Smart contract-based access control for the internet of things Y Zhang, S Kasahara, Y Shen, X Jiang, J Wan IEEE Internet of Things Journal 6 (2), 1594-1605, 2018 | 808 | 2018 |
Adaptive traffic signal control: Deep reinforcement learning algorithm with experience replay and target network J Gao, Y Shen, J Liu, M Ito, N Shiratori arXiv preprint arXiv:1705.02755, 2017 | 244 | 2017 |
On secure wireless communications for IoT under eavesdropper collusion Y Zhang, Y Shen, H Wang, J Yong, X Jiang IEEE Transactions on Automation Science and Engineering 13 (3), 1281-1293, 2015 | 151 | 2015 |
Fedproc: Prototypical contrastive federated learning on non-iid data X Mu, Y Shen, K Cheng, X Geng, J Fu, T Zhang, Z Zhang Future Generation Computer Systems 143, 93-104, 2023 | 100 | 2023 |
Microthings: A generic iot architecture for flexible data aggregation and scalable service cooperation Y Shen, T Zhang, Y Wang, H Wang, X Jiang IEEE Communications Magazine 55 (9), 86-93, 2017 | 78 | 2017 |
Physical layer authentication jointly utilizing channel and phase noise in MIMO systems P Zhang, Y Shen, X Jiang, B Wu IEEE Transactions on Communications 68 (4), 2446-2458, 2020 | 73 | 2020 |
Secure -NN Query on Encrypted Cloud Data with Multiple Keys K Cheng, L Wang, Y Shen, H Wang, Y Wang, X Jiang, H Zhong IEEE Transactions on Big Data 7 (4), 689-702, 2017 | 73 | 2017 |
Detecting cyberattacks in industrial control systems using online learning algorithms G Li, Y Shen, P Zhao, X Lu, J Liu, Y Liu, SCH Hoi Neurocomputing 364, 338-348, 2019 | 66 | 2019 |
Mode selection and spectrum partition for D2D inband communications: A physical layer security perspective Y Zhang, Y Shen, X Jiang, S Kasahara IEEE Transactions on Communications 67 (1), 623-638, 2018 | 65 | 2018 |
A survey of knowledge enhanced pre-trained models J Yang, X Hu, G Xiao, Y Shen arXiv preprint arXiv:2110.00269, 2021 | 54 | 2021 |
A hierarchical sharding protocol for multi-domain iot blockchains W Tong, X Dong, Y Shen, X Jiang ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-6, 2019 | 51 | 2019 |
Embedding service function tree with minimum cost for NFV-enabled multicast B Ren, D Guo, Y Shen, G Tang, X Lin IEEE Journal on Selected Areas in Communications 37 (5), 1085-1097, 2019 | 50 | 2019 |
Mtmr: Ensuring mapreduce computation integrity with merkle tree-based verifications Y Wang, Y Shen, H Wang, J Cao, X Jiang IEEE Transactions on Big Data 4 (3), 418-431, 2016 | 48 | 2016 |
Selfholding: A combined attack model using selfish mining with block withholding attack X Dong, F Wu, A Faree, D Guo, Y Shen, J Ma Computers & Security 87, 101584, 2019 | 47 | 2019 |
Lightweight tag-based PHY-layer authentication for IoT devices in smart cities P Zhang, J Liu, Y Shen, H Li, X Jiang IEEE Internet of things journal 7 (5), 3977-3990, 2019 | 46 | 2019 |
Incentive jamming-based secure routing in decentralized internet of things Y Xu, J Liu, Y Shen, J Liu, X Jiang, T Taleb IEEE Internet of Things Journal 8 (4), 3000-3013, 2020 | 43 | 2020 |
Covert rate maximization in wireless full-duplex relaying systems with power control R Sun, B Yang, S Ma, Y Shen, X Jiang IEEE Transactions on Communications 69 (9), 6198-6212, 2021 | 41 | 2021 |
Cutting long-tail latency of routing response in software defined networks J Xie, D Guo, X Li, Y Shen, X Jiang IEEE Journal on Selected Areas in Communications 36 (3), 384-396, 2018 | 40 | 2018 |
On security-delay trade-off in two-hop wireless networks with buffer-aided relay selection X Liao, Y Zhang, Z Wu, Y Shen, X Jiang, H Inamura IEEE Transactions on Wireless Communications 17 (3), 1893-1906, 2017 | 40 | 2017 |
QoS-aware secure routing design for wireless networks with selfish jammers Y Xu, J Liu, Y Shen, X Jiang, Y Ji, N Shiratori IEEE Transactions on Wireless Communications 20 (8), 4902-4916, 2021 | 39 | 2021 |