default search action
Yichuan Wang 0003
Person information
- affiliation: Xi'an University of Technology, Xi'an, China
Other persons with the same name
- Yichuan Wang — disambiguation page
- Yichuan Wang 0001
— University of Sheffield, UK
- Yichuan Wang 0002 — UC Berkeley, CA, USA
- Yichuan Wang 0004
— Zhejiang University, Hangzhou, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j35]Wei Chen
, Wenjiang Ji, Yichuan Wang
, Ju Ren, Guanglei Sheng, Xinhong Hei:
Visually secure image encryption: Exploring deep learning for enhanced robustness and flexibility. Expert Syst. Appl. 266: 126027 (2025) - 2024
- [j34]Yichuan Wang, Yanhua Feng, Yeqiu Xiao, Xiaoxue Liu, Xinhong Hei:
Privacy Block-Streaming: A Novel DEX File Loading Scheme Based on Federated Learning. J. Inf. Sci. Eng. 40(1): 27-39 (2024) - [c50]Xiaoxue Liu, Xinwei Duan, Xinhong Hei, Yichuan Wang, Xin Song:
Compiler Differentiation Detection Method for Binary Similarity. NaNA 2024: 72-77 - [c49]Yichuan Wang, Peipei Li, Xin Song, Yeqiu Xiao, Xiaoxue Liu:
Probability analysis of system vulnerability distribution based on the matroid theory. NaNA 2024: 96-101 - [c48]Ruinan Peng, Xinhong Hei, Yichuan Wang, Xiaoxue Liu, Yeqiu Xiao:
Crucial Interaction Elements Detection for 5G Core Network based on the Complex Network Model. NaNA 2024: 252-257 - [c47]Zhoukai Wang, Zuoyan Xu, Yaling Zhang, Xin Song, Yichuan Wang:
Research on Code Virtualization Methods for Cloud Applications. NaNA 2024: 287-292 - [c46]Xinhong Hei, Jianfeng Chen, Yichuan Wang, Xin Song, Lei Zhu:
A Novel Multipath Data Transmission Method with Traffic Obfuscation. NaNA 2024: 293-298 - [c45]Xin Song, Haonan Wang, Yichuan Wang, Xinhong Hei, Wenjiang Ji:
Code obfuscation protection strategies for program running states. NaNA 2024: 327-332 - 2023
- [j33]Xiaoxue Liu
, Yichuan Wang, Yanping Li, Hao Cao
:
PTAP: A novel secure privacy-preserving & traceable authentication protocol in VANETs. Comput. Networks 226: 109643 (2023) - [j32]Wei Chen
, Yichuan Wang, Yeqiu Xiao, Xinhong Hei:
Explore the potential of deep learning and hyperchaotic map in the meaningful visual image encryption scheme. IET Image Process. 17(11): 3235-3257 (2023) - [j31]Yu Han, Liumei Zhang
, Yichuan Wang
, Xi Deng, Zhendong Gu, Xiaohui Zhang
:
Research on the Security of IPv6 Communication Based on Petri Net under IoT. Sensors 23(11): 5192 (2023) - [j30]Dan Wang
, Ju Ren
, Zhibo Wang
, Yichuan Wang
, Yaoxue Zhang:
PrivAim: A Dual-Privacy Preserving and Quality-Aware Incentive Mechanism for Federated Learning. IEEE Trans. Computers 72(7): 1913-1927 (2023) - [j29]Mingyang Yuan
, Yang Xu
, Cheng Zhang
, Yunlin Tan
, Yichuan Wang
, Ju Ren
, Yaoxue Zhang:
TRUCON: Blockchain-Based Trusted Data Sharing With Congestion Control in Internet of Vehicles. IEEE Trans. Intell. Transp. Syst. 24(3): 3489-3500 (2023) - [c44]Yichuan Wang
, Jingjing Zhao
, Yaling Zhang
, Xinhong Hei
, Lei Zhu
:
Smart Contract Symbol Execution Vulnerability Detection Method Based on CFG Path Pruning. BSCI 2023: 132-139 - [c43]Tong Zhang, Wei Wei, Yichuan Wang, Xi Deng, Lei Zhu, Wenjiang Ji:
Formal Modeling and Defense Methods for 5G Network Endpoint Access Denial of Service Attacks. NaNA 2023: 72-77 - [c42]Weigang Ma, Yichuan Wang, Dengfang Hu, Zhoukai Wang:
E-PBFT: An Improved Consensus Mechanism Based on PBFT. NaNA 2023: 143-149 - [c41]Yaling Zhang, Jingjing Chen, Yichuan Wang, Yeqiu Xiao, Xiaoxue Liu:
A Novel On-Demand Service Architecture for Efficient Cloud-Edge Collaboration. NaNA 2023: 169-174 - [c40]Yichuan Wang, Jianhuan Tie, Xinhong Hei, Li Zhao, Xiaohui Zhang:
A Trusted Privacy-Preserving Model for Cross-Chain Transactions Based on zk_SNARKs. NaNA 2023: 187-192 - [c39]Weigang Ma, Yaping Yu, Yichuan Wang, Xiaoxue Liu, Zhoukai Wang:
A Pseudonym Exchange-Based Traceable Location Privacy Protection Scheme for IoV. NaNA 2023: 287-292 - [c38]Wenjiang Ji, Yixin Yang, Yaling Zhang, Yichuan Wang, Mengjie Tian, Yuan Qiu:
DDoS Attack Detection Based on Information Entropy Feature Extraction in Software Defined Networks. NaNA 2023: 459-464 - [c37]Lei Zhu, Miaoqing Wen, Tong Zhang, Yichuan Wang, Jing Wang, Mingsong Yang, Bing Ma:
A Text Classification Method of Network Public Opinion Based on Information Fusion. NaNA 2023: 484-489 - [c36]Yichuan Wang
, Yibin Ma
, Junxia Ding
, Xiang Sun
, Dan Wu
, Xinhong Hei
:
Hearing Cyber-Attacks: A Novel Model for Bridging Network Security Situation and Music. SSPS 2023: 63-70 - 2022
- [j28]Yichuan Wang
, Rui Fan
, Xiaolong Liang, Pengge Li, Xinhong Hei:
Trusted Data Storage Architecture for National Infrastructure. Sensors 22(6): 2318 (2022) - [j27]Mengyang Li, Xinhong Hei
, Wenjiang Ji
, Lei Zhu
, Yichuan Wang
, Yuan Qiu:
A Fault-Diagnosis Method for Railway Turnout Systems Based on Improved Autoencoder and Data Augmentation. Sensors 22(23): 9438 (2022) - [c35]Yundi Guo, Qianyuan Tang, Yichuan Wang, Ju Ren:
FDQM: Four-Dimensional Quantitative Measure for Statistical Heterogeneity in Federated Learning. ICCC 2022: 956-961 - [c34]Yichuan Wang, Rui Fan, Xinyue Yin, Xinhong Hei:
Trusted Storage Architecture for Machine Reasoning based on Blockchain. INFOCOM Workshops 2022: 1-6 - [c33]Yichuan Wang, Yanhua Feng, Yanning Du, Xinhong Hei, Yuying Tian, Xiangjie Cui:
Block-Streaming Service Loading Optimization of Android Dalvik Executable File for Cloud-End Collaboration. NaNA 2022: 1-6 - [c32]Yeqiu Xiao, Yichuan Wang, Wenjiang Ji, Lei Zhu, Xinhong Hei:
Effective Secrecy Throughput Analysis for Communication Systems with a DF Satellite Relay. NaNA 2022: 1-5 - [c31]Tong Zhang, Xiangjie Cui, Yichuan Wang, Yanning Du, Wen Gao:
TCS Security Analysis in Intel SGX Enclave MultiThreading. NaNA 2022: 276-281 - 2021
- [j26]Yichuan Wang, Binbin Bai
, Xinhong Hei, Lei Zhu, Wenjiang Ji:
An unknown protocol syntax analysis method based on convolutional neural network. Trans. Emerg. Telecommun. Technol. 32(5) (2021) - [j25]Wenjiang Ji, Chen Cheng, Guo Xie, Lei Zhu, Yichuan Wang, Long Pan, Xinhong Hei:
An intelligent fault diagnosis method based on curve segmentation and SVM for rail transit turnout. J. Intell. Fuzzy Syst. 41(3): 4275-4285 (2021) - [j24]Yichuan Wang
, Xiaolong Liang
, Xinhong Hei
, Wenjiang Ji, Lei Zhu:
Deep Learning Data Privacy Protection Based on Homomorphic Encryption in AIoT. Mob. Inf. Syst. 2021: 5510857:1-5510857:11 (2021) - [j23]Yichuan Wang
, Han Yu
, Xinhong Hei
, Binbin Bai, Wenjiang Ji:
From Unknown to Similar: Unknown Protocol Syntax Analysis for Network Flows in IoT. Secur. Commun. Networks 2021: 9179286:1-9179286:13 (2021) - [j22]Yichuan Wang
, Yuying Tian
, Xinhong Hei
, Lei Zhu, Wenjiang Ji:
A Novel IoV Block-Streaming Service Awareness and Trusted Verification Scheme in 6G. IEEE Trans. Veh. Technol. 70(6): 5197-5210 (2021) - [c30]Yichuan Wang, He Wang, Xinhong Hei, Wenjiang Ji, Lei Zhu:
Petri net modeling and vulnerability analysis of the Heartbleed. NaNA 2021: 155-160 - [c29]Guiling Zhang, Yaling Zhang, Yichuan Wang, Lei Zhu, Wenjiang Ji:
A fine-grained petri model for SQL time-blind injection. NaNA 2021: 161-167 - [c28]Xin Song, Yichuan Wang, Lei Zhu, Wenjiang Ji, Yanning Du, Feixiong Hu:
A Method for Fast Outlier Detection in High Dimensional Database Log. NaNA 2021: 236-241 - [c27]Xiaoyan Zhu, Yu Zhang, Lei Zhu, Xinhong Hei, Yichuan Wang, Feixiong Hu, Yanni Yao:
Chinese named entity recognition method for the field of network security based on RoBERTa. NaNA 2021: 420-425 - [c26]Yaling Zhang, Hongyun Wang, Yichuan Wang, Wenjiang Ji, Lei Zhu:
Signature Scheme Based on The SM2 Algorithm in Fabric. NaNA 2021: 443-448 - [c25]Lei Zhu, Ziheng Zhang, Xinhong Hei, Yichuan Wang, Ziliang Yang, Feixiong Hu, Ping He:
A permission generation and configuration method based on Rules and FP-Growth algorithm. NaNA 2021: 495-500 - [c24]Xinhong Hei, Hao Zhang, Wenjiang Ji, Yichuan Wang, Lei Zhu, Yuan Qiu:
ConvCatb: An Attention-based CNN-CATBOOST Risk Prediction Model for Driving Safety. NaNA 2021: 513-519 - [c23]Wenjiang Ji, Jiangcheng Yang, Yichuan Wang, Lei Zhu, Yuan Qiu, Xinhong Hei:
A Driving Risk Prediction Approach Based on Generative Adversarial Networks and VANET for Autonomous Trams. NaNA 2021: 520-526 - [c22]Yichuan Wang, Xiaolong Liang, Xinhong Hei, Lei Zhu, Wenjiang Ji:
A Heuristic SAT Problems Solving Method based on LSTM Network. PAAP 2021: 141-145 - 2020
- [j21]Yichuan Wang, Yuying Tian, Xinyue Yin, Xinhong Hei
:
A trusted recommendation scheme for privacy protection based on federated learning. CCF Trans. Netw. 3(3-4): 218-228 (2020) - [j20]Xinhong Hei, Xinyue Yin, Yichuan Wang, Ju Ren, Lei Zhu:
A trusted feature aggregator federated learning for distributed malicious attack detection. Comput. Secur. 99: 102033 (2020) - [j19]Yefei Zhang, Yichuan Wang
:
A novel energy-aware bio-inspired clustering scheme for IoT communication. J. Ambient Intell. Humaniz. Comput. 11(10): 4239-4248 (2020) - [j18]Yichuan Wang, Binbin Bai, Xinhong Hei, Ju Ren, Wenjiang Ji:
Classification and Recognition of Unknown Network Protocol Characteristics. J. Inf. Sci. Eng. 36(4): 765-776 (2020) - [j17]Lei Zhu, Ping He, Xinhong Hei, Yanni Yao, Yichuan Wang, Wenjiang Ji, Qin Zhao, Long Pan:
Combined access control model embedding configurable policy for fine-grained data security. Microprocess. Microsystems 75: 103060 (2020) - [j16]Xinhong Hei, Wen Gao
, Yichuan Wang
, Lei Zhu, Wenjiang Ji:
From Hardware to Operating System: A Static Measurement Method of Android System Based on TrustZone. Wirel. Commun. Mob. Comput. 2020: 8816023:1-8816023:13 (2020) - [c21]Yichuan Wang, Xinyue Yin, He Zhu, Xinhong Hei:
A Blockchain Based Distributed Storage System for Knowledge Graph Security. ICAIS (2) 2020: 318-327 - [c20]Yichuan Wang, Wen Gao, Xinhong Hei, Irenee Mungwarama, Ju Ren:
Independent credible: Secure communication architecture of Android devices based on TrustZone. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2020: 85-92 - [c19]Xinhong Hei, Xiaolong Liang, Yichuan Wang, Wenjiang Ji, Lei Zhu:
Deep Learning as a Service Based on Encrypted Data. NaNA 2020: 53-58 - [c18]Irenee Mungwarakarama, Xinhong Hei, Yichuan Wang, Wenjiang Ji, Xinyu Jiang:
Network Flow Analytics: Multi-Class Classification of DDoS Attacks Based on OKNN. NaNA 2020: 271-276 - [c17]Yanning Du, Yichuan Wang, Lei Zhu, Wenjiang Ji, Xin Song, Yida Yang, Long Pan:
A Framework for Audit Analysis of Heterogeneous Logs from PaaS. NaNA 2020: 292-297 - [c16]Lei Zhu, Yaolin Liu, Xinhong Hei, Yichuan Wang, Haining Meng, Jiuyuan Jiao, Long Pan:
A study on exercise recommendation method using Knowledge Graph for computer network course. NaNA 2020: 436-442
2010 – 2019
- 2019
- [j15]Yanxiao Liu
, Qindong Sun, Yichuan Wang, Lei Zhu, Wenjiang Ji:
Efficient group authentication in RFID using secret sharing scheme. Clust. Comput. 22(Supplement): 8605-8611 (2019) - [j14]Yichuan Wang
, He Zhu, Xinhong Hei, Yue Kong, Wenjiang Ji, Lei Zhu:
An energy saving based on task migration for mobile edge computing. EURASIP J. Wirel. Commun. Netw. 2019: 133 (2019) - [j13]Wenjiang Ji, Lei Zhu, Yichuan Wang, Zheng Liu, Xinhong Hei:
RSU authentication in vehicular ad hoc networks base on verifiable secret sharing. J. Intell. Fuzzy Syst. 37(4): 4531-4536 (2019) - [j12]Lei Zhu
, Yanni Yao, Yichuan Wang, Xinhong Hei, Qin Zhao, Wenjiang Ji, Quanzhu Yao:
A novel subgraph querying method based on paths and spectra. Neural Comput. Appl. 31(9): 5671-5678 (2019) - [c15]Xinhong Hei, Wen Gao, Yichuan Wang, Zhongdi Liang, Wenjiang Ji, Xianzhi Hu:
Railway Key Exchange Scheme for Improving Communication Efficiency of RSSP-II Protocol. GLOBECOM Workshops 2019: 1-6 - [c14]Wei Wang, Binbin Bai, Yichuan Wang, Xinhong Hei, Li Zhang:
Bitstream Protocol Classification Mechanism Based on Feature Extraction. NaNA 2019: 241-246 - [c13]Xinhong Hei, Binbin Bai, Yichuan Wang, Li Zhang, Lei Zhu, Wenjiang Ji:
Feature Extraction Optimization for Bitstream Communication Protocol Format Reverse Analysis. TrustCom/BigDataSE 2019: 662-669 - 2018
- [j11]Liumei Zhang, Jianfeng Ma, Tianshi Liu, Yichuan Wang, Di Lu:
AHP Aided Decision-Making in Virtual Machine Migration for Green Cloud. Comput. Informatics 37(2): 291-310 (2018) - [j10]Yichuan Wang
, Yefei Zhang, Lei Zhu, Wenjiang Ji, Yanxiao Liu, Xinhong Hei:
A novel energy-aware trustworthy multi-hop routing model for Internet of things. Int. J. Distributed Sens. Networks 14(12) (2018) - [j9]Yanxiao Liu, Ching-Nung Yang, Yichuan Wang, Lei Zhu, Wenjiang Ji:
Cheating identifiable secret sharing scheme using symmetric bivariate polynomial. Inf. Sci. 453: 21-29 (2018) - [j8]Yichuan Wang
, Yefei Zhang, Wenjiang Ji, Lei Zhu, Yanxiao Liu
:
Gleer: A Novel Gini-Based Energy Balancing Scheme for Mobile Botnet Retopology. Wirel. Commun. Mob. Comput. 2018: 7805408:1-7805408:10 (2018) - [c12]Wei Wang, Yanni Yao, Lei Zhu, Xinhong Hei, Yichuan Wang:
A Novel Subgraph Querying Method on Directed Weighted Graphs. CIS 2018: 150-154 - [c11]Jie Zhang, Yi Chen, Xinhong Hei, Lei Zhu, Qin Zhao, Yichuan Wang:
A RMM Based Word Segmentation Method for Chinese Design Specifications of Building Stairs. CIS 2018: 277-280 - [c10]Zhongdi Liang, Xinhong Hei, Yichuan Wang, Wenjiang Ji, Lei Zhu, Yefei Zhang:
Analysis and Protection of DDOS Attack Based on RSSP-II Protocol. NaNA 2018: 117-120 - [c9]He Zhu, Yichuan Wang, Xinhong Hei, Wenjiang Ji, Li Zhang:
A Blockchain-Based Decentralized Cloud Resource Scheduling Architecture. NaNA 2018: 324-329 - [c8]Yue Kong, Yikun Zhang, Yichuan Wang, Hao Chen, Xinhong Hei:
Energy Saving Strategy for Task Migration Based on Genetic Algorithm. NaNA 2018: 330-336 - 2017
- [c7]Lei Zhu, Yanxiao Liu, Yichuan Wang, Wenjiang Ji, Xinhong Hei, Quanzhu Yao, Xiaoyan Zhu:
Efficient (k, n) Secret Sharing Scheme Secure against k - 2 Cheaters. NaNA 2017: 1-4 - 2016
- [j7]Yichuan Wang, Santosh Chandrasekhar, Mukesh Singhal, Jianfeng Ma:
A limited-trust capacity model for mitigating threats of internal malicious services in cloud computing. Clust. Comput. 19(2): 647-662 (2016) - [j6]Yichuan Wang, Jianfeng Ma, Xiang Lu, Di Lu, Liumei Zhang:
Efficiency optimisation signature scheme for time-critical multicast data origin authentication. Int. J. Grid Util. Comput. 7(1): 1-11 (2016) - [j5]Liumei Zhang, Yichuan Wang, Lei Zhu, Wenjiang Ji:
Towards energy efcient cloud: an optimized ant colony model for virtual machine placement. J. Commun. Inf. Networks 1(4): 116-132 (2016) - [j4]Yichuan Wang, Yefei Zhang, Xinhong Hei, Wenjiang Ji, Weigang Ma:
Game strategies for distributed denial of service defense in the Cloud of Things. J. Commun. Inf. Networks 1(4): 143-155 (2016) - [j3]Yichuan Wang, Jianfeng Ma, Liumei Zhang, Wenjiang Ji, Di Lu, Xinhong Hei:
Dynamic game model of botnet DDoS attack and defense. Secur. Commun. Networks 9(16): 3127-3140 (2016) - [c6]Wen Jiang Ji, Yichuan Wang, Yanxiao Liu, Lei Zhu, Weigang Ma, Li Yan:
A New Interference Aware Routing Metric for Multi-radio Multi-channel Wireless Mesh Networks. NaNA 2016: 135-140 - [c5]Yanxiao Liu, Yichuan Wang, Lei Zhu, Jiwen Jiang, Xinhong Hei:
(k, n) Secret Sharing Scheme against Two Types of Cheaters. NaNA 2016: 284-287 - 2014
- [j2]Yichuan Wang, Jianfeng Ma, Di Lu, Xiang Lu, Liumei Zhang:
From high-availability to collapse: quantitative analysis of "Cloud-Droplet-Freezing" attack threats to virtual machine migration in cloud computing. Clust. Comput. 17(4): 1369-1381 (2014) - 2013
- [j1]Youliang Tian, Jianfeng Ma, Changgen Peng, Yichuan Wang, Liumei Zhang:
A rational framework for secure communication. Inf. Sci. 250: 215-226 (2013) - [c4]Di Lu, Jianfeng Ma, Yichuan Wang, Ning Xi:
Highly Flexible and Extensible Storage Scheme for Virtualization Platforms under Cloud Computing. INCoS 2013: 1-8 - [c3]Liumei Zhang, Jianfeng Ma, Yichuan Wang:
Content Based Spam Text Classification: An Empirical Comparison between English and Chinese. INCoS 2013: 69-76 - [c2]Yichuan Wang, Jianfeng Ma, Di Lu, Liumei Zhang, Xiang Lu:
Game Optimization for Time-Critical Multicast Data Origin Authentication: Trade Off between Security and Efficiency. INCoS 2013: 85-92 - 2011
- [c1]Liumei Zhang, Jianfeng Ma, Yichuan Wang, Shaowei Pan:
PSO-BP Neural Network in Reservoir Parameter Dynamic Prediction. CIS 2011: 123-126
Coauthor Index
aka: Wen Jiang Ji
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-05 21:54 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint