关注
Yi Ren
Yi Ren
其他姓名Edwin Ren
School of Computing Sciences, University of East Anglia
在 uea.ac.uk 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
bcBIM: A Blockchain‐Based Big Data Model for BIM Modification Audit and Provenance in Mobile Cloud
R Zheng, J Jiang, X Hao, W Ren, F Xiong, Y Ren
Mathematical problems in engineering 2019 (1), 5349538, 2019
1872019
A novel approach to trust management in unattended wireless sensor networks
Y Ren, VI Zadorozhny, VA Oleshchuk, FY Li
IEEE Transactions on Mobile Computing 13 (7), 1409-1423, 2013
912013
Dynamic auto scaling algorithm (DASA) for 5G mobile networks
Y Ren, T Phung-Duc, JC Chen, ZW Yu
2016 IEEE global communications conference (GLOBECOM), 1-6, 2016
572016
SaaS: A situational awareness and analysis system for massive android malware detection
Y Zhang, W Ren, T Zhu, Y Ren
Future Generation Computer Systems 95, 548-559, 2019
362019
Security in mobile wireless sensor networks-A survey
Y Ren, VA Oleshchuk, FY Li, X Ge
Academy Publisher, 2011
352011
Deep-learned regularization and proximal operator for image compressive sensing
Z Chen, W Guo, Y Feng, Y Li, C Zhao, Y Ren, L Shao
IEEE Transactions on Image Processing 30, 7112-7126, 2021
312021
Optimized secure and reliable distributed data storage scheme and performance evaluation in unattended WSNs
Y Ren, VA Oleshchuk, FY Li
Computer Communications 36 (9), 1067-1077, 2013
302013
A scheme for secure and reliable distributed data storage in unattended WSNs
Y Ren, V Oleshchuk, FY Li
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-6, 2010
262010
Design and analysis of deadline and budget constrained autoscaling (DBCA) algorithm for 5G mobile networks
T Phung-Duc, Y Ren, JC Chen, ZW Yu
2016 IEEE international conference on cloud computing technology and science …, 2016
232016
How to authenticate a device? Formal authentication models for M2M communications defending against ghost compromising attack
W Ren, L Yu, L Ma, Y Ren
International Journal of Distributed Sensor Networks 9 (2), 679450, 2013
232013
Hybrids: A scheme for secure distributed data storage in wsns
W Ren, Y Ren, H Zhang
2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2008
232008
RISE: a reliable and secure scheme for wireless machine to machine communications
W Ren, L Yu, L Ma, Y Ren
Tsinghua Science and Technology 18 (1), 100-117, 2013
202013
ASA: Adaptive VNF scaling algorithm for 5G mobile networks
Y Ren, T Phung-Duc, YK Liu, JC Chen, YH Lin
2018 IEEE 7th international conference on cloud networking (CloudNet), 1-4, 2018
182018
Invariant deep compressible covariance pooling for aerial scene categorization
S Wang, Y Ren, G Parr, Y Guan, L Shao
IEEE Transactions on Geoscience and Remote Sensing 59 (8), 6549-6561, 2020
172020
Design and analysis of the key management mechanism in evolved multimedia broadcast/multicast service
Y Ren, JC Chen, JC Chin, YC Tseng
IEEE Transactions on Wireless Communications 15 (12), 8463-8476, 2016
172016
Traceable and authenticated key negotiations via blockchain for vehicular communications
Y Chen, X Hao, W Ren, Y Ren
Mobile Information Systems 2019 (1), 5627497, 2019
152019
eHint: An efficient protocol for uploading small-size IoT data
TY Chan, Y Ren, YC Tseng, JC Chen
2017 IEEE Wireless Communications and Networking Conference (WCNC), 1-6, 2017
142017
Network Coding based Dependable and Efficient Data Survival in Unattended Wireless Sensor Networks.
W Ren, J Zhao, Y Ren
J. Commun. 4 (11), 894-901, 2009
142009
FoSBaS: A bi-directional secrecy and collusion resilience key management scheme for BANs
Y Ren, V Oleshchuk, FY Li, S Sulistyo
2012 IEEE Wireless Communications and Networking Conference (WCNC), 2841-2846, 2012
132012
A distributed data storage and retrieval scheme in unattended WSNs using Homomorphic Encryption and secret sharing
Y Ren, V Oleshchuk, FY Li
2009 2nd IFIP Wireless Days (WD), 1-6, 2009
132009
系统目前无法执行此操作,请稍后再试。
文章 1–20