Yujue Wang

ORCID: 0000-0002-0951-8880
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Blockchain Technology Applications and Security
  • Privacy-Preserving Technologies in Data
  • Advancements in Battery Materials
  • Cloud Data Security Solutions
  • Advanced Battery Materials and Technologies
  • Supercapacitor Materials and Fabrication
  • Advanced Authentication Protocols Security
  • Vehicular Ad Hoc Networks (VANETs)
  • Smart Grid Security and Resilience
  • IoT and Edge/Fog Computing
  • Internet Traffic Analysis and Secure E-voting
  • Security in Wireless Sensor Networks
  • UAV Applications and Optimization
  • User Authentication and Security Systems
  • Advanced Steganography and Watermarking Techniques
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Distributed systems and fault tolerance
  • Extraction and Separation Processes
  • Complexity and Algorithms in Graphs
  • FinTech, Crowdfunding, Digital Finance
  • Cryptographic Implementations and Security
  • Advanced Memory and Neural Computing
  • Access Control and Trust

University of Münster
2025

Chinese Academy of Sciences
2020-2025

Beihang University
2021-2024

Chengdu University
2015-2024

China Railway Group (China)
2024

Universiti Teknologi MARA
2024

Guilin University of Electronic Technology
2017-2023

Zhengzhou University
2023

Central China Normal University
2023

University of Science and Technology of China
2023

Cloud storage system provides facilitative file and sharing services for distributed clients. To address integrity, controllable outsourcing, origin auditing concerns on outsourced files, we propose an identity-based data outsourcing (IBDO) scheme equipped with desirable features advantageous over existing proposals in securing data. First, our IBDO allows a user to authorize dedicated proxies upload the cloud server her behalf, e.g., company may some employees files company's account...

10.1109/tifs.2016.2646913 article EN IEEE Transactions on Information Forensics and Security 2016-12-30

With the rapid development of cloud computing, an increasing number individuals and organizations are sharing data in public cloud. To protect privacy stored cloud, a owner usually encrypts his such way that certain designated users can decrypt data. This raises serious problem when encrypted needs to be shared more people beyond those initially by owner. address this problem, we introduce formalize identity-based encryption transformation (IBET) model seamlessly integrating two...

10.1109/tifs.2020.2985532 article EN IEEE Transactions on Information Forensics and Security 2020-01-01

With the establishment of intelligent transportation system (ITS), vehicular ad hoc networks (VANETs) play a significant role for improving traffic safety and efficiency. In order to avoid malicious attack resource abuse in VANETs, use digital signature scheme is widely regarded as first line defense achieve secure VANETs system. However, it still challenging task design conditional privacy preserving authentication scheme, resolve security privacy-preserving problems improve utilization...

10.1109/tvt.2021.3064337 article EN IEEE Transactions on Vehicular Technology 2021-03-08

Currently, the commercial separator (Celgard2500) of lithium-ion batteries (LIBs) suffers from poor electrolyte affinity, mechanical property and thermal stability, which seriously affect electrochemical performances safety LIBs. Here, composite separators named PVDF-HFP/TiN for high-safety LIBs are synthesized. The integration PVDF-HFP TiN forms porous structure with a uniform rich organic framework. significantly improves adsorption between electrolyte, causing higher absorption rate...

10.1002/smll.202300378 article EN Small 2023-04-08

N/O/S co-regulates the surface trapping force of carbons, enabling fast and stable Na/K storage by adsorption weak intercalation.

10.1039/d2qi02378d article EN Inorganic Chemistry Frontiers 2023-01-01

Smart grid can greatly improve the efficiency, reliability, and sustainability of traditional grids. In industrial smart grid, real-time user-side metering data may be frequently collected for monitoring controlling electricity consumption. However, procedure collection lead to sensitive information leakage. To address security issues in this article, we construct an efficient identity-based aggregation scheme supporting batch verification by collector service provider, respectively, which...

10.1109/tii.2020.2965578 article EN IEEE Transactions on Industrial Informatics 2020-02-12

Due to the rapid development of demand response management and distributed energy resources, prosumers are becoming more proactive, which also promotes emergence peer-to-peer (P2P) trading mechanisms. However, we find that it is quite difficult simultaneously achieve high computational efficiency, decentralized operations solution optimality in a P2P mechanism, called "P2P trilemma". In this paper, first propose novel negotiation mechanism for can maximize social welfare manner respect...

10.1109/tsg.2023.3266809 article EN IEEE Transactions on Smart Grid 2023-04-13

Hard carbons have broad prospects of application in potassium-ion batteries (PIBs) and sodium-ion (SIBs).

10.1039/d4qi01110d article EN Inorganic Chemistry Frontiers 2024-01-01

Fivefold twins are extensively present in nanoparticles and nanowires, enhancing their performance physical, chemical, mechanical properties. However, a deep insight into the correlation between properties fivefold bulk nanograined materials is lacking due to synthesis difficulties. Here, fivefold-twinned Ni synthesized via electrodeposition. The nanograins typically feature decahedral icosahedral shapes similar particles. material exhibits yield strength of ≈1.7 GPa under both compression...

10.1002/smll.202410202 article EN Small 2025-01-23

Abstract Traditional machine learning requires collecting data from participants for training, which may lead to malicious acquisition of privacy in participants’ data. Federated provides a method protect by transferring the training process centralized server terminal devices. However, still obtain through inference attacks and other methods. In addition, provided varies quality, excessive involvement low-quality can render model unusable, is an important issue current mainstream federated...

10.1186/s13677-024-00618-8 article EN cc-by Journal of Cloud Computing Advances Systems and Applications 2024-03-18

Provable data possession (PDP) allows a user to outsource with guarantee that the integrity can be efficiently verified. Existing publicly verifiable PDP schemes require perform expensive computations, such as modular exponentiations for processing before outsourcing storage server, which is not desirable weak users limited computation resources. In this paper, we introduce and formalize an online/offline (OOPDP) model, divides procedure into offline online phases. OOPDP, most of...

10.1109/tifs.2017.2656461 article EN IEEE Transactions on Information Forensics and Security 2017-01-20

A vehicular ad hoc network (VANET) is a special mobile that provides vehicle collaborative security applications using intervehicle communication technology. The method enables vehicles to exchange information (e.g., emergency brake). In VANET, there are many platoon driving scenes, where with identical attributes (location, organization, etc.) organized as group. However, this organization causes the issue of threats (message confidentiality, identity privacy, because an unsafe wireless...

10.3390/s19030482 article EN cc-by Sensors 2019-01-24

Vehicle ad-hoc networks (VANETs) can offer numerous benefits, but also face many privacy and security issues. There exist the certificate management burden key escrow issue in traditional public infrastructure (PKI)-based identity (ID)-based privacy-preserving authentication schemes, respectively. In addition, of some existing cryptographic schemes depends on strong assumptions about ideal tamper-proof devices. To address these issues, a certificateless aggregate signature (CLAS) scheme for...

10.1109/jsyst.2022.3213245 article EN IEEE Systems Journal 2022-11-03

Abstract A composite of olivine lithium manganese iron phosphate (LiMn 0.5 Fe PO 4 ), external carbon coating and internal embedded flakes, EC-IC-LMFP, is prepared by using phytic acid (PhyA) as phosphorus source via solvothermal process followed calcination. The with improved electronic conductivity ion diffusivity presents an ultrahigh reversible specific capacity 193 mAh g −1 at 0.1 C, excellent cycling stability 93% retention after 100 cycles 1 C when applied a cathode material for...

10.1038/s41598-019-43140-7 article EN cc-by Scientific Reports 2019-04-30

As the next-generation grid, smart grid (SG) can significantly enhance reliability, flexibility as well efficiency of electricity services. To address latency and bandwidth issues during data analysis, there have been attempts to introduce fog computing (FC) in SG. However, computing-based (FCSG) face serious challenges security privacy. In this paper, we propose a privacy-preserving aggregation scheme that supports dynamic billing arbitration, named PPDB. Specifically, design four-layer...

10.3390/app13020748 article EN cc-by Applied Sciences 2023-01-05
Coming Soon ...