


default search action
Chao Yang 0016
Person information
- affiliation (PhD 2008): Xidian University, School of Cyber Engineering, Xi'an, China
Other persons with the same name
- Chao Yang — disambiguation page
- Chao Yang 0001 ![0000-0001-7172-7539 [0000-0001-7172-7539]](https://dblp1.uni-trier.de/img/orcid-mark.12x12.png) — Lawrence Berkeley National Laboratory, Computational Research Division, CA, USA — Lawrence Berkeley National Laboratory, Computational Research Division, CA, USA
- Chao Yang 0002 ![0000-0001-7426-6248 [0000-0001-7426-6248]](https://dblp1.uni-trier.de/img/orcid-mark.12x12.png) — Peking University, Beijing, China (and 1 more) — Peking University, Beijing, China (and 1 more)
- Chao Yang 0003 ![0000-0002-5204-8060 [0000-0002-5204-8060]](https://dblp1.uni-trier.de/img/orcid-mark.12x12.png) — Sun Yat-Sen University, School of Mathematics, Guangzhou, China (and 1 more) — Sun Yat-Sen University, School of Mathematics, Guangzhou, China (and 1 more)
- Chao Yang 0004 ![0000-0001-6067-7505 [0000-0001-6067-7505]](https://dblp1.uni-trier.de/img/orcid-mark.12x12.png) — Chinese Academy of Sciences, Institute of Process Engineering, Beijing, China — Chinese Academy of Sciences, Institute of Process Engineering, Beijing, China
- Chao Yang 0005 ![0000-0002-0335-2517 [0000-0002-0335-2517]](https://dblp1.uni-trier.de/img/orcid-mark.12x12.png) — Guangdong University of Technology, School of Automation, Guangzhou, China (and 2 more) — Guangdong University of Technology, School of Automation, Guangzhou, China (and 2 more)
- Chao Yang 0006 ![0000-0001-9255-0752 [0000-0001-9255-0752]](https://dblp1.uni-trier.de/img/orcid-mark.12x12.png) — Yanshan University, Institute of Electric Engineering, Qinhuangdao, China (and 1 more) — Yanshan University, Institute of Electric Engineering, Qinhuangdao, China (and 1 more)
- Chao Yang 0007 ![0000-0003-0406-7598 [0000-0003-0406-7598]](https://dblp1.uni-trier.de/img/orcid-mark.12x12.png) — China University of Geosciences, National Engineering Research Center of Geographic Information System, Wuhan, China — China University of Geosciences, National Engineering Research Center of Geographic Information System, Wuhan, China
- Chao Yang 0008 ![0000-0003-1242-5180 [0000-0003-1242-5180]](https://dblp1.uni-trier.de/img/orcid-mark.12x12.png) — Hunan University, College of Mathematics and Econometrics, Changsha, China — Hunan University, College of Mathematics and Econometrics, Changsha, China
- Chao Yang 0009 ![0000-0002-5441-2540 [0000-0002-5441-2540]](https://dblp1.uni-trier.de/img/orcid-mark.12x12.png) — East China University of Science and Technology, Key Laboratory of Advanced Control and Optimization for Chemical Processes, Shanghai, China (and 1 more) — East China University of Science and Technology, Key Laboratory of Advanced Control and Optimization for Chemical Processes, Shanghai, China (and 1 more)
- Chao Yang 0010 ![0000-0001-7724-0385 [0000-0001-7724-0385]](https://dblp1.uni-trier.de/img/orcid-mark.12x12.png) — Shenzhen University, College of Information Engineering / Key Laboratory of Spatial Smart Sensing and Services, China — Shenzhen University, College of Information Engineering / Key Laboratory of Spatial Smart Sensing and Services, China
- Chao Yang 0011 ![0000-0002-6553-7963 [0000-0002-6553-7963]](https://dblp1.uni-trier.de/img/orcid-mark.12x12.png) — University of Southern California, Department of Computer Science, Los Angeles, CA, USA — University of Southern California, Department of Computer Science, Los Angeles, CA, USA
- Chao Yang 0012 ![0000-0002-4796-7011 [0000-0002-4796-7011]](https://dblp1.uni-trier.de/img/orcid-mark.12x12.png) — National Digital Switching System Engineering and Technological Research Center, Zhengzhou, China — National Digital Switching System Engineering and Technological Research Center, Zhengzhou, China
- Chao Yang 0013 ![0000-0002-0607-9552 [0000-0002-0607-9552]](https://dblp1.uni-trier.de/img/orcid-mark.12x12.png) — Tsinghua University, School of Public Policy and Management, Beijing, China (and 1 more) — Tsinghua University, School of Public Policy and Management, Beijing, China (and 1 more)
- Chao Yang 0014 ![0000-0003-1924-6927 [0000-0003-1924-6927]](https://dblp1.uni-trier.de/img/orcid-mark.12x12.png) — Guilin University of Electronic Technology, MOE Key Laboratory of Cognitive Radio and Signal Processing, China — Guilin University of Electronic Technology, MOE Key Laboratory of Cognitive Radio and Signal Processing, China
- Chao Yang 0015 ![0000-0001-8774-8115 [0000-0001-8774-8115]](https://dblp1.uni-trier.de/img/orcid-mark.12x12.png) — Hunan University, College of Computer Science and Electronic Engineering, Changsha, China (and 2 more) — Hunan University, College of Computer Science and Electronic Engineering, Changsha, China (and 2 more)
- Chao Yang 0017 ![0000-0001-7648-6738 [0000-0001-7648-6738]](https://dblp1.uni-trier.de/img/orcid-mark.12x12.png) — Central South University, School of Information Science and Engineering, Changsha, China — Central South University, School of Information Science and Engineering, Changsha, China
- Chao Yang 0018 ![0000-0001-9001-0656 [0000-0001-9001-0656]](https://dblp1.uni-trier.de/img/orcid-mark.12x12.png) — National University of Defense Technology, College of Computer, Changsha, China — National University of Defense Technology, College of Computer, Changsha, China
- Chao Yang 0019 ![0000-0003-0917-5256 [0000-0003-0917-5256]](https://dblp1.uni-trier.de/img/orcid-mark.12x12.png) — Northeastern University, Shenyang, China (and 1 more) — Northeastern University, Shenyang, China (and 1 more)
- Chao Yang 0020 — University of Newcastle Upon Tyne, UK
- Chao Yang 0021 ![0000-0001-9276-5673 [0000-0001-9276-5673]](https://dblp1.uni-trier.de/img/orcid-mark.12x12.png) — Shanghai University, School of Communication and Information Engineering, Shanghai Institute for Advanced Communication and Data Science, China (and 2 more) — Shanghai University, School of Communication and Information Engineering, Shanghai Institute for Advanced Communication and Data Science, China (and 2 more)
- Chao Yang 0022 — Texas A&M University, Department of Computer Science and Engineering, College Station, TX, USA
- Chao Yang 0023 ![0000-0002-7136-6013 [0000-0002-7136-6013]](https://dblp1.uni-trier.de/img/orcid-mark.12x12.png) — University of Electronic Science and Technology of China, School of Life Science and Technology, Center of Bioinformatics, Chengdu, China — University of Electronic Science and Technology of China, School of Life Science and Technology, Center of Bioinformatics, Chengdu, China
- Chao Yang 0024 ![0000-0002-3763-5080 [0000-0002-3763-5080]](https://dblp1.uni-trier.de/img/orcid-mark.12x12.png) — University of Technology Sydney, Australia (and 1 more) — University of Technology Sydney, Australia (and 1 more)
- Chao Yang 0025 ![0000-0002-3311-291X [0000-0002-3311-291X]](https://dblp1.uni-trier.de/img/orcid-mark.12x12.png) — Auburn University, Department of Electrical and Computer Engineering, USA — Auburn University, Department of Electrical and Computer Engineering, USA
- Chao Yang 0026 ![0000-0002-2697-5661 [0000-0002-2697-5661]](https://dblp1.uni-trier.de/img/orcid-mark.12x12.png) — Tsinghua University, Beijing National Research Center for Information Science and Technology, Institute for Artificial Intelligence, Beijing, China — Tsinghua University, Beijing National Research Center for Information Science and Technology, Institute for Artificial Intelligence, Beijing, China
- Chao Yang 0027 — Southeast University, LEADS, National Mobile Communications Research Laboratory, Nanjing, China
- Chao Yang 0028 ![0009-0009-7637-7254 [0009-0009-7637-7254]](https://dblp1.uni-trier.de/img/orcid-mark.12x12.png) — Southwest Jiaotong University, Faculty of Geosciences and Environmental Engineering, Chengdu, China — Southwest Jiaotong University, Faculty of Geosciences and Environmental Engineering, Chengdu, China
- Chao Yang 0029 ![0000-0003-3052-3091 [0000-0003-3052-3091]](https://dblp1.uni-trier.de/img/orcid-mark.12x12.png) — Northwest Institute of Nuclear Technology, Xi'an, China (and 1 more) — Northwest Institute of Nuclear Technology, Xi'an, China (and 1 more)
- Chao Yang 0030 — Marvell Semiconductor, Austin, TX, USA (and 1 more)
- Chao Yang 0031 — Mobvoi Inc., WeNet Open Source Community, Beijing, China
- Chao Yang 0032 ![0000-0002-7456-9617 [0000-0002-7456-9617]](https://dblp1.uni-trier.de/img/orcid-mark.12x12.png) — Shanghai University of Engineering Science, School of Mathematics, Physics and Statistics, China (and 1 more) — Shanghai University of Engineering Science, School of Mathematics, Physics and Statistics, China (and 1 more)
- Chao Yang 0033 ![0000-0003-0781-7227 [0000-0003-0781-7227]](https://dblp1.uni-trier.de/img/orcid-mark.12x12.png) — University of Electronic Science and Technology of China, State Key Laboratory of Electronic Thin Films and Integrated Devices, Chengdu, China — University of Electronic Science and Technology of China, State Key Laboratory of Electronic Thin Films and Integrated Devices, Chengdu, China
- Chao Yang 0034 ![0000-0003-4225-9566 [0000-0003-4225-9566]](https://dblp1.uni-trier.de/img/orcid-mark.12x12.png) — Tongji University, Shanghai, China — Tongji University, Shanghai, China
