default search action
Yu-an Tan 0001
Person information
- affiliation: Beijing Institute of Technology, School of Computer Science and Technology, China
Other persons with the same name
- Yu-an Tan (aka: Yu-An Tan, Yuan Tan, YuAn Tan) — disambiguation page
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j68]Jiaxing Li, Yu-An Tan, Xinyu Liu, Weizhi Meng, Yuanzhang Li:
Interpretable adversarial example detection via high-level concept activation vector. Comput. Secur. 150: 104218 (2025) - 2024
- [j67]Jingci Zhang, Jun Zheng, Zheng Zhang, Tian Chen, Yu-an Tan, Quanxin Zhang, Yuanzhang Li:
ATT&CK-based Advanced Persistent Threat attacks risk propagation assessment model for zero trust networks. Comput. Networks 245: 110376 (2024) - [j66]Zheng Zhang, Jingfeng Xue, Thar Baker, Tian Chen, Yu-an Tan, Yuanzhang Li:
COVER: Enhancing virtualization obfuscation through dynamic scheduling using flash controller-based secure module. Comput. Secur. 146: 104038 (2024) - [j65]Yuexuan Ma, Xiao Yu, Li Zhang, Zhao Li, Yuanzhang Li, Yu-an Tan:
Dynamic fuzz testing of UAV configuration parameters based on dual guidance of fitness and coverage. Connect. Sci. 36(1) (2024) - [j64]Haoran Lyu, Yajie Wang, Yu-An Tan, Huipeng Zhou, Yuhang Zhao, Quanxin Zhang:
Maxwell's Demon in MLP-Mixer: towards transferable adversarial attacks. Cybersecur. 7(1): 6 (2024) - [j63]Chen Liang, Guoyu Wang, Ning Li, Zuo Wang, Weihong Zeng, Fu-an Xiao, Yu-An Tan, Yuanzhang Li:
Accelerating page loads via streamlining JavaScript engine for distributed learning. Inf. Sci. 675: 120713 (2024) - [j62]Tian Chen, Yu-An Tan, Zheng Zhang, Nan Luo, Bin Li, Yuanzhang Li:
Dataflow optimization with layer-wise design variables estimation method for enflame CNN accelerators. J. Parallel Distributed Comput. 189: 104869 (2024) - [j61]Huipeng Zhou, Yajie Wang, Yu-an Tan, Shangbo Wu, Yuhang Zhao, Quanxin Zhang, Yuanzhang Li:
Crafting Transferable Adversarial Examples Against Face Recognition via Gradient Eroding. IEEE Trans. Artif. Intell. 5(1): 412-419 (2024) - [c29]Shangbo Wu, Yu-an Tan, Yajie Wang, Ruinan Ma, Wencong Ma, Yuanzhang Li:
Towards Transferable Adversarial Attacks with Centralized Perturbation. AAAI 2024: 6109-6116 - [c28]Jiapeng Wang, Zhihan Zheng, Kefan Qiu, Yu-an Tan, Chen Liang, Wenjuan Li:
A Framework for BMC Firmware Vulnerability Analysis and Exploitation. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2024: 9-16 - 2023
- [j60]Jie Yang, Jun Zheng, Thar Baker, Shuai Tang, Yu-an Tan, Quanxin Zhang:
Clean-label poisoning attacks on federated learning for IoT. Expert Syst. J. Knowl. Eng. 40(5) (2023) - [j59]Wenjun Song, Mengqi Liu, Thar Baker, Qikun Zhang, Yu-an Tan:
A group key exchange and secure data sharing based on privacy protection for federated learning in edge-cloud collaborative computing environment. Int. J. Netw. Manag. 33(5) (2023) - [j58]Yaoyuan Zhang, Yu-an Tan, Haipeng Sun, Yuhang Zhao, Quanxin Zhang, Yuanzhang Li:
Improving the invisibility of adversarial examples with perceptually adaptive perturbation. Inf. Sci. 635: 126-137 (2023) - [j57]Yaoyuan Zhang, Yu-an Tan, Mingfeng Lu, Lu Liu, Dianxin Wang, Quanxin Zhang, Yuanzhang Li:
Towards interpreting vulnerability of object detection models via adversarial distillation. J. Inf. Secur. Appl. 72: 103410 (2023) - [j56]Haipeng Sun, Yu-an Tan, Liang Zhu, Qikun Zhang, Shan Ai, Jun Zheng:
A blockchain-based access control protocol for secure resource sharing with mobile edge-cloud collaboration. J. Ambient Intell. Humaniz. Comput. 14(10): 13661-13672 (2023) - [j55]Jie Yang, Jun Zheng, Haochen Wang, Jiaxing Li, Haipeng Sun, Weifeng Han, Nan Jiang, Yu-An Tan:
Edge-Cloud Collaborative Defense against Backdoor Attacks in Federated Learning. Sensors 23(3): 1052 (2023) - [j54]Yajie Wang, Kongyang Chen, Yu-an Tan, Shuxin Huang, Wencong Ma, Yuanzhang Li:
Stealthy and Flexible Trojan in Deep Learning Framework. IEEE Trans. Dependable Secur. Comput. 20(3): 1789-1798 (2023) - [j53]Yajie Wang, Yu-an Tan, Thar Baker, Neeraj Kumar, Quanxin Zhang:
Deep Fusion: Crafting Transferable Adversarial Examples and Improving Robustness of Industrial Artificial Intelligence of Things. IEEE Trans. Ind. Informatics 19(6): 7480-7488 (2023) - [j52]Chen Liang, Thar Baker, Yuanzhang Li, Raheel Nawaz, Yu-an Tan:
Building Covert Timing Channel of the IoT-Enabled MTS Based on Multi-Stage Verification. IEEE Trans. Intell. Transp. Syst. 24(2): 2578-2595 (2023) - [c27]Yuexuan Ma, Xiao Yu, Yuanzhang Li, Li Zhang, Yifei Yan, Yu-an Tan:
Fuzz Testing of UAV Configurations Based on Evolutionary Algorithm. BlockTEA 2023: 41-56 - [c26]Xiao Yu, Zhao Li, Xu Qiao, Yu-an Tan, Yuanzhang Li, Li Zhang:
A Stealth Security Hardening Method Based on SSD Firmware Function Extension. ICONIP (9) 2023: 362-375 - [c25]Yujie Ma, Haokai Wu, Yu-an Tan, Yuanzhang Li:
Research on Evasion and Detection of Malicious JavaScript Code. ML4CS 2023: 104-130 - [i11]Xinrui Liu, Yu-an Tan, Yajie Wang, Kefan Qiu, Yuanzhang Li:
Stealthy Low-frequency Backdoor Attack against Deep Neural Networks. CoRR abs/2305.09677 (2023) - [i10]Xinrui Liu, Yajie Wang, Yu-An Tan, Kefan Qiu, Yuanzhang Li:
Towards Invisible Backdoor Attacks in the Frequency Domain against Deep Neural Networks. CoRR abs/2305.10596 (2023) - [i9]Ruinan Ma, Canjie Zhu, Mingfeng Lu, Yunjie Li, Yu-An Tan, Ruibin Zhang, Ran Tao:
Concealed Electronic Countermeasures of Radar Signal with Adversarial Examples. CoRR abs/2310.08292 (2023) - [i8]Ruinan Ma, Yu-an Tan, Shangbo Wu, Tian Chen, Yajie Wang, Yuanzhang Li:
Unified High-binding Watermark for Unconditional Image Generation Models. CoRR abs/2310.09479 (2023) - [i7]Shangbo Wu, Yu-an Tan, Yajie Wang, Ruinan Ma, Wencong Ma, Yuanzhang Li:
Towards Transferable Adversarial Attacks with Centralized Perturbation. CoRR abs/2312.06199 (2023) - 2022
- [j51]Haipeng Sun, Yu-an Tan, Liang Zhu, Qikun Zhang, Yuanzhang Li, Shangbo Wu:
A fine-grained and traceable multidomain secure data-sharing model for intelligent terminals in edge-cloud collaboration scenarios. Int. J. Intell. Syst. 37(3): 2543-2566 (2022) - [j50]Yaoyuan Zhang, Yu-an Tan, Mingfeng Lu, Tian Chen, Yuanzhang Li, Quanxin Zhang:
Boosting cross-task adversarial attack with random blur. Int. J. Intell. Syst. 37(10): 8139-8154 (2022) - [j49]Yajie Wang, Yu-an Tan, Haoran Lyu, Shangbo Wu, Yuhang Zhao, Yuanzhang Li:
Toward feature space adversarial attack in the frequency domain. Int. J. Intell. Syst. 37(12): 11019-11036 (2022) - [c24]Yaoyuan Zhang, Yu-an Tan, Mingfeng Lu, Lu Liu, Quanxin Zhang, Yuanzhang Li, Dianxin Wang:
Towards Interpreting Vulnerability of Object Detection Models via Adversarial Distillation. ACNS Workshops 2022: 53-65 - [c23]Yaoyuan Zhang, Yu-an Tan, Tian Chen, Xinrui Liu, Quanxin Zhang, Yuanzhang Li:
Enhancing the Transferability of Adversarial Examples with Random Patch. IJCAI 2022: 1672-1678 - [c22]Yucheng Shi, Yahong Han, Yu-an Tan, Xiaohui Kuang:
Decision-based Black-box Attack Against Vision Transformers via Patch-wise Adversarial Removal. NeurIPS 2022 - [i6]Haoran Lyu, Yajie Wang, Yu-an Tan, Huipeng Zhou, Yuhang Zhao, Quanxin Zhang:
Boosting Adversarial Transferability of MLP-Mixer. CoRR abs/2204.12204 (2022) - [i5]Huipeng Zhou, Yu-an Tan, Yajie Wang, Haoran Lyu, Shangbo Wu, Yuanzhang Li:
Improving the Transferability of Adversarial Examples with Restructure Embedded Patches. CoRR abs/2204.12680 (2022) - [i4]Shuhao Li, Yajie Wang, Yuanzhang Li, Yu-an Tan:
l-Leaks: Membership Inference Attacks with Logits. CoRR abs/2205.06469 (2022) - [i3]Nan Luo, Yuanzhang Li, Yajie Wang, Shangbo Wu, Yu-An Tan, Quanxin Zhang:
Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers. CoRR abs/2206.04881 (2022) - 2021
- [j48]Nan Zhang, Yu-an Tan, Chen Yang, Yuanzhang Li:
Deep learning feature exploration for Android malware detection. Appl. Soft Comput. 102: 107069 (2021) - [j47]Qikun Zhang, Yongjiao Li, Ruifang Wang, Lu Liu, Yu-an Tan, Jingjing Hu:
Data security sharing model based on privacy protection for blockchain-enabled industrial Internet of Things. Int. J. Intell. Syst. 36(1): 94-111 (2021) - [j46]Nan Zhang, Jingfeng Xue, Yuxi Ma, Ruyun Zhang, Tiancai Liang, Yu-an Tan:
Hybrid sequence-based Android malware detection using natural language processing. Int. J. Intell. Syst. 36(10): 5770-5784 (2021) - [j45]Yajie Wang, Haoran Lv, Xiaohui Kuang, Gang Zhao, Yu-an Tan, Quanxin Zhang, Jingjing Hu:
Towards a physical-world adversarial patch for blinding object detection models. Inf. Sci. 556: 459-471 (2021) - [j44]Yutian Zhou, Yu-an Tan, Quanxin Zhang, Xiaohui Kuang, Yahong Han, Jingjing Hu:
An Evolutionary-Based Black-Box Attack to Deep Neural Network Classifiers. Mob. Networks Appl. 26(4): 1616-1629 (2021) - [c21]Yuan Xue, Shouxin Wang, Tian Chen, Quanxin Zhang, Lu Liu, Yu-an Tan:
On-line Firmware Updating and Fingerprint Generating for Solid State Disks. DMBD (2) 2021: 28-36 - [c20]Xinrui Liu, Xiao Yu, Zhibin Zhang, Quanxin Zhang, Yuanzhang Li, Yu-an Tan:
A Random Multi-target Backdooring Attack on Deep Neural Networks. DMBD (2) 2021: 45-52 - [c19]Xiaoyao Tong, Yuxi Ma, Yuan Xue, Quanxin Zhang, Yuanzhang Li, Yu-an Tan:
Anti Intelligent Mine Unmanned Ground Vehicle Based on Reinforcement Learning. DMBD (2) 2021: 61-68 - [c18]Ke Li, Yuan Xue, Yujie Shao, Bing Su, Yu-an Tan, Jingjing Hu:
Software Misconfiguration Troubleshooting Based on State Analysis. DSC 2021: 361-366 - [c17]Zhiwei Shi, Tian Chen, Yuan Xue, Yuanzhang Li, Quanxin Zhang, Yu-an Tan, Jingjing Hu:
Code Decoupling Execution Isolating Based on TF Card Firmware Extension. DSC 2021: 403-408 - [c16]Yajie Wang, Shangbo Wu, Wenyi Jiang, Shengang Hao, Yu-an Tan, Quanxin Zhang:
Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity. IJCAI 2021: 3125-3133 - [i2]Yajie Wang, Shangbo Wu, Wenyi Jiang, Shengang Hao, Yu-an Tan, Quanxin Zhang:
Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity. CoRR abs/2107.01396 (2021) - 2020
- [j43]Yuanzhang Li, Yaxiao Wang, Ye Wang, Lishan Ke, Yu-an Tan:
A feature-vector generative adversarial network for evading PDF malware classifiers. Inf. Sci. 523: 38-48 (2020) - [j42]Yajie Wang, Yu-an Tan, Wenjiao Zhang, Yuhang Zhao, Xiaohui Kuang:
An adversarial attack on DNN-based black-box object detectors. J. Netw. Comput. Appl. 161: 102634 (2020) - [j41]Yu-an Tan, Shuo Feng, Xiaochun Cheng, Yuanzhang Li, Jun Zheng:
An Android Inline Hooking Framework for the Securing Transmitted Data. Sensors 20(15): 4201 (2020) - [j40]Yuanzhang Li, Xiaosong Zhang, Xinting Xu, Yu-an Tan:
A Robust Packet-Dropout Covert Channel over Wireless Networks. IEEE Wirel. Commun. 27(3): 60-65 (2020) - [c15]Haitao Zhang, Fan Jia, Quanxin Zhang, Yahong Han, Xiaohui Kuang, Yu-an Tan:
Two-Way Feature-Aligned And Attention-Rectified Adversarial Training. ICME 2020: 1-6 - [c14]Shuo Feng, Yu-an Tan, Gang Zhao, Xiaohui Kuang, Xiao Yu, Juan Wang:
A VirtualXposed-Based Inline Hooking Framework for Android Native Methods. SocialSec 2020: 245-253
2010 – 2019
- 2019
- [j39]Yuanzhang Li, Shangjun Yao, Kai Yang, Yu-an Tan, Quan-Xin Zhang:
A High-Imperceptibility and Histogram-Shifting Data Hiding Scheme for JPEG Images. IEEE Access 7: 73573-73582 (2019) - [j38]Fang Yan, Xi Yang, Jiamou Liu, Hengliang Tang, Yu-an Tan, Yuanzhang Li:
Optimizing the restoration performance of deduplication systems through an energy-saving data layout. Ann. des Télécommunications 74(7-8): 461-471 (2019) - [j37]Chuan Zhao, Shengnan Zhao, Minghao Zhao, Zhenxiang Chen, Chong-Zhi Gao, Hongwei Li, Yu-an Tan:
Secure Multi-Party Computation: Theory, practice and applications. Inf. Sci. 476: 357-372 (2019) - [j36]Feng Guo, Qingjie Zhao, Xuan Li, Xiaohui Kuang, Jianwei Zhang, Yahong Han, Yu-an Tan:
Detecting adversarial examples via prediction difference for deep neural networks. Inf. Sci. 501: 182-192 (2019) - [j35]Xiao Yu, Yu-an Tan, Zhizhuo Sun, Jingyu Liu, Chen Liang, Quanxin Zhang:
A fault-tolerant and energy-efficient continuous data protection system. J. Ambient Intell. Humaniz. Comput. 10(8): 2945-2954 (2019) - [j34]Xiaosong Zhang, Liehuang Zhu, Xianmin Wang, Changyou Zhang, Hongfei Zhu, Yu-an Tan:
A packet-reordering covert channel over VoLTE voice and video traffics. J. Netw. Comput. Appl. 126: 29-38 (2019) - [j33]Xianmin Wang, Jing Li, Xiaohui Kuang, Yu-an Tan, Jin Li:
The security of machine learning in an adversarial setting: A survey. J. Parallel Distributed Comput. 130: 12-23 (2019) - [j32]Quan-Xin Zhang, Hanxiao Gong, Xiaosong Zhang, Chen Liang, Yu-an Tan:
A sensitive network jitter measurement for covert timing channels over interactive traffic. Multim. Tools Appl. 78(3): 3493-3509 (2019) - 2018
- [j31]Xiaosong Zhang, Yu-an Tan, Chen Liang, Yuanzhang Li, Jin Li:
A Covert Channel Over VoLTE via Adjusting Silence Periods. IEEE Access 6: 9292-9302 (2018) - [j30]Qikun Zhang, Yong Gan, Quan-Xin Zhang, Ruifang Wang, Yu-an Tan:
A Dynamic and Cross-Domain Authentication Asymmetric Group Key Agreement in Telemedicine Application. IEEE Access 6: 24064-24074 (2018) - [j29]Jiamin Zheng, Yu-an Tan, Qikun Zhang, Xiaosong Zhang, Liehuang Zhu, Quan-Xin Zhang:
Cross-cluster asymmetric group key agreement for wireless sensor networks. Sci. China Inf. Sci. 61(4): 048103:1-048103:3 (2018) - [j28]Yu-an Tan, Xinting Xu, Chen Liang, Xiaosong Zhang, Quan-Xin Zhang, Yuanzhang Li:
An end-to-end covert channel via packet dropout for mobile networks. Int. J. Distributed Sens. Networks 14(5) (2018) - [j27]Yuan Xue, Yu-an Tan, Chen Liang, Yuanzhang Li, Jun Zheng, Quan-Xin Zhang:
RootAgency: A digital signature-based root privilege management agency for cloud terminal devices. Inf. Sci. 444: 36-50 (2018) - [j26]Xiaosong Zhang, Chen Liang, Quan-Xin Zhang, Yuanzhang Li, Jun Zheng, Yu-an Tan:
Building covert timing channels by packet rearrangement over mobile networks. Inf. Sci. 445-446: 66-78 (2018) - [j25]Chen Liang, Xianmin Wang, Xiaosong Zhang, Yu Zhang, Kashif Sharif, Yu-an Tan:
A payload-dependent packet rearranging covert channel for mobile VoIP traffic. Inf. Sci. 465: 162-173 (2018) - [j24]Yu-an Tan, Yuan Xue, Chen Liang, Jun Zheng, Quan-Xin Zhang, Jiamin Zheng, Yuanzhang Li:
A root privilege management scheme with revocable authorization for Android devices. J. Netw. Comput. Appl. 107: 69-82 (2018) - [j23]Chen Liang, Yu-an Tan, Xiaosong Zhang, Xianmin Wang, Jun Zheng, Quan-Xin Zhang:
Building packet length covert channel over mobile VoIP traffics. J. Netw. Comput. Appl. 118: 144-153 (2018) - [j22]Xiao Yu, Changyou Zhang, Yuan Xue, Hongfei Zhu, Yuanzhang Li, Yu-an Tan:
An extra-parity energy saving data layout for video surveillance. Multim. Tools Appl. 77(4): 4563-4583 (2018) - [j21]Xiaosong Zhang, Yu-an Tan, Changyou Zhang, Yuan Xue, Yuanzhang Li, Jun Zheng:
A code protection scheme by process memory relocation for android devices. Multim. Tools Appl. 77(9): 11137-11157 (2018) - [j20]Hongfei Zhu, Yu-an Tan, Liehuang Zhu, Xianmin Wang, Quan-Xin Zhang, Yuanzhang Li:
An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks. Sensors 18(5): 1663 (2018) - [j19]Yuan Xue, Yu-an Tan, Chen Liang, Changyou Zhang, Jun Zheng:
An optimized data hiding scheme for Deflate codes. Soft Comput. 22(13): 4445-4455 (2018) - [j18]Zhizhuo Sun, Quan-Xin Zhang, Yuanzhang Li, Yu-an Tan:
DPPDL: A Dynamic Partial-Parallel Data Layout for Green Video Surveillance Storage. IEEE Trans. Circuits Syst. Video Technol. 28(1): 193-205 (2018) - [j17]Yu-an Tan, Xiaosong Zhang, Kashif Sharif, Chen Liang, Quan-Xin Zhang, Yuanzhang Li:
Covert Timing Channels for IoT over Mobile Networks. IEEE Wirel. Commun. 25(6): 38-44 (2018) - [j16]Hongfei Zhu, Yu-an Tan, Liehuang Zhu, Quan-Xin Zhang, Yuanzhang Li:
An Efficient Identity-Based Proxy Blind Signature for Semioffline Services. Wirel. Commun. Mob. Comput. 2018: 5401890:1-5401890:9 (2018) - [c13]Jiajia Sun, Jinbao Gao, Yu-an Tan, Yu Zhang, Xiao Yu:
A Java Code Protection Scheme via Dynamic Recovering Runtime Instructions. ICA3PP (4) 2018: 260-269 - 2017
- [j15]Xiaosong Zhang, Yu-an Tan, Yuan Xue, Quan-Xin Zhang, Yuanzhang Li, Can Zhang, Jun Zheng:
Cryptographic key protection against FROST for mobile devices. Clust. Comput. 20(3): 2393-2402 (2017) - [j14]Hongfei Zhu, Yu-an Tan, Xiaosong Zhang, Liehuang Zhu, Changyou Zhang, Jun Zheng:
A round-optimal lattice-based blind signature scheme for cloud services. Future Gener. Comput. Syst. 73: 106-114 (2017) - [j13]Ruijin Zhu, Baofeng Zhang, Junjie Mao, Quan-Xin Zhang, Yu-an Tan:
A methodology for determining the image base of ARM-based industrial control system firmware. Int. J. Crit. Infrastructure Prot. 16: 26-35 (2017) - [c12]Jiamin Zheng, Yu-an Tan, Xiaosong Zhang, Chen Liang, Changyou Zhang, Jun Zheng:
An Anti-Forensics Method against Memory Acquiring for Android Devices. CSE/EUC (1) 2017: 214-218 - 2016
- [j12]Ruijin Zhu, Yu-an Tan, Quan-Xin Zhang, Yuanzhang Li, Jun Zheng:
Determining image base of firmware for ARM devices by matching literal pools. Digit. Investig. 16: 19-28 (2016) - [j11]Ruijin Zhu, Yu-an Tan, Quan-Xin Zhang, Fei Wu, Jun Zheng, Yuan Xue:
Determining Image Base of Firmware Files for ARM Devices. IEICE Trans. Inf. Syst. 99-D(2): 351-359 (2016) - 2015
- [j10]Li Zhang, Shen-Gang Hao, Jun Zheng, Yu-an Tan, Quan-xin Zhang, Yuan-zhang Li:
Descrambling data on solid-state disks by reverse-engineering the firmware. Digit. Investig. 12: 77-87 (2015) - [j9]Cong Guo, Zijian Zhang, Liehuang Zhu, Yu-an Tan, Zhen Yang:
Scalable protocol for cross-domain group password-based authenticated key exchange. Frontiers Comput. Sci. 9(1): 157-169 (2015) - [j8]Ping Bai, Kang Sheng, Yuanzhang Li, Yu-an Tan, Xiao Yu:
Research on Bluetooth protocols based on Android kernel log. Int. J. Comput. Sci. Math. 6(1): 78-87 (2015) - [j7]Xiao Yu, Tong-Sheng Ju, Quan-Xin Zhang, Yuanzhang Li, Yu-an Tan:
Tuner and demodulator design of antenna control system. Int. J. Wirel. Mob. Comput. 8(2): 141-146 (2015) - 2014
- [j6]Chang Liu, Liehuang Zhu, Mingzhong Wang, Yu-an Tan:
Search pattern leakage in searchable encryption: Attacks and new construction. Inf. Sci. 265: 176-188 (2014) - [j5]Zhizhuo Sun, Yu-an Tan, Yuanzhang Li:
An energy-efficient storage for video surveillance. Multim. Tools Appl. 73(1): 151-167 (2014) - 2013
- [j4]Xiao Yu, Yuanzhang Li, Qinggang Liang, Xiu-Mei Ding, Hong-Liang Chen, Yi-Hao Liu, Kai Fan, Yu-an Tan:
Design of satellite TV antenna control system for car carrying. Int. J. Wirel. Mob. Comput. 6(4): 412-418 (2013) - [c11]Bernard Ntirenganya, Zijian Zhang, Liehuang Zhu, Yu-an Tan, Zhen Yang, Cong Guo:
Enhanced Privacy Preserving Pattern-Code Based Data Aggregation in Wireless Sensor Networks. MSN 2013: 336-341 - [i1]Chang Liu, Liehuang Zhu, Mingzhong Wang, Yu-an Tan:
Search Pattern Leakage in Searchable Encryption: Attacks and New Constructions. IACR Cryptol. ePrint Arch. 2013: 163 (2013) - 2012
- [j3]Li Zhang, Yu-an Tan, Qikun Zhang:
Identification of NAND flash ECC algorithms in mobile devices. Digit. Investig. 9(1): 34-48 (2012) - [c10]Li Zhang, Wenming Wang, Yu-an Tan, Xunhu Sun, Zhi Sun, Yang Yang:
Design and Implementation of a Fine-Grained NAND Flash Programmer. PDCAT 2012: 257-261 - [c9]Fang Yan, Yu-An Tan, Qinggang Liang, Ningning Xing, Yaolei Wang, Xiang Zhang:
Energy Aware Data Layout for De-duplication System. PDCAT 2012: 511-516 - 2011
- [j2]Qikun Zhang, Jun Zheng, Yu-an Tan, Ruifang Wang, Yuanzhang Li:
Cross-domain Authentication Alliance Protocol Based on Isomorphic Groups. J. Comput. 6(4): 650-656 (2011) - [j1]Fang Yan, Yu-An Tan:
A Method of Object-based De-duplication. J. Networks 6(12): 1705-1712 (2011) - [c8]Chang Liu, Liehuang Zhu, Longyijia Li, Yu-an Tan:
Fuzzy keyword search on encrypted cloud storage data with small index. CCIS 2011: 269-273 - [c7]Jun Zheng, Yu-an Tan, Qikun Zhang, Xin Sun, Yichun Chen:
An Improved Cross-Domain Role-Based Authorization Management Model. ICAIC (4) 2011: 526-537 - [c6]Jun Zheng, Yu-an Tan, Qikun Zhang, Chunxiao Gao, Siyuan Wang:
A RBAC Model Based on Multi-granularities of Time Constraints. ICAIC (4) 2011: 538-549 - 2010
- [c5]Jingyu Liu, Yu-an Tan, Yuanzhang Li, Xuelan Zhang, Zexiang Zhou:
A Method of Deduplication for Data Remote Backup. CCTA (1) 2010: 68-75
2000 – 2009
- 2009
- [c4]Zuo Wang, Feng Shi, Qi Zuo, Weixing Ji, Jiaxin Li, Ning Deng, Licheng Xue, Yu-An Tan, Baojun Qiao:
Group-caching for NoC based multicore cache coherent systems. DATE 2009: 755-760 - 2007
- [c3]Yu-An Tan, Zuo Wang, Xu-Bo Wu:
A Collaborative Teaching Approach Using Integrated Electronic Environments for Information Security. International Conference on Computational Science (3) 2007: 567-570 - [c2]Yu-An Tan, Zuo Wang, Qi Luo:
Research on Customer Classification in E-Supermarket by Using Modified Fuzzy Neural Networks. ISNN (2) 2007: 301-306 - 2006
- [c1]Yu-An Tan, Xin-Hua Zhang, Li-Ning Xing, Xuelan Zhang, Shu-Wu Wang:
An Improved Multi-agent Approach for Solving Large Traveling Salesman Problem. PRIMA 2006: 351-361
Coauthor Index
aka: Yuan-zhang Li
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 19:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint