Y
Yuhan Yang
Researcher at Shanghai Jiao Tong University
Publications - 13
Citations - 87
Yuhan Yang is an academic researcher from Shanghai Jiao Tong University. The author has contributed to research in topics: Computer science & Data sharing. The author has an hindex of 1, co-authored 4 publications receiving 2 citations.
Papers
More filters
Journal ArticleDOI
D2D-Enabled Mobile-Edge Computation Offloading for Multiuser IoT Network
TL;DR: In this article, the authors proposed a game theoretic offloading method by considering the computation offloading process as a resource contention game, which minimizes the individual task execution cost and the system overhead.
Journal ArticleDOI
Trust Management for Internet of Things: A Comprehensive Study
TL;DR: The trust issue and the composition of trust management in IoT is comprehended, and the difference of existing work is illustrated, thereby motivating further research interest in this field.
Proceedings ArticleDOI
Block-SMPC: A Blockchain-based Secure Multi-party Computation for Privacy-Protected Data Sharing
TL;DR: This paper proposes a blockchain-based secure multi-party computation architecture for data sharing, where an aggregator consortium for data storage, verification and joint computation is designed, and introduces a straightforward secureMulti- party computation scheme based on homomorphic encryption.
Journal ArticleDOI
Differentially Private Federated Learning via Reconfigurable Intelligent Surface
TL;DR: This article proposes a reconfigurable intelligent surface (RIS)-empowered over-the-air FL system to alleviate the dilemma between learning accuracy and privacy and develops a system optimization problem to optimize the learning accuracy while satisfying privacy and power constraints.
Journal ArticleDOI
Blockchain-Enabled Multiparty Computation for Privacy Preserving and Public Audit in Industrial IoT
TL;DR: A privacy-preserving and publicly auditable multiparty computation scheme for industrial data sharing and computing, which avoids privacy leakage and computation misbehavior by separating the data ownership, data use, and data verification.