Name
Papers
Collaborators
YULONG SHEN
135
257
Citations 
PageRank 
Referers 
235
50.62
761
Referees 
References 
2473
1170
Search Limit
1001000
Title
Citations
PageRank
Year
On Covert Communication Performance With Outdated CSI in Wireless Greedy Relay Systems00.342022
CFHider: Protecting Control Flow Confidentiality With Intel SGX00.342022
Energy-Efficient and Secure Communication Toward UAV Networks00.342022
A blockchain-driven data exchange model in multi-domain IoT with controllability and parallelity00.342022
Online machine learning-based physical layer authentication for MmWave MIMO systems00.342022
Physical layer authentication in MIMO systems: a carrier frequency offset approach00.342022
Visibility graph entropy based radiometric feature for physical layer identification00.342022
CHChain: Secure and parallel crowdsourcing driven by hybrid blockchain00.342022
Enhancing Leakage Prevention for MapReduce00.342022
Buffer Space Management in Intermittently Connected Internet of Things: Sharing or Allocation?00.342022
Jamming and Link Selection for Joint Secrecy/Delay Guarantees in Buffer-Aided Relay System00.342022
Research on the Security of Visual Reasoning CAPTCHA00.342021
Optimal Mobile Crowdsensing Incentive Under Sensing Inaccuracy10.352021
Incentive Jamming-Based Secure Routing in Decentralized Internet of Things20.372021
Mobility-Aware Privacy-Preserving Mobile Crowdsourcing00.342021
Secure <inline-formula><tex-math notation="LaTeX">$k$</tex-math><alternatives><mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML"><mml:mi>k</mml:mi></mml:math><inline-graphic xlink:href="wang-ieq1-2707552.gif" xmlns:xlink="http://www.w3.org/1999/xlink"/></alternatives></inline-formula>-NN Query on Encrypted Cloud Data with Multiple Keys40.392021
Secure And Energy-Efficient Precoding For Mimo Two-Way Untrusted Relay Systems00.342021
Covert Rate Maximization in Wireless Full-Duplex Relaying Systems With Power Control10.352021
Exploiting Channel Gain And Phase Noise For Phy-Layer Authentication In Massive Mimo Systems10.352021
Decentralized Online Learning With Compressed Communication for Near-Sensor Data Analytics00.342021
Mobile Semantic-Aware Trajectory for Personalized Location Privacy Preservation00.342021
Dual-Target Cross-Domain Bundle Recommendation00.342021
Towards Flexible and Truthful Incentive for Multichannel Allocation in DSA00.342021
CryptSQLite: SQLite With High Data Security00.342020
Lightweight Tag-based PHY-layer Authentication for IoT Devices in Smart Cities30.362020
Physical Layer Authentication Jointly Utilizing Channel and Phase Noise in MIMO Systems60.452020
SF-sketch: A Two-stage Sketch for Data Streams10.362020
Collaborative online ranking algorithms for multitask learning00.342020
A Lightweight Auction Framework for Spectrum Allocation with Strong Security Guarantees00.342020
Decentralized and Secure Cross-Domain Data Sharing Scheme Based on Blockchain for Application-Centric IoT.00.342020
Target Privacy Preserving For Social Networks00.342020
GPS Spoofing Detector with Adaptive Trustable Residence Area for Cellular based-UAVs.00.342020
Covert Outage Analysis for Random Wireless Networks Under Warden Collusion00.342020
On Delay Performance Study for Cooperative Multicast MANETs00.342020
Strongly Secure and Efficient Range Queries in Cloud Databases under Multiple Keys10.362019
Reversible data hiding using the dynamic block-partition strategy and pixel-value-ordering00.342019
Packet delivery ratio and energy consumption in multicast delay tolerant MANETs with power control.10.372019
Diamond Sketch: Accurate Per-flow Measurement for Big Streaming Data10.352019
Cloud Computing Task Scheduling Based on Improved Differential Evolution Algorithm10.382019
Profit optimization in service-oriented data market: A Stackelberg game approach10.352019
Minimizing Traffic Migration During Network Update in IaaS Datacenters10.362019
Preserving Geo-Indistinguishability of the Primary User in Dynamic Spectrum Sharing30.382019
Mode Selection and Spectrum Partition for D2D Inband Communications: A Physical Layer Security Perspective.40.432019
Authenticated Key Agreement Scheme with Strong Anonymity for Multi-Server Environment in TMIS.20.362019
Embedding Service Function Tree With Minimum Cost for NFV-Enabled Multicast40.412019
CFHider: Control Flow Obfuscation with Intel SGX20.372019
AClog: Attack Chain Construction Based on Log Correlation00.342019
Fast OpenFlow Table Lookup with Fast Update.00.342018
Provoking the Adversary by Dual Detection Techniques: An Extended Stochastic Game Theoretical Framework00.342018
MtMR: Ensuring MapReduce Computation Integrity with Merkle Tree-Based Verifications.10.362018
  • 1
  • 2