bcBIM: A Blockchain‐Based Big Data Model for BIM Modification Audit and Provenance in Mobile Cloud R Zheng, J Jiang, X Hao, W Ren, F Xiong, Y Ren Mathematical problems in engineering 2019 (1), 5349538, 2019 | 187 | 2019 |
A novel approach to trust management in unattended wireless sensor networks Y Ren, VI Zadorozhny, VA Oleshchuk, FY Li IEEE Transactions on Mobile Computing 13 (7), 1409-1423, 2013 | 91 | 2013 |
Dynamic auto scaling algorithm (DASA) for 5G mobile networks Y Ren, T Phung-Duc, JC Chen, ZW Yu 2016 IEEE global communications conference (GLOBECOM), 1-6, 2016 | 57 | 2016 |
SaaS: A situational awareness and analysis system for massive android malware detection Y Zhang, W Ren, T Zhu, Y Ren Future Generation Computer Systems 95, 548-559, 2019 | 36 | 2019 |
Security in mobile wireless sensor networks-A survey Y Ren, VA Oleshchuk, FY Li, X Ge Academy Publisher, 2011 | 35 | 2011 |
Deep-learned regularization and proximal operator for image compressive sensing Z Chen, W Guo, Y Feng, Y Li, C Zhao, Y Ren, L Shao IEEE Transactions on Image Processing 30, 7112-7126, 2021 | 31 | 2021 |
Optimized secure and reliable distributed data storage scheme and performance evaluation in unattended WSNs Y Ren, VA Oleshchuk, FY Li Computer Communications 36 (9), 1067-1077, 2013 | 30 | 2013 |
A scheme for secure and reliable distributed data storage in unattended WSNs Y Ren, V Oleshchuk, FY Li 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-6, 2010 | 26 | 2010 |
Design and analysis of deadline and budget constrained autoscaling (DBCA) algorithm for 5G mobile networks T Phung-Duc, Y Ren, JC Chen, ZW Yu 2016 IEEE international conference on cloud computing technology and science …, 2016 | 23 | 2016 |
How to authenticate a device? Formal authentication models for M2M communications defending against ghost compromising attack W Ren, L Yu, L Ma, Y Ren International Journal of Distributed Sensor Networks 9 (2), 679450, 2013 | 23 | 2013 |
Hybrids: A scheme for secure distributed data storage in wsns W Ren, Y Ren, H Zhang 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2008 | 23 | 2008 |
RISE: a reliable and secure scheme for wireless machine to machine communications W Ren, L Yu, L Ma, Y Ren Tsinghua Science and Technology 18 (1), 100-117, 2013 | 20 | 2013 |
ASA: Adaptive VNF scaling algorithm for 5G mobile networks Y Ren, T Phung-Duc, YK Liu, JC Chen, YH Lin 2018 IEEE 7th international conference on cloud networking (CloudNet), 1-4, 2018 | 18 | 2018 |
Invariant deep compressible covariance pooling for aerial scene categorization S Wang, Y Ren, G Parr, Y Guan, L Shao IEEE Transactions on Geoscience and Remote Sensing 59 (8), 6549-6561, 2020 | 17 | 2020 |
Design and analysis of the key management mechanism in evolved multimedia broadcast/multicast service Y Ren, JC Chen, JC Chin, YC Tseng IEEE Transactions on Wireless Communications 15 (12), 8463-8476, 2016 | 17 | 2016 |
Traceable and authenticated key negotiations via blockchain for vehicular communications Y Chen, X Hao, W Ren, Y Ren Mobile Information Systems 2019 (1), 5627497, 2019 | 15 | 2019 |
eHint: An efficient protocol for uploading small-size IoT data TY Chan, Y Ren, YC Tseng, JC Chen 2017 IEEE Wireless Communications and Networking Conference (WCNC), 1-6, 2017 | 14 | 2017 |
Network Coding based Dependable and Efficient Data Survival in Unattended Wireless Sensor Networks. W Ren, J Zhao, Y Ren J. Commun. 4 (11), 894-901, 2009 | 14 | 2009 |
FoSBaS: A bi-directional secrecy and collusion resilience key management scheme for BANs Y Ren, V Oleshchuk, FY Li, S Sulistyo 2012 IEEE Wireless Communications and Networking Conference (WCNC), 2841-2846, 2012 | 13 | 2012 |
A distributed data storage and retrieval scheme in unattended WSNs using Homomorphic Encryption and secret sharing Y Ren, V Oleshchuk, FY Li 2009 2nd IFIP Wireless Days (WD), 1-6, 2009 | 13 | 2009 |