- Chao Yang 0035 ![0000-0002-6220-0660 [0000-0002-6220-0660]](https://dblp1.uni-trier.de/img/orcid-mark.12x12.png) — Aalto University, Espoo, Finland — Aalto University, Espoo, Finland
- Chao Yang 0036 ![0000-0002-7358-1657 [0000-0002-7358-1657]](https://dblp1.uni-trier.de/img/orcid-mark.12x12.png) — Guangxi University of Science and Technology, Liuzhou, Guangxi, China — Guangxi University of Science and Technology, Liuzhou, Guangxi, China
- Chao Yang 0037 ![0000-0002-3995-6881 [0000-0002-3995-6881]](https://dblp1.uni-trier.de/img/orcid-mark.12x12.png) — University of Hong Kong, Hong Kong, SAR, China — University of Hong Kong, Hong Kong, SAR, China
- Chao Yang 0038 ![0009-0000-8790-3381 [0009-0000-8790-3381]](https://dblp1.uni-trier.de/img/orcid-mark.12x12.png) — China University of Petroleum, Qingdao, Shandong, China — China University of Petroleum, Qingdao, Shandong, China
- Chao Yang 0039 ![0000-0001-8495-8862 [0000-0001-8495-8862]](https://dblp1.uni-trier.de/img/orcid-mark.12x12.png) — Jiaxing University, Jiaxing, China — Jiaxing University, Jiaxing, China
- Chao Yang 0040 ![0000-0002-2961-2129 [0000-0002-2961-2129]](https://dblp1.uni-trier.de/img/orcid-mark.12x12.png) — Beijing University of Technology, Beijing, China — Beijing University of Technology, Beijing, China
- Chao Yang 0041 ![0000-0003-2417-0621 [0000-0003-2417-0621]](https://dblp1.uni-trier.de/img/orcid-mark.12x12.png) — Chongqing University of Posts and Telecommunications, Chongqing, China — Chongqing University of Posts and Telecommunications, Chongqing, China
- Chao Yang 0042 ![0000-0002-7166-0984 [0000-0002-7166-0984]](https://dblp1.uni-trier.de/img/orcid-mark.12x12.png) — College of Mathematical Sciences, Harbin Engineering University, Harbin, China — College of Mathematical Sciences, Harbin Engineering University, Harbin, China
- Chao Yang 0043 ![0000-0002-6682-3283 [0000-0002-6682-3283]](https://dblp1.uni-trier.de/img/orcid-mark.12x12.png) — Hubei University, Wuhan, China — Hubei University, Wuhan, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
 [j33]Zhizhuang Jia, Chao Yang, Pengbin Feng, Xiaoyun Zhao [j33]Zhizhuang Jia, Chao Yang, Pengbin Feng, Xiaoyun Zhao , Xinghua Li, Jianfeng Ma: , Xinghua Li, Jianfeng Ma:
 Impact assessment of third-party library vulnerabilities through vulnerability reachability analysis. Comput. Secur. 157: 104546 (2025)
 [j32]Bin Wang [j32]Bin Wang , Chao Yang , Chao Yang , Jianfeng Ma , Jianfeng Ma : :
 UKVLDP: Utility-Optimized Local Differential Privacy Mechanism for Key-Value IoT Data Collection. IEEE Internet Things J. 12(11): 17964-17976 (2025)
 [c16]Yue Wang, Chao Yang, Xiaodong Zhang, Yuwanqi Deng, Jianfeng Ma: [c16]Yue Wang, Chao Yang, Xiaodong Zhang, Yuwanqi Deng, Jianfeng Ma:
 DPFuzzer: Discovering Safety Critical Vulnerabilities for Drone Path Planners. ICSE 2025: 1973-1985
- 2024
 [j31]Qixian Ren [j31]Qixian Ren , Yu Zheng, Chao Yang, Yue Li, Jian-Feng Ma: , Yu Zheng, Chao Yang, Yue Li, Jian-Feng Ma:
 Shadow backdoor attack: Multi-intensity backdoor attack against federated learning. Comput. Secur. 139: 103740 (2024)
 [j30]Yue Wang [j30]Yue Wang , Chao Yang , Chao Yang , Ruidong Han , Ruidong Han , Xinghua Li , Xinghua Li , Jianfeng Ma , Jianfeng Ma : :
 Dvatar: Simulating the Binary Firmware of Drones. IEEE Internet Things J. 11(19): 30661-30675 (2024)
 [j29]Taifeng Liu [j29]Taifeng Liu , Chao Yang , Chao Yang , Xinjing Liu , Xinjing Liu , Ruidong Han , Ruidong Han , Jianfeng Ma , Jianfeng Ma : :
 RPAU: Fooling the Eyes of UAVs via Physical Adversarial Patches. IEEE Trans. Intell. Transp. Syst. 25(3): 2586-2598 (2024)
 [c15]Wei Tong, Xuewen Dong, Weidong Yang, Yulong Shen, Chao Yang, Zesong Dong: [c15]Wei Tong, Xuewen Dong, Weidong Yang, Yulong Shen, Chao Yang, Zesong Dong:
 Non-Subjective Trust Mechanism for Online Ride-Hailing Services. ICWS 2024: 1377-1383
- 2023
 [j28]Xiaoyun Zhao [j28]Xiaoyun Zhao , Chao Yang, Zhizhuang Jia, Yue Wang, Jianfeng Ma: , Chao Yang, Zhizhuang Jia, Yue Wang, Jianfeng Ma:
 FCEVAL: An effective and quantitative platform for evaluating fuzzer combinations fairly and easily. Comput. Secur. 132: 103354 (2023)
 [j27]Zhizhuang Jia [j27]Zhizhuang Jia , Chao Yang, Xiaoyun Zhao , Chao Yang, Xiaoyun Zhao , Xinghua Li, Jian Feng Ma: , Xinghua Li, Jian Feng Ma:
 Design and implementation of an efficient container tag dynamic taint analysis. Comput. Secur. 135: 103528 (2023)
 [j26]Bin Wang [j26]Bin Wang , Chao Yang , Chao Yang , Jianfeng Ma , Jianfeng Ma : :
 IAFDroid: Demystifying Collusion Attacks in Android Ecosystem via Precise Inter-App Analysis. IEEE Trans. Inf. Forensics Secur. 18: 2883-2898 (2023)
 [c14]Yu Zheng [c14]Yu Zheng , Xinglin Lian , Xinglin Lian , Zhangxuan Dang , Zhangxuan Dang , Chunlei Peng , Chunlei Peng , Chao Yang , Chao Yang , Jianfeng Ma , Jianfeng Ma : :
 A Semi-Supervised Anomaly Network Traffic Detection Framework via Multimodal Traffic Information Fusion. CIKM 2023: 4455-4459
 [c13]Yue Wang [c13]Yue Wang , Chao Yang , Chao Yang , Ning Xi, Yulong Shen , Ning Xi, Yulong Shen , Jianfeng Ma , Jianfeng Ma : :
 SEBD: Sensor Emulation Based Backdoor for Autopilot. IoT 2023: 265-269
- 2022
 [j25]Suixing Wang [j25]Suixing Wang , Chao Yang , Chao Yang , Gang Guo, Mingzhe Chen, Jian Feng Ma: , Gang Guo, Mingzhe Chen, Jian Feng Ma:
 SSAPPIDENTIFY: A robust system identifies application over Shadowsocks's traffic. Comput. Networks 203: 108659 (2022)
 [c12]Ruidong Han [c12]Ruidong Han , Chao Yang, Siqi Ma , Chao Yang, Siqi Ma , Jianfeng Ma, Cong Sun, Juanru Li, Elisa Bertino: , Jianfeng Ma, Cong Sun, Juanru Li, Elisa Bertino:
 Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search. ICSE 2022: 462-473
 [i2]Yu Zheng, Zhangxuan Dang, Chunlei Peng [i2]Yu Zheng, Zhangxuan Dang, Chunlei Peng , Chao Yang, Xinbo Gao: , Chao Yang, Xinbo Gao:
 Multi-view Multi-label Anomaly Network Traffic Classification based on MLP-Mixer Neural Network. CoRR abs/2210.16719 (2022)
- 2021
 [j24]Baolin Ma [j24]Baolin Ma , Chao Yang , Chao Yang , Mingzhe Chen, Jianfeng Ma: , Mingzhe Chen, Jianfeng Ma:
 GramMatch: An automatic protocol feature extraction and identification system. Comput. Networks 201: 108528 (2021)
 [j23]Qiuning Ren [j23]Qiuning Ren , Chao Yang , Chao Yang , Jianfeng Ma: , Jianfeng Ma:
 App identification based on encrypted multi-smartphone sources traffic fingerprints. Comput. Networks 201: 108590 (2021)
 [j22]Quanlong Zhu, Chao Yang, Yu Zheng, Jianfeng Ma, Hui Li, Junwei Zhang, Jiajie Shao: [j22]Quanlong Zhu, Chao Yang, Yu Zheng, Jianfeng Ma, Hui Li, Junwei Zhang, Jiajie Shao:
 Smart home: Keeping privacy based on Air-Padding. IET Inf. Secur. 15(2): 156-168 (2021)
 [c11]Yu Zheng, Chao Yang, Yanzhou Yang, Qixian Ren [c11]Yu Zheng, Chao Yang, Yanzhou Yang, Qixian Ren , Yue Li, Jianfeng Ma: , Yue Li, Jianfeng Ma:
 ShadowDGA: Toward Evading DGA Detectors with GANs. ICCCN 2021: 1-8
 [i1]Ruidong Han, Chao Yang, Siqi Ma, Jianfeng Ma, Cong Sun, Juanru Li, Elisa Bertino: [i1]Ruidong Han, Chao Yang, Siqi Ma, Jianfeng Ma, Cong Sun, Juanru Li, Elisa Bertino:
 Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search. CoRR abs/2112.03511 (2021)
- 2020
 [j21]Zhanquan Sun [j21]Zhanquan Sun , Chaoli Wang, Yangyang Zhao, Chao Yang: , Chaoli Wang, Yangyang Zhao, Chao Yang:
 Multi-Label ECG Signal Classification Based on Ensemble Classifier. IEEE Access 8: 117986-117996 (2020)
 [j20]Zhicheng Yan, Chao Yang, Wei You, Jingjing Guo, Junwei Zhang, Yu Zheng, Jianfeng Ma: [j20]Zhicheng Yan, Chao Yang, Wei You, Jingjing Guo, Junwei Zhang, Yu Zheng, Jianfeng Ma:
 Achieving secure and convenient WLAN sharing in personal. IET Inf. Secur. 14(6): 733-744 (2020)
 [j19]Jingjing Guo [j19]Jingjing Guo , Xinghua Li , Xinghua Li , Zhiquan Liu , Zhiquan Liu , Jianfeng Ma, Chao Yang , Jianfeng Ma, Chao Yang , Junwei Zhang, Dapeng Wu , Junwei Zhang, Dapeng Wu : :
 TROVE: A Context-Awareness Trust Model for VANETs Using Reinforcement Learning. IEEE Internet Things J. 7(7): 6647-6662 (2020)
 [c10]Jing Zhang, Chao Yang, Yu Zheng, Wei You, Ruidan Su, Jianfeng Ma: [c10]Jing Zhang, Chao Yang, Yu Zheng, Wei You, Ruidan Su, Jianfeng Ma:
 A Preliminary Analysis of Password Guessing Algorithm. ICCCN 2020: 1-9
 [c9]Ruidong Han, Chao Yang, Jianfeng Ma, Siqi Ma [c9]Ruidong Han, Chao Yang, Jianfeng Ma, Siqi Ma , Yunbo Wang, Feng Li: , Yunbo Wang, Feng Li:
 IMShell-Dec: Pay More Attention to External Links in PowerShell. SEC 2020: 189-202
2010 – 2019
- 2019
 [j18]Junwei Zhang, Yue Zong [j18]Junwei Zhang, Yue Zong , Chao Yang , Chao Yang , Yinbin Miao, Jingjing Guo , Yinbin Miao, Jingjing Guo : :
 LBOA: Location-Based Secure Outsourced Aggregation in IoT. IEEE Access 7: 43869-43883 (2019)
 [j17]Junwei Zhang, Ning Lu, Jianfeng Ma, Chao Yang: [j17]Junwei Zhang, Ning Lu, Jianfeng Ma, Chao Yang:
 Universally composable secure geographic area verification without pre-shared secret. Sci. China Inf. Sci. 62(3): 32113:1-32113:15 (2019)
 [j16]Junwei Zhang [j16]Junwei Zhang , Wenxuan Cui, Jianfeng Ma, Chao Yang: , Wenxuan Cui, Jianfeng Ma, Chao Yang:
 Blockchain-based secure and fair crowdsourcing scheme. Int. J. Distributed Sens. Networks 15(7) (2019)
 [j15]Chao Yang [j15]Chao Yang , Junwei Zhang , Junwei Zhang , Jingjing Guo , Jingjing Guo , Yu Zheng, Li Yang, Jianfeng Ma , Yu Zheng, Li Yang, Jianfeng Ma : :
