


default search action
Yueyu Zhang
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Jie Chen, Yinuo Luo
, Jun Liu
, Chao Wang, Yueyu Zhang, Xiaoli Dong:
A White-box Implementation of SM4 with Self-equivalence Encoding. Comput. J. 67(3): 1087-1098 (2024) - [j13]Renshu Gu, Yueyu Zhang, Lisha Wang, Dechao Chen, Yaqi Wang, Ruiquan Ge, Zicheng Jiao, Juan Ye, Gangyong Jia, Linyan Wang:
Mmy-net: a multimodal network exploiting image and patient metadata for simultaneous segmentation and diagnosis. Multim. Syst. 30(2): 72 (2024) - 2022
- [j12]Jin Cao
, Sheng Li, Ruhui Ma
, Yuxi Han
, Yueyu Zhang, Hui Li
:
RPRIA: Reputation and PUF-Based Remote Identity Attestation Protocol for Massive IoT Devices. IEEE Internet Things J. 9(19): 19174-19187 (2022) - 2021
- [j11]Yueyu Zhang, Jie Chen, Hua Zhou, Lanjun Dang:
A Privacy-preserving Data Aggregation Scheme with Efficient Batch Verification in Smart Grid. KSII Trans. Internet Inf. Syst. 15(2): 617-636 (2021)
2010 – 2019
- 2018
- [j10]Lanjun Dang, Jie Xu, Xuefei Cao, Hui Li, Jie Chen, Yueyu Zhang, Xiaotong Fu:
Efficient identity-based authenticated key agreement protocol with provable security for vehicular ad hoc networks. Int. J. Distributed Sens. Networks 14(4) (2018) - [c5]Ning Yang, Yueyu Zhang:
A Radio Frequency Fingerprint Extraction Method Based on Cluster Center Difference. FCS 2018: 282-298 - 2015
- [j9]Jie Chen, Junping Shi, Yueyu Zhang
:
EPPDC: An Efficient Privacy-Preserving Scheme for Data Collection in Smart Grid. Int. J. Distributed Sens. Networks 11: 656219:1-656219:12 (2015) - [j8]Zhen Zhao, Jie Chen, Yueyu Zhang, Lanjun Dang:
An Efficient Revocable Group Signature Scheme in Vehicular Ad Hoc Networks. KSII Trans. Internet Inf. Syst. 9(10): 4250-4267 (2015) - 2014
- [j7]Jin Cao, Maode Ma, Hui Li, Yueyu Zhang, Zhenxing Luo:
A Survey on Security Aspects for LTE and LTE-A Networks. IEEE Commun. Surv. Tutorials 16(1): 283-302 (2014) - [j6]Yueyu Zhang, Jie Chen, Hui Li, Jin Cao, Chengzhe Lai:
Group-based authentication and key agreement for machine-type communication. Int. J. Grid Util. Comput. 5(2): 87-95 (2014) - [c4]Jieying Li, Yueyu Zhang, Jie Chen, Hui Li, Wujun Zhang:
Group Key Agreement in Multimedia Service for Machine Type Communication. APSCC 2014: 141-146 - 2013
- [j5]Wujun Zhang, Yueyu Zhang, Jie Chen, Hui Li, Yumin Wang:
End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture. Clust. Comput. 16(4): 861-871 (2013) - [j4]Yong Wang, Liu Yang, Yun Ai, Hui Li, Yueyu Zhang, Fengrong Li:
Interference management strategy for multiuser two-way relay networks. Int. J. Embed. Syst. 5(3): 175-180 (2013) - 2012
- [j3]Jin Cao, Hui Li, Maode Ma, Yueyu Zhang, Chengzhe Lai:
A simple and robust handover authentication between HeNB and eNB in LTE networks. Comput. Networks 56(8): 2119-2131 (2012) - [j2]Chengzhe Lai, Hui Li, Yueyu Zhang, Jin Cao:
Security Issues on Machine to Machine Communications. KSII Trans. Internet Inf. Syst. 6(2): 198-514 (2012) - [c3]Yueyu Zhang, Jie Chen, Hui Li, Wujun Zhang, Jin Cao, Chengzhe Lai:
Dynamic Group Based Authentication Protocol for Machine Type Communications. INCoS 2012: 334-341 - [c2]Wujun Zhang, Yueyu Zhang, Jie Chen, Hui Li, Yumin Wang:
End-to-End Security Scheme for Machine Type Communication Based on Generic Authentication Architecture. INCoS 2012: 353-359
2000 – 2009
- 2009
- [c1]Yang Zhan, Haibo Tian, Qingqi Pei, Yueyu Zhang, Yumin Wang, Weidong Zhang:
A Deep Copy Protection Framework for Electronic Devices within Home. IAS 2009: 23-26 - 2007
- [j1]Jie Chen, YuPu Hu, Yueyu Zhang:
Impossible differential cryptanalysis of Advanced Encryption Standard. Sci. China Ser. F Inf. Sci. 50(3): 342-350 (2007)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint