A survey on trust management for Internet of Things Z Yan, P Zhang, AV Vasilakos Journal of network and computer applications 42, 120-134, 2014 | 858 | 2014 |
Active ticket with dynamic characteristic such as appearance with various validation options P Saarinen, M Lahteenmaki, Z Yan US Patent App. 10/675,857, 2005 | 260 | 2005 |
System and method for controlled copying and moving of content between devices and domains based on conditional encryption of content key depending on usage J Alve, PK Chiu, Z Yan, J Hietasarka US Patent 7,487,363, 2009 | 247 | 2009 |
Trust evaluation based security solution in ad hoc networks Z Yan, P Zhang, T Virtanen Proceedings of the Seventh Nordic Workshop on Secure IT Systems 14, 2003 | 240 | 2003 |
From cloud to fog computing: A review and a conceptual live VM migration framework O Osanaiye, S Chen, Z Yan, R Lu, KKR Choo, M Dlodlo IEEE Access 5, 8284-8300, 2017 | 220 | 2017 |
Trust modeling and management: from social trust to digital trust Z Yan, S Holtmanns Computer security, privacy and politics: current issues, challenges and …, 2008 | 160 | 2008 |
A security and trust framework for virtualized networks and software‐defined networking Z Yan, P Zhang, AV Vasilakos Security and communication networks 9 (16), 3059-3069, 2016 | 152 | 2016 |
Autonomic trust management for a component-based software system Z Yan, C Prehofer IEEE Transactions on Dependable and Secure Computing 8 (6), 810-823, 2010 | 126 | 2010 |
Deduplication on encrypted big data in cloud Z Yan, W Ding, X Yu, H Zhu, RH Deng IEEE transactions on big data 2 (2), 138-150, 2016 | 125 | 2016 |
Method and a device for providing digital tickets in a mobile communications environment Z Yan, M Lähteenmäki, P Cofta US Patent 7,555,284, 2009 | 122 | 2009 |
Flexible data access control based on trust and reputation in cloud computing Z Yan, X Li, M Wang, AV Vasilakos IEEE transactions on cloud Computing 5 (3), 485-498, 2015 | 112 | 2015 |
An efficient deep learning model to predict cloud workload for industry informatics Q Zhang, LT Yang, Z Yan, Z Chen, P Li IEEE transactions on industrial informatics 14 (7), 3170-3178, 2018 | 99 | 2018 |
A survey on security in D2D communications M Wang, Z Yan Mobile Networks and Applications 22 (2), 195-208, 2017 | 84 | 2017 |
A hybrid approach of mobile malware detection in Android F Tong, Z Yan Journal of Parallel and Distributed computing 103, 22-31, 2017 | 73 | 2017 |
System and method to establish and maintain conditional trust by stating signal of distrust Z Yan, PL Cofta US Patent 7,634,807, 2009 | 72 | 2009 |
Encrypted data management with deduplication in cloud computing Z Yan, M Wang, Y Li, AV Vasilakos IEEE Cloud Computing 3 (2), 28-35, 2016 | 68 | 2016 |
SecIoT: a security framework for the Internet of Things X Huang, P Craig, H Lin, Z Yan Security and communication networks 9 (16), 3083-3094, 2016 | 64 | 2016 |
A QoS-aware system for mobile cloud computing P Zhang, Z Yan 2011 IEEE International Conference on Cloud Computing and Intelligence …, 2011 | 62 | 2011 |
Two schemes of privacy-preserving trust evaluation Z Yan, W Ding, V Niemi, AV Vasilakos Future Generation Computer Systems 62, 175-189, 2016 | 61 | 2016 |
A survey on security, privacy, and trust in mobile crowdsourcing W Feng, Z Yan, H Zhang, K Zeng, Y Xiao, YT Hou IEEE Internet of Things Journal 5 (4), 2971-2992, 2017 | 59 | 2017 |