Follow
Zeng Yingpei
Zeng Yingpei
School of Cyberspace, Hangzhou Dianzi University
Verified email at hdu.edu.cn - Homepage
Title
Cited by
Cited by
Year
Random-walk based approach to detect clone attacks in wireless sensor networks
Y Zeng, J Cao, S Zhang, S Guo, L Xie
IEEE Journal on selected areas in communications 28 (5), 677-691, 2010
1832010
Secure localization and location verification in wireless sensor networks: a survey
Y Zeng, J Cao, J Hong, S Zhang, L Xie
the Journal of Supercomputing 64, 685-701, 2013
1362013
Attribute-based signature scheme
G Shanqing, Z Yingpei
2008 International Conference on Information Security and Assurance (ISA …, 2008
1322008
Attribute-based re-encryption scheme in the standard model
S Guo, Y Zeng, J Wei, Q Xu
Wuhan University Journal of Natural Sciences 13 (5), 621-625, 2008
442008
On accuracy of region based localization algorithms for wireless sensor networks
S Zhang, J Cao, Y Zeng, Z Li, L Chen, D Chen
Computer Communications 33 (12), 1391-1403, 2010
272010
SWCA: A secure weighted clustering algorithm in wireless ad hoc networks
Y Zeng, J Cao, S Guo, K Yang, L Xie
2009 IEEE Wireless Communications and Networking Conference, 1-6, 2009
232009
移动传感器网络中定位算法的性能评测
张士庚, 曾英佩, 陈力军, 陈道蓄, 谢立
软件学报 7, 2011
22*2011
Multifuzz: A coverage-based multiparty-protocol fuzzer for iot publish/subscribe protocols
Y Zeng, M Lin, S Guo, Y Shen, T Cui, T Wu, Q Zheng, Q Wang
Sensors 20 (18), 5194, 2020
212020
DRLgencert: Deep learning-based automated testing of certificate verification in SSL/TLS implementations
C Chen, W Diao, Y Zeng, S Guo, C Hu
2018 IEEE International Conference on Software Maintenance and Evolution …, 2018
212018
Secure hop-count based localization in wireless sensor networks
Y Zeng, S Zhang, S Guo, X Li
2007 International conference on computational intelligence and security …, 2007
212007
SecMCL: A secure monte carlo localization algorithm for mobile sensor networks
Y Zeng, J Cao, J Hong, S Zhang, L Xie
2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems …, 2009
192009
Pollution attack: A new attack against localization in wireless sensor networks
Y Zeng, J Cao, S Zhang, S Guo, L Xie
2009 IEEE Wireless Communications and Networking Conference, 1-6, 2009
142009
入侵检测在线规则生成模型
郭山清, 谢立, 曾英佩
计算机学报 29 (9), 1523-1532, 2006
142006
A location-free prediction-based sleep scheduling protocol for object tracking in sensor networks
J Hong, J Cao, Y Zeng, S Lu, D Chen, Z Li
2009 17th IEEE International Conference on Network Protocols, 63-72, 2009
132009
Multi-step attack detection based on pre-trained hidden Markov models
X Zhang, T Wu, Q Zheng, L Zhai, H Hu, W Yin, Y Zeng, C Cheng
Sensors 22 (8), 2874, 2022
102022
Identification of private ics protocols based on raw traffic
L Zhai, Q Zheng, X Zhang, H Hu, W Yin, Y Zeng, T Wu
Symmetry 13 (9), 1743, 2021
42021
Deep packet inspection with delayed signature matching in network auditing
Y Zeng, S Guo
Information and Communications Security: 20th International Conference …, 2018
42018
Secure localization and location verification inwireless sensor networks
Y Zeng, J Cao, J Hong, L Xie
2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 0
4
GSA-Fuzz: optimize seed mutation with gravitational search algorithm
M Lin, Y Zeng, T Wu, Q Wang, L Fang, S Guo
Security and Communication Networks 2022, 2022
32022
Survey of the security alerts correlation algorithms
SQ Guo, XL Yang, YP Zeng, L Xie, C Gao
Computer Applications 25 (10), 2276-2278, 2005
32005
The system can't perform the operation now. Try again later.
Articles 1–20