scispace - formally typeset
Z

Zheng Yan

Researcher at Shanghai Jiao Tong University

Publications -  490
Citations -  12887

Zheng Yan is an academic researcher from Shanghai Jiao Tong University. The author has contributed to research in topics: Computer science & Cloud computing. The author has an hindex of 47, co-authored 420 publications receiving 8786 citations. Previous affiliations of Zheng Yan include Helsinki University of Technology & Huawei.

Papers
More filters
Journal ArticleDOI

Passivity and passification of memristor-based recurrent neural networks with time-varying delays.

TL;DR: This paper presents new theoretical results on the passivity and passification of a class of memristor-based recurrent neural networks (MRNNs) with time-varying delays, and two procedures for designing passification controllers are proposed, which guarantee that MRNNs withTime-varies delays are passive.
Journal ArticleDOI

A survey on dynamic mobile malware detection

TL;DR: This paper introduces the definition, evolution, classification, and security threats of mobile malware, and compares, analyze, and comment on existing mobile malware detection methods proposed in recent years based on evaluation criteria and measures.
Journal ArticleDOI

A Survey on Security in D2D Communications

TL;DR: This paper explores a security architecture for D2D communications under the framework of 3GPP LTE, and investigates potential security threats and specify security requirements accordingly.
Journal ArticleDOI

A Collective Neurodynamic Approach to Constrained Global Optimization

TL;DR: It is proved in the framework of stochastic optimization that the proposed collective neurodynamic approach is capable of computing the global optimal solutions with probability one provided that a sufficiently large number of neural networks are utilized.
Journal ArticleDOI

Privacy preservation in permissionless blockchain: A survey

TL;DR: The specific characteristics of permissionless blockchain are analyzed, the potential privacy threats are summarized, the existing privacy preservation technologies are carefully surveyed and evaluated based on the proposed evaluation criteria.