scispace - formally typeset
Z

Zheng Yan

Researcher at Shanghai Jiao Tong University

Publications -  490
Citations -  12887

Zheng Yan is an academic researcher from Shanghai Jiao Tong University. The author has contributed to research in topics: Computer science & Cloud computing. The author has an hindex of 47, co-authored 420 publications receiving 8786 citations. Previous affiliations of Zheng Yan include Helsinki University of Technology & Huawei.

Papers
More filters
Journal ArticleDOI

Flexible data access control in D2D communications

TL;DR: This scheme realizes secure data communications among mobile devices under the legacy system model of Long-Term Evolution (LTE).
Patent

Virtual private network based on root-trust module computing platforms

Peng Zhang, +1 more
TL;DR: In this paper, a root-trust-based virtual private network (VPN) system is described, which includes a plurality of terminals, services and servers, part or all of which are root trust module based platforms.
Journal ArticleDOI

Lightweighted Secure Searching Over Public-Key Ciphertexts for Edge-Cloud-Assisted Industrial IoT Devices

TL;DR: This article proposes a lightweight-designed scheme called edge-aided searchable public-key encryption (ESPE), which allows IIoT devices to delegate their costly cryptographic operations to the nearby edge for fast computing and guarantees that all outsourced ciphertexts are semantically secure.
Journal ArticleDOI

2D Federated Learning for Personalized Human Activity Recognition in Cyber-Physical-Social Systems

TL;DR: A 2-Dimensional Federated Learning (2DFL) framework is designed to cope with the insufficient training data and insecure data sharing issues in CPSS during a secure distributed learning process, and demonstrates the usefulness and effectiveness of the proposed model in achieving faster and smoother convergence.
Journal ArticleDOI

Privacy protection in mobile crowd sensing: a survey

TL;DR: This paper targets the privacy issues of MCS and conducts a comprehensive literature research on it by providing a thorough survey, and classify the privacy protection schemes into four categories with regard to identity privacy, data privacy, attribute privacy, and task privacy.