): 725-742 (2017) - [j41]Li Zang, Yong Yu, Liang Xue, Yannan Li, Yujie Ding, Xiaoling Tao:
Improved dynamic remote data auditing protocol for smart city security. Pers. Ubiquitous Comput. 21(5): 911-921 (2017) - [j40]Weiwei Liu, Yi Mu, Guomin Yang, Yong Yu:
Efficient E-coupon systems with strong user privacy. Telecommun. Syst. 64(4): 695-708 (2017) - [j39]Yong Yu, Man Ho Au, Giuseppe Ateniese, Xinyi Huang, Willy Susilo, Yuanshun Dai, Geyong Min:
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage. IEEE Trans. Inf. Forensics Secur. 12(4): 767-778 (2017) - [j38]Willy Susilo, Peng Jiang, Fuchun Guo, Guomin Yang, Yong Yu, Yi Mu:
EACSIP: Extendable Access Control System With Integrity Protection for Enhancing Collaboration in the Cloud. IEEE Trans. Inf. Forensics Secur. 12(12): 3110-3122 (2017) - [c25]Yangguang Tian, Shiwei Zhang, Guomin Yang, Yi Mu, Yong Yu:
Privacy-Preserving k-time Authenticated Secret Handshakes. ACISP (2) 2017: 281-300 - [c24]Haomiao Yang, Yunfan Huang, Yong Yu, Mingxuan Yao, Xiaosong Zhang:
Privacy-Preserving Extraction of HOG Features Based on Integer Vector Homomorphic Encryption. ISPEC 2017: 102-117 - [e2]Tatsuaki Okamoto, Yong Yu, Man Ho Au, Yannan Li:
Provable Security - 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings. Lecture Notes in Computer Science 10592, Springer 2017, ISBN 978-3-319-68636-3 [contents] - 2016
- [j37]Yong Yu, Yi Mu, Rongxing Lu, Jian Ren:
Recent advances in security and privacy in large-scale networks. Concurr. Comput. Pract. Exp. 28(4): 1080-1082 (2016) - [j36]Yafang Zhang, Jianbing Ni, Xiaoling Tao, Yong Wang, Yong Yu:
Provable multiple replication data possession with full dynamics for secure cloud storage. Concurr. Comput. Pract. Exp. 28(4): 1161-1173 (2016) - [j35]Yong Yu, Jianbing Ni, Qi Xia, Xiaofen Wang, Haomiao Yang, Xiaosong Zhang:
SDIVIP2: shared data integrity verification with identity privacy preserving in mobile clouds. Concurr. Comput. Pract. Exp. 28(10): 2877-2888 (2016) - [j34]Yong Yu, Liang Xue, Man Ho Au, Willy Susilo, Jianbing Ni, Yafang Zhang, Athanasios V. Vasilakos, Jian Shen:
Cloud data integrity checking with an identity-based auditing mechanism from RSA. Future Gener. Comput. Syst. 62: 85-91 (2016) - [j33]Mengmeng Ge, Kim-Kwang Raymond Choo, Huai Wu, Yong Yu:
Survey on key revocation mechanisms in wireless sensor networks. J. Netw. Comput. Appl. 63: 24-38 (2016) - [j32]Yong Yu, Yannan Li, Jianbing Ni, Guomin Yang, Yi Mu, Willy Susilo:
Comments on "Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification". IEEE Trans. Inf. Forensics Secur. 11(3): 658-659 (2016) - [c23]Yong Yu, Yannan Li, Man Ho Au, Willy Susilo, Kim-Kwang Raymond Choo, Xinpeng Zhang:
Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy. ACISP (1) 2016: 389-405 - [c22]Jianbing Ni, Xiaodong Lin, Kuan Zhang, Yong Yu:
Secure and Deduplicated Spatial Crowdsourcing: A Fog-Based Approach. GLOBECOM 2016: 1-6 - [c21]Jianbing Ni, Xiaodong Lin, Kuan Zhang, Yong Yu, Xuemin Sherman Shen:
Secure outsourced data transfer with integrity verification in cloud storage. ICCC 2016: 1-6 - [c20]Jianbing Ni, Xiaodong Lin, Kuan Zhang, Yong Yu, Xuemin Sherman Shen:
Device-invisible two-factor authenticated key agreement protocol for BYOD. ICCC 2016: 1-6 - [c19]Yangguang Tian, Guomin Yang, Yi Mu, Kaitai Liang, Yong Yu:
One-Round Attribute-Based Key Exchange in the Multi-party Setting. ProvSec 2016: 227-243 - [c18]Jianbing Ni, Kuan Zhang, Xiaodong Lin, Yong Yu, Xuemin (Sherman) Shen:
Cloud-Based Privacy-Preserving Parking Navigation Through Vehicular Communications. SecureComm 2016: 85-103 - 2015
- [j31]Xinyu Fan, Guomin Yang, Yi Mu, Yong Yu:
On Indistinguishability in Remote Data Integrity Checking. Comput. J. 58(4): 823-830 (2015) - [j30]Yong Yu, Man Ho Au, Yi Mu, Willy Susilo, Huai Wu:
Secure Delegation of Signing Power from Factorization. Comput. J. 58(4): 867-877 (2015) - [j29]Yong Yu, Yafang Zhang, Jianbing Ni, Man Ho Au, Lanxiang Chen, Hongyu Liu:
Remote data possession checking with enhanced security for cloud storage. Future Gener. Comput. Syst. 52: 77-85 (2015) - [j28]Kaitai Liang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang, Yong Yu, Anjia Yang:
A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing. Future Gener. Comput. Syst. 52: 95-108 (2015) - [j27]Lei Niu, Changqing Zhang, Qi Xia, Yong Yu:
Advanced security analysis of a signature scheme with message recovery. Int. J. Inf. Comput. Secur. 7(1): 39-48 (2015) - [j26]Yong Yu, Man Ho Au, Yi Mu, Shaohua Tang, Jian Ren, Willy Susilo, Liju Dong:
Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage. Int. J. Inf. Sec. 14(4): 307-318 (2015) - [j25]Yong Yu, Yi Mu, Giuseppe Ateniese:
Recent Advances in Security and Privacy in Big Data. J. Univers. Comput. Sci. 21(3): 365-368 (2015) - [j24]Yong Yu, Jianbing Ni, Man Ho Au, Yi Mu, Boyang Wang, Hui Li:
Comments on a Public Auditing Mechanism for Shared Cloud Data Service. IEEE Trans. Serv. Comput. 8(6): 998-999 (2015) - [c17]Yong Yu, Jianbing Ni, Wei Wu, Yilei Wang:
Provable Data Possession Supporting Secure Data Transfer for Cloud Storage. BWCCA 2015: 38-42 - [c16]Yong Yu, Yafang Zhang, Yi Mu, Willy Susilo, Hongyu Liu:
Provably Secure Identity Based Provable Data Possession. ProvSec 2015: 310-325 - 2014
- [j23]Yong Yu, Jianbing Ni, Man Ho Au, Hongyu Liu, Hua Wang, Chunxiang Xu:
Improved security of a dynamic remote data possession checking protocol for cloud storage. Expert Syst. Appl. 41(17): 7789-7796 (2014) - [j22]Yong Yu, Lei Niu, Guomin Yang, Yi Mu, Willy Susilo:
On the security of auditing mechanisms for secure cloud storage. Future Gener. Comput. Syst. 30: 127-132 (2014) - [j21]Jianhong Zhang, Yong Yu:
Short computational Diffie-Hellman-based proxy signature scheme in the standard model. Int. J. Commun. Syst. 27(10): 1894-1907 (2014) - [j20]Yong Yu, Yi Mu, Willy Susilo, Man Ho Au:
Security pitfalls of an efficient threshold proxy signature scheme for mobile agents. Inf. Process. Lett. 114(1-2): 5-8 (2014) - [j19]Chunxiang Xu, Yuan Zhang, Yong Yu, Xiaojun Zhang, Junwei Wen:
An Efficient Provable Secure Public Auditing Scheme for Cloud Storage. KSII Trans. Internet Inf. Syst. 8(11): 4226-4241 (2014) - [j18]Yong Yu, Jianbing Ni, Haomiao Yang, Yi Mu, Willy Susilo:
Efficient public key encryption with revocable keyword search. Secur. Commun. Networks 7(2): 466-472 (2014) - [j17]Jianbing Ni, Yong Yu, Yi Mu, Qi Xia:
On the Security of an Efficient Dynamic Auditing Protocol in Cloud Storage. IEEE Trans. Parallel Distributed Syst. 25(10): 2760-2761 (2014) - [c15]Joseph K. Liu, Man Ho Au, Xinyi Huang, Willy Susilo, Jianying Zhou, Yong Yu:
New Insight to Preserve Online Survey Accuracy and Privacy in Big Data Era. ESORICS (2) 2014: 182-199 - [c14]Yong Yu, Jianbing Ni, Jian Ren, Wei Wu, Lanxiang Chen, Qi Xia:
Improvement of a Remote Data Possession Checking Protocol from Algebraic Signatures. ISPEC 2014: 359-372 - [c13]Kaitai Liang, Man Ho Au, Willy Susilo, Duncan S. Wong, Guomin Yang, Yong Yu:
An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing. ISPEC 2014: 448-461 - [c12]Yong Yu, Yi Mu, Jianbing Ni, Jiang Deng, Ke Huang:
Identity Privacy-Preserving Public Auditing with Dynamic Group for Secure Mobile Cloud Storage. NSS 2014: 28-40 - 2013
- [j16]Bo Yang, Yong Yu, Ying Sun:
A novel construction of SDVS with secure disavowability. Clust. Comput. 16(4): 807-815 (2013) - [j15]Ying Sun, Yong Yu, Xiaosong Zhang, Jiwen Chai:
On the Security of an Identity-Based Proxy Signature Scheme in the Standard Model. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(3): 721-723 (2013) - [j14]Yong Yu, Jianbing Ni, Ying Sun:
Security Analysis of a Distributed Reprogramming Protocol for Wireless Sensor Networks. IEICE Trans. Inf. Syst. 96-D(8): 1875-1877 (2013) - [j13]Bo Yang, Chung-Huang Yang, Yong Yu, Dan Xie:
A Secure Scalar Product Protocol and Its Applications to Computational Geometry. J. Comput. 8(8): 2018-2026 (2013) - [j12]Bo Yang, Yong Yu, Chung-Huang Yang:
A Secure Scalar Product Protocol Against Malicious Adversaries. J. Comput. Sci. Technol. 28(1): 152-158 (2013) - [c11]Zhiyi Shao, Bo Yang, Yong Yu:
Private Set Intersection via Public Key Encryption with Multiple Keywords Search. INCoS 2013: 323-328 - [c10]Yannan Li, Qi Xia, Jianbing Ni, Yong Yu:
A New Construction of Proxy Signature Using Chameleon Hash Function. INCoS 2013: 388-391 - [c9]Ying Sun, Jiwen Chai, Huihui Liang, Jianbing Ni, Yong Yu:
A Secure and Efficient E-Cheque Protocol from Chameleon Hash Function. INCoS 2013: 470-475 - 2012
- [j11]Ying Sun, Yong Yu, Yi Mu:
Further Analysis of a Practical Hierarchical Identity-Based Encryption Scheme. IEICE Trans. Inf. Syst. 95-D(6): 1690-1693 (2012) - [j10]Yong Yu, Yi Mu, Guilin Wang, Qi Xia, Bo Yang:
Improved certificateless signature scheme provably secure in the standard model. IET Inf. Secur. 6(2): 102-110 (2012) - [j9]Xu An Wang, Xiaoyuan Yang, Minqing Zhang, Yong Yu:
Cryptanalysis of a Fuzzy Identity Based Encryption Scheme in the Standard Model. Informatica 23(2): 299-314 (2012) - [j8]Yong Yu, Yi Mu, Willy Susilo, Ying Sun, Yafu Ji:
Provably secure proxy signature scheme from factorization. Math. Comput. Model. 55(3-4): 1160-1168 (2012) - [c8]Bo Yang, Ying Sun, Yong Yu, Qi Xia:
A Strong Designated Verifier Signature Scheme with Secure Disavowability. INCoS 2012: 286-291 - [c7]Lei Niu, Yong Yu, Jianbing Ni, Ying Sun:
Further Cryptanalysis of a Signature Scheme with Message Recovery. INCoS 2012: 587-589 - [e1]Tsuyoshi Takagi, Guilin Wang, Zhiguang Qin, Shaoquan Jiang, Yong Yu:
Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings. Lecture Notes in Computer Science 7496, Springer 2012, ISBN 978-3-642-33271-5 [contents] - 2011
- [j7]Yong Yu, Yi Mu, Guilin Wang, Ying Sun:
Cryptanalysis of an Off-Line Electronic Cash Scheme Based on Proxy Blind Signature. Comput. J. 54(10): 1645-1651 (2011) - [j6]Ying Sun, Chunxiang Xu, Yong Yu, Bo Yang:
Improvement of a proxy multi-signature scheme without random oracles. Comput. Commun. 34(3): 257-263 (2011) - [j5]Ying Sun, Chunxiang Xu, Yong Yu, Yi Mu:
Strongly unforgeable proxy signature scheme secure in the standard model. J. Syst. Softw. 84(9): 1471-1479 (2011)
2000 – 2009
- 2009
- [j4]Yong Yu, Chunxiang Xu, Xiaosong Zhang, Yongjian Liao:
Designated verifier proxy signature scheme without random oracles. Comput. Math. Appl. 57(8): 1352-1364 (2009) - [j3]Yong Yu, Bo Yang, Ying Sun, Shenglin Zhu:
Identity based signcryption scheme without random oracles. Comput. Stand. Interfaces 31(1): 56-62 (2009) - [j2]Yong Yu, Chunxiang Xu, Xinyi Huang, Yi Mu:
An efficient anonymous proxy signature scheme with provable security. Comput. Stand. Interfaces 31(2): 348-353 (2009) - [c6]Ying Sun, Chunxiang Xu, Fagen Li, Yong Yu:
Identity Based Multi-proxy Multi-signcryption Scheme for Electronic Commerce. IAS 2009: 281-284 - [c5]Ying Sun, Chunxiang Xu, Qi Xia, Yong Yu:
Analysis and Improvement of a Proxy Blind Multi-signature Scheme without a Secure Channel. IAS 2009: 661-664 - 2008
- [j1]Xuefei Cao, Weidong Kou, Yong Yu, Rong Sun:
Identity-Based Authenticated Key Agreement Protocols without Bilinear Pairings. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(12): 3833-3836 (2008) - [i1]Fagen Li, Yong Yu:
An Efficient and Provably Secure ID-Based Threshold Signcryption Scheme. IACR Cryptol. ePrint Arch. 2008: 187 (2008) - 2007
- [c4]Yong Yu, Bo Yang, Xinyi Huang, Mingwu Zhang:
Efficient Identity-Based Signcryption Scheme for Multiple Receivers. ATC 2007: 13-21 - [c3]Bo Yang, Yong Yu, Fagen Li, Ying Sun:
Provably Secure Identity-Based Threshold Unsigncryption Scheme. ATC 2007: 114-122 - [c2]Yong Yu, Bo Yang, Ying Sun:
ID-based threshold signature and mediated signature schemes. SNPD (1) 2007: 473-478 - [c1]Yong Yu, Bo Yang, Ying Sun:
A provably secure ID-based mediated signcryption scheme. SNPD (3) 2007: 647-652
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 21:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint