default search action
Ayong Ye
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Qiuling Chen, Ayong Ye, Guohua Ye, Chuan Huang:
Wearing myopia glasses on GANs: Mitigating bias for pre-trained Generative Adversarial Networks via online prior perturbation. Appl. Soft Comput. 166: 112133 (2024) - [j19]Jiaomei Zhang, Ayong Ye, Jianwei Chen, Yuexin Zhang, Wenjie Yang:
CSFL: Cooperative Security Aware Federated Learning Model Using The Blockchain. Comput. J. 67(4): 1298-1308 (2024) - [j18]Yamei Wang, Weijing You, Yuexin Zhang, Ayong Ye, Li Xu:
Cloud EMRs auditing with decentralized (t, n)-threshold ownership transfer. Cybersecur. 7(1): 53 (2024) - [j17]Yiqing Diao, Ayong Ye, Yuexin Zhang, Ji Zhang, Li Xu:
P-Chain: Towards privacy-aware smart contract using SMPC. J. Inf. Secur. Appl. 86: 103872 (2024) - [j16]Qiuling Chen, Ayong Ye, Yuexin Zhang, Jianwei Chen, Chuan Huang:
An intra-class distribution-focused generative adversarial network approach for imbalanced tabular data learning. Int. J. Mach. Learn. Cybern. 15(7): 2551-2572 (2024) - [j15]Qiuling Chen, Ayong Ye, Yuexin Zhang, Jianwei Chen, Chuan Huang:
Information-Minimizing Generative Adversarial Network for Fair Generation and Classification. Neural Process. Lett. 56(1): 36 (2024) - [c15]Yanni Liu, Ayong Ye, Yuanhuang Liu, Wenting Lu:
Few-Shot Malware Classification using Malware Variant and Model Augmentation. NaNA 2024: 399-404 - 2023
- [j14]Qiuling Chen, Ayong Ye, Ziwen Zhao, Jinbo Xiong:
The dummy-based trajectory privacy protection method to resist correlation attacks in Internet of Vehicles. Concurr. Comput. Pract. Exp. 35(19) (2023) - [j13]Qiuling Chen, Ayong Ye, Baorong Cheng, Chuan Huang:
Service-Splitting-Based Privacy Protection Mechanism for Proximity Detection Supporting High Utility. IEEE Trans. Comput. Soc. Syst. 10(1): 192-203 (2023) - [j12]Yuexin Zhang, Fengjuan Zhou, Xinyi Huang, Li Xu, Ayong Ye:
Key Extraction Using Ambient Sounds for Smart Devices. ACM Trans. Sens. Networks 19(1): 16:1-16:20 (2023) - [c14]Chengling Wang, Yunru Ma, Yuexin Zhang, Ayong Ye, Li Xu:
A Continuous Authentication Scheme for Digital Therapeutics Using Denoising Autoencoder. ICCNS 2023: 12-18 - [c13]Qiuling Chen, Ayong Ye, Fengyu Wu, Huang Zhang:
Leverage Generative Adversarial Network for Enhancing Fairness and Utility. NaNA 2023: 508-513 - 2022
- [c12]Jiaomei Zhang, Ayong Ye, Zhiqiang Yao, Minghui Sun:
A Fair Federated Learning Framework based on Clustering. NaNA 2022: 477-482 - 2021
- [j11]Ayong Ye, Lingyu Meng, Jiaomei Zhang, Yiqing Diao:
A new -map mechanism for mobility traces privacy. Concurr. Comput. Pract. Exp. 33(6) (2021) - [j10]Ayong Ye, Junlin Jin, Zhijiang Yang, Ziwen Zhao, Lingyu Meng:
Evolutionary game analysis on competition strategy choice of application providers. Concurr. Comput. Pract. Exp. 33(8) (2021) - 2020
- [j9]Ayong Ye, Qing Li, Qiang Zhang, Baorong Cheng:
Detection of Spoofing Attacks in WLAN-Based Positioning Systems Using WiFi Hotspot Tags. IEEE Access 8: 39768-39780 (2020) - [j8]Ayong Ye, Qiang Zhang, Yiqing Diao, Jiaomei Zhang, Huina Deng, Baorong Cheng:
A Semantic-Based Approach for Privacy-Preserving in Trajectory Publishing. IEEE Access 8: 184965-184975 (2020) - [c11]Yiqing Diao, Ayong Ye, Baorong Cheng, Jiaomei Zhang, Qiang Zhang:
A Dummy-Based Privacy Protection Scheme for Location-Based Services under Spatiotemporal Correlation. NaNA 2020: 443-447
2010 – 2019
- 2019
- [j7]Ayong Ye, Xiaoliang Yang, Qing Li, Aimin Chen:
A novel adaptive radio map for RSS-based indoor positioning. Concurr. Comput. Pract. Exp. 31(23) (2019) - [c10]Ayong Ye, Jianfei Shao, Yiqing Diao, Lingyu Meng, Jiaomei Zhang, Li Xu:
Indoor Fingerprinting Positioning Based on the Least Anticipation Loss. ISPA/BDCloud/SocialCom/SustainCom 2019: 468-475 - [c9]Ziwen Zhao, Ayong Ye, Lingyu Meng, Qiang Zhang:
Pseudonym Changing for Vehicles in VANETs: A Game-Theoretic Analysis Based Approach. NaNA 2019: 70-74 - 2018
- [j6]Ayong Ye, Qiuling Chen, Li Xu, Wei Wu:
The flexible and privacy-preserving proximity detection in mobile social network. Future Gener. Comput. Syst. 79: 271-283 (2018) - [j5]Ayong Ye, Jianfei Shao, Li Xu, Jianwei Chen, Jinbo Xiong:
Local HMM for indoor positioning based on fingerprinting and displacement ranging. IET Commun. 12(10): 1163-1170 (2018) - 2017
- [j4]Ayong Ye, Yacheng Li, Li Xu:
A novel location privacy-preserving scheme based on l-queries for continuous LBS. Comput. Commun. 98: 1-10 (2017) - [c8]Qing Li, Ayong Ye, Li Xu:
A Defense Mechanism Against Location Cheating Attack in Social Network. DSC 2017: 549-553 - [c7]Ayong Ye, Yacheng Li, Li Xu, Qing Li, Hui Lin:
A Trajectory Privacy-Preserving Algorithm Based on Road Networks in Continuous Location-Based Services. TrustCom/BigDataSE/ICESS 2017: 510-516 - [c6]Rong Ma, Jinbo Xiong, Mingwei Lin, Zhiqiang Yao, Hui Lin, Ayong Ye:
Privacy Protection-Oriented Mobile Crowdsensing Analysis Based on Game Theory. TrustCom/BigDataSE/ICESS 2017: 990-995 - [c5]Ayong Ye, Qiuling Chen, Li Xu:
Private and Flexible Proximity Detection Based on Geohash. VTC Spring 2017: 1-5 - 2016
- [j3]Ayong Ye, Jianfei Sao, Qi Jian:
A robust location fingerprint based on differential signal strength and dynamic linear interpolation. Secur. Commun. Networks 9(16): 3618-3626 (2016) - [c4]Jun Ren, Zhiqiang Yao, Jinbo Xiong, Yuanyuan Zhang, Ayong Ye:
A Secure Data Deduplication Scheme Based on Differential Privacy. ICPADS 2016: 1241-1246 - [c3]Qiuling Chen, Ayong Ye, Li Xu:
A privacy-preserving Proximity Detection Method in social network. ICC 2016 2016: 68:1-68:6 - 2013
- [j2]Ayong Ye, Yuanjing Ling, Li Xu, Xiaoliang Yang:
An Improved RFID-Based Localization Algorithm for Wireless Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - 2012
- [c2]Jinfa Zhong, Li Xu, Haifeng Hu, Ayong Ye:
A Secure DV-Hop Localization Algorithm Based on Secure Beacon Nodes. CWSN 2012: 715-724
2000 – 2009
- 2009
- [j1]Ayong Ye, Jianfeng Ma, Xiaohong Jiang, Susumu Horiguchi:
Robust Node Positioning in Wireless Sensor Networks. IEICE Trans. Commun. 92-B(6): 2023-2031 (2009) - 2006
- [c1]Li Xu, Zhiwei Lin, Ayong Ye:
Analysis and Countermeasure of Selfish Node Problem in Mobile Ad Hoc Network. CSCWD 2006: 1027-1030
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint