关注
Xin Yang
Xin Yang
在 upc.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Systems and methods for managing top-level domain names using consortium blockchain
H Li, X Wang, Z Lin, J Wu, X Si, K Li, X Yang, H Wang
US Patent 10,178,069, 2019
382019
Indexing a multi-layer blockchain system
H Li, LI Haopeng, H Ma, H Wang, P Yi, K Li, X Yang
US Patent App. 15/997,726, 2018
332018
MIN: Co-governing multi-identifier network architecture and its prototype on operator’s network
H Li, J Wu, X Yang, H Wang, J Lan, K Xu, H Tan, J Wei, W Liang, F Zhu, ...
IEEE Access 8, 36569-36581, 2020
322020
Blockchain-based domain name resolution system
H Li, H Ma, LI Haopeng, Z Huang, X Yang, K Li, H Wang
US Patent App. 15/768,833, 2019
312019
BV-ICVs: A privacy-preserving and verifiable federated learning framework for V2X environments using blockchain and zkSNARKs
A Smahi, H Li, Y Yang, X Yang, P Lu, Y Zhong, C Liu
Journal of King Saud University-Computer and Information Sciences 35 (6), 101542, 2023
202023
MDFS: A mimic defense theory based architecture for distributed file system
Z Lin, K Li, H Hou, X Yang, H Li
2017 IEEE International Conference on Big Data (Big Data), 2670-2675, 2017
122017
Co-governed Sovereignty Network: Legal Basis and Its Prototype & Applications with MIN Architecture
H Li, X Yang
Springer Nature, 2021
112021
On distributed object storage architecture based on mimic defense
H Yu, H Li, X Yang, H Ma
China Communications 18 (8), 109-120, 2021
82021
Optimal strategy for cyberspace mimic defense based on game theory
Z Chen, G Cui, L Zhang, X Yang, H Li, Y Zhao, C Ma, T Sun
IEEE Access 9, 68376-68386, 2021
82021
An improved vulnerability detection system of smart contracts based on symbolic execution
Y Yao, H Li, X Yang, Y Le
2022 IEEE International Conference on Big Data (Big Data), 3225-3234, 2022
72022
NPM: An anti-attacking analysis model of the MTD system based on martingale theory
X Yang, H Li, H Wang
2018 IEEE Symposium on Computers and Communications (ISCC), 1-7, 2018
42018
An SRN-Based Model for Assessing Co-Resident Attack Mitigation in Cloud with VM Migration and Allocation Policies
X Yang, A Smahi, H Li, H Zhang, SYR Li
GLOBECOM 2023-2023 IEEE Global Communications Conference, 4995-5000, 2023
32023
Co-governed Space-Terrestrial Integrated Network Architecture and Prototype Based on MIN
G Wei, H Li, Y Bai, X Yang, H Zhang, JM Que, W Li
2021 International Conference on Computer Communications and Networks (ICCCN …, 2021
32021
A High Security Signature Algorithm Based on Kerberos for REST-style Cloud Storage Service
Y Yang, H Li, X Cheng, X Yang, Y Huo
2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile …, 2020
32020
Anti-attacking modelling for CMD systems based on GSPN and Martingale theory
H Li, J Wu, X Yang, P Yi, SYR Li
US Patent 10,440,048, 2019
32019
Architecture of sovereignty network
H Li, X Yang, H Li, X Yang
Co-Governed Sovereignty Network: Legal Basis and Its Prototype …, 2021
22021
Sovereignty and Network Sovereignty
H Li, X Yang, H Li, X Yang
Co-governed Sovereignty Network: Legal Basis and Its Prototype …, 2021
22021
Meteorological evolution of boundary layer during heavy pollution in Beijing during the CPPCC (China People's Political Consultative Conference) in March 2018.
Y Zhao, Y Chen, X Yang, J Hu, F Chai, P Yi, Z Wu
22019
Triple methods-based empirical assessment of the effectiveness of adaptive cyber defenses in the cloud
X Yang, A Smahi, H Li, P Lu, H Zhang, SYR Li
The Journal of Supercomputing 79 (8), 8634-8667, 2023
12023
Differentially authorized deduplication system based on blockchain
T ZHAO, H LI, X YANG, H WANG, M ZENG, H GUO, D WANG
ZTE Communications 19 (2), 67-76, 2021
12021
系统目前无法执行此操作,请稍后再试。
文章 1–20