


default search action
Geng Yang 0002
Person information
- affiliation: Nanjing University of Posts and Telecommunication, Nanjing, China
Other persons with the same name
- Geng Yang — disambiguation page
- Geng Yang 0001
— Xidian University, Xi'an, China
- Geng Yang 0003
— Zhejiang University, Hangzhou, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j66]Zhousheng Wang, Junjie Chen, Hua Dai, Jian Xu, Geng Yang, Hao Zhou:
ACSFL: An adaptive client selection-based Federated Learning with personalized differential privacy for heterogeneous AIoT environments. Comput. Commun. 242: 108264 (2025) - [j65]Yinfu Deng
, Hua Dai
, Zhangchen Li, Haiping Huang
, Qian Zhou, Jian Xu
, Geng Yang:
EDP-CVSM model-based multi-keyword ranked search scheme over encrypted cloud data. Future Gener. Comput. Syst. 167: 107726 (2025) - [j64]Zhousheng Wang
, Jiahe Shen, Hua Dai
, Jian Xu
, Geng Yang, Hao Zhou
:
Federated adaptive pruning with differential privacy. Future Gener. Comput. Syst. 169: 107783 (2025) - [j63]Yuxian Huang
, Geng Yang
, Dong Yuan
, Shui Yu
:
DBSSL: A Scheme to Detect Backdoor Attacks in Self-Supervised Learning Models. IEEE Trans. Dependable Secur. Comput. 22(4): 3371-3382 (2025) - [j62]Mingfeng Jiang
, Hua Dai
, Huaqun Wang
, Rui Gao
, Geng Yang
, Fu Xiao
:
EPSRQ: Efficient Privacy-Preserving Spatial-Keyword Range Query Processing in Cloud. IEEE Trans. Inf. Forensics Secur. 20: 8802-8816 (2025) - [j61]Qian Zhou
, Jiayang Wu
, Hua Dai
, Geng Yang, Yanchun Zhang
:
An Intelligent Ride-Sharing Recommendation Method Based on Graph Neural Network and Evolutionary Computation. IEEE Trans. Intell. Transp. Syst. 26(1): 569-578 (2025) - [j60]Qu Lu
, Hua Dai
, Pengyue Li, Shuyan Wan
, Geng Yang
, Yang Xiang
, Fu Xiao
:
Privacy-Preserving Contact Query Processing Over Trajectory Data in Mobile Cloud Computing. IEEE Trans. Mob. Comput. 24(3): 1818-1832 (2025) - [j59]Hao Zhou
, Hua Dai
, Geng Yang
, Yang Xiang:
Robust Federated Learning for Privacy Preservation and Efficiency in Edge Computing. IEEE Trans. Serv. Comput. 18(3): 1739-1752 (2025) - 2024
- [j58]Yuxian Huang
, Geng Yang, Hao Zhou, Hua Dai
, Dong Yuan, Shui Yu
:
VPPFL: A verifiable privacy-preserving federated learning scheme against poisoning attacks. Comput. Secur. 136: 103562 (2024) - [j57]Zhousheng Wang
, Geng Yang, Hua Dai
, Yunlu Bai
:
DAFL: Domain adaptation-based federated learning for privacy-preserving biometric recognition. Future Gener. Comput. Syst. 150: 436-450 (2024) - [j56]Yuanlong Liu, Hua Dai
, Qian Zhou, Pengyue Li, Xun Yi
, Geng Yang:
EPSMR: An efficient privacy-preserving semantic-aware multi-keyword ranked search scheme in cloud. Future Gener. Comput. Syst. 159: 1-14 (2024) - [j55]Pengyue Li, Hua Dai, Qian Zhou, Yu Chen, Qiang Zhou, Bohan Li, Geng Yang:
ECEQ: efficient multi-source contact event query processing for moving objects. World Wide Web (WWW) 27(6): 69 (2024) - [c39]Qu Lu, Hua Dai, Bohan Li, Pengyue Li, Qian Zhou, Qiang Zhou, Geng Yang:
EPCQ: Efficient Privacy-Preserving Contact Query Processing over Trajectory Data in Cloud. APWeb/WAIM (4) 2024: 183-198 - [c38]Pengyue Li
, Hua Dai
, Sheng Wang
, Wenzhe Yang
, Geng Yang
:
Privacy-preserving Spatial Dataset Search in Cloud. CIKM 2024: 1245-1254 - [c37]You Chen, Hua Dai, Mingfeng Jiang, Qu Lu, Pengyue Li, Bohan Li, Geng Yang:
KCPMA: k-degree Contact Pattern Mining Algorithms for Moving Objects. CSCWD 2024: 2764-2769 - [c36]Pengyue Li, Hua Dai, Jie Sun, Sheng Wang, Wenzhe Yang, Geng Yang:
EDSS: An Exemplar Dataset Search Service over Encrypted Spatial Datasets. ICWS 2024: 1344-1346 - 2023
- [j54]Yiyang Liu
, Hua Dai
, Jiawei Li
, Yu Chen
, Geng Yang
, Jun Wang
:
BP-Model-based convoy mining algorithms for moving objects. Expert Syst. Appl. 213(Part): 118860 (2023) - [j53]Hao Zhou
, Geng Yang
, Yang Xiang, Yunlu Bai, Weiya Wang:
A Lightweight Matrix Factorization for Recommendation With Local Differential Privacy in Big Data. IEEE Trans. Big Data 9(1): 160-173 (2023) - [j52]Hao Zhou
, Geng Yang
, Yuxian Huang
, Hua Dai
, Yang Xiang:
Privacy-Preserving and Verifiable Federated Learning Framework for Edge Computing. IEEE Trans. Inf. Forensics Secur. 18: 565-580 (2023) - [j51]Zhousheng Wang
, Geng Yang
, Hua Dai
, Chunming Rong
:
Privacy-Preserving Split Learning for Large-Scaled Vision Pre-Training. IEEE Trans. Inf. Forensics Secur. 18: 1539-1553 (2023) - [j50]Ke Ma
, Geng Yang
:
TBAC: A Fine-Grained Topic-Based Access Control Model for Text Data. IEEE Trans. Serv. Comput. 16(3): 2215-2228 (2023) - [j49]Qian Zhou
, Hua Dai, Wenjie Sheng, Yuanlong Liu, Geng Yang:
EVSS: An efficient verifiable search scheme over encrypted cloud data. World Wide Web (WWW) 26(4): 1459-1479 (2023) - [j48]Qian Zhou
, Hua Dai, Yuanlong Liu, Geng Yang, Xun Yi, Zheng Hu:
A novel semantic-aware search scheme based on BCI-tree index over encrypted cloud data. World Wide Web (WWW) 26(5): 3055-3079 (2023) - [c35]Runhuan Chen, Hua Dai, Hui Li, Geng Yang, Haozhe Wu, Weihong Yang:
An Urban Electric Load Forecasting Model Using Discrepancy Compensation and Short-term Sampling Contrastive Loss in LSTM. CSCWD 2023: 137-142 - [c34]Weihong Yang, Hua Dai, Haozhe Wu, Geng Yang, Meng Lu, Guineng Zheng:
A Human Pose Similarity Calculation Method Based on Partition Weighted OKS Model. CSCWD 2023: 1760-1765 - [c33]Pengyue Li, Hua Dai, Yu Chen, Bohan Li, Geng Yang:
Efficient Multi-source Contact Event Query Processing for Moving Objects. ICDM 2023: 1109-1114 - [c32]Yinfu Deng, Hua Dai, Yuanlong Liu, Zhangchen Li, Geng Yang, Xun Yi:
TFS-index-based Multi-keyword Ranked Search Scheme Over Cloud Encrypted Data. ICPADS 2023: 2320-2327 - 2022
- [j47]Qian Zhou
, Hua Dai
, Zheng Hu, Yuanlong Liu, Geng Yang:
Accuracy-first and efficiency-first privacy-preserving semantic-aware ranked searches in the cloud. Int. J. Intell. Syst. 37(11): 9213-9244 (2022) - [j46]Xuelong Dai
, Hua Dai
, Chunming Rong
, Geng Yang
, Fu Xiao
, Bin Xiao
:
Enhanced Semantic-Aware Multi-Keyword Ranked Search Scheme Over Encrypted Cloud Data. IEEE Trans. Cloud Comput. 10(4): 2595-2612 (2022) - [j45]Hao Zhou
, Geng Yang
, Hua Dai
, Guoxiu Liu:
PFLF: Privacy-Preserving Federated Learning Framework for Edge Computing. IEEE Trans. Inf. Forensics Secur. 17: 1905-1918 (2022) - [j44]Shuangjie Bai
, Geng Yang
, Guoxiu Liu, Hua Dai
, Chunming Rong
:
NttpFL: Privacy-Preserving Oriented No Trusted Third Party Federated Learning System Based on Blockchain. IEEE Trans. Netw. Serv. Manag. 19(4): 3750-3763 (2022) - [j43]Guoxiu Liu
, Geng Yang
, Shuangjie Bai
, Huaqun Wang, Yang Xiang
:
FASE: A Fast and Accurate Privacy-Preserving Multi-Keyword Top-k Retrieval Scheme Over Encrypted Cloud Data. IEEE Trans. Serv. Comput. 15(4): 1855-1867 (2022) - [c31]Qian Zhou
, Hua Dai, Zheng Hu, Yuanlong Liu, Geng Yang:
SAPMS: A Semantic-Aware Privacy-Preserving Multi-keyword Search Scheme in Cloud. APWeb/WAIM (1) 2022: 251-263 - [c30]Zheng Hu, Hua Dai, Yuanlong Liu, Geng Yang, Qian Zhou, Yanli Chen:
CSMRS: An Efficient and Effective Semantic-aware Ranked Search Scheme over Encrypted Cloud Data. CSCWD 2022: 699-704 - [c29]Yu Chen, Hua Dai, Geng Yang, Yanli Chen:
Multi-source Infection Pattern Mining Algorithms over Moving Objects. CSCWD 2022: 1102-1107 - 2021
- [j42]Hang Shen
, Qiang Ye
, Weihua Zhuang
, Weisen Shi
, Guangwei Bai, Geng Yang
:
Drone-Small-Cell-Assisted Resource Slicing for 5G Uplink Radio Access Networks. IEEE Trans. Veh. Technol. 70(7): 7071-7086 (2021) - [j41]Weiya Wang
, Geng Yang
, Lin Bao, Ke Ma, Hao Zhou, Yunlu Bai:
Travel Trajectory Frequent Pattern Mining Based on Differential Privacy Protection. Wirel. Commun. Mob. Comput. 2021: 6379530:1-6379530:14 (2021) - [c28]Yiyang Liu, Hua Dai, Bohan Li, Jiawei Li, Geng Yang, Jun Wang:
ECMA: An Efficient Convoy Mining Algorithm for Moving Objects. CIKM 2021: 1089-1098 - 2020
- [j40]Hua Dai
, Yan Ji
, Geng Yang
, Haiping Huang
, Xun Yi
:
A Privacy-Preserving Multi-Keyword Ranked Search Over Encrypted Data in Hybrid Clouds. IEEE Access 8: 4895-4907 (2020) - [j39]Guoxiu Liu
, Geng Yang
, Shuangjie Bai
, Qiang Zhou
, Hua Dai
:
FSSE: An Effective Fuzzy Semantic Searchable Encryption Scheme Over Encrypted Cloud Data. IEEE Access 8: 71893-71906 (2020) - [j38]Shuangjie Bai, Geng Yang, Chunming Rong
, Guoxiu Liu, Hua Dai:
QHSE: An efficient privacy-preserving scheme for blockchain-based transactions. Future Gener. Comput. Syst. 112: 930-944 (2020) - [j37]Ke Ma, Geng Yang, Yang Xiang
:
RCBAC: A risk-aware content-based access control model for large-scale text data. J. Netw. Comput. Appl. 167: 102733 (2020) - [j36]Hua Dai
, Xuelong Dai
, Xiao Li, Xun Yi, Fu Xiao
, Geng Yang
:
A Multibranch Search Tree-Based Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data. Secur. Commun. Networks 2020: 7307315:1-7307315:15 (2020) - [j35]Siguang Chen
, Zhihao Wang, Haijun Zhang
, Geng Yang
, Kun Wang
:
Fog-based Optimized Kronecker-Supported Compression Design for Industrial IoT. IEEE Trans. Sustain. Comput. 5(1): 95-106 (2020) - [j34]Siguang Chen
, Xi Zhu
, Haijun Zhang
, Chuanxin Zhao, Geng Yang
, Kun Wang:
Efficient Privacy Preserving Data Collection and Computation Offloading for Fog-Assisted IoT. IEEE Trans. Sustain. Comput. 5(4): 526-540 (2020) - [c27]Jiawei Li, Hua Dai, Yiyang Liu, Jianqiu Xu, Jie Sun, Geng Yang:
Detection of Loose Tracking Behavior over Trajectory Data. ICA3PP (3) 2020: 218-230 - [c26]Jianguo Zhou, Hua Dai, Jie Zhu, Rongqi Qi, Geng Yang, Jian Xu:
A Privacy-preserving and Collusion-resisting Top-k Query Processing in WSNs. MSN 2020: 677-682
2010 – 2019
- 2019
- [j33]Xuelong Dai
, Hua Dai, Geng Yang, Xun Yi, Haiping Huang
:
An Efficient and Dynamic Semantic-Aware Multikeyword Ranked Search Scheme Over Encrypted Cloud Data. IEEE Access 7: 142855-142865 (2019) - [j32]Hua Dai, Xuelong Dai
, Xun Yi, Geng Yang, Haiping Huang:
Semantic-aware multi-keyword ranked search scheme over encrypted cloud data. J. Netw. Comput. Appl. 147 (2019) - [j31]Hua Dai, Xiao Li, Xiangyang Zhu, Geng Yang, Xun Yi:
面向云环境的多关键词密文排序检索研究综述 (Research on Multi-keyword Ranked Search over Encrypted Cloud Data). 计算机科学 46(1): 6-12 (2019) - [j30]Yahong Xu
, Geng Yang
, Shuangjie Bai
:
Laplace Input and Output Perturbation for Differentially Private Principal Components Analysis. Secur. Commun. Networks 2019: 9169802:1-9169802:10 (2019) - [c25]Jingjing Bao, Hua Dai, Maohu Yang, Xun Yi, Geng Yang, Liang Liu:
PMRS: A Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data. ICA3PP (2) 2019: 496-511 - [c24]Hua Dai, Yan Ji, Liang Liu, Geng Yang, Xun Yi:
A Privacy-Preserving Multi-keyword Ranked Search over Encrypted Data in Hybrid Clouds. ICAIS (3) 2019: 68-80 - [c23]Ke Ma
, Geng Yang
:
CABAC: A Content-Driven Attribute-Based Access Control Model for Big Data. ICAIS (3) 2019: 517-529 - [c22]Hua Dai, Yan Ji, Fu Xiao, Geng Yang, Xun Yi, Lei Chen:
Privacy-Preserving MAX/MIN Query Processing for WSN -as-a -Service. Networking 2019: 1-9 - [c21]Maohu Yang, Hua Dai, Jingjing Bao, Xun Yi, Geng Yang:
A Parallel Multi-keyword Top-k Search Scheme over Encrypted Cloud Data. NPC 2019: 169-181 - [c20]Hao Zhou
, Geng Yang, Yahong Xu, Weiya Wang:
Effective Matrix Factorization for Recommendation with Local Differential Privacy. SciSec 2019: 235-249 - 2018
- [j29]Zhengyu Chen
, Lei Chen, Guobing Hu, Wencai Ye
, Jin Zhang, Geng Yang:
Data Reconstruction in Wireless Sensor Networks From Incomplete and Erroneous Observations. IEEE Access 6: 45493-45503 (2018) - [j28]Guoxiu Liu, Geng Yang, Haiwei Wang, Hua Dai, Qiang Zhou:
