CryptoSec Lab
Research Group
- Huan Zhao, Ph.D. Student (Spring 2023 - )
- Meiying Zhang, Ph.D. Student (Fall 2021 - )
- Sheldon Ebron, Ph.D. Student (Fall 2019 - )
- Jamal Mosakheil, Ph.D. Student (Fall 2018 - Fall 2024 (part-time since S23), Intel)
- Shiyu Li, Visiting Scholar (Spring 2023, Ph.D. at University of Virginia)
- Lei Yan, Visiting Ph.D. Student (Fall 2018 - 2020, INSPUR China)
- Senjuti Dutta, M.S. Student (Research Thesis oriented, Graduated in 2020, Ph.D. at University of Tenessee Knoxville)
- Jobin J. Sunny, M.S. Student (Project-oriented, Graduated in 2018, St. Jude Cloud)
Publications (Google Scholar Citations, DBLP, Web of Science, ORCID)
Patent
- US11582024 “Blockchain-based Decentralized Public Key Management System” by
K. Yang and L. Wang, Feb 2023
Preprint
- S. C. Ebron and
K. Yang , "FedTruth: Byzantine-Robust and Backdoor-Resilient Federated Learning Framework", https://arxiv.org/pdf/2311.10248.pdf.
2024
- [C32] S. Li, Y. Zhang, Y. Song, F. Wu, F. Lyu,
K. Yang and Q. Tang, "EpiOracle: Privacy-Preserving Cross-Facility EarlyWarning for Unknown Epidemics". To appear onThe 25th Privacy Enhancing Technologies Symposium (PETS'25) . - [C31] G. Auricchio, H. Clough, C. Ho, K. Bian, C. Dong,
K. Yang and J. Zhang, "A Game Theory Reward Model for Federated Learning with Probabilistic Verification". To appear onthe 6th International Conference on Distributed Artificial Intelligence (DAI’24) . - [C30] M. Zhang, H. Zhao, S.C. Ebron and
K. Yang , "Towards Fair, Robust and Efficient Client Contribution Evaluation in Federated Learning". To appear onProc. of IEEE Global Communications Conference (GLOBECOM’24) , Cape Town, South Africa. - [C29] M. Zhang, H. Zhao, S.C. Ebron, R. Xie and
K. Yang , "Ensuring Fairness in Federated Learning Services: Innovative Approaches to Client Selection, Scheduling, and Rewards". InProc. of the 44th IEEE International Conference on Distributed Computing Systems (ICDCS'24, acceptance rate: 21.9%) , 23 July - 26 July, Jersey City, New Jersey, USA - [C28] J. Mosakheil and
K. Yang . "SilentProof: Anonymous Authentication with Blockchain-backed Offloading". InProc. of 19th ACM ASIA Conference on Computer and Communications Security (AsiaCCS'24, acceptance rate: 21%, , Singapore, July 2024.Best Paper Award ) - [C27] Y. Wang, Y. Zhang, Y. Song, N. Cheng and
K. Yang . "PPoD: Practical Proofs of Dealership for Authorized Data Trading". InProc. of IEEE International Conference on Communications (ICC) , Denver, CO, USA, June 2024. - [C26] X. He, Y. Zhang, Y. Song, N. Cheng and
K. Yang . "STAGE: Secure and Efficient Data Delivery for Exchange-Assisted Data Marketplaces". InProc. of IEEE International Conference on Communications (ICC) , Denver, CO, USA, June 2024.
- [J54] J. Mosakheil and
K. Yang , "PKChain: Compromise-Tolerant and Verifiable Public Key Management System". To appear onIEEE Internet of Things Journal , 2024. - [J53] Y. Shi, K. Fan, Y. Bai, C. Zhang,
K. Yang , H. Li and Y. Yang, "Building Efficient and Flexible Voting Protocols: An Approach to Fairness and Anonymity". To appear onIEEE Internet of Things Journal , 2024. - [J52] S. Li, Y. Zhang, Y. Song, H. Liu, N. Cheng, D. Tao, H. Li and
K. Yang , "Beyond Security: Achieving Fairness in Mailmen-Assisted Timed Data Delivery".IEEE Transactions on Information Forensics and Security , vol. 19, pp. 6425 – 6440, 2024. - [J51] Y. Bi, K. Fan, Z. Zeng,
K. Yang , H. Li and Y. Yang. "Seamless group handover authentication protocol for vehicle networks: Services continuity".Computer Networks , vol. 252, 2024. - [J50] G. Wei, K. Fan, K. Zhang, H. Wang, Y. Wang,
K. Yang , H. Li and Y. Yang. "Lower rounds lattice-based anonymous AKA under the seCK model for the IoT".Peer-to-Peer Networking and Applications , https://doi.org/10.1007/s12083-024-01676-0. - [J49] S. Li, Y. Zhang, Y. Song, N. Cheng,
K. Yang and H. Li. "Blockchain-Based Portable Authenticated Data Transmission for Mobile Edge Computing: A Universally Composable Secure Solution".IEEE Transactions on Computers , vol. 73, no. 4, pp. 1114-1125, 2024. - [J48]
K. Yang , R. Lu, M. Mahmoud and X. Jia. "Guest Editorial Special Issue on Recent Advances of Security, Privacy, and Trust in Mobile Crowdsourcing",IEEE Internet of Things Journal , vol. 11, no. 2, pp. 1784-1787, Jan. 15, 2024, doi: 10.1109/JIOT.2023.3339395. - [J47] K. Fan, W. Li, Y. Bai, Y. Yang,
K. Yang and H. Li. "EIV-BT-ABE: Efficient Attribute-Based Encryption With Black-Box Traceability Based On Encrypted Identity Vector".IEEE Internet of Things Journal , vol. 11, no. 9, pp. 15229-15240, 2024. - [J46] W. Li, K. Fan,
K. Yang , Y. Yang and H. Li. "PBFL: Privacy-preserving and Byzantine-robust Federated Learning Empowered Industry 4.0".IEEE Internet of Things Journal , vol. 11, no. 4, pp. 7128-7140, 2024.
2023
- [J45] Z. Liu, K. Zheng, L. Hou, H. Yang and
K. Yang . "A Novel Blockchain-Assisted Aggregation Scheme for Federated Learning in IoT Networks".IEEE Internet of Things Journal , vol.10, no.9, pp.17544-17556, 2023. - [J44] K. Fan, Z. Shi, Y. Yang, L. Bai, Y. Yang,
K. Yang and H. Li. "Blockchain-based cloud-edge clock calibration in IoT".Peer-to-Peer Networking and Applications . vol 16, pp:1432–1444, 2023. - [J43]
K. Yang , J. Shu and R. Xie. "Efficient and Provably Secure Data Selective Sharing and Acquisition in Cloud-based Systems".IEEE Transactions on Information Forensics and Security , vol. 18, pp. 71-84, 2023, doi: 10.1109/TIFS.2022.3216956. - [J42] J. Shu, T. Yang, X. Liao, F. Chen, Y. Xiao,
K. Yang and X. Jia. "Clustered Federated Multi-Task Learning on Non-IID Data with Enhanced Privacy,"IEEE Internet of Things Journal , vol.10, no.4, pp:3453-3467, 2023.
2022
- [J41] X. Wang, K. Fan,
K. Yang , X. Cheng, Q. Dong, H. Li and Y. Yang, "A new RFID ultra-lightweight authentication protocol for medical privacy protection in smart living". Computer Communications, Elsevier, Feb. 2022. - [J40] A. Yang, J. Weng,
K. Yang , C. Huang and X. Shen, "Delegating Authentication to Edge: A Decentralized Authentication Architecture for Vehicular Networks".IEEE Transactions on Intelligent Transportation Systems , vol. 23, no. 2, pp: 1284-1298, 2022. - [J39] L. Yan,
K. Yang , and S. Yang, "Reputation-based Truth Discovery with Long-term Quality of Source in Internet of Things".IEEE Internet of Things Journal , Vol. 9, no.7, pp. 5410-5421, 2022.
2021
- [C25] L. Yan,
K. Yang , S. Yang and Z. Han, "A Trust-aware Fog Offloading Game with Long-term Trustworthiness of Users". InProc. of 2021 IEEE Global Communications Conference (Globecom'21) , Madrid, Spain, 7-11 December 2021. - [C24]
K. Yang and S. Dutta. "Secure and Efficient Task Matching with Multi-keyword in Multi-requester and Multi-worker Crowdsourcing". InProc. of IEEE/ACM International Symposium on Quality of Service (IWQoS'21) , 25-28 June 2021, Virtual Conference.
- [J38] B. Zhao, K. Fan,
K. Yang , Z. Wang, H. Li and Y. Yang, "Anonymous and Privacy-preserving Federated Learning with Industrial Big Data".IEEE Transactions on Industrial Informatics , vol. 17, no. 9, pp. 5314-6323, 2021. - [J37] H. Yang, R. Su, P. Huang, Y. Bai, K. Fan,
K. Yang , H. Li, and Y. Yang, "PMAB: A Public Mutual Audit Blockchain for Outsourced Data in Cloud Storage",Secure Communication Networks , 2021 - [J36] Y. Zhang, C. Xu, H. Li,
K. Yang , N. Cheng, and X. Shen, "PROTECT: Efficient Password-based Threshold Single-sign-on Authentication for Mobile Users against Perpetual Leakage".IEEE Transactions on Mobile Computing , vol. 20, no. 6, pp. 2297-2312, 2021. - [J35] J. Shu,
K. Yang , X. Jia, X. Liu, C. Wang, and D. Zheng, "Proxy-Free Privacy-Preserving Task Matching with Efficient Revocation in Crowdsourcing".IEEE Transactions on Dependable and Secure Computing , vol. 18, no. 1, pp. 117-130, 2021. - [J34] J. Shu, X. Jia,
K. Yang , and H. Wang, "Privacy-Preserving Task Recommendation Services for Crowdsourcing".IEEE Transactions on Services Computing , vol. 14, no. 1, p. 235-247, 2021.
2020
- [C23] G. Xu, H. Li, H. Ren, J. Sun, S. Xu, J. Ning, H. Yang,
K. Yang , R. Deng. "Secure and Verifiable Inference in Deep Neural Networks". InProc. of 36th Annual Computer Security Applications Conference (ACSAC'20) , Austin, TX, 7-11 December 2020.
- [J33] G. Xu, H. Li, S. Liu,
K. Yang and X. Lin, "VerifyNet: Secure and Verifiable Federated Learning".IEEE Transactions on Information Forensics and Security , vol. 15, pp. 911-926, 2020.(ESI Highly Cited Paper) - [J32] Z. Su, Q. Xu, Q. Zhao, J. Song, W. Shen, Y. Wang, and
K. Yang , "Experience Blocking Ratio Based Game Theoretic Approach for Spectrum Sharing in Heterogeneous Networks".IEEE Transactions on Network Science and Engineering , vol. 7, no. 1, pp. 343-355, 2020.
- [C22] K. Fan, B. Zhao, W. You,
K. Yang , Z. Wang, and H. Li. "A Weight-based k-prototypes Algorithm for Anomaly Detection in Smart Grid". InProc. of IEEE International Conference on Communications (ICC'20) , Dublin, Ireland, 7-11 June 2020.
2019
- [J31] G. Xu, H. Li, H. Ren,
K. Yang and R. H. Deng, "Data Security Issues in Deep Learning: Attacks, Countermeasures, and Opportunities".IEEE Communications Magazine , vol. 57, no. 11, pp. 116-122, Nov 2019. - [J30] K. Fan, S. Wang, Y. Ren,
K. Yang , Z. Yan, H. Li, and Y. Yang, "Blockchain-based Secure Time Protection Scheme in IoT".IEEE Internet of Things Journal , vol. 6, no. 3, pp. 4671-4679, June 2019. - [J29] G. Xu, H. Li, Y. Dai,
K. Yang and X. Lin, "Enabling Efficient and Geometric Range Query with Access Control Over Encrypted Spatial Data". inIEEE Transactions on Information Forensics and Security , vol. 14, no. 4, pp. 870-885, April 2019. - [J28] Z. Yang,
K. Yang , L. Lei, K. Zheng and V. C. M. Leung, "Blockchain-based Decentralized Trust Management in Vehicular Networks".IEEE Internet of Things Journal , vol. 6, no. 2, pp. 1495-1505, April 2019.(2021 IEEE IoTJ Best Paper Award Runner-Up, ESI Highly Cited Paper, Hot Cited Paper) - [J27] J. Shu, X. Liu,
K. Yang , Y. Zhang, X. Jia, R. H. Deng, "SybSub: Privacy-Preserving Expressive Task Subscription With Sybil Detection in Crowdsourcing".IEEE Internet Things Journal . vol. 6, no. 2, pp. 3003-3013, 2019.
2018
- [J26] Y. Zhang, R. H. Deng, J. Shu,
K. Yang , and D. Zheng, "TKSE: Trustworthy Keyword Search Over Encrypted Data With Two-Side Verifiability via Blockchain".IEEE Access , vol. 6, pp. 31077 - 31087, 2018. - [J25] J. Shu, X. Liu, X. Jia,
K. Yang , and R. H. Deng, "Anonymous Privacy-Preserving Task Matching in Crowdsourcing".IEEE Internet of Things Journal , vol. 5, no. 4, pp. 3068-3078, Aug. 2018. - [J24] Y. Zhang, C. Xu, H. Li,
K. Yang , J. Zhou and X. Lin, "HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems".IEEE Transactions on Industrial Informatics , vol. 14, no. 9, pp. 4101-4112, Sept. 2018. - [J23] H. Ren, H. Li, Y. Dai,
K. Yang , and X. Lin, "Querying in Internet of Things with Privacy Preserving: Challenges, Solutions and Opportunities".IEEE Network , vol. 32, no. 6, pp. 144-151, 2018. - [J22] K. Zhang, X. Liang, J. Ni,
K. Yang , and X. Shen. "Exploiting Social Network to Enhance Human-to-Human Infection Analysis Without Privacy Leakage".IEEE Transactions on Dependable and Secure Computing , vol. 15, no. 4, pp. 607-620, 2018.
- [C21] J. Shu, X. Liu,
K. Yang , Y. Zhang, X. Jia, and R. H. Deng. "SybMatch: Sybil Detection for Privacy-Preserving Task Matching in Crowdsourcing". InProc. of IEEE Global Telecommunications Conference (GLOBECOM'18) , Abu Dhabi, United Arab Emirates, December 9-13, 2018. - [C20]
K. Yang , J. Sunny, and L. Wang. "Blockchain-based Decentralized Public Key Management for Named-Data Networks (Invited Paper)". InProc. of The IEEE 27th International Conference on Computer Communications and Networks (ICCCN’18) , Hangzhou, China, July 30 – August 2, 2018.
2017
- [J21] P. Yang, N. Zhang, S. Zhang,
K. Yang , L. Yu, and X. Shen. "Identifying the Most Valuable Workers in Fog-Assisted Spatial Crowdsourcing".IEEE Internet of Things Journal , vol. 4, no. 5, pp. 1193-1203, 2017. - [J20] Q. Xu, Z. Su, and
K. Yang . "Optimal Control Theory Based Epidemic Information Spreading Scheme for Mobile Social Users with Energy Constraint".IEEE Access , vol. 5, pp. 14107-14118, 2017. - [J19] G. Xu, H. Li, C. Tan, D. Liu, Y. Dai and
K. Yang . "Achieving efficient and privacy-preserving truth discovery in crowd sensing systems".Computers & Security (Elsevier) , vol. 69, pp. 114-126, 2017. - [J18]
K. Yang , K. Zhang, X. Jia, A. M. Hasan, and X. Shen. "Privacy-Preserving Attribute-Keyword Based Publish-Subscribe Service on Cloud Platforms".Information Sciences(Elsevier) , vol. 387, Pages 116–131, 2017. - [J17] K. Zhang, J. Ni,
K. Yang , X. Liang, and X. Shen. "Security and Privacy in Smart City Applications: Challenges and Solutions".IEEE Communications Magazine , vol. 55, no. 1, pp. 122-129, 2017.(ESI Highly Cited Paper) - [J16] X. Jin, N. Zhang,
K. Yang , X. Shen, Z. Xu, C. Zhang, and Z. Jin. "PN Ranging Based on Noncommensurate Sampling: Zero-bias Mitigation Methods"IEEE Trans. on Aerospace and Electronic Systems , vol. 53, no. 2, pp. 926-940, 2017. - [J15]
K. Yang , Q. Han, H. Li, K. Zheng, Z. Su, and X. Shen. "An Efficient and Fine-grained Big Data Access Control Scheme with Privacy-preserving Policy".IEEE Internet of Things Journal , vol. 4, no. 2, pp. 536-571, 2017.
- [C19] Z. Yang, K. Zheng,
K. Yang and V. C.M. Leung. "A Blockchain-based Reputation System for Data Credibility Assessment in Vehicular Networks". InProc. of IEEE PIMRC 2017 Special Session SP-05 on "5G Wireless Technologies for V2X Communications" , Montreal, QC, Canada, October 8-13, 2017. - [C18] G. Xu, Y. Ren, H. Li, D. Liu, Y. Dai and
K. Yang . "CryptMDB: A Practical Encrypted MongoDB over Big Data". InProc. of International Conference on Communications (ICC'17) , Paris, France, May, 2017. - [C17] Q. Xu, Z. Su, Q.Zhao, J. Song, W. Shen, Y. Wang and
K. Yang . "QoE Loss Probability Based Game-Theoretic Approach for Spectrum Sharing in Heterogeneous Networks". InProc. of International Conference on Communications (ICC'17) , Paris, France, May, 2017.
2016
- [J14] J. Ren, Y. Zhang, Q. Ye,
K. Yang , K. Zhang, and X. Shen. "Exploiting Secure Collaborative Spectrum Sensing for Cognitive Radio Sensor Networks".IEEE Trans. on Wireless Communications , vol. 15, no. 10, 6813-6827, 2016. - [J13] L. Lei, Y. Kuang,
K. Yang , J. Qiao, X. Shen and Z. Zhong. "Optimal Reliability in Energy Harvesting Industrial Wireless Sensor Networks".IEEE Trans. on Wireless Communications , vol. 15, no. 8, pp.5399-5413, 2016. - [J12]
K. Yang , Z. Liu, X. Jia and X. Shen. "Time-domain Attribute-based Access Control for Cloud-based Video Content Sharing: A Cryptographic Approach".IEEE Trans. on Multimedia . vol. 18, no. 5, pp. 940-950, 2016. - [J11] K. Zheng, Z. Yang, K. Zhang, P. Chatzimisios, W. Xiang and
K. Yang . "Big Data Driven Optimization for Mobile Networks towards 5G".IEEE Network . vol. 30, no. 1, pp. 44-51, 2016.(ESI Highly Cited Paper) - [J10] B. Zhang, X. Jia,
K. Yang and R. Xie. "Design of Analytical Model and Algorithm for Optimal Roadside AP Placement in VANETs".IEEE Trans. on Vehicular Technology . vol. 65, no. 9, pp.7708-7718.
- [B2]
K. Yang , X. Jia and X. Shen. "Privacy-preserving Data Access Control in the Smart Grid".Cyber Security for Industrial Control Systems: from the viewpoint of close-loop . Peng Cheng, Heng Zhang and Jiming Chen (Eds.), CRC, 2016.
2015
- [J9]
K. Yang , K. Zhang, J. Ren and X. Shen. "Security and Privacy in Mobile Crowdsourcing Networks: Challenges and Opportunities".IEEE Communications Magazine . vol. 53, no. 8, pp. 75-81, 2015. - [J8] K. Zhang,
K. Yang , X. Liang, Z. Su, X. Shen and H. H. Luo. "Security and Privacy for Mobile Healthcare Networks: From Quality-of-Service Perspective".IEEE Wireless Communications . vol. 22, no. 4, pp. 104-112, 2015. - [J7]
K. Yang , X. Jia and K. Ren. "Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud".IEEE Trans. on Parallel and Distributed Systems . vol. 26, no. 12, pp. 3461-3470, 2015. - [J6] J. Wang, C. Huang,
K. Yang , J. Wang, X. Wang and X. Chen. "MAVP-FE: Multi-authority vector policy functional encryption with efficient encryption and decryption".China Communications . vol. 12, no. 6, pp. 126-140, 2015.
- [C16] Z. Su, Q. Xu, K. Zhang,
K. Yang and X. Shen. "Dynamic Bandwidth Allocation in Mobile Social Networks with Multiple Homing Access". InProc. of International Conference on Wireless Communications & Signal Processing (WCSP'15) , Nanjing Jiangsu, China, Oct. 2015. - [C15] K. He, C. Huang,
K. Yang and J. Shi. "Identity-Preserving Public Auditing for Shared Cloud Data". InProc. of the 23rd IEEE International Symposium on Quality of Service (IWQoS'15) , pp. 159-164, Portland, OR, USA, June 2015. - [C14] K. Zhang, X. Liang, R. Ru,
K. Yang and X. Shen. "Exploiting Mobile Social Behaviors for Sybil Detection". InProc. of the 34th IEEE International Conference on Computer Communications (INFOCOM'15) , pp. 271-279, Hong Kong, April 2015. - [C13] D. Wang, X. Jia, C. Wang,
K. Yang , S. Fu and M. Xu. "Generalized Pattern Matching String Search on Encrypted Data in Cloud Systems". InProc. of the 34th IEEE International Conference on Computer Communications (INFOCOM'15) , pp. 2101-2109, Hong Kong, April 2015.
2014
- [B1]
K. Yang and X. Jia. "Security for Cloud Storage Systems".Springer Briefs in Computer Science , ISBN 978-1-4614-7872-0, pp. i-xi, 1-83, 2013.This monograph was reviewed and recommended in June's ACM Computing Reviews!
- [J5]
K. Yang and X. Jia. "Expressive, Efficient and Revocable Data Access Control for Multi-Authority Cloud Storage".IEEE Trans. on Parallel and Distributed Systems , vol. 25, no. 7, pp. 1735-1744, 2014.
- [C12]
K. Yang , X. Jia, K. Ren, R. Xie and L. Huang. "Enabling Efficient Access Control with Dynamic Policy Updating for Big Data in the Cloud". InProc. of the 33rd IEEE International Conference on Computer Communications (INFOCOM'14) , pp. 2013-2021, Toronto, Canada, 2014.
2013
- [J4]
K. Yang , X. Jia et al. "DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems".IEEE Trans. on Information Forensics and Security , vol. 8, no. 11, pp. 1790-1801, 2013. - [J3]
K. Yang and X. Jia. "An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing".IEEE Trans. on Parallel and Distributed Systems , vol. 24, no. 9, pp. 1717-1726,September 2013.(ESI Highly Cited Paper)
- [C11]
K. Yang , X. Jia, K. Ren and B. Zhang. "DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems". InProc. of the 32nd IEEE International Conference on Computer Communications (INFOCOM'13) , pp. 2995-3003, Turin, Italy, 2013. - [C10]
K. Yang , X. Jia and K. Ren. "Attribute-based Fine-Grained Access Control with Efficient Revocation in Cloud Storage Systems". InProc. of the 8th ACM Symposium on Information, Computer and Communications Security (AsiaCCS'13) , pp. 523-528, Hangzhou, China, 2013. - [C9] B. Zhang, X. Jia,
K. Yang and R. Xie. "Multi-path Routing and Stream Scheduling with Spatial Multiplexing and Interference Cancellation in MIMO Networks". InProc. of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS'13 Workshops) , pp. 256-261, Philadelphia, USA, 2013. - [C8] R. Xie, X. Jia,
K. Yang and B. Zhang. "Energy Saving Virtual Machine Allocation in Cloud Computing". InProc. of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS'13 Workshops) , pp. 256-261, Philadelphia, USA, 2013.
2012
- [J2]
K. Yang and X. Jia. "Data Storage Auditing Service in Cloud Computing: Challenges, Methods and Opportunities".World Wide Web , vol. 15, no. 4, pp. 409-428, July 2012.(Notable Paper in Computing Review Best of 2012 )
- [C7]
K. Yang and X. Jia. "Attributed-based Access Control for Multi-authority Systems in Cloud Storage". InProc. of the 32nd International Conference on Distributed Computing Systems (ICDCS'12) , pp. 536-545, Macau, 2012.
2010
- [C6]
K. Yang , X. Jia, B. Zhang and Z. Zheng. "Threshold Key Redistribution for Dynamic Change of Authentication Group in Wireless Mesh Networks". InProc. of IEEE Global Telecommunications Conference (GLOBECOM'10) , pp. 1-5, Miami, FL, 2010. - [C5] B. Zhang, Z. Zheng, X. Jia and
K. Yang . "A Distributed Collaborative Relay Protocol for Multi-hop WLAN". InProc. of IEEE Global Telecommunications Conference (GLOBECOM'10) , pp. 1-5, Miami, FL, 2010. - [C4] Z. Zheng, B. Zhang, X. Jia, J. Zhang,
K. Yang . "Minimum AP Placement for WLAN Adaptation using Physical Interference Model". InProc. of IEEE Global Telecommunications Conference (GLOBECOM'10) , pp. 1-5, Miami, FL, 2010.
Before 2009 (Undergraduate Work)
- [J1]
K. Yang , L. Huang, W. Yang and F. Song. "Quantum Teleportation via GHZ-like State".International Journal of Theoretical Physics . vol. 48, no. 2, pp. 516-521, February 2009.
- [C3] Y. Wang,
K. Yang , L. Huang and X. Fu, "Level Control Maintenance of Temporal Consistency in Wireless Sensor Networks". InProc. of Intl. Conf. on Power Electronic and Intelligent Transportation System , pp. 295-300, 2009. - [C2] F. Song, L. Huang, W. Yang and
K. Yang . "Building QKD Networks Based On a Novel QKD Scheme". InProc. of 2008 IEEE International Conference on Networking, Sensing and Control , pp.596-601, 2008. - [C1]
K. Yang , L. Huang and W. Yang. "Quantum User Authentication with Nonentangled-based QKD Protocol". InProc. of 2007 International Conference on Convergence Information Technology (ICCIT'07) , vol. 136, pp.1969-1973, 2007.
Note: Downloadable papers HERE are under copyright protection. Please abide by all applicable copyright laws!