A survey on trust management for Internet of Things Z Yan, P Zhang, AV Vasilakos Journal of network and computer applications 42, 120-134, 2014 | 1347 | 2014 |
A survey on machine learning for data fusion T Meng, X Jing, Z Yan, W Pedrycz Information Fusion 57, 115-129, 2020 | 524 | 2020 |
From cloud to fog computing: A review and a conceptual live VM migration framework O Osanaiye, S Chen, Z Yan, R Lu, KKR Choo, M Dlodlo IEEE Access 5, 8284-8300, 2017 | 369 | 2017 |
Active ticket with dynamic characteristic such as appearance with various validation options P Saarinen, M Lahteenmaki, Z Yan US Patent App. 10/675,857, 2005 | 325 | 2005 |
System and method for controlled copying and moving of content between devices and domains based on conditional encryption of content key depending on usage J Alve, PK Chiu, Z Yan, J Hietasarka US Patent 7,487,363, 2009 | 273 | 2009 |
A survey on biometric authentication: Toward secure and privacy-preserving identification Z Rui, Z Yan IEEE access 7, 5994-6009, 2018 | 267 | 2018 |
Trust evaluation based security solution in ad hoc networks Z Yan, P Zhang, T Virtanen Proceedings of the Seventh Nordic Workshop on Secure IT Systems 14, 2003 | 249 | 2003 |
Deep-learning-enhanced multitarget detection for end–edge–cloud surveillance in smart IoT X Zhou, X Xu, W Liang, Z Zeng, Z Yan IEEE Internet of Things Journal 8 (16), 12588-12596, 2021 | 248 | 2021 |
Method and apparatus for providing access control to shared data based on trust level Z Yan US Patent 9,769,124, 2017 | 234 | 2017 |
An efficient deep learning model to predict cloud workload for industry informatics Q Zhang, LT Yang, Z Yan, Z Chen, P Li IEEE transactions on industrial informatics 14 (7), 3170-3178, 2018 | 219 | 2018 |
Trust modeling and management: from social trust to digital trust Z Yan, S Holtmanns Computer security, privacy and politics: current issues, challenges and …, 2008 | 216 | 2008 |
A survey on data fusion in internet of things: Towards secure and privacy-preserving fusion W Ding, X Jing, Z Yan, LT Yang Information Fusion 51, 129-144, 2019 | 211 | 2019 |
A security and trust framework for virtualized networks and software‐defined networking Z Yan, P Zhang, AV Vasilakos Security and communication networks 9 (16), 3059-3069, 2016 | 208 | 2016 |
Two-layer federated learning with heterogeneous model aggregation for 6g supported internet of vehicles X Zhou, W Liang, J She, Z Yan, I Kevin, K Wang IEEE Transactions on Vehicular Technology 70 (6), 5308-5317, 2021 | 207 | 2021 |
Deduplication on encrypted big data in cloud Z Yan, W Ding, X Yu, H Zhu, RH Deng IEEE transactions on big data 2 (2), 138-150, 2016 | 205 | 2016 |
A privacy-preserving cryptosystem for IoT E-healthcare R Hamza, Z Yan, K Muhammad, P Bellavista, F Titouna Information Sciences 527, 493-510, 2020 | 191 | 2020 |
Data collection for security measurement in wireless sensor networks: A survey H Xie, Z Yan, Z Yao, M Atiquzzaman IEEE Internet of Things Journal 6 (2), 2205-2224, 2018 | 188 | 2018 |
Method and a device for providing digital tickets in a mobile communications environment Z Yan, M Lähteenmäki, P Cofta US Patent 7,555,284, 2009 | 182 | 2009 |
Flexible data access control based on trust and reputation in cloud computing Z Yan, X Li, M Wang, AV Vasilakos IEEE transactions on cloud Computing 5 (3), 485-498, 2015 | 172 | 2015 |
Privacy preservation in permissionless blockchain: A survey L Peng, W Feng, Z Yan, Y Li, X Zhou, S Shimizu Digital Communications and Networks 7 (3), 295-307, 2021 | 171 | 2021 |