Zheng YANG
Cited by
Cited by
Modeling the propagation of mobile malware on complex networks
W Liu, C Liu, Z Yang, X Liu, Y Zhang, Z Wei
Communications in Nonlinear Science and Numerical Simulation 37, 249-264, 2016
The death and rebirth of privacy-preserving WiFi fingerprint localization with Paillier encryption
Z Yang, K Järvinen
IEEE INFOCOM 2018-IEEE conference on computer communications, 1223-1231, 2018
On the Security of the Pre-Shared Key Ciphersuites of TLS
Y Li, S Schäge, Z Yang, F Kohlar, J Schwenk
17th International Conference on Practice and Theory in Public-Key …, 2014
PILOT: Practical privacy-preserving indoor localization using outsourcing
K Järvinen, H Leppäkoski, ES Lohan, P Richter, T Schneider, ...
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 448-463, 2019
Faster authenticated key agreement with perfect forward secrecy for industrial internet-of-things
Z Yang, J He, Y Tian, J Zhou
IEEE Transactions on Industrial Informatics 16 (10), 6584-6596, 2019
Network emulation as a service (neaas): Towards a cloud-based network emulation platform
J Lai, J Tian, K Zhang, Z Yang, D Jiang
Mobile Networks and Applications 26, 766-780, 2021
Efficient eck-secure authenticated key exchange protocols in the standard model
Z Yang
Information and Communications Security: 15th International Conference …, 2013
A novel authenticated key agreement protocol with dynamic credential for WSNs
Z Yang, J Lai, Y Sun, J Zhou
ACM Transactions on Sensor Networks (TOSN) 15 (2), 1-27, 2019
On the security of a provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks
J He, Z Yang, J Zhang, W Liu, C Liu
International Journal of Distributed Sensor Networks 14 (1), 1550147718756311, 2018
Experimental investigation on dynamic mechanical behavior and fracture evolution of fissure-filled red sandstone after thermal treatment
Y Chen, T Yin, X Li, Q Li, Z Yang, M Li, Y Wu
Engineering Geology 295, 106433, 2021
Effect of temperature on mixed mode I/III fracture behavior of diorite: An experimental investigation
Z Yang, T Yin, D Zhuang, Y Wu, J Yin, Y Chen
Theoretical and Applied Fracture Mechanics 122, 103571, 2022
Experimental investigation on the effect of open fire on the tensile properties and damage evolution behavior of granite
T Yin, Z Yang, Y Wu, X Tan, M Li
International Journal of Damage Mechanics 31 (8), 1139-1164, 2022
Faster privacy-preserving location proximity schemes
K Järvinen, Á Kiss, T Schneider, O Tkachenko, Z Yang
Cryptology and Network Security: 17th International Conference, CANS 2018 …, 2018
Fractal fracture toughness measurements of heat-treated granite using hydraulic fracturing under different injection flow rates
D Zhuang, T Yin, Q Li, Y Wu, Y Chen, Z Yang
Theoretical and Applied Fracture Mechanics 119, 103340, 2022
Stability of neural networks with delay and variable-time impulses
C Liu, W Liu, Z Yang, X Liu, C Li, G Zhang
Neurocomputing 171, 1644-1654, 2016
Temperature dependences and rate effects on Mode II fracture toughness determined by punch-through shear technique for granite
T Yin, X Tan, Y Wu, Z Yang, M Li
Theoretical and Applied Fracture Mechanics 114, 103029, 2021
Building low-interactivity multifactor authenticated key exchange for industrial internet of things
Z Li, Z Yang, P Szalachowski, J Zhou
IEEE Internet of Things Journal 8 (2), 844-859, 2020
New modular compilers for authenticated key exchange
Y Li, S Schäge, Z Yang, C Bader, J Schwenk
Applied Cryptography and Network Security: 12th International Conference …, 2014
ADAM: An Adaptive DDoS Attack Mitigation Scheme in Software-defined Cyber-Physical System
T Cai, T Jia, S Adepu, Y Li, Z Yang*
IEEE Transactions on Industrial Informatics, 2023
Analytical investigation on the unstable fracture toughness of fine-grained quartz-diorite rock considering the size effect
Y Wu, T Yin, Q Li, D Zhuang, Y Chen, Z Yang
Engineering Fracture Mechanics 272, 108722, 2022
The system can't perform the operation now. Try again later.
Articles 1–20