scispace - formally typeset
Y

Yuhan Yang

Researcher at Shanghai Jiao Tong University

Publications -  13
Citations -  87

Yuhan Yang is an academic researcher from Shanghai Jiao Tong University. The author has contributed to research in topics: Computer science & Data sharing. The author has an hindex of 1, co-authored 4 publications receiving 2 citations.

Papers
More filters
Journal ArticleDOI

D2D-Enabled Mobile-Edge Computation Offloading for Multiuser IoT Network

TL;DR: In this article, the authors proposed a game theoretic offloading method by considering the computation offloading process as a resource contention game, which minimizes the individual task execution cost and the system overhead.
Journal ArticleDOI

Trust Management for Internet of Things: A Comprehensive Study

TL;DR: The trust issue and the composition of trust management in IoT is comprehended, and the difference of existing work is illustrated, thereby motivating further research interest in this field.
Proceedings ArticleDOI

Block-SMPC: A Blockchain-based Secure Multi-party Computation for Privacy-Protected Data Sharing

TL;DR: This paper proposes a blockchain-based secure multi-party computation architecture for data sharing, where an aggregator consortium for data storage, verification and joint computation is designed, and introduces a straightforward secureMulti- party computation scheme based on homomorphic encryption.
Journal ArticleDOI

Differentially Private Federated Learning via Reconfigurable Intelligent Surface

TL;DR: This article proposes a reconfigurable intelligent surface (RIS)-empowered over-the-air FL system to alleviate the dilemma between learning accuracy and privacy and develops a system optimization problem to optimize the learning accuracy while satisfying privacy and power constraints.
Journal ArticleDOI

Blockchain-Enabled Multiparty Computation for Privacy Preserving and Public Audit in Industrial IoT

TL;DR: A privacy-preserving and publicly auditable multiparty computation scheme for industrial data sharing and computing, which avoids privacy leakage and computation misbehavior by separating the data ownership, data use, and data verification.