Follow
Yichuan Wang(王一川)
Yichuan Wang(王一川)
Verified email at xaut.edu.cn
Title
Cited by
Cited by
Year
Cheating identifiable secret sharing scheme using symmetric bivariate polynomial
Y Liu, C Yang, Y Wang, L Zhu, W Ji
Information Sciences 453, 21-29, 2018
682018
A trusted feature aggregator federated learning for distributed malicious attack detection
X Hei, X Yin, Y Wang, J Ren, L Zhu
Computers & Security 99, 102033, 2020
552020
A trusted recommendation scheme for privacy protection based on federated learning
Y Wang, Y Tian, X Yin, X Hei
CCF Transactions on Networking 3 (3), 218-228, 2020
282020
Towards energy efficient cloud: an optimized ant colony model for virtual machine placement
Z Liumei, W Yichuan, ZHU Lei, J Wenjiang
Journal of communications and information networks 1 (4), 116-132, 2016
232016
A novel energy-aware bio-inspired clustering scheme for IoT communication
Y Zhang, Y Wang
Journal of Ambient Intelligence and Humanized Computing 11 (10), 4239-4248, 2020
222020
An energy saving based on task migration for mobile edge computing
Y Wang, H Zhu, X Hei, Y Kong, W Ji, L Zhu
EURASIP Journal on Wireless Communications and Networking 2019, 1-10, 2019
212019
Dynamic game model of botnet DDoS attack and defense
Y Wang, J Ma, L Zhang, W Ji, D Lu, X Hei
Security and Communication Networks 9 (16), 3127-3140, 2016
192016
A limited-trust capacity model for mitigating threats of internal malicious services in cloud computing
Y Wang, S Chandrasekhar, M Singhal, J Ma
Cluster computing 19, 647-662, 2016
192016
From high-availability to collapse: quantitative analysis of “cloud-droplet-freezing” attack threats to virtual machine migration in cloud computing
Y Wang, J Ma, D Lu, X Lu, L Zhang
Cluster computing 17, 1369-1381, 2014
142014
PSO-BP neural network in reservoir parameter dynamic prediction
L Zhang, J Ma, Y Wang, S Pan
2011 Seventh International Conference on Computational Intelligence and …, 2011
142011
An unknown protocol syntax analysis method based on convolutional neural network
Y Wang, B Bai, X Hei, L Zhu, W Ji
Transactions on Emerging Telecommunications Technologies 32 (5), e3922, 2021
122021
Efficient group authentication in RFID using secret sharing scheme
Y Liu, Q Sun, Y Wang, L Zhu, W Ji
Cluster Computing 22, 8605-8611, 2019
122019
A blockchain based distributed storage system for knowledge graph security
Y Wang, X Yin, H Zhu, X Hei
Artificial Intelligence and Security: 6th International Conference, ICAIS …, 2020
112020
Game strategies for distributed denial of service defense in the cloud of things
W Yichuan, Z Yefei, HEI Xinhong, JI Wenjiang, MA Weigang
Journal of communications and information networks 1 (4), 143-155, 2016
112016
A rational framework for secure communication
Y Tian, J Ma, C Peng, Y Wang, L Zhang
Information Sciences 250, 215-226, 2013
112013
Content based spam text classification: An empirical comparison between english and Chinese
L Zhang, J Ma, Y Wang
2013 5th International Conference on Intelligent Networking and …, 2013
112013
Game optimization for internal DDoS attack detection in cloud computing
W Yichuan, M Jianfeng, L Di, Z Liumei, M Xianjia
Journal of Computer Research and Development 52 (8), 1873, 2015
92015
A novel subgraph querying method based on paths and spectra
L Zhu, Y Yao, Y Wang, X Hei, Q Zhao, W Ji, Q Yao
Neural Computing and Applications 31, 5671-5678, 2019
62019
A novel energy-aware trustworthy multi-hop routing model for Internet of things
Y Wang, Y Zhang, L Zhu, W Ji, Y Liu, X Hei
International Journal of Distributed Sensor Networks 14 (12), 1550147718818689, 2018
62018
云计算下保障公平性的多资源分配算法
卢笛, 马建峰, 王一川, 习宁, 张留美, 孟宪佳
西安电子科技大学学报 41 (3), 162-168, 2014
62014
The system can't perform the operation now. Try again later.
Articles 1–20