 Fingerprint Protected Password Authentication Protocol. Secur. Commun. Networks 2019: 1694702:1-1694702:12 (2019)
 [c8]Boyao Yu, Chao Yang, Jianfeng Ma: [c8]Boyao Yu, Chao Yang, Jianfeng Ma:
 Continuous Authentication for the Internet of Things Using Channel State Information. GLOBECOM 2019: 1-6
- 2018
 [j14]Yaxian Ji, Junwei Zhang [j14]Yaxian Ji, Junwei Zhang , Jianfeng Ma, Chao Yang, Xin Yao: , Jianfeng Ma, Chao Yang, Xin Yao:
 BMPLS: Blockchain-Based Multi-level Privacy-Preserving Location Sharing Scheme for Telecare Medical Information Systems. J. Medical Syst. 42(8): 147:1-147:13 (2018)
 [j13]Qi Gao, Junwei Zhang [j13]Qi Gao, Junwei Zhang , Jianfeng Ma , Jianfeng Ma , Chao Yang, Jingjing Guo , Chao Yang, Jingjing Guo , Yinbin Miao: , Yinbin Miao:
 LIP-PA: A Logistics Information Privacy Protection Scheme with Position and Attribute-Based Access Control on Mobile Devices. Wirel. Commun. Mob. Comput. 2018: 9436120:1-9436120:14 (2018)
 [c7]Li Yang, Teng Wei, Jianfeng Ma, Shui Yu [c7]Li Yang, Teng Wei, Jianfeng Ma, Shui Yu , Chao Yang: , Chao Yang:
 Inference Attack in Android Activity based on Program Fingerprint. CNS 2018: 1-9
 [c6]Maozhen Liu, Chao Yang, Qi Jiang [c6]Maozhen Liu, Chao Yang, Qi Jiang , Xiaofeng Chen, Jianfeng Ma, Jian Ren: , Xiaofeng Chen, Jianfeng Ma, Jian Ren:
 Updatable Block-Level Deduplication with Dynamic Ownership Management on Encrypted Data. ICC 2018: 1-7
- 2017
 [j12]Qi Jiang [j12]Qi Jiang , Jianfeng Ma, Chao Yang, XinDi Ma, Jian Shen , Jianfeng Ma, Chao Yang, XinDi Ma, Jian Shen , Shehzad Ashraf Chaudhry , Shehzad Ashraf Chaudhry : :
 Efficient end-to-end authentication protocol for wearable health monitoring systems. Comput. Electr. Eng. 63: 182-195 (2017)
 [j11]Chao Yang, Min Zhang, Qi Jiang [j11]Chao Yang, Min Zhang, Qi Jiang , Junwei Zhang, Danping Li, Jianfeng Ma, Jian Ren: , Junwei Zhang, Danping Li, Jianfeng Ma, Jian Ren:
 Zero knowledge based client side deduplication for encrypted files of secure cloud storage in smart cities. Pervasive Mob. Comput. 41: 243-258 (2017)
 [j10]Kai Fan [j10]Kai Fan , Panfei Song, Zhao Du, Haojin Zhu , Panfei Song, Zhao Du, Haojin Zhu , Hui Li, Yintang Yang, Xinghua Li, Chao Yang: , Hui Li, Yintang Yang, Xinghua Li, Chao Yang:
 NFC Secure Payment and Verification Scheme with CS E-Ticket. Secur. Commun. Networks 2017: 4796373:1-4796373:9 (2017)
 [c5]Danping Li, Chao Yang, Chengzhou Li, Qi Jiang [c5]Danping Li, Chao Yang, Chengzhou Li, Qi Jiang , Xiaofeng Chen, Jianfeng Ma, Jian Ren: , Xiaofeng Chen, Jianfeng Ma, Jian Ren:
 A client-based secure deduplication of multimedia data. ICC 2017: 1-6
- 2016
 [j9]Junwei Zhang, Fangqiong Du, Jianfeng Ma, Chao Yang: [j9]Junwei Zhang, Fangqiong Du, Jianfeng Ma, Chao Yang:
 Position based key exchange: defnitions and implementations. J. Commun. Inf. Networks 1(4): 33-43 (2016)
 [j8]Qi Jiang [j8]Qi Jiang , Xinxin Lian, Chao Yang, Jianfeng Ma, Youliang Tian, Yuanyuan Yang: , Xinxin Lian, Chao Yang, Jianfeng Ma, Youliang Tian, Yuanyuan Yang:
 A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth. J. Medical Syst. 40(11): 231:1-231:10 (2016)
 [j7]Xuewen Dong, Chao Yang, Lijie Sheng, Chao Wang, Jianfeng Ma: [j7]Xuewen Dong, Chao Yang, Lijie Sheng, Chao Wang, Jianfeng Ma:
 A new method to deduce counterexamples in secure routing protocols based on strand space model. Secur. Commun. Networks 9(18): 5834-5848 (2016)
 [c4]Kai Fan, Panfei Song, Zhao Du, Haojin Zhu [c4]Kai Fan, Panfei Song, Zhao Du, Haojin Zhu , Hui Li, Yintang Yang, Xinghua Li, Chao Yang: , Hui Li, Yintang Yang, Xinghua Li, Chao Yang:
 NFC Secure Payment and Verification Scheme for Mobile Payment. WASA 2016: 116-125
- 2015
 [j6]Chao Yang, Jianfeng Ma, Jian Ren: [j6]Chao Yang, Jianfeng Ma, Jian Ren:
 Provable Ownership of Encrypted Files in De-duplication Cloud Storage. Ad Hoc Sens. Wirel. Networks 26(1-4): 43-72 (2015)
 [j5]Junwei Zhang, Jianfeng Ma, Chao Yang, Li Yang: [j5]Junwei Zhang, Jianfeng Ma, Chao Yang, Li Yang:
 Universally composable secure positioning in the bounded retrieval model. Sci. China Inf. Sci. 58(11): 1-15 (2015)
 [j4]Chao Yang, Jian Ren, Jianfeng Ma: [j4]Chao Yang, Jian Ren, Jianfeng Ma:
 Provable ownership of files in deduplication cloud storage. Secur. Commun. Networks 8(14): 2457-2468 (2015)
 [j3]Junwei Zhang, Jianfeng Ma, Chao Yang: [j3]Junwei Zhang, Jianfeng Ma, Chao Yang:
 Protocol Derivation System for the Needham-Schroeder family. Secur. Commun. Networks 8(16): 2687-2703 (2015)
- 2013
 [c3]Chao Yang, Jian Ren, Jianfeng Ma: [c3]Chao Yang, Jian Ren, Jianfeng Ma:
 Provable ownership of file in de-duplication cloud storage. GLOBECOM 2013: 695-700
- 2012
 [c2]Jian Li, Chao Yang, Di Tang, Tongtong Li, Jian Ren: [c2]Jian Li, Chao Yang, Di Tang, Tongtong Li, Jian Ren:
 Characterization of linear network coding for pollution detection. GLOBECOM 2012: 1066-1071
- 2011
 [j2]Chao Yang, Jianfeng Ma, Xuewen Dong: [j2]Chao Yang, Jianfeng Ma, Xuewen Dong:
 A New Evaluation Model for Security Protocols. J. Commun. 6(6): 485-494 (2011)
 [c1]Junwei Zhang, Chao Yang, Jianfeng Ma: [c1]Junwei Zhang, Chao Yang, Jianfeng Ma:
 Protocol Derivation System for the Needham-Schroeder family. CHINACOM 2011: 836-840
2000 – 2009
- 2008
 [j1]Chunjie Cao, Chao Yang, Jianfeng Ma, Sang-Jae Moon: [j1]Chunjie Cao, Chao Yang, Jianfeng Ma, Sang-Jae Moon:
 Constructing UC Secure and Constant-Round Group Key Exchange Protocols via Secret Sharing. EURASIP J. Wirel. Commun. Netw. 2008 (2008)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from  to the list of external document links (if available).
 to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the  of the Internet Archive (if available).
 of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from  ,
,  , and
, and  to record detail pages.
 to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from  and
 and  to record detail pages.
 to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from  .
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-10-31 02:08 CET by the dblp team
 all metadata released as open data under CC0 1.0 license
 all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID







