CrowdBC: A blockchain-based decentralized framework for crowdsourcing M Li, J Weng, A Yang, W Lu, Y Zhang, L Hou, JN Liu, Y Xiang, RH Deng IEEE Transactions on Parallel and Distributed Systems 30 (6), 1251-1266, 2018 | 411 | 2018 |
A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, Y Yu, A Yang Future Generation Computer Systems 52, 95-108, 2015 | 162 | 2015 |
Lightweight and privacy-preserving delegatable proofs of storage with data dynamics in cloud storage A Yang, J Xu, J Weng, J Zhou, DS Wong IEEE Transactions on Cloud Computing 9 (1), 212-225, 2018 | 92 | 2018 |
A new ADS-B authentication framework based on efficient hierarchical identity-based signature with batch verification A Yang, X Tan, J Baek, DS Wong IEEE Transactions on Services Computing 10 (2), 165-175, 2015 | 72 | 2015 |
Toward blockchain-based fair and anonymous ad dissemination in vehicular networks M Li, J Weng, A Yang, JN Liu, X Lin IEEE Transactions on Vehicular Technology 68 (11), 11248-11259, 2019 | 62 | 2019 |
Enabling efficient and privacy-preserving aggregation communication and function query for fog computing-based smart grid JN Liu, J Weng, A Yang, Y Chen, X Lin IEEE Transactions on Smart Grid 11 (1), 247-257, 2019 | 55 | 2019 |
DeQoS attack: Degrading quality of service in VANETs and its mitigation A Yang, J Weng, N Cheng, J Ni, X Lin, X Shen IEEE Transactions on Vehicular Technology 68 (5), 4834-4845, 2019 | 45 | 2019 |
Delegating authentication to edge: A decentralized authentication architecture for vehicular networks A Yang, J Weng, K Yang, C Huang, X Shen IEEE Transactions on Intelligent Transportation Systems 23 (2), 1284-1298, 2020 | 44 | 2020 |
Two-hop distance-bounding protocols: Keep your friends close A Yang, E Pagnin, A Mitrokotsa, GP Hancke, DS Wong IEEE Transactions on Mobile Computing 17 (7), 1723-1736, 2017 | 22 | 2017 |
An efficient single-slow-phase mutually authenticated RFID distance bounding protocol with tag privacy A Yang, Y Zhuang, DS Wong Information and Communications Security: 14th International Conference …, 2012 | 22 | 2012 |
HB+ DB: Distance bounding meets human based authentication E Pagnin, A Yang, Q Hu, G Hancke, A Mitrokotsa Future Generation Computer Systems 80, 627-639, 2018 | 19 | 2018 |
Security analysis of some diffusion mechanisms used in chaotic ciphers LY Zhang, Y Zhang, Y Liu, A Yang, G Chen International Journal of Bifurcation and Chaos 27 (10), 1750155, 2017 | 19 | 2017 |
Lightweight delegatable proofs of storage J Xu, A Yang, J Zhou, DS Wong Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016 | 18 | 2016 |
REMT: A real-time end-to-end media data transmission mechanism in UAV-aided networks J Zhang, J Weng, W Luo, JN Liu, A Yang, J Lin, Z Zhang, H Li IEEE network 32 (5), 118-123, 2018 | 13 | 2018 |
A highly efficient RFID distance bounding protocol without real-time PRF evaluation Y Zhuang, A Yang, DS Wong, G Yang, Q Xie Network and System Security: 7th International Conference, NSS 2013, Madrid …, 2013 | 13 | 2013 |
Privacy-preserving group authentication for rfid tags using bit-collision patterns A Yang, D Boshoff, Q Hu, GP Hancke, X Luo, J Weng, K Mayes, ... IEEE Internet of Things Journal 8 (14), 11607-11620, 2021 | 12 | 2021 |
HB+ DB, mitigating man-in-the-middle attacks against hb+ with distance bounding E Pagnin, A Yang, G Hancke, A Mitrokotsa Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and …, 2015 | 11 | 2015 |
Decentralized anonymous authentication with fair billing for space-ground integrated networks X Liu, A Yang, C Huang, Y Li, T Li, M Li IEEE Transactions on Vehicular Technology 70 (8), 7764-7777, 2021 | 10 | 2021 |
DAMIA: Leveraging Domain Adaptation as a Defense Against Membership Inference Attacks H Huang, W Luo, G Zeng, J Weng, Y Zhang, A Yang IEEE Transactions on Dependable and Secure Computing 19 (5), 3183-3199, 2021 | 10 | 2021 |
Preventing overshadowing attacks in self-jamming audio channels Q Hu, Y Liu, A Yang, GP Hancke IEEE Transactions on Dependable and Secure Computing 18 (1), 45-57, 2018 | 10 | 2018 |