default search action
Yunhua He
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Yunhua He, Shuang Wang, Zhihao Zhou, Ke Xiao, Anke Xie, Bin Wu:
A Blockchain-based carbon emission security accounting scheme. Comput. Networks 243: 110304 (2024) - [j22]Ke Xiao, Jiayang Li, Yunhua He, Xu Wang, Chao Wang:
A secure multi-party payment channel on-chain and off-chain supervisable scheme. Future Gener. Comput. Syst. 154: 330-343 (2024) - [j21]Yunhua He, Zihe Yan, Tingli Yuan:
Attribute-Based Access Control Scheme for Secure Identity Resolution in Prognostics and Health Management. IEEE Internet Things J. 11(13): 23140-23155 (2024) - 2023
- [j20]Xue Chen, Shiyuan Xu, Yibo Cao, Yunhua He, Ke Xiao:
AQRS: Anti-quantum ring signature scheme for secure epidemic control with blockchain. Comput. Networks 224: 109595 (2023) - [j19]Yunhua He, Cui Zhang, Bin Wu, Yigang Yang, Ke Xiao, Hong Li:
Cross-Chain Trusted Service Quality Computing Scheme for Multichain-Model-Based 5G Network Slicing SLA. IEEE Internet Things J. 10(14): 12126-12139 (2023) - [j18]Yunhua He, Mingshun Luo, Bin Wu, Limin Sun, Yongdong Wu, Zhiquan Liu, Ke Xiao:
A Game Theory-Based Incentive Mechanism for Collaborative Security of Federated Learning in Energy Blockchain Environment. IEEE Internet Things J. 10(24): 21294-21308 (2023) - [j17]Chao Wang, Shuo Wang, Xiaoman Cheng, Yunhua He, Ke Xiao, Shujia Fan:
A Privacy and Efficiency-Oriented Data Sharing Mechanism for IoTs. IEEE Trans. Big Data 9(1): 174-185 (2023) - [j16]Yunhua He, Yueting Wu, Cui Zhang, Jialong Shen, Ke Xiao, Keshav Sood, Limin Sun:
A Sparse Protocol Parsing Method for IIoT Based on BPSO-vote-HMM Hybrid Model. IEEE/ACM Trans. Netw. 31(2): 485-496 (2023) - [c25]Cui Zhang, Hui Yang, Jun Li, Yunhua He, Jie Zhang, Qiuyan Yao, Chao Li:
An Efficient and Verifiable Polynomial Cross-chain Outsourcing Calculation Scheme for IoT. COMPSAC 2023: 362-369 - [c24]Shiyuan Xu, Xue Chen, Weimin Kong, Yibo Cao, Yunhua He, Ke Xiao:
An Efficient Blockchain-based Privacy-Preserving Authentication Scheme in VANET. VTC2023-Spring 2023: 1-6 - 2022
- [j15]Yibo Cao, Shiyuan Xu, Xue Chen, Yunhua He, Shuo Jiang:
A forward-secure and efficient authentication protocol through lattice-based group signature in VANETs scenarios. Comput. Networks 214: 109149 (2022) - [j14]Yunhua He, Cui Zhang, Bin Wu, Yigang Yang, Ke Xiao, Hong Li:
A Cross-Chain Trusted Reputation Scheme for a Shared Charging Platform Based on Blockchain. IEEE Internet Things J. 9(11): 7989-8000 (2022) - [j13]Guangcan Yang, Yunhua He, Ke Xiao, Qifeng Tang, Yang Xin, Hongliang Zhu:
Privacy-Preserving Query Scheme (PPQS) for Location-Based Services in Outsourced Cloud. Secur. Commun. Networks 2022: 9360899:1-9360899:16 (2022) - [c23]Ke Xiao, Yueyao Zhang, Yunhua He, Gang Xu, Chao Wang:
Industrial IoT Network Security Situation Prediction Based on Improved SSA-BiLSTM. CWSN 2022: 212-224 - [c22]Xue Chen, Shiyuan Xu, Yunhua He, Yu Cui, Jiahuan He, Shang Gao:
LFS-AS: Lightweight Forward Secure Aggregate Signature for e-Health Scenarios. ICC 2022: 1239-1244 - [c21]Shiyuan Xu, Xue Chen, Yunhua He, Yibo Cao, Shang Gao:
VMT: Secure VANETs Message Transmission Scheme with Encryption and Blockchain. WASA (1) 2022: 244-257 - [c20]Yuyang Cheng, Shiyuan Xu, Yibo Cao, Yunhua He, Ke Xiao:
SBA-GT: A Secure Bandwidth Allocation Scheme with Game Theory for UAV-Assisted VANET Scenarios. WASA (2) 2022: 356-364 - 2021
- [j12]Chao Wang, Xiaoman Cheng, Jitong Li, Yunhua He, Ke Xiao:
A survey: applications of blockchain in the Internet of Vehicles. EURASIP J. Wirel. Commun. Netw. 2021(1): 77 (2021) - [j11]Ke Xiao, Ziye Geng, Yunhua He, Gang Xu, Chao Wang, Yutong Tian:
A blockchain-based privacy-preserving 5G network slicing service level agreement audit scheme. EURASIP J. Wirel. Commun. Netw. 2021(1): 165 (2021) - [c19]Ziye Geng, Yunhua He, Chao Wang, Gang Xu, Ke Xiao, Shui Yu:
A Blockchain based Privacy-Preserving Reputation Scheme for Cloud Service. ICC 2021: 1-6 - [c18]Shiyuan Xu, Xue Chen, Chao Wang, Yunhua He, Ke Xiao, Yibo Cao:
A Lattice-Based Ring Signature Scheme to Secure Automated Valet Parking. WASA (2) 2021: 70-83 - 2020
- [j10]Chao Wang, Jitong Li, Yunhua He, Ke Xiao, Haoyu Zhang:
Destination Prediction-Based Scheduling Algorithms for Message Delivery in IoVs. IEEE Access 8: 14965-14976 (2020) - [j9]Chao Wang, Jitong Li, Yunhua He, Ke Xiao, Chunqiang Hu:
Segmented Trajectory Clustering-Based Destination Prediction in IoVs. IEEE Access 8: 98999-99009 (2020) - [j8]Fuwen Hu, Jingli Cheng, Yunchang Bao, Yunhua He:
Accuracy enhancement for the front-end tracking algorithm of RGB-D SLAM. Intell. Serv. Robotics 13(2): 207-218 (2020) - [c17]Yunhua He, Jialong Shen, Ke Xiao, Keshav Sood, Chao Wang, Limin Sun:
A Sparse Protocol Parsing Method for IIoT Protocols Based on HMM hybrid model. ICC 2020: 1-6 - [c16]Chao Wang, Jitong Li, Xiaoman Cheng, Yunhua He, Limin Sun, Ke Xiao:
LSTM-Based Communication Scheduling Mechanism for Energy Harvesting RSUs in IoVs. VTC Fall 2020: 1-5 - [c15]Chao Wang, Xiaoman Cheng, Jitong Li, Yunhua He, Ke Xiao:
A Survey: Applications of Blockchains in the Internet of Vehicles. WASA (1) 2020: 457-468 - [c14]Ke Xiao, Ziye Geng, Yunhua He, Gang Xu, Chao Wang, Wei Cheng:
A Blockchain Based Privacy-Preserving Cloud Service Level Agreement Auditing Scheme. WASA (1) 2020: 542-554
2010 – 2019
- 2019
- [j7]Ke Xiao, Jianyu Zhao, Yunhua He, Chaofei Li, Wei Cheng:
Abnormal Behavior Detection Scheme of UAV Using Recurrent Neural Networks. IEEE Access 7: 110293-110305 (2019) - [c13]Ji-Yao Liu, Yunhua He, Chao Wang, Yan Hu, Hong Li, Limin Sun:
An Anonymous Blockchain-Based Logging System for Cloud Computing. BlockSys 2019: 288-301 - [c12]Chao Wang, Yunhua He, Limin Sun, Chengjie Pang, Jitong Li:
Deep Memory Network with Auxiliary Sequences for Chinese Implied Sentiment Analysis. CWSN 2019: 198-211 - [c11]Ke Xiao, Jianyu Zhao, Yunhua He, Shui Yu:
Trajectory Prediction of UAV in Smart City using Recurrent Neural Networks. ICC 2019: 1-6 - [c10]Ke Xiao, Chaofei Li, Yunhua He, Chao Wang, Wei Cheng:
A Location Predictive Model Based on 2D Angle Data for HAPS Using LSTM. WASA 2019: 370-381 - 2018
- [j6]Jingzhong Wang, Mengru Li, Yunhua He, Hong Li, Ke Xiao, Chao Wang:
A Blockchain Based Privacy-Preserving Incentive Mechanism in Crowdsensing Applications. IEEE Access 6: 17545-17556 (2018) - [j5]Yunhua He, Hong Li, Xiuzhen Cheng, Yan Liu, Chao Yang, Limin Sun:
A Blockchain Based Truthful Incentive Mechanism for Distributed P2P Applications. IEEE Access 6: 27324-27335 (2018) - [j4]Ke Xiao, Shaowei Zhang, Yunhua He:
On the Secrecy Capacity of 5G New Radio Networks. Wirel. Commun. Mob. Comput. 2018: 4359261:1-4359261:11 (2018) - [c9]Wei Liu, Zhehao Yan, Yunhua He:
The Wi-Fi Device Authentication Method Based on Information Hiding. I-SPAN 2018: 80-86 - 2017
- [c8]Baocheng Wang, Jiawei Sun, Yunhua He, Dandan Pang, Ningxiao Lu:
Large-scale Election Based On Blockchain. IIKI 2017: 234-237 - [c7]Ziye Geng, Yunhua He, Tong Niu, Hong Li, Limin Sun, Wei Cheng, Xu Li:
Poster: Smart-Contract Based Incentive Mechanism for K-Anonymity Privacy Protection in LBSs. PAC 2017: 200-201 - [c6]Lin Zhang, Hong Li, Limin Sun, Zhiqiang Shi, Yunhua He:
Poster: Towards Fully Distributed User Authentication with Blockchain. PAC 2017: 202-203 - [c5]Yunhua He, Hong Li, Xiuzhen Cheng, Yan Liu, Limin Sun:
A Bitcoin Based Incentive Mechanism for Distributed P2P Applications. WASA 2017: 457-468 - 2016
- [j3]Weidong Yang, Yunhua He, Limin Sun, Xiang Lu, Xinghua Li:
An optimal query strategy for protecting location privacy in location-based services. Peer-to-Peer Netw. Appl. 9(4): 752-761 (2016) - [c4]Hong Li, Yunhua He, Xiuzhen Cheng, Limin Sun:
A Lightweight Location Privacy-Preserving Scheme for WiFi Fingerprint-Based Localization. IIKI 2016: 525-529 - [c3]Hong Li, Yunhua He, Limin Sun, Xiuzhen Cheng, Jiguo Yu:
Side-channel information leakage of encrypted video stream in video surveillance systems. INFOCOM 2016: 1-9 - [c2]Hong Li, Cheng Zhang, Yunhua He, Xiuzhen Cheng, Yan Liu, Limin Sun:
An Enhanced Structure-Based De-anonymization of Online Social Networks. WASA 2016: 331-342 - 2015
- [j2]Hong Li, Yunhua He, Xiuzhen Cheng, Hongsong Zhu, Limin Sun:
Security and privacy in localization for underwater sensor networks. IEEE Commun. Mag. 53(11): 56-62 (2015) - 2014
- [j1]Yunhua He, Limin Sun, Weidong Yang, Hong Li:
A Game Theory-Based Analysis of Data Privacy in Vehicular Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [c1]Yunhua He, Limin Sun, Zhi Li, Hong Li, Xiuzhen Cheng:
An optimal privacy-preserving mechanism for crowdsourced traffic monitoring. FOMC 2014: 11-18
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint