default search action
Yichuan Wang
- > Home > Persons > Yichuan Wang
Publications
- 2024
- [j73]Yichuan Wang, Yanhua Feng, Yeqiu Xiao, Xiaoxue Liu, Xinhong Hei:
Privacy Block-Streaming: A Novel DEX File Loading Scheme Based on Federated Learning. J. Inf. Sci. Eng. 40(1): 27-39 (2024) - 2023
- [j69]Wei Chen, Yichuan Wang, Yeqiu Xiao, Xinhong Hei:
Explore the potential of deep learning and hyperchaotic map in the meaningful visual image encryption scheme. IET Image Process. 17(11): 3235-3257 (2023) - [c90]Yichuan Wang, Jingjing Zhao, Yaling Zhang, Xinhong Hei, Lei Zhu:
Smart Contract Symbol Execution Vulnerability Detection Method Based on CFG Path Pruning. BSCI 2023: 132-139 - [c82]Yichuan Wang, Jianhuan Tie, Xinhong Hei, Li Zhao, Xiaohui Zhang:
A Trusted Privacy-Preserving Model for Cross-Chain Transactions Based on zk_SNARKs. NaNA 2023: 187-192 - [c77]Yichuan Wang, Yibin Ma, Junxia Ding, Xiang Sun, Dan Wu, Xinhong Hei:
Hearing Cyber-Attacks: A Novel Model for Bridging Network Security Situation and Music. SSPS 2023: 63-70 - 2022
- [j57]Yichuan Wang, Rui Fan, Xiaolong Liang, Pengge Li, Xinhong Hei:
Trusted Data Storage Architecture for National Infrastructure. Sensors 22(6): 2318 (2022) - [j56]Mengyang Li, Xinhong Hei, Wenjiang Ji, Lei Zhu, Yichuan Wang, Yuan Qiu:
A Fault-Diagnosis Method for Railway Turnout Systems Based on Improved Autoencoder and Data Augmentation. Sensors 22(23): 9438 (2022) - [c73]Yichuan Wang, Rui Fan, Xinyue Yin, Xinhong Hei:
Trusted Storage Architecture for Machine Reasoning based on Blockchain. INFOCOM Workshops 2022: 1-6 - [c72]Yichuan Wang, Yanhua Feng, Yanning Du, Xinhong Hei, Yuying Tian, Xiangjie Cui:
Block-Streaming Service Loading Optimization of Android Dalvik Executable File for Cloud-End Collaboration. NaNA 2022: 1-6 - [c71]Yeqiu Xiao, Yichuan Wang, Wenjiang Ji, Lei Zhu, Xinhong Hei:
Effective Secrecy Throughput Analysis for Communication Systems with a DF Satellite Relay. NaNA 2022: 1-5 - 2021
- [j52]Yichuan Wang, Binbin Bai, Xinhong Hei, Lei Zhu, Wenjiang Ji:
An unknown protocol syntax analysis method based on convolutional neural network. Trans. Emerg. Telecommun. Technol. 32(5) (2021) - [j46]Wenjiang Ji, Chen Cheng, Guo Xie, Lei Zhu, Yichuan Wang, Long Pan, Xinhong Hei:
An intelligent fault diagnosis method based on curve segmentation and SVM for rail transit turnout. J. Intell. Fuzzy Syst. 41(3): 4275-4285 (2021) - [j45]Yichuan Wang, Xiaolong Liang, Xinhong Hei, Wenjiang Ji, Lei Zhu:
Deep Learning Data Privacy Protection Based on Homomorphic Encryption in AIoT. Mob. Inf. Syst. 2021: 5510857:1-5510857:11 (2021) - [j43]Yichuan Wang, Han Yu, Xinhong Hei, Binbin Bai, Wenjiang Ji:
From Unknown to Similar: Unknown Protocol Syntax Analysis for Network Flows in IoT. Secur. Commun. Networks 2021: 9179286:1-9179286:13 (2021) - [j41]Yichuan Wang, Yuying Tian, Xinhong Hei, Lei Zhu, Wenjiang Ji:
A Novel IoV Block-Streaming Service Awareness and Trusted Verification Scheme in 6G. IEEE Trans. Veh. Technol. 70(6): 5197-5210 (2021) - [c67]Yichuan Wang, He Wang, Xinhong Hei, Wenjiang Ji, Lei Zhu:
Petri net modeling and vulnerability analysis of the Heartbleed. NaNA 2021: 155-160 - [c62]Xiaoyan Zhu, Yu Zhang, Lei Zhu, Xinhong Hei, Yichuan Wang, Feixiong Hu, Yanni Yao:
Chinese named entity recognition method for the field of network security based on RoBERTa. NaNA 2021: 420-425 - [c60]Lei Zhu, Ziheng Zhang, Xinhong Hei, Yichuan Wang, Ziliang Yang, Feixiong Hu, Ping He:
A permission generation and configuration method based on Rules and FP-Growth algorithm. NaNA 2021: 495-500 - [c59]Xinhong Hei, Hao Zhang, Wenjiang Ji, Yichuan Wang, Lei Zhu, Yuan Qiu:
ConvCatb: An Attention-based CNN-CATBOOST Risk Prediction Model for Driving Safety. NaNA 2021: 513-519 - [c58]Wenjiang Ji, Jiangcheng Yang, Yichuan Wang, Lei Zhu, Yuan Qiu, Xinhong Hei:
A Driving Risk Prediction Approach Based on Generative Adversarial Networks and VANET for Autonomous Trams. NaNA 2021: 520-526 - [c57]Yichuan Wang, Xiaolong Liang, Xinhong Hei, Lei Zhu, Wenjiang Ji:
A Heuristic SAT Problems Solving Method based on LSTM Network. PAAP 2021: 141-145 - 2020
- [j40]Yichuan Wang, Yuying Tian, Xinyue Yin, Xinhong Hei:
A trusted recommendation scheme for privacy protection based on federated learning. CCF Trans. Netw. 3(3-4): 218-228 (2020) - [j37]Xinhong Hei, Xinyue Yin, Yichuan Wang, Ju Ren, Lei Zhu:
A trusted feature aggregator federated learning for distributed malicious attack detection. Comput. Secur. 99: 102033 (2020) - [j34]Yichuan Wang, Binbin Bai, Xinhong Hei, Ju Ren, Wenjiang Ji:
Classification and Recognition of Unknown Network Protocol Characteristics. J. Inf. Sci. Eng. 36(4): 765-776 (2020) - [j33]Lei Zhu, Ping He, Xinhong Hei, Yanni Yao, Yichuan Wang, Wenjiang Ji, Qin Zhao, Long Pan:
Combined access control model embedding configurable policy for fine-grained data security. Microprocess. Microsystems 75: 103060 (2020) - [j32]Xinhong Hei, Wen Gao, Yichuan Wang, Lei Zhu, Wenjiang Ji:
From Hardware to Operating System: A Static Measurement Method of Android System Based on TrustZone. Wirel. Commun. Mob. Comput. 2020: 8816023:1-8816023:13 (2020) - [c54]Yichuan Wang, Xinyue Yin, He Zhu, Xinhong Hei:
A Blockchain Based Distributed Storage System for Knowledge Graph Security. ICAIS (2) 2020: 318-327 - [c53]Yichuan Wang, Wen Gao, Xinhong Hei, Irenee Mungwarama, Ju Ren:
Independent credible: Secure communication architecture of Android devices based on TrustZone. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2020: 85-92 - [c52]Xinhong Hei, Xiaolong Liang, Yichuan Wang, Wenjiang Ji, Lei Zhu:
Deep Learning as a Service Based on Encrypted Data. NaNA 2020: 53-58 - [c51]Irenee Mungwarakarama, Xinhong Hei, Yichuan Wang, Wenjiang Ji, Xinyu Jiang:
Network Flow Analytics: Multi-Class Classification of DDoS Attacks Based on OKNN. NaNA 2020: 271-276 - [c49]Lei Zhu, Yaolin Liu, Xinhong Hei, Yichuan Wang, Haining Meng, Jiuyuan Jiao, Long Pan:
A study on exercise recommendation method using Knowledge Graph for computer network course. NaNA 2020: 436-442 - 2019
- [j29]Yichuan Wang, He Zhu, Xinhong Hei, Yue Kong, Wenjiang Ji, Lei Zhu:
An energy saving based on task migration for mobile edge computing. EURASIP J. Wirel. Commun. Netw. 2019: 133 (2019) - [j25]Wenjiang Ji, Lei Zhu, Yichuan Wang, Zheng Liu, Xinhong Hei:
RSU authentication in vehicular ad hoc networks base on verifiable secret sharing. J. Intell. Fuzzy Syst. 37(4): 4531-4536 (2019) - [j24]Lei Zhu, Yanni Yao, Yichuan Wang, Xinhong Hei, Qin Zhao, Wenjiang Ji, Quanzhu Yao:
A novel subgraph querying method based on paths and spectra. Neural Comput. Appl. 31(9): 5671-5678 (2019) - [c46]Xinhong Hei, Wen Gao, Yichuan Wang, Zhongdi Liang, Wenjiang Ji, Xianzhi Hu:
Railway Key Exchange Scheme for Improving Communication Efficiency of RSSP-II Protocol. GLOBECOM Workshops 2019: 1-6 - [c43]Wei Wang, Binbin Bai, Yichuan Wang, Xinhong Hei, Li Zhang:
Bitstream Protocol Classification Mechanism Based on Feature Extraction. NaNA 2019: 241-246 - [c42]Xinhong Hei, Binbin Bai, Yichuan Wang, Li Zhang, Lei Zhu, Wenjiang Ji:
Feature Extraction Optimization for Bitstream Communication Protocol Format Reverse Analysis. TrustCom/BigDataSE 2019: 662-669 - 2018
- [j21]Yichuan Wang, Yefei Zhang, Lei Zhu, Wenjiang Ji, Yanxiao Liu, Xinhong Hei:
A novel energy-aware trustworthy multi-hop routing model for Internet of things. Int. J. Distributed Sens. Networks 14(12) (2018) - [c39]Wei Wang, Yanni Yao, Lei Zhu, Xinhong Hei, Yichuan Wang:
A Novel Subgraph Querying Method on Directed Weighted Graphs. CIS 2018: 150-154 - [c38]Jie Zhang, Yi Chen, Xinhong Hei, Lei Zhu, Qin Zhao, Yichuan Wang:
A RMM Based Word Segmentation Method for Chinese Design Specifications of Building Stairs. CIS 2018: 277-280 - [c36]Zhongdi Liang, Xinhong Hei, Yichuan Wang, Wenjiang Ji, Lei Zhu, Yefei Zhang:
Analysis and Protection of DDOS Attack Based on RSSP-II Protocol. NaNA 2018: 117-120 - [c35]He Zhu, Yichuan Wang, Xinhong Hei, Wenjiang Ji, Li Zhang:
A Blockchain-Based Decentralized Cloud Resource Scheduling Architecture. NaNA 2018: 324-329 - [c34]Yue Kong, Yikun Zhang, Yichuan Wang, Hao Chen, Xinhong Hei:
Energy Saving Strategy for Task Migration Based on Genetic Algorithm. NaNA 2018: 330-336 - 2017
- [c32]Lei Zhu, Yanxiao Liu, Yichuan Wang, Wenjiang Ji, Xinhong Hei, Quanzhu Yao, Xiaoyan Zhu:
Efficient (k, n) Secret Sharing Scheme Secure against k - 2 Cheaters. NaNA 2017: 1-4 - 2016
- [j8]Yichuan Wang, Yefei Zhang, Xinhong Hei, Wenjiang Ji, Weigang Ma:
Game strategies for distributed denial of service defense in the Cloud of Things. J. Commun. Inf. Networks 1(4): 143-155 (2016) - [j7]Yichuan Wang, Jianfeng Ma, Liumei Zhang, Wenjiang Ji, Di Lu, Xinhong Hei:
Dynamic game model of botnet DDoS attack and defense. Secur. Commun. Networks 9(16): 3127-3140 (2016) - [c28]Yanxiao Liu, Yichuan Wang, Lei Zhu, Jiwen Jiang, Xinhong Hei:
(k, n) Secret Sharing Scheme against Two Types of Cheaters. NaNA 2016: 284-287
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-26 01:51 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint