Yulong Shen
Yulong Shen
Xidan University
Verified email at - Homepage
Cited by
Cited by
Smart contract-based access control for the internet of things
Y Zhang, S Kasahara, Y Shen, X Jiang, J Wan
IEEE Internet of Things Journal 6 (2), 1594-1605, 2018
Adaptive traffic signal control: Deep reinforcement learning algorithm with experience replay and target network
J Gao, Y Shen, J Liu, M Ito, N Shiratori
arXiv preprint arXiv:1705.02755, 2017
On secure wireless communications for IoT under eavesdropper collusion
Y Zhang, Y Shen, H Wang, J Yong, X Jiang
IEEE Transactions on Automation Science and Engineering 13 (3), 1281-1293, 2015
Fedproc: Prototypical contrastive federated learning on non-iid data
X Mu, Y Shen, K Cheng, X Geng, J Fu, T Zhang, Z Zhang
Future Generation Computer Systems 143, 93-104, 2023
Microthings: A generic iot architecture for flexible data aggregation and scalable service cooperation
Y Shen, T Zhang, Y Wang, H Wang, X Jiang
IEEE Communications Magazine 55 (9), 86-93, 2017
Secure -NN Query on Encrypted Cloud Data with Multiple Keys
K Cheng, L Wang, Y Shen, H Wang, Y Wang, X Jiang, H Zhong
IEEE Transactions on Big Data 7 (4), 689-702, 2017
Physical layer authentication jointly utilizing channel and phase noise in MIMO systems
P Zhang, Y Shen, X Jiang, B Wu
IEEE Transactions on Communications 68 (4), 2446-2458, 2020
Detecting cyberattacks in industrial control systems using online learning algorithms
G Li, Y Shen, P Zhao, X Lu, J Liu, Y Liu, SCH Hoi
Neurocomputing 364, 338-348, 2019
Mode selection and spectrum partition for D2D inband communications: A physical layer security perspective
Y Zhang, Y Shen, X Jiang, S Kasahara
IEEE Transactions on Communications 67 (1), 623-638, 2018
A survey of knowledge enhanced pre-trained models
J Yang, X Hu, G Xiao, Y Shen
arXiv preprint arXiv:2110.00269, 2021
A hierarchical sharding protocol for multi-domain iot blockchains
W Tong, X Dong, Y Shen, X Jiang
ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-6, 2019
Embedding service function tree with minimum cost for NFV-enabled multicast
B Ren, D Guo, Y Shen, G Tang, X Lin
IEEE Journal on Selected Areas in Communications 37 (5), 1085-1097, 2019
Mtmr: Ensuring mapreduce computation integrity with merkle tree-based verifications
Y Wang, Y Shen, H Wang, J Cao, X Jiang
IEEE Transactions on Big Data 4 (3), 418-431, 2016
Selfholding: A combined attack model using selfish mining with block withholding attack
X Dong, F Wu, A Faree, D Guo, Y Shen, J Ma
Computers & Security 87, 101584, 2019
Lightweight tag-based PHY-layer authentication for IoT devices in smart cities
P Zhang, J Liu, Y Shen, H Li, X Jiang
IEEE Internet of things journal 7 (5), 3977-3990, 2019
Incentive jamming-based secure routing in decentralized internet of things
Y Xu, J Liu, Y Shen, J Liu, X Jiang, T Taleb
IEEE Internet of Things Journal 8 (4), 3000-3013, 2020
Covert rate maximization in wireless full-duplex relaying systems with power control
R Sun, B Yang, S Ma, Y Shen, X Jiang
IEEE Transactions on Communications 69 (9), 6198-6212, 2021
Cutting long-tail latency of routing response in software defined networks
J Xie, D Guo, X Li, Y Shen, X Jiang
IEEE Journal on Selected Areas in Communications 36 (3), 384-396, 2018
QoS-aware secure routing design for wireless networks with selfish jammers
Y Xu, J Liu, Y Shen, X Jiang, Y Ji, N Shiratori
IEEE Transactions on Wireless Communications 20 (8), 4902-4916, 2021
Exploiting channel gain and phase noise for PHY-layer authentication in massive MIMO systems
P Zhang, J Liu, Y Shen, X Jiang
IEEE Transactions on Information Forensics and Security 16, 4265-4279, 2020
The system can't perform the operation now. Try again later.
Articles 1–20