Follow
Yulong Shen
Yulong Shen
Xidan University
Verified email at mail.xidian.edu.cn - Homepage
Title
Cited by
Cited by
Year
Smart contract-based access control for the internet of things
Y Zhang, S Kasahara, Y Shen, X Jiang, J Wan
IEEE Internet of Things Journal 6 (2), 1594-1605, 2018
6712018
Adaptive traffic signal control: Deep reinforcement learning algorithm with experience replay and target network
J Gao, Y Shen, J Liu, M Ito, N Shiratori
arXiv preprint arXiv:1705.02755, 2017
2112017
On secure wireless communications for IoT under eavesdropper collusion
Y Zhang, Y Shen, H Wang, J Yong, X Jiang
IEEE Transactions on Automation Science and Engineering 13 (3), 1281-1293, 2015
1292015
Microthings: A generic iot architecture for flexible data aggregation and scalable service cooperation
Y Shen, T Zhang, Y Wang, H Wang, X Jiang
IEEE Communications Magazine 55 (9), 86-93, 2017
692017
Mode selection and spectrum partition for D2D inband communications: A physical layer security perspective
Y Zhang, Y Shen, X Jiang, S Kasahara
IEEE Transactions on Communications 67 (1), 623-638, 2018
562018
Secure -NN Query on Encrypted Cloud Data with Multiple Keys
K Cheng, L Wang, Y Shen, H Wang, Y Wang, X Jiang, H Zhong
IEEE Transactions on Big Data 7 (4), 689-702, 2017
512017
Detecting cyberattacks in industrial control systems using online learning algorithms
G Li, Y Shen, P Zhao, X Lu, J Liu, Y Liu, SCH Hoi
Neurocomputing 364, 338-348, 2019
502019
Physical layer authentication jointly utilizing channel and phase noise in MIMO systems
P Zhang, Y Shen, X Jiang, B Wu
IEEE Transactions on Communications 68 (4), 2446-2458, 2020
452020
Mtmr: Ensuring mapreduce computation integrity with merkle tree-based verifications
Y Wang, Y Shen, H Wang, J Cao, X Jiang
IEEE Transactions on Big Data 4 (3), 418-431, 2016
422016
A hierarchical sharding protocol for multi-domain iot blockchains
W Tong, X Dong, Y Shen, X Jiang
ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-6, 2019
372019
Embedding service function tree with minimum cost for NFV-enabled multicast
B Ren, D Guo, Y Shen, G Tang, X Lin
IEEE Journal on Selected Areas in Communications 37 (5), 1085-1097, 2019
352019
On secure wireless communications for service oriented computing
Y Zhang, Y Shen, H Wang, Y Zhang, X Jiang
IEEE Transactions on Services Computing 11 (2), 318-328, 2015
352015
Secure service composition with information flow control in service clouds
N Xi, C Sun, J Ma, Y Shen
Future Generation Computer Systems 49, 142-148, 2015
342015
Selfholding: A combined attack model using selfish mining with block withholding attack
X Dong, F Wu, A Faree, D Guo, Y Shen, J Ma
Computers & Security 87, 101584, 2019
332019
Cutting long-tail latency of routing response in software defined networks
J Xie, D Guo, X Li, Y Shen, X Jiang
IEEE Journal on Selected Areas in Communications 36 (3), 384-396, 2018
332018
On security-delay trade-off in two-hop wireless networks with buffer-aided relay selection
X Liao, Y Zhang, Z Wu, Y Shen, X Jiang, H Inamura
IEEE Transactions on Wireless Communications 17 (3), 1893-1906, 2017
332017
Incentive jamming-based secure routing in decentralized internet of things
Y Xu, J Liu, Y Shen, J Liu, X Jiang, T Taleb
IEEE Internet of Things Journal 8 (4), 3000-3013, 2020
322020
Security/QoS-aware route selection in multi-hop wireless ad hoc networks
Y Xu, J Liu, Y Shen, X Jiang, T Taleb
2016 IEEE international conference on communications (ICC), 1-6, 2016
322016
Lightweight tag-based PHY-layer authentication for IoT devices in smart cities
P Zhang, J Liu, Y Shen, H Li, X Jiang
IEEE Internet of things journal 7 (5), 3977-3990, 2019
302019
Transmission protocol for secure big data in two-hop wireless networks with cooperative jamming
Y Shen, Y Zhang
Information Sciences 281, 201-210, 2014
292014
The system can't perform the operation now. Try again later.
Articles 1–20