scispace - formally typeset
Z

Zheng Yan

Researcher at Shanghai Jiao Tong University

Publications -  490
Citations -  12887

Zheng Yan is an academic researcher from Shanghai Jiao Tong University. The author has contributed to research in topics: Computer science & Cloud computing. The author has an hindex of 47, co-authored 420 publications receiving 8786 citations. Previous affiliations of Zheng Yan include Helsinki University of Technology & Huawei.

Papers
More filters
Proceedings ArticleDOI

A Novel Architecture Based on Cloud Computing for Wireless Sensor Network

TL;DR: Simulation results show that the proposed architecture improves the performance of WSN, e.g., reduced packet transmission error rate, decreased number of end-to-end hops, and improved efficiency of energy consumption.
Journal ArticleDOI

TruSMS: A trustworthy SMS spam control system based on trust management

TL;DR: TruSMS can control SMS spam from its source to destinations according to trust evaluation by analyzing spam detection behaviors and SMS traffic data and shows that TruSMS is effective with regard to accuracy, efficiency and robustness, which imply its trustworthiness.
Journal ArticleDOI

Editorial: Blockchain in Industrial IoT Applications: Security and Privacy Advances, Challenges, and Opportunities

TL;DR: This special issue presents existing state-of-the-art advances reported by the nine accepted papers and concludes the special issue with a number of potential research agenda.
Patent

Method and apparatus for providing credibility information over an ad-hoc network

TL;DR: In this article, a trust manager receives content from a transmitting node over an ad-hoc network and retrieves one or more trust values associated with the content, the transmitting node, or both, wherein the trust values are assigned by a trust server and further adjusted based on locally collected credibility information.
Journal ArticleDOI

Security Vulnerabilities of SGX and Countermeasures: A Survey

TL;DR: Wang et al. as discussed by the authors proposed two sets of criteria for estimating security risks of existing attacks and evaluating defense effects brought by attack countermeasures, and proposed a taxonomy of SGX security vulnerabilities and shed light on corresponding attack vectors.