Zheng YANG
Cited by
Cited by
Modeling the propagation of mobile malware on complex networks
W Liu, C Liu, Z Yang, X Liu, Y Zhang, Z Wei
Communications in Nonlinear Science and Numerical Simulation 37, 249-264, 2016
The death and rebirth of privacy-preserving WiFi fingerprint localization with Paillier encryption
Z Yang, K Järvinen
IEEE INFOCOM 2018-IEEE conference on computer communications, 1223-1231, 2018
PILOT: Practical privacy-preserving indoor localization using outsourcing
K Järvinen, H Leppäkoski, ES Lohan, P Richter, T Schneider, ...
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 448-463, 2019
On the Security of the Pre-Shared Key Ciphersuites of TLS
Y Li, S Schäge, Z Yang, F Kohlar, J Schwenk
17th International Conference on Practice and Theory in Public-Key …, 2014
Faster authenticated key agreement with perfect forward secrecy for industrial internet-of-things
Z Yang, J He, Y Tian, J Zhou
IEEE Transactions on Industrial Informatics 16 (10), 6584-6596, 2019
Network emulation as a service (neaas): Towards a cloud-based network emulation platform
J Lai, J Tian, K Zhang, Z Yang, D Jiang
Mobile Networks and Applications 26, 766-780, 2021
Efficient eck-secure authenticated key exchange protocols in the standard model
Z Yang
Information and Communications Security: 15th International Conference …, 2013
A novel authenticated key agreement protocol with dynamic credential for WSNs
Z Yang, J Lai, Y Sun, J Zhou
ACM Transactions on Sensor Networks (TOSN) 15 (2), 1-27, 2019
On the security of a provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks
J He, Z Yang, J Zhang, W Liu, C Liu
International Journal of Distributed Sensor Networks 14 (1), 1550147718756311, 2018
ADAM: An Adaptive DDoS Attack Mitigation Scheme in Software-defined Cyber-Physical System
T Cai, T Jia, S Adepu, Y Li, Z Yang*
IEEE Transactions on Industrial Informatics, 2023
Faster privacy-preserving location proximity schemes
K Järvinen, Á Kiss, T Schneider, O Tkachenko, Z Yang
Cryptology and Network Security: 17th International Conference, CANS 2018 …, 2018
Building low-interactivity multifactor authenticated key exchange for industrial internet of things
Z Li, Z Yang, P Szalachowski, J Zhou
IEEE Internet of Things Journal 8 (2), 844-859, 2020
New modular compilers for authenticated key exchange
Y Li, S Schäge, Z Yang, C Bader, J Schwenk
Applied Cryptography and Network Security: 12th International Conference …, 2014
Stability of neural networks with delay and variable-time impulses
C Liu, W Liu, Z Yang, X Liu, C Li, G Zhang
Neurocomputing 171, 1644-1654, 2016
On security analysis of an after-the-fact leakage resilient key exchange protocol
Z Yang, S Li
Information Processing Letters 116 (1), 33-40, 2016
Stability of switched neural networks with time-varying delays
C Liu, Z Yang, D Sun, X Liu, W Liu
Neural Computing and Applications 30, 2229-2244, 2018
PLCrypto: A Symmetric Cryptographic Library for Programmable Logic Controllers
Z Yang, Z Bao, C Jin, Z Liu, J Zhou
IACR Transactions on Symmetric Cryptology 2021 (3), 170-217, 2021
Lis: Lightweight signature schemes for continuous message authentication in cyber-physical systems
Z Yang, C Jin, Y Tian, J Lai, J Zhou
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
Ibwh: an intermittent block withholding attack with optimal mining reward rate
J Ke, P Szalachowski, J Zhou, Q Xu, Z Yang
Information Security: 22nd International Conference, ISC 2019, New York City …, 2019
Modeling privacy in WiFi fingerprinting indoor localization
Z Yang, K Järvinen
Provable Security: 12th International Conference, ProvSec 2018, Jeju, South …, 2018
The system can't perform the operation now. Try again later.
Articles 1–20