Follow
Qiang Yan
Qiang Yan
Verified email at smu.edu.sg - Homepage
Title
Cited by
Cited by
Year
A blockchain-based decentralized federated learning framework with committee consensus
Y Li, C Chen, N Liu, H Huang, Z Zheng, Q Yan
IEEE Network 35 (1), 234-241, 2020
3592020
Privacy leakage analysis in online social networks
Y Li, Y Li, Q Yan, RH Deng
Computers & Security 49, 239-254, 2015
1012015
Understanding OSN-based facial disclosure against face authentication systems
Y Li, K Xu, Q Yan, Y Li, RH Deng
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
842014
On limitations of designing leakage-resilient password systems: Attacks, principles and usability
Q Yan, J Han, Y Li, RH Deng
Proceedings of the 19th Annual Network & Distributed System Security Symposium, 2012
83*2012
Comparing mobile privacy protection through cross-platform applications
J Han, Q Yan, D Gao, J Zhou, RH Deng
Proceedings of the 20th Annual Network & Distributed System Security Symposium, 2013
672013
Designing leakage-resilient password entry on touchscreen mobile devices
Q Yan, J Han, Y Li, J Zhou, RH Deng
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
662013
Seeing your face is not enough: An inertial sensor-based liveness detection for face authentication
Y Li, Y Li, Q Yan, H Kong, RH Deng
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
562015
Communication-efficient and cross-chain empowered federated learning for artificial intelligence of things
J Kang, X Li, J Nie, Y Liu, M Xu, Z Xiong, D Niyato, Q Yan
IEEE Transactions on Network Science and Engineering 9 (5), 2966-2977, 2022
532022
Launching generic attacks on ios with approved third-party applications
J Han, SM Kywe, Q Yan, F Bao, R Deng, D Gao, Y Li, J Zhou
Applied Cryptography and Network Security: 11th International Conference …, 2013
362013
Towards semantically secure outsourcing of association rule mining on categorical data
J Lai, Y Li, RH Deng, J Weng, C Guan, Q Yan
Information Sciences 267, 267-286, 2014
332014
Empirical study of face authentication systems under OSNFD attacks
Y Li, Y Li, K Xu, Q Yan, RH Deng
IEEE Transactions on Dependable and Secure Computing 15 (2), 231-245, 2016
322016
A software-based root-of-trust primitive on multicore platforms
Q Yan, J Han, Y Li, RH Deng, T Li
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
272011
ModCon: A model-based testing platform for smart contracts
Y Liu, Y Li, SW Lin, Q Yan
Proceedings of the 28th ACM Joint Meeting on European Software Engineering …, 2020
252020
Insights into malware detection and prevention on mobile phones
Q Yan, Y Li, T Li, R Deng
Security Technology: International Conference, SecTech 2009, Held as Part of …, 2009
252009
Leakage-resilient password entry: challenges, design, and evaluation
Q Yan, J Han, Y Li, J Zhou, RH Deng
Computers & Security 48, 196-211, 2015
212015
Secure and reliable transfer learning framework for 6G-enabled Internet of Vehicles
M Xu, DT Hoang, J Kang, D Niyato, Q Yan, DI Kim
IEEE Wireless Communications 29 (4), 132-139, 2022
192022
On the potential of limitation-oriented malware detection and prevention techniques on mobile phones
Q Yan, RH Deng, Y Li, T Li
International journal of security and its applications 4 (1), 21, 2010
172010
Decentralized Incentive-based multi-energy trading mechanism for CCHP-based MG cluster
J Guo, J Tan, Y Li, H Gu, X Liu, Y Cao, Q Yan, D Xu
International Journal of Electrical Power & Energy Systems 133, 107138, 2021
162021
Semi-supervised federated learning with non-iid data: Algorithm and system design
Z Zhang, S Ma, J Nie, Y Wu, Q Yan, X Xu, D Niyato
2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th …, 2021
122021
DVREI: Dynamic verifiable retrieval over encrypted images
Y Li, J Ma, Y Miao, H Li, Q Yan, Y Wang, X Liu, KKR Choo
IEEE Transactions on Computers 71 (8), 1755-1769, 2021
112021
The system can't perform the operation now. Try again later.
Articles 1–20