论文论著展开
[1] J. Yu, B. Yan, H. Qi, S. Wang, W.Cheng, An Efficient and Secure Data Sharing Scheme for Edge-Enabled IoT. IEEE Trans. Computers 73(1): 178-191 (2024)
[2] F. Zhong, X. Cheng, D. Yu, B. Gong, S. Song, J. Yu, MalFox: Camouflaged Adversarial Malware Example Generation Based on Conv-GANs Against Black-Box Detectors. IEEE Trans. Computers 73(4): 980-993 (2024)
[3] K. Yu, J. Yu, Z. Feng, H. Chen, A Reassessment on Applying Protocol Interference Model Under Rayleigh Fading: From Perspective of Link Scheduling. IEEE/ACM Trans. Netw. 32(1): 238-252 (2024)
[4] G. Wang, J. Yu, Y. Zou, J. Fan, W. Cheng, A New Measure of Fault-Tolerance for Network Reliability: Double-Structure Connectivity. IEEE/ACM Trans. Netw. 32(1): 874-889 (2024)
[5] Y. Xiao, Y. Jia, Q. Hu, X. Cheng, B. Gong, J. Yu, CommandFence: A Novel Digital-Twin-Based Preventive Framework for Securing Smart Home Systems. IEEE Trans. Dependable Secur. Comput. 20(3): 2450-2465 (2023)
[6] Y. Tao, S. Chen, F. Li, D. Yu, J. Yu, H. Sheng, A Distributed Privacy-Preserving Learning Dynamics in General Social Networks. IEEE Trans. Knowl. Data Eng. 35(9): 9547-9561 (2023)
[7] H. Jiang, H. Yu, X. Cheng, J. Pei, R. Pless, J. Yu, DP2-Pub: Differentially Private High-Dimensional Data Publication With Invariant Post Randomization. IEEE Trans. Knowl. Data Eng. 35(10): 10831-10844 (2023)
[8] Y. Zou, D. Yu, P. Hu, J. Yu, X. Cheng, P. Mohapatra, Jamming-Resilient Message Dissemination in Wireless Networks. IEEE Trans. Mob. Comput. 22(3): 1536-1550 (2023)
[9] K. Yu, J. Yu, C. Luo, The Impact of Mobility on Physical Layer Security of 5G IoT Networks. IEEE/ACM Trans. Netw. 31(3): 1042-1055 (2023)
[10] C. Liu, H. Guo, M. Xu, S. Wang, D. Yu, J. Yu, X. Cheng, Extending On-Chain Trust to Off-Chain - Trustworthy Blockchain Data Collection Using Trusted Execution Environment (TEE). IEEE Trans. Computers 71(12): 3268-3280 (2022)