Personal information

No personal information available

Activities

Works (15)

Encryption as a Service (EaaS): Introducing the Full-Cloud-Fog Architecture for Enhanced Performance and Security

IEEE Internet of Things Journal
2024 | Journal article
Contributors: Amir Javadpour; Forough Ja’fari; Tarik Taleb; Chafika Benzaïd; Yang Bin; Yue Zhao
Source: check_circle
Crossref

No-Box Universal Adversarial Perturbations Against Image Classifiers via Artificial Textures

IEEE Transactions on Information Forensics and Security
2024 | Journal article
Contributors: Ningping Mou; Binqing Guo; Lingchen Zhao; Cong Wang; Yue Zhao; Qian Wang
Source: check_circle
Crossref

LAMBERT: Leveraging Attention Mechanisms to Improve the BERT Fine-Tuning Model for Encrypted Traffic Classification

Mathematics
2024-05-22 | Journal article
Contributors: Tao Liu; Xiting Ma; Ling Liu; Xin Liu; Yue Zhao; Ning Hu; Kayhan Zrar Ghafoor
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Encryption as a Service for IoT: Opportunities, Challenges, and Solutions

IEEE Internet of Things Journal
2024-03-01 | Journal article
Contributors: Amir Javadpour; Forough Ja’fari; Tarik Taleb; Yue Zhao; Bin Yang; Chafika Benzaïd
Source: check_circle
Crossref

An Anonymous Authentication Protocol Based on Blind Signature for Internet of Things

2024-02-02 | Conference paper
Contributors: Yue Zhao; Bin Yang; Yarang Yang
Source: check_circle
Crossref

PUF-assisted Anonymous Authentication Scheme for 6G VANET

2024-01-19 | Conference paper
Contributors: Yu Wang; Yue Zhao; Jintao Meng; Hao Zhang; Dongyu Yang
Source: check_circle
Crossref

EStore: A User-Friendly Encrypted Storage Scheme for Distributed File Systems

Sensors
2023-10-17 | Journal article
Contributors: Yuxiang Chen; Guishan Dong; Chunxiang Xu; Yao Hao; Yue Zhao
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

A Federated Attention-Based Multimodal Biometric Recognition Approach in IoT

Sensors
2023-06-28 | Journal article
Contributors: Leyu Lin; Yue Zhao; Jintao Meng; Qi Zhao
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

A Covert-Aware Anonymous Communication Network for Social Communication

Security and Communication Networks
2022-11-15 | Journal article
Contributors: Xinda Cheng; Ning Hu; Yue Zhao; Kaijun Wu; Jincai Zou; Yixing Chen; Ilsun You
Source: check_circle
Crossref

A Trusted and Privacy-Preserved Dispersed Computing Scheme for the Internet of Mobile Things

Security and Communication Networks
2022-09-16 | Journal article
Contributors: Yan Zhao; Ning Hu; Yue Zhao; Yuqiang Zhang; Ilsun You
Source: check_circle
Crossref

SQRT: A Secure Querying Scheme of Routing Table Based on Oblivious Transfer

Symmetry
2022-06 | Journal article | Author
Contributors: yue zhao; Bo Tian; NING HU; Qi Zhao; Yiru Niu; Leyu Lin; Yarang Yang
Source: check_circle
Multidisciplinary Digital Publishing Institute
grade
Preferred source (of 2)‎

Edge Intelligence Based Identification and Classification of Encrypted Traffic of Internet of Things

IEEE Access
2021 | Journal article
Contributors: Yue Zhao; Yarang Yang; Bo Tian; Jin Yang; Tianyi Zhang; Ning Hu
Source: check_circle
Crossref

Data Mining to Atmospheric Corrosion Process Based on Evidence Fusion

Materials
2021-11-17 | Journal article
Contributors: Jintao Meng; Hao Zhang; Xue Wang; Yue Zhao
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

A Security Management and Control Solution of Smart Park Based on Sensor Networks

Sensors
2021-10-13 | Journal article
Contributors: Yue Zhao; Bo Tian; Yiru Niu; Hao Zhang; Zhongqiang Yi; Ruiqi Zeng
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Disruption‐Free Load Balancing for Aerial Access Network

Wireless Communications and Mobile Computing
2021-01 | Journal article
Contributors: Na Li; Yue Zhao; Ning Hu; Jing Teng; Haitao Xu
Source: check_circle
Crossref

Peer review (2 reviews for 1 publication/grant)

Review activity for EURASIP Journal on wireless communications and networking (2)