Kan Yang
Kan Yang
Assistant Professor in Computer Science, University of Memphis
Verified email at - Homepage
Cited by
Cited by
Blockchain-based decentralized trust management in vehicular networks
Z Yang, K Yang, L Lei, K Zheng, VCM Leung
IEEE Internet of Things Journal 6 (2), 1495-1505, 2018
An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing.
K Yang, X Jia
IEEE Trans. Parallel Distrib. Syst. 24 (9), 1717-1726, 2013
Security and Privacy in Smart City Applications: Challenges and Solutions
K Zhang, J Ni, K Yang, X Liang, J Ren, XS Shen
IEEE Communications Magazine 55 (1), 122-129, 2017
VerifyNet: Secure and Verifiable Federated Learning
G Xu, H Li, S Liu, K Yang, X Lin
IEEE Transactions on Information Forensics and Security 15, 911-926, 2019
DAC-MACS: Effective data access control for multiauthority cloud storage systems
K Yang, X Jia, K Ren, B Zhang, R Xie
IEEE Transactions on Information Forensics and Security 8 (11), 1790-1801, 2013
Big data-driven optimization for mobile networks toward 5G
K Zheng, Z Yang, K Zhang, P Chatzimisios, K Yang, W Xiang
IEEE Network 30 (1), 44-51, 2016
Expressive, efficient, and revocable data access control for multi-authority cloud storage
K Yang, X Jia
IEEE transactions on parallel and distributed systems 25 (7), 1735-1744, 2013
Data storage auditing service in cloud computing: challenges, methods and opportunities
K Yang, X Jia
World Wide Web 15 (4), 409-428, 2012
A blockchain-based reputation system for data credibility assessment in vehicular networks
Z Yang, K Zheng, K Yang, VCM Leung
2017 IEEE 28th Annual International Symposium on Personal, Indoor, and …, 2017
Security and privacy in mobile crowdsourcing networks: challenges and opportunities
K Yang, K Zhang, J Ren, X Shen
IEEE Communications Magazine 53 (8), 75-81, 2015
Attribute-based fine-grained access control with efficient revocation in cloud storage systems
K Yang, X Jia, K Ren
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
Healthdep: An efficient and secure deduplication scheme for cloud-assisted ehealth systems
Y Zhang, C Xu, H Li, K Yang, J Zhou, X Lin
IEEE Transactions on Industrial Informatics 14 (9), 4101-4112, 2018
Enabling efficient and geometric range query with access control over encrypted spatial data
G Xu, H Li, Y Dai, K Yang, X Lin
IEEE Transactions on Information Forensics and Security 14 (4), 870-885, 2018
Attributed-based access control for multi-authority systems in cloud storage
K Yang, X Jia
2012 IEEE 32nd International Conference on Distributed Computing Systems …, 2012
Security and privacy for mobile healthcare networks: from a quality of protection perspective
K Zhang, K Yang, X Liang, Z Su, X Shen, HH Luo
IEEE Wireless Communications 22 (4), 104-112, 2015
Privacy-preserving task recommendation services for crowdsourcing
J Shu, X Jia, K Yang, H Wang
IEEE Transactions on Services Computing 14 (1), 235-247, 2018
Secure and verifiable policy update outsourcing for big data access control in the cloud
K Yang, X Jia, K Ren
IEEE Transactions on Parallel and Distributed Systems 26 (12), 3461-3470, 2014
Querying in internet of things with privacy preserving: Challenges, solutions and opportunities
H Ren, H Li, Y Dai, K Yang, X Lin
IEEE Network 32 (6), 144-151, 2018
An efficient and fine-grained big data access control scheme with privacy-preserving policy
K Yang, Q Han, H Li, K Zheng, Z Su, X Shen
IEEE Internet of Things Journal 4 (2), 563-571, 2017
Time-domain attribute-based access control for cloud-based video content sharing: A cryptographic approach
K Yang, Z Liu, X Jia, XS Shen
IEEE Transactions on Multimedia 18 (5), 940-950, 2016
The system can't perform the operation now. Try again later.
Articles 1–20