Year |
Citation |
Score |
2020 |
Li Z, Bai Y, Shin KG, Yan Z, Li H. Inside-Out Precoding to Manage Multiple Interferences From the Same Source Ieee Transactions On Vehicular Technology. 69: 7583-7595. DOI: 10.1109/Tvt.2020.2994332 |
0.336 |
|
2020 |
Ding W, Hu R, Yan Z, Qian X, Deng RH, Yang LT, Dong M. An Extended Framework of Privacy-Preserving Computation With Flexible Access Control Ieee Transactions On Network and Service Management. 17: 918-930. DOI: 10.1109/Tnsm.2019.2952462 |
0.346 |
|
2020 |
Wen S, Wei H, Yan Z, Guo Z, Yang Y, Huang T, Chen Y. Memristor-based Design of Sparse Compact Convolutional Neural Network Ieee Transactions On Network Science and Engineering. 7: 1431-1440. DOI: 10.1109/Tnse.2019.2934357 |
0.31 |
|
2020 |
Wang P, Yang LT, Qian G, Li J, Yan Z. HO-OTSVD: A Novel Tensor Decomposition and Its Incremental Decomposition for Cyber–Physical–Social Networks (CPSN) Ieee Transactions On Network Science and Engineering. 7: 713-725. DOI: 10.1109/Tnse.2019.2929155 |
0.343 |
|
2020 |
Wang W, Xu P, Liu D, Yang LT, Yan Z. Lightweighted Secure Searching Over Public-Key Ciphertexts for Edge-Cloud-Assisted Industrial IoT Devices Ieee Transactions On Industrial Informatics. 16: 4221-4230. DOI: 10.1109/Tii.2019.2950295 |
0.32 |
|
2020 |
Ding W, Yan Z, Deng RH. Privacy-Preserving Data Processing with Flexible Access Control Ieee Transactions On Dependable and Secure Computing. 17: 363-376. DOI: 10.1109/Tdsc.2017.2786247 |
0.342 |
|
2020 |
Zhou D, Yan Z, Liu G, Atiquzzaman M. An Adaptive Network Data Collection System in SDN Ieee Transactions On Cognitive Communications and Networking. 6: 562-574. DOI: 10.1109/Tccn.2019.2956141 |
0.339 |
|
2020 |
Cao J, Yan Z, Ma R, Zhang Y, Fu Y, Li H. LSAA: A Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks Ieee Internet of Things Journal. 7: 5329-5344. DOI: 10.1109/Jiot.2020.2976740 |
0.344 |
|
2020 |
Yan Z, Govindaraju V, Zheng Q, Wang Y. IEEE Access Special Section Editorial: Trusted Computing Ieee Access. 8: 25722-25726. DOI: 10.1109/Access.2020.2969768 |
0.318 |
|
2020 |
Fu Y, Chen H, Zheng Q, Yan Z, Kantola R, Jing X, Cao J, Li H. An Adaptive Security Data Collection and Composition Recognition method for security measurement over LTE/LTE-A networks Journal of Network and Computer Applications. 155: 102549. DOI: 10.1016/J.Jnca.2020.102549 |
0.38 |
|
2020 |
Sun B, Cao Y, Guo Z, Yan Z, Wen S. Quantized passification of delayed memristor-based neural networks via sliding model control Journal of the Franklin Institute-Engineering and Applied Mathematics. 357: 3741-3752. DOI: 10.1016/J.Jfranklin.2020.02.053 |
0.307 |
|
2020 |
Liu Y, Ma Z, Yan Z, Wang Z, Liu X, Ma J. Privacy-preserving federated k-means for proactive caching in next generation cellular networks Information Sciences. 521: 14-31. DOI: 10.1016/J.Ins.2020.02.042 |
0.327 |
|
2020 |
Hamza R, Yan Z, Muhammad K, Bellavista P, Titouna F. A privacy-preserving cryptosystem for IoT E-healthcare Information Sciences. 527: 493-510. DOI: 10.1016/J.Ins.2019.01.070 |
0.337 |
|
2020 |
Yan Z, Liu J, Yang LT, Pedrycz W. Data fusion in heterogeneous networks Information Fusion. 53: 1-3. DOI: 10.1016/J.Inffus.2019.06.007 |
0.301 |
|
2020 |
Peng L, Feng W, Yan Z, Li Y, Zhou X, Shimizu S. Privacy preservation in permissionless blockchain: A survey Digital Communications and Networks. DOI: 10.1016/J.Dcan.2020.05.008 |
0.333 |
|
2020 |
Feng W, Li Y, Yang X, Yan Z, Chen L. Blockchain-based data transmission control for Tactical Data Link Digital Communications and Networks. DOI: 10.1016/J.Dcan.2020.05.007 |
0.326 |
|
2020 |
Liang X, Yan Z, Deng RH. Game theoretical study on client-controlled cloud data deduplication Computers & Security. 91: 101730. DOI: 10.1016/J.Cose.2020.101730 |
0.331 |
|
2020 |
Wang Y, Yan Z, Feng W, Liu S. Privacy protection in mobile crowd sensing: a survey World Wide Web. 23: 421-452. DOI: 10.1007/S11280-019-00745-2 |
0.343 |
|
2020 |
Wu Y, Yan Z, Zhao Z, Al‐Dubai A. Editorial: Special issue on SDN‐based wireless network virtualization Concurrency and Computation: Practice and Experience. 32: 5444. DOI: 10.1002/Cpe.5444 |
0.31 |
|
2019 |
Wang L, Yu Z, Xiong F, Yang D, Pan S, Yan Z. Influence Spread in Geo-Social Networks: A Multiobjective Optimization Perspective. Ieee Transactions On Cybernetics. PMID 30951488 DOI: 10.1109/Tcyb.2019.2906078 |
0.313 |
|
2019 |
Li N, Yan Z, Wang M, Yang LT. Securing Communication Data in Pervasive Social Networking Based on Trust with KP-ABE Acm Transactions On Cyber-Physical Systems. 3: 1-23. DOI: 10.1145/3145624 |
0.326 |
|
2019 |
Liang X, Yan Z, Chen X, Yang LT, Lou W, Hou YT. Game Theoretical Analysis on Encrypted Cloud Data Deduplication Ieee Transactions On Industrial Informatics. 15: 5778-5789. DOI: 10.1109/Tii.2019.2920402 |
0.321 |
|
2019 |
Yan Z, Zhang L, Ding W, Zheng Q. Heterogeneous Data Storage Management with Deduplication in Cloud Computing Ieee Transactions On Big Data. 5: 393-407. DOI: 10.1109/Tbdata.2017.2701352 |
0.338 |
|
2019 |
Li Z, Liu Y, Shin KG, Liu J, Yan Z. Interference Steering to Manage Interference in IoT Ieee Internet of Things Journal. 6: 10458-10471. DOI: 10.1109/Jiot.2019.2939255 |
0.329 |
|
2019 |
Liu D, Yan Z, Ding W, Atiquzzaman M. A Survey on Secure Data Analytics in Edge Computing Ieee Internet of Things Journal. 6: 4946-4967. DOI: 10.1109/Jiot.2019.2897619 |
0.354 |
|
2019 |
Xie H, Yan Z, Yao Z, Atiquzzaman M. Data Collection for Security Measurement in Wireless Sensor Networks: A Survey Ieee Internet of Things Journal. 6: 2205-2224. DOI: 10.1109/Jiot.2018.2883403 |
0.362 |
|
2019 |
Fan K, Wang S, Ren Y, Yang K, Yan Z, Li H, Yang Y. Blockchain-Based Secure Time Protection Scheme in IoT Ieee Internet of Things Journal. 6: 4671-4679. DOI: 10.1109/Jiot.2018.2874222 |
0.336 |
|
2019 |
Jing X, Yan Z, Pedrycz W. Security Data Collection and Data Analytics in the Internet: A Survey Ieee Communications Surveys & Tutorials. 21: 586-618. DOI: 10.1109/Comst.2018.2863942 |
0.354 |
|
2019 |
Gupta BB, Rahulamathavan Y, Yamaguchi S, Brooks T, Yan Z. IEEE Access Special Section Editorial: Recent Advances in Computational Intelligence Paradigms for Security and Privacy for Fog and Mobile Edge Computing Ieee Access. 7: 134063-134070. DOI: 10.1109/Access.2019.2940302 |
0.333 |
|
2019 |
Monshizadeh M, Khatri V, Atli BG, Kantola R, Yan Z. Performance Evaluation of a Combined Anomaly Detection Platform Ieee Access. 7: 100964-100978. DOI: 10.1109/Access.2019.2930832 |
0.329 |
|
2019 |
Rui Z, Yan Z. A Survey on Biometric Authentication: Toward Secure and Privacy-Preserving Identification Ieee Access. 7: 5994-6009. DOI: 10.1109/Access.2018.2889996 |
0.33 |
|
2019 |
Liu S, Liu A, Yan Z, Feng W. Efficient LBS queries with mutual privacy preservation in IoV Vehicular Communications. 16: 62-71. DOI: 10.1016/J.Vehcom.2019.03.001 |
0.324 |
|
2019 |
Jing X, Zhao J, Zheng Q, Yan Z, Pedrycz W. A reversible sketch-based method for detecting and mitigating amplification attacks Journal of Network and Computer Applications. 142: 15-24. DOI: 10.1016/J.Jnca.2019.06.007 |
0.339 |
|
2019 |
Lin H, Yan Z, Fu Y. Adaptive security-related data collection with context awareness Journal of Network and Computer Applications. 126: 88-103. DOI: 10.1016/J.Jnca.2018.11.002 |
0.366 |
|
2019 |
Yu X, Yan Z, Zhang R. Verifiable outsourced computation over encrypted data Information Sciences. 479: 372-385. DOI: 10.1016/J.Ins.2018.12.022 |
0.337 |
|
2019 |
Ruan J, Yan Z, Dong B, Zheng Q, Qian B. Identifying suspicious groups of affiliated-transaction-based tax evasion in big data Information Sciences. 477: 508-532. DOI: 10.1016/J.Ins.2018.11.008 |
0.302 |
|
2019 |
Ding W, Jing X, Yan Z, Yang LT. A survey on data fusion in internet of things: Towards secure and privacy-preserving fusion Information Fusion. 51: 129-144. DOI: 10.1016/J.Inffus.2018.12.001 |