QSDB: An Encrypted Database Model for Privacy-Preserving in Cloud Computing. KSII Trans. Internet Inf. Syst. 12(7): 3375-3400 (2018) - [j27]Chuan-Jun Yi, Geng Yang, Hua Dai, Liang Liu, Yunhua Chen:
Efficient Geographical Information-Based En-route Filtering Scheme in Wireless Sensor Networks. KSII Trans. Internet Inf. Syst. 12(9): 4183-4204 (2018) - [j26]Hui Ren, Hua Dai, Geng Yang:
基于安全比较码的云环境隐私保护排序方法 (Secure Comparator Based Privacy-preserving Sorting Algorithms for Clouds). 计算机科学 45(5): 139-142 (2018) - [j25]Hua Dai, Jingjing Bao, Xiangyang Zhu, Xun Yi, Geng Yang:
面向云环境的一致性可验证单关键词检索方法 (Integrity-verifying Single Keyword Search Method in Clouds). 计算机科学 45(12): 92-97 (2018) - [j24]Shuangjie Bai
, Geng Yang
, Jingqi Shi
, Guoxiu Liu, Zhaoe Min:
Privacy-Preserving Oriented Floating-Point Number Fully Homomorphic Encryption Scheme. Secur. Commun. Networks 2018: 2363928:1-2363928:14 (2018) - [j23]Hua Dai
, Hui Ren, Zhiye Chen, Geng Yang
, Xun Yi:
Privacy-Preserving Sorting Algorithms Based on Logistic Map for Clouds. Secur. Commun. Networks 2018: 2373545:1-2373545:10 (2018) - [j22]Guoxiu Liu, Geng Yang
, Huaqun Wang, Yang Xiang, Hua Dai
:
A Novel Secure Scheme for Supporting Complex SQL Queries over Encrypted Databases in Cloud Computing. Secur. Commun. Networks 2018: 7383514:1-7383514:15 (2018) - [j21]Chuan-Jun Yi
, Geng Yang, Hua Dai, Liang Liu
, Ning Li:
Public Key-Based Authentication and En-Route Filtering Scheme in Wireless Sensor Networks. Sensors 18(11): 3829 (2018) - [c19]Siguang Chen, Xi Zhu
, Xuejian Zhao, Haijun Zhang, Kun Wang, Geng Yang:
Fog Computing Assisted Efficient Privacy Preserving Data Collection for Big Sensory Data. GLOBECOM 2018: 1-6 - [c18]Jian Xu, Xinyu Huang, Geng Yang, Yuanyuan Wu
:
An Efficient Multi-keyword top-k Search Scheme over Encrypted Cloud Data. I-SPAN 2018: 305-310 - 2017
- [j20]Wencai Ye
, Lei Chen, Geng Yang, Hua Dai, Fu Xiao:
Anomaly-Tolerant Traffic Matrix Estimation via Prior Information Guided Matrix Completion. IEEE Access 5: 3172-3182 (2017) - [j19]Hua Dai, Min Wang
, Xun Yi
, Geng Yang, Jingjing Bao:
Secure MAX/MIN Queries in Two-Tiered Wireless Sensor Networks. IEEE Access 5: 14478-14489 (2017) - [j18]Hua Dai, Qingqun Ye, Geng Yang, Fu Xiao, Ruiliang He:
两层传感器网络中安全Top-k查询处理技术综述 (Overview of Secure Top-k Query Processing in Two-tiered Wireless Sensor Networks). 计算机科学 44(5): 6-13 (2017) - [j17]Xiangyang Zhu
, Hua Dai
, Xun Yi, Geng Yang
, Xiao Li:
MUSE: An Efficient and Accurate Verifiable Privacy-Preserving Multikeyword Text Search over Encrypted Cloud Data. Secur. Commun. Networks 2017: 1923476:1-1923476:17 (2017) - [j16]Wei Teng, Geng Yang, Yang Xiang, Ting Zhang, Dongyang Wang:
Attribute-Based Access Control with Constant-Size Ciphertext in Cloud Computing. IEEE Trans. Cloud Comput. 5(4): 617-627 (2017) - [c17]Hua Dai, Xiangyang Zhu, Geng Yang, Xun Yi
:
A Verifiable Single Keyword Top-k Search Scheme against Insider Attacks over Cloud Data. BigCom 2017: 111-116 - 2016
- [j15]Zhengyu Chen, Geng Yang, Lei Chen, Jian Xu:
Constructing Maximum-Lifetime Data-Gathering Tree in WSNs Based on Compressed Sensing. Int. J. Distributed Sens. Networks 12(5) (2016) - [j14]Hua Dai, Qingqun Ye, Xun Yi, Ruiliang He, Geng Yang, Jinji Pan:
VP2RQ: Efficient verifiable privacy-preserving range query processing in two-tiered wireless sensor networks. Int. J. Distributed Sens. Networks 12(11) (2016) - [j13]Hua Dai
, Tianyi Wei, Yue Huang, Jia Xu, Geng Yang
:
Random Secure Comparator Selection Based Privacy-Preserving MAX/MIN Query Processing in Two-Tiered Sensor Networks. J. Sensors 2016: 6301404:1-6301404:13 (2016) - [j12]Hua Dai
, Qingqun Ye
, Geng Yang, Jia Xu, Ruiliang He:
CSRQ: Communication-Efficient Secure Range Queries in Two-Tiered Sensor Networks. Sensors 16(2): 259 (2016) - 2015
- [j11]Haiyong Wang
, Geng Yang
, Yiran Gu
, Jian Xu, Zhixin Sun
:
A Novel Cooperative ARQ Method for Wireless Sensor Networks. Int. J. Distributed Sens. Networks 11: 102326:1-102326:7 (2015) - [j10]Chuan-Jun Yi, Geng Yang
, Hua Dai
, Liang Liu, Ning Li:
Switching Algorithm with Prediction Strategy for Maximizing Lifetime in Wireless Sensor Network. Int. J. Distributed Sens. Networks 11: 592093:1-592093:12 (2015) - [j9]Bin Liu
, Geng Yang
:
Probabilistic Trust Evaluation with Inaccurate Reputation Reports. Int. J. Distributed Sens. Networks 11: 736286:1-736286:7 (2015) - [j8]Hua Dai, Geng Yang, Haiping Huang, Fu Xiao:
Efficient Verifiable Top-k Queries in Two-tiered Wireless Sensor Networks. KSII Trans. Internet Inf. Syst. 9(6): 2111-2131 (2015) - [j7]Lei Chen, Geng Yang, Zhengyu Chen, Fu Xiao, Jianyue Shi:
Correlation consistency constrained matrix completion for web service tag refinement. Neural Comput. Appl. 26(1): 101-110 (2015) - [c16]Bin Liu, Zhenfeng Xu
, Junjie Chen, Geng Yang:
Toward reliable data analysis for Internet of Things by Bayesian dynamic modeling and computation. ChinaSIP 2015: 1027-1031 - 2014
- [j6]Xiaolong Xu
, Weijian Geng, Geng Yang
, Nik Bessis
, Peter Norrington
:
LEDFD: A Low Energy Consumption Distributed Fault Detection Algorithm for Wireless Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [j5]Qiang Zhou, Geng Yang
, Liwen He
:
An Efficient Secure Data Aggregation Based on Homomorphic Primitives in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [c15]Lei Chen, Geng Yang, Zhengyu Chen, Fu Xiao, Xuxia Li:
Tag Completion and Refinement for Web Service via Low-Rank Matrix Completion. PAKDD Workshops 2014: 269-278 - 2013
- [j4]Hua Dai, Geng Yang
, Xiaolin Qin:
EMQP: An Energy-Efficient Privacy-Preserving MAX/MIN Query Processing in Tiered Wireless Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j3]Geng Yang
, Li Sen, Xiaolong Xu, Hua Dai, Zhen Yang:
Precision-Enhanced and Encryption-Mixed Privacy-Preserving Data Aggregation in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j2]Lei Chen, Geng Yang, Wei Zhu, Yingzhou Zhang, Zhen Yang:
Clustering facilitated web services discovery model based on supervised term weighting and adaptive metric learning. Int. J. Web Eng. Technol. 8(1): 58-80 (2013) - [c14]Hua Dai, Geng Yang, Fu Xiao, Qiang Zhou:
EVTQ: An Efficient Verifiable Top-k Query Processing in Two-Tiered Wireless Sensor Networks. MSN 2013: 206-211 - 2012
- [c13]Zhengyu Chen, Geng Yang, Lei Chen, Jian Xu, Haiyong Wang:
A load-balanced data aggregation scheduling for duty-cycled wireless sensor networks. CloudCom 2012: 888-893 - [c12]Geng Yang, Qiang Zhou, Xiaolong Xu, Jian Xu, Chunming Rong
:
A Novel Identity-Based Key Management and Encryption Scheme for Distributed System. CSS 2012: 123-138 - [c11]Haiyong Wang, Geng Yang, Jian Xu, Zhengyu Chen, Zhen Yang:
A Code Dissemination Protocol of Low Energy Consumption. WISM 2012: 36-43 - [c10]Wei Zhu, Geng Yang, Jian Xu, Xiao-ling Yang:
Information Encryption Based on Virtual Optical Imaging System and Chen's Chaos. WISM 2012: 206-213 - 2011
- [c9]Hongbing Cheng, Chunming Rong
, Geng Yang:
Design and Analysis of a Secure Routing Protocol Algorithm for Wireless Sensor Networks. AINA 2011: 475-480 - 2010
- [j1]Yingzhou Zhang, Wei Fu, Geng Yang, Lei Chen, Weifeng Zhang:
Web Service Generation through Program Slicing. Int. J. Commun. Netw. Syst. Sci. 3(11): 877-887 (2010) - [c8]Lei Chen, Geng Yang, Dongrui Wang, Yingzhou Zhang:
WordNet-powered Web Services Discovery Using Kernel-Based Similarity Matching Mechanism. SOSE 2010: 64-68
2000 – 2009
- 2008
- [c7]Tao Yang, Ye Huang, Jianxin Chen, Geng Yang, Chunming Rong
:
Di-GAFR: Directed Greedy Adaptive Face-Based Routing. ATC 2008: 555-566 - 2006
- [c6]Peng Jiang, Geng Yang, Chunming Rong
:
Combined Method for Nonlinear Systems of Equations. International Conference on Computational Science (4) 2006: 693-699 - [c5]Peng Jiang, Geng Yang, Chunming Rong
:
Performance Analysis of Block Jacobi Preconditioning Technique Based on Block Broyden Method. International Conference on Computational Science (1) 2006: 794-797 - 2005
- [c4]Quan Zhou, Geng Yang, Jiangang Shen, Chunming Rong
:
A Scalable Security Architecture for Grid. PDCAT 2005: 89-93 - [c3]Xiuying Wu, Geng Yang, Jiangang Shen, Quan Zhou:
A Novel Security Model Based on Virtual Organization for Grid. PDCAT 2005: 106-109 - 2004
- [c2]Quan Zhou, Geng Yang:
A Grid Portal Model Based on Security and Storage Resource Proxy. CIS 2004: 13-18 - 2003
- [c1]Geng Yang, Chunming Rong
, Yunping Dai:
A Distributed Honeypot System for Grid Security. GCC (1) 2003: 1083-1086
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-10-05 23:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint