Yulong Shen
Yulong Shen
Xidan University
Verified email at - Homepage
Cited by
Cited by
Smart contract-based access control for the internet of things
Y Zhang, S Kasahara, Y Shen, X Jiang, J Wan
IEEE Internet of Things Journal 6 (2), 1594-1605, 2018
Adaptive traffic signal control: Deep reinforcement learning algorithm with experience replay and target network
J Gao, Y Shen, J Liu, M Ito, N Shiratori
arXiv preprint arXiv:1705.02755, 2017
On secure wireless communications for IoT under eavesdropper collusion
Y Zhang, Y Shen, H Wang, J Yong, X Jiang
IEEE Transactions on Automation Science and Engineering 13 (3), 1281-1293, 2015
Microthings: A generic iot architecture for flexible data aggregation and scalable service cooperation
Y Shen, T Zhang, Y Wang, H Wang, X Jiang
IEEE Communications Magazine 55 (9), 86-93, 2017
Mode selection and spectrum partition for D2D inband communications: A physical layer security perspective
Y Zhang, Y Shen, X Jiang, S Kasahara
IEEE Transactions on Communications 67 (1), 623-638, 2018
Secure -NN Query on Encrypted Cloud Data with Multiple Keys
K Cheng, L Wang, Y Shen, H Wang, Y Wang, X Jiang, H Zhong
IEEE Transactions on Big Data 7 (4), 689-702, 2017
Mtmr: Ensuring mapreduce computation integrity with merkle tree-based verifications
Y Wang, Y Shen, H Wang, J Cao, X Jiang
IEEE Transactions on Big Data 4 (3), 418-431, 2016
Detecting cyberattacks in industrial control systems using online learning algorithms
G Li, Y Shen, P Zhao, X Lu, J Liu, Y Liu, SCH Hoi
Neurocomputing 364, 338-348, 2019
Security/QoS-aware route selection in multi-hop wireless ad hoc networks
Y Xu, J Liu, Y Shen, X Jiang, T Taleb
2016 IEEE international conference on communications (ICC), 1-6, 2016
On secure wireless communications for service oriented computing
Y Zhang, Y Shen, H Wang, Y Zhang, X Jiang
IEEE Transactions on Services Computing 11 (2), 318-328, 2015
Secure service composition with information flow control in service clouds
N Xi, C Sun, J Ma, Y Shen
Future Generation Computer Systems 49, 142-148, 2015
On security-delay trade-off in two-hop wireless networks with buffer-aided relay selection
X Liao, Y Zhang, Z Wu, Y Shen, X Jiang, H Inamura
IEEE Transactions on Wireless Communications 17 (3), 1893-1906, 2017
A hierarchical sharding protocol for multi-domain iot blockchains
W Tong, X Dong, Y Shen, X Jiang
ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-6, 2019
Survey of wireless sensor network security techniques
QQ Pei, YL Shen, JF Ma
Tongxin Xuebao(Journal on Communications) 28 (8), 113-122, 2007
Physical layer security-aware routing and performance tradeoffs in ad hoc networks
Y Xu, J Liu, Y Shen, X Jiang, N Shiratori
Computer Networks 123, 77-87, 2017
Sf-sketch: A fast, accurate, and memory efficient data structure to store frequencies of data items
T Yang, L Liu, Y Yan, M Shahzad, Y Shen, X Li, B Cui, G Xie
2017 IEEE 33rd International Conference on Data Engineering (ICDE), 103-106, 2017
An access control scheme in wireless sensor networks
Proc. 4th IFIP International Conference on Network and Parallel Computing …, 2007
Selfholding: A combined attack model using selfish mining with block withholding attack
X Dong, F Wu, A Faree, D Guo, Y Shen, J Ma
Computers & Security 87, 101584, 2019
On the throughput capacity study for aloha mobile ad hoc networks
Y Chen, Y Shen, J Zhu, X Jiang, H Tokuda
IEEE Transactions on Communications 64 (4), 1646-1659, 2016
Transmission protocol for secure big data in two-hop wireless networks with cooperative jamming
Y Shen, Y Zhang
Information Sciences 281, 201-210, 2014
The system can't perform the operation now. Try again later.
Articles 1–20