A survey on trust management for Internet of Things Z Yan, P Zhang, AV Vasilakos Journal of network and computer applications 42, 120-134, 2014 | 1203 | 2014 |
A survey on machine learning for data fusion T Meng, X Jing, Z Yan, W Pedrycz Information Fusion 57, 115-129, 2020 | 324 | 2020 |
From cloud to fog computing: A review and a conceptual live VM migration framework O Osanaiye, S Chen, Z Yan, R Lu, KKR Choo, M Dlodlo IEEE Access 5, 8284-8300, 2017 | 319 | 2017 |
Active ticket with dynamic characteristic such as appearance with various validation options P Saarinen, M Lahteenmaki, Z Yan US Patent App. 10/675,857, 2005 | 296 | 2005 |
System and method for controlled copying and moving of content between devices and domains based on conditional encryption of content key depending on usage J Alve, PK Chiu, Z Yan, J Hietasarka US Patent 7,487,363, 2009 | 267 | 2009 |
Trust evaluation based security solution in ad hoc networks Z Yan, P Zhang, T Virtanen Proceedings of the Seventh Nordic Workshop on Secure IT Systems 14, 2003 | 245 | 2003 |
Method and apparatus for providing access control to shared data based on trust level Z Yan US Patent 9,769,124, 2017 | 210 | 2017 |
Trust modeling and management: from social trust to digital trust Z Yan, S Holtmanns Computer security, privacy and politics: current issues, challenges and …, 2008 | 189 | 2008 |
An efficient deep learning model to predict cloud workload for industry informatics Q Zhang, LT Yang, Z Yan, Z Chen, P Li IEEE transactions on industrial informatics 14 (7), 3170-3178, 2018 | 185 | 2018 |
A survey on biometric authentication: Toward secure and privacy-preserving identification Z Rui, Z Yan IEEE access 7, 5994-6009, 2018 | 182 | 2018 |
A security and trust framework for virtualized networks and software‐defined networking Z Yan, P Zhang, AV Vasilakos Security and communication networks 9 (16), 3059-3069, 2016 | 182 | 2016 |
Deduplication on encrypted big data in cloud Z Yan, W Ding, X Yu, H Zhu, RH Deng IEEE transactions on big data 2 (2), 138-150, 2016 | 176 | 2016 |
Flexible data access control based on trust and reputation in cloud computing Z Yan, X Li, M Wang, AV Vasilakos IEEE transactions on cloud Computing 5 (3), 485-498, 2015 | 162 | 2015 |
A survey on data fusion in internet of things: Towards secure and privacy-preserving fusion W Ding, X Jing, Z Yan, LT Yang Information Fusion 51, 129-144, 2019 | 160 | 2019 |
A privacy-preserving cryptosystem for IoT E-healthcare R Hamza, Z Yan, K Muhammad, P Bellavista, F Titouna Information Sciences 527, 493-510, 2020 | 153 | 2020 |
Method and a device for providing digital tickets in a mobile communications environment Z Yan, M Lähteenmäki, P Cofta US Patent 7,555,284, 2009 | 153 | 2009 |
Data collection for security measurement in wireless sensor networks: A survey H Xie, Z Yan, Z Yao, M Atiquzzaman IEEE Internet of Things Journal 6 (2), 2205-2224, 2018 | 149 | 2018 |
Autonomic trust management for a component-based software system Z Yan, C Prehofer IEEE Transactions on Dependable and Secure Computing 8 (6), 810-823, 2010 | 140 | 2010 |
A hybrid approach of mobile malware detection in Android F Tong, Z Yan Journal of Parallel and Distributed computing 103, 22-31, 2017 | 137 | 2017 |
A survey on dynamic mobile malware detection P Yan, Z Yan Software Quality Journal 26 (3), 891-919, 2018 | 131 | 2018 |