default search action
Yong Zeng 0002
Person information
- affiliation: Xidian University, School of Cyber Engineering, Xian, China
Other persons with the same name
- Yong Zeng — disambiguation page
- Yong Zeng 0001 — Southeast University, Nanjing, China (and 2 more)
- Yong Zeng 0003 — University of Electronic Science and Technology of China, School of Automation Engineering, Chengdu, China
- Yong Zeng 0004 — Concordia University, Concordia Institute for Information Systems Engineering, Montréal, Canada
- Yong Zeng 0005 — China Meteorological Administration, CMA, Institute of Desert Meteorology, Urumqi, China (and 2 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Yong Zeng, Jiale Liu, Tong Dong, Qingqi Pei, Jianfeng Ma, Yao Liu:
Eyes See Hazy while Algorithms Recognize Who You Are. ACM Trans. Priv. Secur. 27(1): 7:1-7:23 (2024) - 2023
- [c52]Xingwei Wang, Haiquan Lu, Yong Zeng:
Multi-User Delay Alignment Modulation for Millimeter Wave Massive MIMO. GLOBECOM 2023: 6970-6975 - [c51]Kaichao Shi, Yong Zeng, Baihe Ma, Zhihong Liu, Jianfeng Ma:
MT-CNN: A Classification Method of Encrypted Traffic Based on Semi-Supervised Learning. GLOBECOM 2023: 7538-7543 - [c50]Tianci Zhou, Yong Zeng, Yitao Chen, Zhihong Liu, Jianfeng Ma:
Encrypted Voice Traffic Fingerprinting: An Adaptive Network Traffic Feature Encoding Model. ICC 2023: 3768-3773 - [c49]Yong Zeng, Zhe Wang, Xiaoya Guo, Kaichao Shi, Zhihong Liu, Xiaoyan Zhu, Jianfeng Ma:
Social Networks Based Robust Federated Learning for Encrypted Traffic Classification. ICC 2023: 4937-4942 - [c48]Jie Gao, Zhihong Liu, Yong Zeng:
Topological Loss on Graph Auto-Encoders. NaNA 2023: 497-501 - [c47]Ziwen Wang, Baihe Ma, Zhihong Liu, Yong Zeng, Zhe Wang, Kaichao Shi:
DLPriv: Deep Learning Based Dynamic Location Privacy Mechanism for LBS in Internet-of-Vehicles. NaNA 2023: 514-519 - [c46]Hao Zhu, Fagen Li, Lihui Liu, Yong Zeng, Xiaoli Li, Jianfeng Ma:
Signcryption-Based Encrypted Traffic Detection Scheme for Fast Establishing Secure Connections. ProvSec 2023: 44-63 - 2022
- [j14]Kai Yang, Zhihong Liu, Yong Zeng, Jianfeng Ma:
Sliding window based ON/OFF flow watermarking on Tor. Comput. Commun. 196: 66-75 (2022) - [c45]Yueyao Zhao, Baihe Ma, Ziwen Wang, Zhihong Liu, Yong Zeng, Jianfeng Ma:
Trajectory Obfuscation and Detection in Internet-of-vehicles. CSCWD 2022: 769-774 - [c44]Ruixin Li, Zhihong Liu, Yong Zeng, Jianfeng Ma:
Representing the Topology of Complex Networks Based on Graph Embedding. NaNA 2022: 1-7 - [c43]Zhe Wang, Baihe Ma, Yong Zeng, Xiaojie Lin, Kaichao Shi, Ziwen Wang:
Differential Preserving in XGBoost Model for Encrypted Traffic Classification. NaNA 2022: 220-225 - [c42]Kaichao Shi, Baihe Ma, Yong Zeng, Xiaojie Lin, Zhe Wang, Ziwen Wang:
Layered classification method for darknet traffic based on Weighted K-NN. NaNA 2022: 226-231 - 2021
- [j13]Tong Dong, Yong Zeng, Zhihong Liu, Jian-Feng Ma, Xiaoyan Zhu:
A Differential Privacy Topology Scheme for Average Path Length Query. J. Inf. Sci. Eng. 37(4): 885-899 (2021) - [j12]Yong Zeng, Yixin Li, Zhongyuan Jiang, Jianfeng Ma:
GNS: Forge High Anonymity Graph by Nonlinear Scaling Spectrum. Secur. Commun. Networks 2021: 8609278:1-8609278:11 (2021) - [c41]Zhihong Liu, Huiyu Li, Ruixin Li, Yong Zeng, Jianfeng Ma:
Graph Embedding Based on Euclidean Distance Matrix and its Applications. CIKM 2021: 1140-1149 - [c40]Yong Zeng, Yixin Li, Jiale Liu, Jianfeng Ma, Zhihong Liu:
Pri-PGD: Forging privacy-preserving graph towards spectral-based graph neural network. GLOBECOM 2021: 1-6 - [c39]Zhihong Liu, Siqi Li, Yong Zeng, Jianfeng Ma:
Covert Wireless Communications in the Presence of an Active Adversary. ICC 2021: 1-6 - [c38]Yong Zeng, Tong Dong, Qingqi Pei, Jiale Liu, Jianfeng Ma:
LPDBN: A Privacy Preserving Scheme for Deep Belief Network. INFOCOM Workshops 2021: 1-6 - [c37]Tianci Zhou, Yong Zeng, Yixin Li, Zhongyuan Jiang, Zhihong Liu, Teng Li:
Cold-start Recommendation Method Based on Homomorphic Encryption. NaNA 2021: 461-465 - 2020
- [j11]Zhihong Liu, Jiajia Liu, Yong Zeng, Jianfeng Ma:
Covert Wireless Communication in IoT Network: From AWGN Channel to THz Band. IEEE Internet Things J. 7(4): 3378-3388 (2020) - [c36]Yang Liu, Yong Zeng, Zhihong Liu, Jianfeng Ma:
Spectrum Privacy Preserving for Social Networks: A Personalized Differential Privacy Approach. Inscrypt 2020: 277-287 - [c35]Huichuan Liu, Yong Zeng, Jiale Liu, Zhihong Liu, Jianfeng Ma, Xiaoyan Zhu:
Perosonalized Differentially Private Location Collection Method with Adaptive GPS Discretization. CNCERT 2020: 175-190 - [c34]Weidong Luo, Bowen Lan, Xinyi Wan, Zhihong Liu, Yong Zeng, Jianfeng Ma:
Feel Vibration: Challenge-Response Mobile Authentication with Covert Channel. ICCT 2020: 1089-1096
2010 – 2019
- 2019
- [j10]Baihe Ma, Zhihong Liu, Yong Zeng, Zhuo Ma, Hui Zhang, Jianfeng Ma:
Cooperative Jamming for Secrecy of Wireless Communications. J. Inf. Sci. Eng. 35(5): 1029-1044 (2019) - [j9]Yan Gao, Yong Zeng, Zhihong Liu, Jian-Feng Ma, Yang Liu, Yi-Kai Liu:
Social Tie Based Cooperative Jamming for D2D Communications in the Internet of Things. J. Inf. Sci. Eng. 35(5): 1113-1132 (2019) - [c33]Yeqiu Xiao, Yulong Shen, Yong Zeng, Yuzhen Zhang:
Cooperative Jamming Strategy Based on Community Detection for Two-Hop Communication Networks. ICC 2019: 1-6 - [c32]Shijia Mei, Zhihong Liu, Yong Zeng, Lin Yang, Jianfeng Ma:
Listen!: Audio-based Smart IoT Device Pairing Protocol. ICCT 2019: 391-397 - [c31]Lin Yang, Zhihong Liu, Yong Zeng, Shijia Mei, Jianfeng Ma:
Security Mechanisms to Provide Convoy Member Co-presence Authentication in Vehicle Platooning. NaNA 2019: 58-63 - [c30]Longfei Wang, Yong Zeng, Yixin Li, Zhihong Liu, Jianfeng Ma, Xiaoyan Zhu:
Research on Resolution Limit of Community Detection in Location-Based Social Networks. NaNA 2019: 90-95 - [c29]Lingjie Zhou, Yong Zeng, Yang Liu, Zhihong Liu, Jianfeng Ma, Xiaoyan Zhu:
Edge Weight Differential Privacy Based Spectral Query Algorithm. NaNA 2019: 259-267 - [c28]Jie Chi, Lihua Dong, Yong Zeng:
Reconfigurable Pseudo-Random Number Generator Based on Cellular Automata. NaNA 2019: 268-273 - [c27]Mengli Liu, Yong Zeng, Yi-Kai Liu, Zhihong Liu, Jianfeng Ma, Xiaoyan Zhu:
Collective Influence Based Privacy Preservation for Social Networks. NaNA 2019: 282-289 - [c26]Tong Dong, Yong Zeng, Mengli Liu, Zhihong Liu, Jianfeng Ma, Xiaoyan Zhu:
A Topology Based Differential Privacy Scheme for Average Path Length Query. NaNA 2019: 350-355 - [c25]Huichuan Liu, Yong Zeng, Zhihong Liu, Jianfeng Ma, Xiaoyan Zhu:
Adaptive N-Gram Model Based Differentially Private Trajectory Synthesis Method. NaNA 2019: 356-361 - [i4]Zhihong Liu, Jiajia Liu, Yong Zeng, Zhuo Ma, Jianfeng Ma, Qiping Huang:
Challenges in Covert Wireless Communications with Active Warden on AWGN channels. CoRR abs/1901.03185 (2019) - [i3]Zhihong Liu, Jiajia Liu, Yong Zeng, Jianfeng Ma:
Hiding Communications in AWGN Channels and THz Band with Interference Uncertainty. CoRR abs/1909.12752 (2019) - 2018
- [j8]Shuangyuan Qiao, Yong Zeng, Lingjie Zhou, Hi-Hong Liu, Jianfeng Ma:
Jensen-Shannon Divergence Based Secure Authentication Method on Smart Phones. J. Inf. Sci. Eng. 34(4): 961-976 (2018) - [j7]Zhihong Liu, Jiajia Liu, Yong Zeng, Jianfeng Ma:
Covert Wireless Communications in IoT Systems: Hiding Information in Interference. IEEE Wirel. Commun. 25(6): 46-52 (2018) - [c24]Zhihong Liu, Jiajia Liu, Yong Zeng, Jianfeng Ma, Qiping Huang:
On Covert Communication with Interference Uncertainty. ICC 2018: 1-6 - [c23]Baihe Ma, Zhihong Liu, Yong Zeng, Jianfeng Ma:
Cooperative Jamming for Secrecy of Wireless Communications. NaNA 2018: 14-21 - [c22]Yan Gao, Yong Zeng, Zhihong Liu, Jianfeng Ma, Yeqiu Xiao:
Exploiting Social Tie and SIR Characteristic for Cooperative Jamming: A Game Model in a Two-layer Network. NaNA 2018: 74-79 - [c21]Yao Guo, Zhihong Liu, Yong Zeng, Ruiheng Wang, Jianfeng Ma:
Preserving Privacy for Hubs and Links in Social Networks. NaNA 2018: 263-269 - [c20]Pengfei Song, Yong Zeng, Zhihong Liu, Jianfeng Ma, Huichuan Liu:
True Random Number Generation Using Process Scheduling of Android Systems. NaNA 2018: 304-309 - [i2]Zhihong Liu, Jiajia Liu, Yong Zeng, Jianfeng Ma, Qiping Huang:
Covert Wireless Communications with Active Eavesdropper on AWGN Channels. CoRR abs/1805.06182 (2018) - 2017
- [c19]Lihua Dong, Hui Yang, Yong Zeng:
Analysis and Improvement of True Random Number Generator Based on Autonomous Boolean Network. CIS 2017: 243-247 - [c18]Lingjie Zhou, Yong Zeng, Yi He, Zhongyuan Jiang, Jianfeng Ma:
Multi-hop Based Centrality of a Path in Complex Network. CIS 2017: 292-296 - [c17]Longfei Wang, Yong Zeng, Zhongyuan Jiang, Zhihong Liu, Jianfeng Ma:
A Survey of Network Reconstruction on Social Network. CIS 2017: 297-301 - [c16]Mengli Liu, Yong Zeng, Zhongyuan Jiang, Zhihong Liu, Jianfeng Ma:
Centrality Based Privacy Preserving for Weighted Social Networks. CIS 2017: 574-577 - [c15]Feiyang Peng, Zhihong Liu, Yong Zeng, Jialei Wang:
Modeling Key Infection in Large-Scale Sensor Networks. ICICS 2017: 265-275 - [c14]Shuangyuan Qiao, Yong Zeng, Lingjie Zhou, Zhihong Liu, Jianfeng Ma:
A Secure Authentication Method of Intelligent Terminals Based on Jensen-Shannon Divergence. NaNA 2017: 158-163 - [i1]Zhihong Liu, Jiajia Liu, Yong Zeng, Li Yang, Jianfeng Ma:
The Sound and the Fury: Hiding Communications in Noisy Wireless Networks with Interference Uncertainty. CoRR abs/1712.05099 (2017) - 2016
- [j6]Jiajia Liu, Zhihong Liu, Yong Zeng, Jianfeng Ma:
Cooperative Jammer Placement for Physical Layer Security Enhancement. IEEE Netw. 30(6): 56-61 (2016) - 2015
- [j5]Zhihong Liu, Yong Zeng, Pingjuan Zhang, Qiping Huang:
On Key Evolution over Wireless Channels. Int. J. Distributed Sens. Networks 11: 592848:1-592848:9 (2015) - 2014
- [j4]Yong Zeng, Xin Wang, Zhihong Liu, Jianfeng Ma, Lihua Dong:
Reliable Enhanced Secure Code Dissemination with Rateless Erasure Codes in WSNs. J. Softw. 9(1): 190-194 (2014) - [c13]Lihua Dong, Yong Zeng, Ligang Ji, Xucang Han:
Study on the Pass Rate of NIST SP800-22 Statistical Test Suite. CIS 2014: 402-404 - 2013
- [c12]Yuehua Zhou, Yong Zeng, Zhihong Liu, Nan Li, Jianfeng Ma, Lihua Dong:
Fault and Intrusion Tolerance of Complex Networks: A Controllability View. INCoS 2013: 516-520 - 2012
- [j3]Zhihong Liu, Jianfeng Ma, Yong Zeng, Yang Li, YoungHo Park:
Secrecy Transfer. Int. J. Distributed Sens. Networks 8 (2012) - [c11]Yong Zeng, Xin Wang, Lihua Dong, Jianfeng Ma, Zhihong Liu:
Out-of-Order-Delivery-Tolerant Secure Code Dissemination with Fountain Codes in Wireless Sensor Networks. CIS 2012: 683-686 - 2011
- [c10]Yue Qi, Qingqi Pei, Yong Zeng, Chao Yang, Shu-po Bu:
A security testing approach for WSN protocols based on object-oriented attack model. CIS 2011: 517-520 - [c9]Shirui Ji, Qingqi Pei, Yong Zeng, Chao Yang, Shu-po Bu:
An Automated Black-box Testing Approach for WSN Security Protocols. CIS 2011: 693-697 - 2010
- [j2]Yong Zeng, Jianfeng Ma, Sang-Jae Moon:
An Improvement on a Three-party Password-based Key Exchange Protocol Using Weil Pairing. Int. J. Netw. Secur. 10(3): 188-193 (2010) - [j1]Yong Zeng, Jianfeng Ma, Sang-Jae Moon:
An Improvement on a Three-party Password-based Key Exchange Protocol Using Weil Pairing. Int. J. Netw. Secur. 11(1): 17-22 (2010) - [c8]Yong Zeng, Qinqi Pei, Jianfeng Ma, Lihua Dong:
Efficient secure multicast route using genetic algorithms for wireless sensor and actor networks. HPCS 2010: 676-678
2000 – 2009
- 2009
- [c7]Yong Zeng, Jianfeng Ma, Qinqi Pei, Lihua Dong:
A Hardware-Oriented Fast Encryption Keystream Generator for Digital Rights Management. CIS (2) 2009: 584-586 - [c6]Yong Zeng, Qinqi Pei, Jianfeng Ma, Sang-Jae Moon:
Multi-path Protocol for High Data Confidentiality and Reliability in Wireless Sensor Networks Using Non-dominated Dynamic Compensation. ISPAN 2009: 243-248 - 2008
- [c5]Yong Zeng, Jianfeng Ma, Lihua Dong, Liaojun Pang, Yuanbo Guo:
Adaptive Algorithms to Mitigate Inefficiency in Reliability Differentiation Mechanisms for Wireless Sensor Networks. MSN 2008: 208-211 - 2006
- [c4]Lihua Dong, Yupu Hu, Yong Zeng:
Computing the k-Error N-Adic Complexity of a Sequence of Period pn. SETA 2006: 190-198 - 2005
- [c3]Lihua Dong, Yong Zeng, Yupu Hu:
Stability of the Linear Complexity of the Generalized Self-shrinking Sequences. CIS (2) 2005: 68-73 - [c2]Yong Zeng, Jianfeng Ma:
Sampling Distance Analysis of Gigantic Data Mining for Intrusion Detection Systems. CIS (2) 2005: 228-235 - 2003
- [c1]Yong Zeng, Jian Feng Ma:
Pseudorandom number generators based on evolutionary algorithm. IEEE Congress on Evolutionary Computation 2003: 1662-1668
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint