Modeling the propagation of mobile malware on complex networks W Liu, C Liu, Z Yang, X Liu, Y Zhang, Z Wei Communications in Nonlinear Science and Numerical Simulation 37, 249-264, 2016 | 85 | 2016 |
The death and rebirth of privacy-preserving WiFi fingerprint localization with Paillier encryption Z Yang, K Järvinen IEEE INFOCOM 2018-IEEE conference on computer communications, 1223-1231, 2018 | 73 | 2018 |
PILOT: Practical privacy-preserving indoor localization using outsourcing K Järvinen, H Leppäkoski, ES Lohan, P Richter, T Schneider, ... 2019 IEEE European Symposium on Security and Privacy (EuroS&P), 448-463, 2019 | 69 | 2019 |
Faster authenticated key agreement with perfect forward secrecy for industrial internet-of-things Z Yang, J He, Y Tian, J Zhou IEEE Transactions on Industrial Informatics 16 (10), 6584-6596, 2019 | 62 | 2019 |
On the Security of the Pre-Shared Key Ciphersuites of TLS Y Li, S Schäge, Z Yang, F Kohlar, J Schwenk 17th International Conference on Practice and Theory in Public-Key …, 2014 | 59 | 2014 |
ADAM: An Adaptive DDoS Attack Mitigation Scheme in Software-defined Cyber-Physical System T Cai, T Jia, S Adepu, Y Li, Z Yang* IEEE Transactions on Industrial Informatics, 2023 | 39 | 2023 |
Network emulation as a service (neaas): Towards a cloud-based network emulation platform J Lai, J Tian, K Zhang, Z Yang, D Jiang Mobile Networks and Applications 26, 766-780, 2021 | 37 | 2021 |
A novel authenticated key agreement protocol with dynamic credential for WSNs Z Yang, J Lai, Y Sun, J Zhou ACM Transactions on Sensor Networks (TOSN) 15 (2), 1-27, 2019 | 31 | 2019 |
On the security of a provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks J He, Z Yang, J Zhang, W Liu, C Liu International Journal of Distributed Sensor Networks 14 (1), 1550147718756311, 2018 | 30 | 2018 |
Efficient eck-secure authenticated key exchange protocols in the standard model Z Yang Information and Communications Security: 15th International Conference …, 2013 | 29 | 2013 |
Building low-interactivity multifactor authenticated key exchange for industrial internet of things Z Li, Z Yang, P Szalachowski, J Zhou IEEE Internet of Things Journal 8 (2), 844-859, 2020 | 22 | 2020 |
Faster privacy-preserving location proximity schemes K Järvinen, Á Kiss, T Schneider, O Tkachenko, Z Yang Cryptology and Network Security: 17th International Conference, CANS 2018 …, 2018 | 21 | 2018 |
New modular compilers for authenticated key exchange Y Li, S Schäge, Z Yang, C Bader, J Schwenk Applied Cryptography and Network Security: 12th International Conference …, 2014 | 19 | 2014 |
Lis: Lightweight signature schemes for continuous message authentication in cyber-physical systems Z Yang, C Jin, Y Tian, J Lai, J Zhou Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020 | 18 | 2020 |
Stability of neural networks with delay and variable-time impulses C Liu, W Liu, Z Yang, X Liu, C Li, G Zhang Neurocomputing 171, 1644-1654, 2016 | 18 | 2016 |
PLCrypto: A Symmetric Cryptographic Library for Programmable Logic Controllers Z Yang, Z Bao, C Jin, Z Liu, J Zhou IACR Transactions on Symmetric Cryptology 2021 (3), 170-217, 2021 | 16 | 2021 |
On security analysis of an after-the-fact leakage resilient key exchange protocol Z Yang, S Li Information Processing Letters 116 (1), 33-40, 2016 | 16 | 2016 |
Ibwh: an intermittent block withholding attack with optimal mining reward rate J Ke, P Szalachowski, J Zhou, Q Xu, Z Yang Information Security: 22nd International Conference, ISC 2019, New York City …, 2019 | 15 | 2019 |
Stability of switched neural networks with time-varying delays C Liu, Z Yang, D Sun, X Liu, W Liu Neural Computing and Applications 30, 2229-2244, 2018 | 15 | 2018 |
Modeling privacy in WiFi fingerprinting indoor localization Z Yang, K Järvinen Provable Security: 12th International Conference, ProvSec 2018, Jeju, South …, 2018 | 14 | 2018 |