Zheng Yan

ORCID: 0000-0002-9697-2108
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy-Preserving Technologies in Data
  • Cryptography and Data Security
  • Network Security and Intrusion Detection
  • Cloud Data Security Solutions
  • Access Control and Trust
  • IoT and Edge/Fog Computing
  • Blockchain Technology Applications and Security
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Malware Detection Techniques
  • Caching and Content Delivery
  • Wireless Communication Security Techniques
  • Opportunistic and Delay-Tolerant Networks
  • Software-Defined Networks and 5G
  • Mobile Ad Hoc Networks
  • Advanced Wireless Communication Technologies
  • Anomaly Detection Techniques and Applications
  • User Authentication and Security Systems
  • Security and Verification in Computing
  • Privacy, Security, and Data Protection
  • Energy Harvesting in Wireless Networks
  • Cloud Computing and Resource Management
  • Peer-to-Peer Network Technologies
  • Cooperative Communication and Network Coding
  • Advanced Authentication Protocols Security
  • Security in Wireless Sensor Networks

Xidian University
2016-2025

Northeastern University
2008-2025

Cangzhou Normal University
2025

KU Leuven
2025

Aalto University
2015-2024

Jinan Central Hospital
2023-2024

Shandong University
2023-2024

Purple Mountain Laboratories
2021-2024

Fujian Provincial Hospital
2024

Fujian Medical University
2024

10.1016/j.jnca.2014.01.014 article EN Journal of Network and Computer Applications 2014-03-25

Along with the rapid development of cloud computing, IoT, and AI technologies, video surveillance (CVS) has become a hotly discussed topic, especially when facing requirement real-time analysis in smart applications. Object detection usually plays an important role for environment monitoring activity tracking system. The emerging edge-cloud computing paradigm provides us opportunity to deal continuously generated huge amount data on-site manner across IoT systems. However, performance is...

10.1109/jiot.2021.3077449 article EN IEEE Internet of Things Journal 2021-05-04

Abstract Background The COVID-19 pandemic has become a great threat to public health, which greatly impacted the study and life of undergraduate students in China. This aims perform survey their knowledge, attitude practice (KAP) associated with COVID-19. Methods A cross-sectional was designed gather information regarding related KAP among undergraduates during home isolation outbreak. Subjects were recruited from 10 universities Shaanxi Province, Enrollees voluntarily submitted answers...

10.1186/s12889-020-09392-z article EN cc-by BMC Public Health 2020-08-26

In order to overcome the difficulty of password management and improve usability authentication systems, biometric has been widely studied attracted special attention in both academia industry. Many systems have researched developed, especially for mobile devices. However, existing still defects. Some biological features not deeply investigated. The could be vulnerable attacks, such as replay attack suffer from user privacy intrusion, which seriously hinder their wide acceptance by end...

10.1109/access.2018.2889996 article EN cc-by-nc-nd IEEE Access 2018-12-27

Deep learning, as the most important architecture of current computational intelligence, achieves super performance to predict cloud workload for industry informatics. However, it is a nontrivial task train deep learning model efficiently since often includes great number parameters. In this paper, an efficient based on canonical polyadic decomposition proposed model, parameters are compressed significantly by converting weight matrices format. Furthermore, algorithm designed Finally,...

10.1109/tii.2018.2808910 article EN IEEE Transactions on Industrial Informatics 2018-02-23

The vision of the upcoming 6G technologies that have fast data rate, low latency, and ultra-dense network, draws great attentions to Internet Vehicles (IoV) Vehicle-to-Everything (V2X) communication for intelligent transportation systems. There is an urgent need distributed machine learning techniques can take advantages massive interconnected networks with explosive amount heterogeneous generated at network edge. In this study, a two-layer federated model proposed end-edge-cloud...

10.1109/tvt.2021.3077893 article EN IEEE Transactions on Vehicular Technology 2021-05-06

Internet of Things (IoT) is gaining increasing popularity. Overwhelming volumes data are generated by IoT devices. Those after analytics provide significant information that could greatly benefit applications. Different from traditional applications, such as environmental monitoring, smart navigation, and healthcare come with new requirements, mobility, real-time response, location awareness. However, cloud computing paradigm cannot satisfy these demands due to centralized processing being...

10.1109/jiot.2019.2897619 article EN IEEE Internet of Things Journal 2019-02-05

Permissionless blockchain, as a kind of distributed ledger, has gained considerable attention because its openness, transparency, decentralization, and immutability. Currently, permissionless blockchain shown good application prospect in many fields, from the initial cryptocurrency to Internet Things (IoT) Vehicular Ad-Hoc Networking (VANET), which is considered beginning rewriting our digital infrastructure. However, confronts some privacy risks that hinder practical applications. Though...

10.1016/j.dcan.2020.05.008 article EN cc-by-nc-nd Digital Communications and Networks 2020-06-25

Smart manufacturing aims to support highly customizable production processes. Therefore, the associated machine intelligence needs be quickly adaptable new products, processes, and applications with limited training data while preserving privacy. In this article, a federated transfer learning framework, for cross-domain prediction, is proposed address challenges of scarcity privacy faced by most approaches in modern smart applications. The framework architecture consists central server...

10.1109/tii.2021.3088057 article EN IEEE Transactions on Industrial Informatics 2021-06-09

Traffic classification groups similar or related traffic data, which is one main stream technique of data fusion in the field network management and security. With rapid growth users emergence new networking services, has attracted increasing attention. Many techniques have been developed widely applied. However, existing literature lacks a thorough survey to summarize, compare analyze recent advances order deliver holistic perspective. This paper carefully reviews methods from comprehensive...

10.1016/j.inffus.2021.02.009 article EN cc-by-nc-nd Information Fusion 2021-02-15

The proliferation in embedded and communication technologies made the concept of Internet Medical Things (IoMT) a reality. Individuals' physical physiological status can be constantly monitored, numerous data collected through wearable mobile devices. However, silo individual brings limitations to existing machine learning approaches correctly identify user's health status. Distributed paradigms, such as federated learning, offer potential solution for privacy-preserving knowledge sharing...

10.1109/tcss.2023.3259431 article EN IEEE Transactions on Computational Social Systems 2023-04-04

Swarms of mobile robots are being widely applied for complex tasks in various practical scenarios toward modern smart industry. Federated learning (FL) has been developed as a promising privacy-preserving paradigm to tackle distributed machine robotic systems 5G and beyond networks. However, unstable wireless network conditions the harsh working environment may lead poor communication quality bring big challenges traditional centralized global training FL models. In this article,...

10.1109/mwc.004.2200381 article EN IEEE Wireless Communications 2023-04-01

The high-speed mobile networks offer great potentials to many future intelligent applications, such as autonomous vehicles in smart transportation systems. Such provide the possibility interconnect devices achieve fast knowledge sharing for efficient collaborative learning and operations, especially with help of distributed machine learning, e.g., Federated Learning (FL), modern digital technologies, Digital Twin (DT) Typically, FL requires a fixed group participants that have Independent...

10.1109/jsac.2023.3310046 article EN IEEE Journal on Selected Areas in Communications 2023-10-01

The proliferation of the Internet Things (IoT), wearable computing, and social media technologies bring forward realization so-called Cyber-Physical-Social Systems (CPSS), which is capable offering intelligent services in many different aspects our day-to-day life. While CPSS offer a wide variety data from devices, challenges such as silos secure sharing still remain. In this study, 2-Dimensional Federated Learning (2DFL) framework, including vertical horizontal federated learning phases,...

10.1109/tnse.2022.3144699 article EN IEEE Transactions on Network Science and Engineering 2022-01-25

Internet of Things (IoT) aims to create a vast network with billions things that can seamlessly and exchange data, establishing intelligent interactions between people objects around them. It is characterized openness, heterogeneity, dynamicity, which inevitably introduce severe security, privacy, trust issues hinder the widespread application IoT. Trust management (TM) holds great promise in identifying malicious nodes, maintaining relationships, enhancing system security. Traditional TM...

10.1109/jiot.2023.3237893 article EN cc-by IEEE Internet of Things Journal 2023-01-18

Wireless sensor network (WSN) is an indispensible part of Internet Things that has been applied in many fields to monitor environments and collect data from surroundings. However, WSNs are highly susceptible attacks due its unique characteristics: large-scale, self-organization, dynamic topology, constrained resources. A number systems have proposed effectively detect varieties WSNs. most previous surveys on WSN focus detection methods for only one or two types lack detailed performance...

10.1109/jiot.2018.2883403 article EN IEEE Internet of Things Journal 2018-11-26

Cloud computing offers a new way of service provision by re-arranging various resources over the Internet. The most important and popular cloud is data storage. In order to preserve privacy holders, are often stored in an encrypted form. However, introduce challenges for deduplication, which becomes crucial big storage processing cloud. Traditional deduplication schemes cannot work on data. Existing solutions suffer from security weakness. They flexibly support access control revocation....

10.1109/tbdata.2016.2587659 article EN IEEE Transactions on Big Data 2016-06-01

With the great success of second-generation wireless telephone technology and third-generation mobile telecommunications technology, fast development fourth-generation phase fifth-generation networks or systems 5G is coming. In this article, we indicate open research issues security trust in context virtualized networking software-defined networking. We further propose a framework focusing on solving network issues. The proposed applies adaptive evaluation management technologies sustainable...

10.1002/sec.1243 article EN Security and Communication Networks 2015-03-26

Cloud computing offers a new way of services and has become popular service platform. Storing user data at cloud center greatly releases storage burden devices brings access convenience. Due to distrust in providers, users generally store their crucial an encrypted form. But many cases, the need be accessed by other entities for fulfilling expected service, e.g., eHealth service. How control personal is critical issue. Various application scenarios request flexible on based owner policies...

10.1109/tcc.2015.2469662 article EN IEEE Transactions on Cloud Computing 2015-08-18
Coming Soon ...