0.333 |
|
2019 |
Jing X, Yan Z, Jiang X, Pedrycz W. Network traffic fusion and analysis against DDoS flooding attacks with a novel reversible sketch Information Fusion. 51: 100-113. DOI: 10.1016/J.Inffus.2018.10.013 |
0.367 |
|
2019 |
Fan K, Sun S, Yan Z, Pan Q, Li H, Yang Y. A blockchain-based clock synchronization Scheme in IoT Future Generation Computer Systems. 101: 524-533. DOI: 10.1016/J.Future.2019.06.007 |
0.354 |
|
2019 |
Feng W, Yan Z. MCS-Chain: Decentralized and trustworthy mobile crowdsourcing based on blockchain Future Generation Computer Systems. 95: 649-666. DOI: 10.1016/J.Future.2019.01.036 |
0.349 |
|
2019 |
Hu R, Yan Z, Ding W, Yang LT. A survey on data provenance in IoT World Wide Web. 23: 1441-1463. DOI: 10.1007/S11280-019-00746-1 |
0.333 |
|
2019 |
Feng W, Li Y, Yang X, Yan Z, Chen L. Blockchain Based Data Transmission Control for Tactical Data Link. Information Sciences. 583-595. DOI: 10.1007/978-981-15-1301-5_46 |
0.326 |
|
2018 |
Wen S, Xie X, Yan Z, Huang T, Zeng Z. General memristor with applications in multilayer neural networks. Neural Networks : the Official Journal of the International Neural Network Society. 103: 142-149. PMID 29677559 DOI: 10.1016/J.Neunet.2018.03.015 |
0.304 |
|
2018 |
Li G, Yan Z, Fu Y, Chen H. Data Fusion for Network Intrusion Detection: A Review Security and Communication Networks. 2018: 8210614. DOI: 10.1155/2018/8210614 |
0.33 |
|
2018 |
Yan Z, Zhang Y, Choo KR, Xiang Y. Security Measurements of Cyber Networks Security and Communication Networks. 2018: 1-2. DOI: 10.1155/2018/6545314 |
0.317 |
|
2018 |
Wang M, Yan Z. Privacy-Preserving Authentication and Key Agreement Protocols for D2D Group Communications Ieee Transactions On Industrial Informatics. 14: 3637-3647. DOI: 10.1109/Tii.2017.2778090 |
0.308 |
|
2018 |
Feng J, Yang LT, Dai G, Chen J, Yan Z. An Improved Secure High-Order-Lanczos Based Orthogonal Tensor SVD for Outsourced Cyber-Physical-Social Big Data Reduction Ieee Transactions On Big Data. 1-1. DOI: 10.1109/Tbdata.2018.2881441 |
0.331 |
|
2018 |
Feng W, Yan Z, Zhang H, Zeng K, Xiao Y, Hou YT. A Survey on Security, Privacy, and Trust in Mobile Crowdsourcing Ieee Internet of Things Journal. 5: 2971-2992. DOI: 10.1109/Jiot.2017.2765699 |
0.34 |
|
2018 |
Tian F, Yan Z, Liang X, Zhang P. Trusted Cooperation Among Virtual Base Stations in C-RAN Ieee Access. 6: 57787-57801. DOI: 10.1109/Access.2018.2873758 |
0.364 |
|
2018 |
Liu S, Zhang L, Yan Z. Predict Pairwise Trust Based on Machine Learning in Online Social Networks: A Survey Ieee Access. 6: 51297-51318. DOI: 10.1109/Access.2018.2869699 |
0.301 |
|
2018 |
Lin H, Yan Z, Chen Y, Zhang L. A Survey on Network Security-Related Data Collection Technologies Ieee Access. 6: 18345-18365. DOI: 10.1109/Access.2018.2817921 |
0.362 |
|
2018 |
Yan Z, Wang H, Yang LT, Niemi V. IEEE Access Special Section Editorial: Trust Management in Pervasive Social Networking (TruPSN) Ieee Access. 6: 16851-16854. DOI: 10.1109/Access.2018.2817858 |
0.318 |
|
2018 |
He L, Yan Z, Atiquzzaman M. LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey Ieee Access. 6: 4220-4242. DOI: 10.1109/Access.2018.2792534 |
0.384 |
|
2018 |
Xu K, Zhang W, Yan Z. A privacy-preserving mobile application recommender system based on trust evaluation Journal of Computational Science. 26: 87-107. DOI: 10.1016/J.Jocs.2018.04.001 |
0.348 |
|
2018 |
Zhou D, Yan Z, Fu Y, Yao Z. A survey on network data collection Journal of Network and Computer Applications. 116: 9-23. DOI: 10.1016/J.Jnca.2018.05.004 |
0.348 |
|
2018 |
Liu G, Yan Z, Pedrycz W. Data collection for attack detection and security measurement in Mobile Ad Hoc Networks: A survey Journal of Network and Computer Applications. 105: 105-122. DOI: 10.1016/J.Jnca.2018.01.004 |
0.36 |
|
2018 |
Yuan H, Chen X, Jiang T, Zhang X, Yan Z, Xiang Y. DedupDUM: Secure and scalable data deduplication with dynamic user management Information Sciences. 456: 159-173. DOI: 10.1016/J.Ins.2018.05.024 |
0.337 |
|
2018 |
Yan Z, Wang P, Feng W. A novel scheme of anonymous authentication on trust in Pervasive Social Networking Information Sciences. 79-96. DOI: 10.1016/J.Ins.2018.02.037 |
0.351 |
|
2018 |
Wei Z, Wu Y, Yang Y, Yan Z, Pei Q, Xie Y, Weng J. AutoPrivacy: Automatic privacy protection and tagging suggestion for mobile social photo Computers & Security. 76: 341-353. DOI: 10.1016/J.Cose.2017.12.002 |
0.317 |
|
2018 |
Yan P, Yan Z. A survey on dynamic mobile malware detection Software Quality Journal. 26: 1-29. DOI: 10.1007/S11219-017-9368-4 |
0.325 |
|
2017 |
Fu Y, Yan Z, Cao J, Koné O, Cao X. An Automata Based Intrusion Detection Method for Internet of Things Mobile Information Systems. 2017: 1750637. DOI: 10.1155/2017/1750637 |
0.365 |
|
2017 |
Yan Z, Wang M. Protect Pervasive Social Networking Based on Two-Dimensional Trust Levels Ieee Systems Journal. 11: 207-218. DOI: 10.1109/Jsyst.2014.2347259 |
0.361 |
|
2017 |
Tian F, Zhang P, Yan Z. A Survey on C-RAN Security Ieee Access. 5: 13372-13386. DOI: 10.1109/Access.2017.2717852 |
0.352 |
|
2017 |
Osanaiye O, Chen S, Yan Z, Lu R, Choo KR, Dlodlo M. From Cloud to Fog Computing: A Review and a Conceptual Live VM Migration Framework Ieee Access. 5: 8284-8300. DOI: 10.1109/Access.2017.2692960 |
0.305 |
|
2017 |
Feng W, Yan Z, Xie H. Anonymous Authentication on Trust in Pervasive Social Networking Based on Group Signature Ieee Access. 5: 6236-6246. DOI: 10.1109/Access.2017.2679980 |
0.357 |
|
2017 |
Yan Z, Yu X, Ding W. Context-Aware Verifiable Cloud Computing Ieee Access. 5: 2211-2227. DOI: 10.1109/Access.2017.2666839 |
0.343 |
|
2017 |
Tong F, Yan Z. A hybrid approach of mobile malware detection in Android Journal of Parallel and Distributed Computing. 103: 22-31. DOI: 10.1016/J.Jpdc.2016.10.012 |
0.322 |
|
2017 |
Yan Z, Shi W. CloudFile: A cloud data access control system based on mobile social trust Journal of Network and Computer Applications. 86: 46-58. DOI: 10.1016/J.Jnca.2016.11.016 |
0.355 |
|
2017 |
Ding W, Yan Z, Deng RH. Encrypted data processing with Homomorphic Re-Encryption Information Sciences. 409: 35-55. DOI: 10.1016/J.Ins.2017.05.004 |
0.334 |
|
2017 |
Yan Z, Jing X, Pedrycz W. Fusing and mining opinions for reputation generation Information Fusion. 36: 172-184. DOI: 10.1016/J.Inffus.2016.11.011 |
0.302 |
|
2017 |
Liang X, Yan Z. A survey on game theoretical methods in Human–Machine Networks Future Generation Computer Systems. 92: 674-693. DOI: 10.1016/J.Future.2017.10.051 |
0.336 |
|
2017 |
Yan Z, Xie H, Zhang P, Gupta BB. Flexible data access control in D2D communications Future Generation Computer Systems. 82: 738-751. DOI: 10.1016/J.Future.2017.08.052 |
0.323 |
|
2017 |
Guo J, Song B, Yu FR, Yan Z, Yang LT. Object detection among multimedia big data in the compressive measurement domain under mobile distributed architecture Future Generation Computer Systems. 76: 519-527. DOI: 10.1016/J.Future.2017.03.004 |
0.315 |
|
2017 |
Zhang L, Yan Z, Kantola R. Privacy-preserving trust management for unwanted traffic control Future Generation Computer Systems. 72: 305-318. DOI: 10.1016/J.Future.2016.06.036 |
0.332 |
|
2017 |
Fu Y, Yan Z, Li H, Xin XL, Cao J. A secure SDN based multi-RANs architecture for future 5G networks Computers & Security. 70: 648-662. DOI: 10.1016/J.Cose.2017.08.013 |
0.376 |
|
2017 |
Yu X, Yan Z, Vasilakos AV. A Survey of Verifiable Computation Mobile Networks and Applications. 22: 438-453. DOI: 10.1007/S11036-017-0872-3 |
0.329 |
|
2017 |
Wang M, Yan Z, Niemi V. UAKA-D2D: Universal Authentication and Key Agreement Protocol in D2D Communications Mobile Networks and Applications. 22: 510-525. DOI: 10.1007/S11036-017-0870-5 |
0.344 |
|
2017 |
Wang M, Yan Z. A Survey on Security in D2D Communications Mobile Networks and Applications. 22: 195-208. DOI: 10.1007/S11036-016-0741-5 |
0.316 |
|
2016 |
Liu Y, Yan Z, Lin Q, Guo X, Han M, Nan K, Hwang KC, Huang Y, Zhang Y, Rogers JA. Guided Formation of 3D Helical Mesostructures by Mechanical Buckling: Analytical Modeling and Experimental Validation. Advanced Functional Materials. 26: 2909-2918. PMID 27499728 DOI: 10.1002/Adfm.201505132 |
0.322 |
|
2016 |
Aad G, Abbott B, Abdallah J, Abdinov O, Aben R, Abolins M, AbouZeid OS, Abramowicz H, Abreu H, Abreu R, Abulaiti Y, Acharya BS, Adamczyk L, Adams DL, ... ... Yan Z, et al. Identification of boosted, hadronically decaying W bosons and comparisons with ATLAS data taken at [Formula: see text] TeV. The European Physical Journal. C, Particles and Fields. 76: 154. PMID 27471432 DOI: 10.1140/Epjc/S10052-016-3978-Z |
0.344 |
|
2016 |
Aad G, Abbott B, Abdallah J, Abdinov O, Aben R, Abolins M, AbouZeid OS, Abramowicz H, Abreu H, Abreu R, Abulaiti Y, Acharya BS, Adamczyk L, Adams DL, Adelman J, ... ... Yan Z, et al. Observation of Long-Range Elliptic Azimuthal Anisotropies in sqrt[s]=13 and 2.76 TeV pp Collisions with the ATLAS Detector. Physical Review Letters. 116: 172301. PMID 27176515 DOI: 10.1103/Physrevlett.116.172301 |
0.314 |
|
2016 |
Aad G, Abbott B, Abdallah J, Abdinov O, Aben R, Abolins M, AbouZeid OS, Abramowicz H, Abreu H, Abreu R, Abulaiti Y, Acharya BS, Adamczyk L, Adams DL, ... ... Yan Z, et al. Measurement of the charge asymmetry in top-quark pair production in the lepton-plus-jets final state in pp collision data at [Formula: see text] with the ATLAS detector. The European Physical Journal. C, Particles and Fields. 76: 87. PMID 27069416 DOI: 10.1140/Epjc/S10052-016-3910-6 |
0.327 |
|
2016 |
Aad G, Abbott B, Abdallah J, Abdinov O, Aben R, Abolins M, AbouZeid OS, Abramowicz H, Abreu H, Abreu R, Abulaiti Y, Acharya BS, Adamczyk L, Adams DL, ... ... Yan Z, et al. Search for direct top squark pair production in final states with two tau leptons in pp collisions at [Formula: see text] TeV with the ATLAS detector. The European Physical Journal. C, Particles and Fields. 76: 81. PMID 27069414 DOI: 10.1140/Epjc/S10052-016-3897-Z |
0.326 |
|
2016 |
Aad G, Abbott B, Abdallah J, Abdinov O, Abeloos B, Aben R, Abolins M, AbouZeid OS, Abramowicz H, Abreu H, Abreu R, Abulaiti Y, Acharya BS, Adamczyk L, Adams DL, ... ... Yan Z, et al. Measurement of the ZZ Production Cross Section in pp Collisions at sqrt[s]=13 TeV with the ATLAS Detector. Physical Review Letters. 116: 101801. PMID 27015473 DOI: 10.1103/Physrevlett.116.101801 |
0.309 |
|
2016 |
Aad G, Abbott B, Abdallah J, Abdinov O, Aben R, Abolins M, AbouZeid OS, Abramowicz H, Abreu H, Abreu R, Abulaiti Y, Acharya BS, Adamczyk L, Adams DL, ... ... Yan Z, et al. Search for an additional, heavy Higgs boson in the [Formula: see text] decay channel at [Formula: see text] in [Formula: see text] collision data with the ATLAS detector. The European Physical Journal. C, Particles and Fields. 76: 45. PMID 26949371 DOI: 10.1140/Epjc/S10052-015-3820-Z |
0.327 |
|
2016 |
Aad G, Abbott B, Abdallah J, Abdinov O, Aben R, Abolins M, AbouZeid OS, Abramowicz H, Abreu H, Abreu R, Abulaiti Y, Acharya BS, Adamczyk L, Adams DL, Adelman J, ... ... Yan Z, et al. Search for single top-quark production via flavour-changing neutral currents at 8 TeV with the ATLAS detector. The European Physical Journal. C, Particles and Fields. 76: 55. PMID 26900343 DOI: 10.1140/Epjc/S10052-016-3876-4 |
0.349 |
|
2016 |
Aad G, Abbott B, Abdallah J, Abdinov O, Aben R, Abolins M, AbouZeid OS, Abramowicz H, Abreu H, Abreu R, Abulaiti Y, Acharya BS, Adamczyk L, Adams DL, Adelman J, ... ... Yan Z, et al. Search for flavour-changing neutral current top-quark decays to [Formula: see text] in [Formula: see text] collision data collected with the ATLAS detector at [Formula: see text] TeV. The European Physical Journal. C, Particles and Fields. 76: 12. PMID 26855606 DOI: 10.1140/Epjc/S10052-015-3851-5 |
0.332 |
|
2016 |
Klionsky DJ, Abdelmohsen K, Abe A, Abedin MJ, Abeliovich H, Acevedo Arozena A, Adachi H, Adams CM, Adams PD, Adeli K, Adhihetty PJ, Adler SG, Agam G, Agarwal R, Aghi MK, ... Yan Z, et al. Guidelines for the use and interpretation of assays for monitoring autophagy (3rd edition). Autophagy. 12: 1-222. PMID 26799652 DOI: 10.1080/15548627.2015.1100356 |
0.332 |
|
2016 |
Aad G, Abbott B, Abdallah J, Abdinov O, Aben R, Abolins M, AbouZeid OS, Abramowicz H, Abreu H, Abreu R, Abulaiti Y, Acharya BS, Adamczyk L, Adams DL, Adelman J, ... ... Yan Z, et al. Measurements of fiducial cross-sections for [Formula: see text] production with one or two additional b-jets in pp collisions at [Formula: see text]=8 TeV using the ATLAS detector. The European Physical Journal. C, Particles and Fields. 76: 11. PMID 26770069 DOI: 10.1140/Epjc/S10052-015-3852-4 |
0.316 |
|
2016 |
Aad G, Abbott B, Abdallah J, Abdinov O, Aben R, Abolins M, AbouZeid OS, Abramowicz H, Abreu H, Abreu R, Abulaiti Y, Acharya BS, Adamczyk L, Adams DL, Adelman J, ... ... Yan Z, et al. Measurements of the Higgs boson production and decay rates and coupling strengths using pp collision data at [Formula: see text] and 8 TeV in the ATLAS experiment. The European Physical Journal. C, Particles and Fields. 76: 6. PMID 26770068 DOI: 10.1140/Epjc/S10052-015-3769-Y |
0.331 |
|
2016 |
Aad G, Abbott B, Abdallah J, Abdinov O, Aben R, Abolins M, AbouZeid OS, Abramowicz H, Abreu H, Abreu R, Abulaiti Y, Acharya BS, Adamczyk L, Adams DL, ... ... Yan Z, et al. Searches for scalar leptoquarks in pp collisions at [Formula: see text] = 8 TeV with the ATLAS detector. The European Physical Journal. C, Particles and Fields. 76: 5. PMID 26770067 DOI: 10.1140/Epjc/S10052-015-3823-9 |
0.324 |
|
2016 |
Aad G, Abbott B, Abdallah J, Abdinov O, Aben R, Abolins M, AbouZeid OS, Abramowicz H, Abreu H, Abreu R, Abulaiti Y, Acharya BS, Adamczyk L, Adams DL, Adelman J, ... ... Yan Z, et al. Study of the [Formula: see text] and [Formula: see text] decays with the ATLAS detector. The European Physical Journal. C, Particles and Fields. 76: 4. PMID 26770066 DOI: 10.1140/Epjc/S10052-015-3743-8 |
0.311 |
|
2016 |
Kuang L, Yang LT, Rho S(, Yan Z, Qiu K. A Tensor-Based Framework for Software-Defined Cloud Data Center Acm Transactions On Multimedia Computing, Communications, and Applications. 12: 74. DOI: 10.1145/2983640 |
0.372 |
|
2016 |
Gao L, Yan Z, Yang LT. Game Theoretical Analysis on Acceptance of a Cloud Data Access Control System Based on Reputation Ieee Transactions On Cloud Computing. 1-1. DOI: 10.1109/Tcc.2016.2632110 |
0.321 |
|
2016 |
Yan Z, Ding W, Yu X, Zhu H, Deng RH. Deduplication on Encrypted Big Data in Cloud Ieee Transactions On Big Data. 2: 138-150. DOI: 10.1109/Tbdata.2016.2587659 |
0.325 |
|
2016 |
Huang C, Yan Z, Li N, Wang M. Secure Pervasive Social Communications Based on Trust in a Distributed Way Ieee Access. 4: 9225-9238. DOI: 10.1109/Access.2017.2647824 |
0.363 |
|
2016 |
Ding W, Yan Z, Deng RH. A Survey on Future Internet Security Architectures Ieee Access. 4: 4374-4393. DOI: 10.1109/Access.2016.2596705 |
0.345 |
|
2016 |
Yan Z, Ding W, Niemi V, Vasilakos AV. Two Schemes of Privacy-Preserving Trust Evaluation Future Generation Computer Systems. 62: 175-189. DOI: 10.1016/J.Future.2015.11.006 |
0.339 |
|
2016 |
Yan Z, Zhang P, Vasilakos AV. A security and trust framework for virtualized networks and software-defined networking Security and Communication Networks. 9: 3059-3069. DOI: 10.1002/Sec.1243 |
0.368 |
|
2016 |
Huang X, Gao X, Yan Z. Security protocols in body sensor networks using visible light communications International Journal of Communication Systems. 29: 2349-2363. DOI: 10.1002/Dac.3021 |
0.351 |
|
2015 |
Aad G, Abajyan T, Abbott B, Abdallah J, Abdel Khalek S, Abdinov O, Aben R, Abi B, Abolins M, AbouZeid OS, Abramowicz H, Abreu H, Abulaiti Y, Acharya BS, ... ... Yan Z, et al. Jet energy measurement and its systematic uncertainty in proton-proton collisions at [Formula: see text] TeV with the ATLAS detector. The European Physical Journal. C, Particles and Fields. 75: 17. PMID 26709345 DOI: 10.1140/Epjc/S10052-014-3190-Y |
0.333 |
|
2015 |
Liu Y, Zhu X, Gao Y, Zhang W, Fan Q, Wei L, Yang Z, Zhang Q, Qian F, Chen Y, He W, Wu Y, Yan Z, Hua Y, Zhao Y, et al. Quasi suppression of higher-order diffractions with inclined rectangular apertures gratings. Scientific Reports. 5: 16502. PMID 26563588 DOI: 10.1038/srep16502 |
0.482 |
|
2015 |
Aad G, Abbott B, Abdallah J, Abdinov O, Aben R, Abolins M, AbouZeid OS, Abramowicz H, Abreu H, Abreu R, Abulaiti Y, Acharya BS, Adamczyk L, Adams DL, Adelman J, ... ... Yan Z, et al. ATLAS Run 1 searches for direct pair production of third-generation squarks at the Large Hadron Collider. The European Physical Journal. C, Particles and Fields. 75: 510. PMID 26549981 DOI: 10.1140/Epjc/S10052-015-3726-9 |
0.357 |
|
2015 |
Aad G, Abbott B, Abdallah J, Abdinov O, Aben R, Abolins M, AbouZeid OS, Abramowicz H, Abreu H, Abreu R, Abulaiti Y, Acharya BS, Adamczyk L, Adams DL, ... ... Yan Z, et al. Search for metastable heavy charged particles with large ionisation energy loss in pp collisions at [Formula: see text] TeV using the ATLAS experiment. The European Physical Journal. C, Particles and Fields. 75: 407. PMID 26543401 DOI: 10.1140/Epjc/S10052-015-3609-0 |
0.325 |
|
2015 |
Aad G, Abbott B, Abdallah J, Abdinov O, Aben R, Abolins M, AbouZeid OS, Abramowicz H, Abreu H, Abreu R, Abulaiti Y, Acharya BS, Adamczyk L, Adams DL, Adelman J, ... ... Yan Z, et al. Study of the spin and parity of the Higgs boson in diboson decays with the ATLAS detector. The European Physical Journal. C, Particles and Fields. 75: 476. PMID 26472935 DOI: 10.1140/Epjc/S10052-015-3685-1 |
0.305 |
|
2015 |
Aad G, Abbott B, Abdallah J, Abdel Khalek S, Abdinov O, Aben R, Abi B, Abolins M, AbouZeid OS, Abramowicz H, Abreu H, Abreu R, Abulaiti Y, Acharya BS, Adamczyk L, ... ... Yan Z, et al. Two-particle Bose-Einstein correlations in pp collisions at [Formula: see text] 0.9 and 7 TeV measured with the ATLAS detector. The European Physical Journal. C, Particles and Fields. 75: 466. PMID 26457062 DOI: 10.1140/Epjc/S10052-015-3644-X |
0.326 |
|
2015 |
Aad G, Abbott B, Abdallah J, Abdinov O, Aben R, Abolins M, AbouZeid OS, Abramowicz H, Abreu H, Abreu R, Abulaiti Y, Acharya BS, Adamczyk L, Adams DL, Adelman J, ... ... Yan Z, et al. Search for Dark Matter in Events with Missing Transverse Momentum and a Higgs Boson Decaying to Two Photons in pp Collisions at sqrt[s]=8 TeV with the ATLAS Detector. Physical Review Letters. 115: 131801. PMID 26451544 DOI: 10.1103/Physrevlett.115.131801 |
0.337 |
|
2015 |
Aad G, Abbott B, Abdallah J, Abdinov O, Aben R, Abolins M, AbouZeid OS, Abramowicz H, Abreu H, Abreu R, Abulaiti Y, Acharya BS, Adamczyk L, Adams DL, Adelman J, ... ... Yan Z, et al. Search for Higgs boson pair production in the [Formula: see text] final state from pp collisions at [Formula: see text] TeVwith the ATLAS detector. The European Physical Journal. C, Particles and Fields. 75: 412. PMID 26380565 DOI: 10.1140/Epjc/S10052-015-3628-X |
0.333 |
|
2015 |
Zhang Y, Yan Z, Nan K, Xiao D, Liu Y, Luan H, Fu H, Wang X, Yang Q, Wang J, Ren W, Si H, Liu F, Yang L, Li H, et al. A mechanically driven form of Kirigami as a route to 3D mesostructures in micro/nanomembranes. Proceedings of the National Academy of Sciences of the United States of America. PMID 26372959 DOI: 10.1073/Pnas.1515602112 |
0.307 |
|
2015 |
Chen N, Liu Y, Cheng Y, Liu L, Yan Z, Tao L, Guo X, Luo Y, Yan A. Technology Resource, Distribution, and Development Characteristics of Global Influenza Virus Vaccine: A Patent Bibliometric Analysis. Plos One. 10: e0136953. PMID 26372160 DOI: 10.1371/journal.pone.0136953 |
0.309 |
|
2015 |
Aad G, Abbott B, Abdallah J, Abdinov O, Aben R, Abolins M, AbouZeid OS, Abramowicz H, Abreu H, Abreu R, Abulaiti Y, Acharya BS, Adamczyk L, Adams DL, Adelman J, ... ... Yan Z, et al. Measurements of the Total and Differential Higgs Boson Production Cross Sections Combining the H→γγ and H→ZZ^{*}→4ℓ Decay Channels at sqrt[s]=8 TeV with the ATLAS Detector. Physical Review Letters. 115: 091801. PMID 26371640 DOI: 10.1103/Physrevlett.115.091801 |
0.304 |
|
2015 |
Aad G, Abbott B, Abdallah J, Abdinov O, Aben R, Abolins M, AbouZeid OS, Abramowicz H, Abreu H, Abreu R, Abulaiti Y, Acharya BS, Adamczyk L, Adams DL, Adelman J, ... ... Yan Z, et al. Search for heavy long-lived multi-charged particles in pp collisions at [Formula: see text] TeV using the ATLAS detector. The European Physical Journal. C, Particles and Fields. 75: 362. PMID 26300688 DOI: 10.1140/Epjc/S10052-015-3534-2 |
0.327 |
|
2015 |
Xu RY, Huang X, Zhang J, Lu Y, Wu G, Yan Z. Software Defined Intelligent Building International Journal of Information Security and Privacy. 9: 84-99. DOI: 10.4018/Ijisp.2015070105 |
0.334 |
|
2015 |
Chen L, Yan Z, Zhang W, Kantola R. TruSMS: A trustworthy SMS spam control system based on trust management Future Generation Computer Systems. 49: 77-93. DOI: 10.1016/J.Future.2014.06.010 |
0.353 |
|
2015 |
Yan Z, Li X, Kantola R. Controlling Cloud Data Access Based on Reputation Mobile Networks and Applications. 20: 828-839. DOI: 10.1007/S11036-015-0591-6 |
0.352 |
|
2015 |
Huang X, Craig P, Lin H, Yan Z. SecIoT: A security framework for the Internet of Things Security and Communication Networks. DOI: 10.1002/Sec.1259 |
0.359 |
|
2014 |
Yan Z, Wang J. Robust Model Predictive Control of Nonlinear Systems With Unmodeled Dynamics and Bounded Uncertainties Based on Neural Networks Ieee Transactions On Neural Networks. 25: 457-469. PMID 24807443 DOI: 10.1109/Tnnls.2013.2275948 |
0.302 |
|
2014 |
Yan Z, Kantola R, Shen Y. A generic solution for unwanted traffic control through trust management The New Review of Hypermedia and Multimedia. 20: 25-51. DOI: 10.1080/13614568.2013.832807 |
0.315 |
|
2014 |
Yan Z, Zhang P, Vasilakos AV. A survey on trust management for Internet of Things Journal of Network and Computer Applications. 42: 120-134. DOI: 10.1016/J.Jnca.2014.01.014 |
0.317 |
|
2014 |
Shen Y, Yan Z, Kantola R. Analysis on the acceptance of Global Trust Management for unwanted traffic control based on game theory Computers & Security. 47: 3-25. DOI: 10.1016/J.Cose.2014.03.010 |
0.341 |
|
2014 |
Yan Z, Chen Y, Shen Y. PerContRep: a practical reputation system for pervasive content services The Journal of Supercomputing. 70: 1051-1074. DOI: 10.1007/S11227-014-1116-Y |
0.332 |
|
2013 |
Yan Z, Wang G, Deng RH, Josang A. Special Issue on Trust and Identity Management in Mobile and Internet Computing and Communications Iet Information Security. 7: 1-2. DOI: 10.1049/Iet-Ifs.2013.0043 |
0.309 |
|
2013 |
Huang X, Chen B, Markham A, Wang Q, Yan Z, Roscoe AW. Human interactive secure key and identity exchange protocols in body sensor networks Iet Information Security. 7: 30-38. DOI: 10.1049/Iet-Ifs.2012.0080 |
0.33 |
|
2013 |
Yan Z, Chen Y, Shen Y. A practical reputation system for pervasive social chatting Journal of Computer and System Sciences. 79: 556-572. DOI: 10.1016/J.Jcss.2012.11.003 |
0.313 |
|
2012 |
Yan Z, Wang J. Model Predictive Control for Tracking of Underactuated Vessels Based on Recurrent Neural Networks Ieee Journal of Oceanic Engineering. 37: 717-726. DOI: 10.1109/Joe.2012.2201797 |
0.313 |
|
2011 |
Yan Z, Chen Y. AdChatRep: a reputation system for MANET chatting Scientia Forestalis. 43-48. DOI: 10.1145/2030066.2030079 |
0.313 |
|
Show low-probability matches. |