Journal Papers (Peer-reviewed, *: Corresponding Author)
Qianyue Qu, Yuanyu Zhang* and Shoji Kasahara, Analysis of Eavesdropping Region in Hybrid mmWave-Microwave Wireless Systems, Wireless Communications and Mobile Computing, vol. 2023, article ID 3178335.
Huihui Wu, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang and Tarik Taleb, Achieving Covertness and Secrecy: The Interplay Between Detection and Eavesdropping Attacks, IEEE Internet of Things, Early Access.
Yuanyu Zhang, Zhumeng Zheng, Ji He, Shuangrui Zhao, Qianyue Qu, Yulong Shen and Xiaohong Jiang, Opportunistic Wiretapping/Jamming: A New Attack Model in Millimeter-Wave Wireless Networks, IEEE Transactions on Wireless Communications, Available online 16 May 2023.
Wei Tong, Xuewen Dong, Yulong Shen, Yuanyu Zhang, Xiaohong Jiang and Wensheng Tian, CHChain: Secure and parallel crowdsourcing driven by hybrid blockchain, Future Generation Computer Systems, Available online 7 February 2022.
Yuanyu Zhang, Yulong Shen*, Xiaohong Jiang and Shoji Kasahara, Secure millimeter-wave ad hoc communications using physical layer security, IEEE Transactions on Information Forensics and Security, vol. 17, pp. 99-114, 2022, doi: 10.1109/TIFS.2021.3054507 (WOS:000736739100001).
Masahiro Sasabe, Masanari Yamamoto, Yuanyu Zhang, Shoji Kasahara, Block diffusion delay attack and its countermeasures in a Bitcoin network, International Journal of Network Management, accepted on 7th October, 2021 (WOS:000713587600001).
Takeaki Matsunaga, Yuanyu Zhang, Masahiro Sasabe and Shoji Kasahara, An Incentivization Mechanism with Validator Voting Profile in Proof-of-Stake-Based Blockchain, IEICE Transactions on Communications, accepted on 20 July, 2021.
Xuening Liao, Zhenqiang Wu, Yuanyu Zhang* and Xiaohong Jiang, Trust-Aware Buffer-Aided Relay Selection for Secure Communications in Cooperative Wireless Networks, Computer Networks, vol. 199, article no. 108456, 9 November 2021 (WOS:000702870600008).
Yuanyu Zhang*, Ruka Nakanishi, Masahiro Sasabe and Shoji Kasahara, Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things, vol. 21, no. 15, article no.5053, Sensors, July 26, 2021 (WOS:000682318200001).
Xuewen Dong, Yuanyu Zhang*, Yuanxiong Guo, Yanmin Gong, Yulong Shen and Jianfeng Ma, PRAM: a Practical Sybil-Proof Auction Mechanism for Dynamic Spectrum Access with Untruthful Attackers, IEEE Transactions on Mobile Computing, accepted on 11th June, 2021.
Xuening Liao, Zhenqiang Wu, Yuanyu Zhang* and Xiaohong Jiang, Buffer-Aided Relay Selection for Secure Communication in Two-Hop Wireless Networks with Limited Packet Lifetime, Ad Hoc Networks, vol. 121, article no. 102580, 1 October 2021. (WOS:000694870500002).
Kentaro Fujita, Yuanyu Zhang*, Masahiro Sasabe and Shoji Kasahara, Mining Pool Selection under Block WithHolding Attack, Applied Sciences, vol. 11, no. 4, article no. 1617, Feb. 3, 2021. (WOS:000632142400001)
Xiaochen Li, Yuanyu Zhang*, Yulong Shen and Xiaohong Jiang, Secrecy transmission capacity in mobile ad hoc networks with security-aware aloha protocol, IET Communications, vol. 14, no. 22, pp. 4135-4141, Dec. 2020. (WOS:000633000300022)
Yuanyu Zhang*, Yutaka Mirei, Masahiro Sasabe and Shoji Kasahara, Attribute-based access control for smart cities: A smart contract-driven framework, IEEE Internet of Things Journal, vol. 8, no. 8, pp. 6372-6384, 15 April 2021 (WOS:000638402100022).
Yuta Nakamura, Yuanyu Zhang*, Masahiro Sasabe and Shoji Kasahara, Exploiting smart contracts for capability-based access control in the internet of things, Sensors, vol. 20, no. 6, article no. 1793, 24 March 2020. (WOS:000529139700251)
Huihui Wu*, Yuanyu Zhang, Xuening Liao, Yulong Shen and Xiaohong Jiang, On covert throughput performance of two-way relay covert wireless communications, Wireless Networks, vol. 26, no.5, pp. 3275–3289, January 2020. (WOS:000508717000002)
Xuening Liao, Yuanyu Zhang*, Zhenqiang Wu and Xiaohong Jiang, Buffer-aided relay selection for secure two-hop wireless networks with decode-and-forward relays and a diversity-combining eavesdropper, Ad Hoc Networks, vol. 98, 102039, March 2020. (WOS:000513987100008)
Yuanyu Zhang, Shoji Kasahara, Yulong Shen*, Xiaohong Jiang and Jianxiong Wan, Smart contract-based access control for the internet of things, IEEE Internet of Things Journal, vol. 6, no. 2, pp. 1594-1605, April 2019. (WOS:000467564700032, ESI Highly Cited Paper)
Yuanyu Zhang, Yulong Shen*, Xiaohong Jiang and Shoji Kasahara, Mode selection and spectrum partition for D2D inband communications: A physical layer security perspective, IEEE Transactions on Communications, vol. 67, no. 1, pp. 623-638, Jan. 2019. (WOS:000457304400048)
Yuanyu Zhang*, Yulong Shen* and Xiaohong Jiang, Friendship-based cooperative jamming for secure communication in poisson networks, Wireless Networks, vol. 25, pp. 4077-4095, 2019. (WOS:000511331200026)
Yuanyu Zhang*, Yulong Shen, Hua Wang, Yanchun Zhang and Xiaohong Jiang, On secure wireless communications for service oriented computing, IEEE Transactions on Services Computing, vol. 11, no. 2, pp. 318-328, 2018. (WOS:000429798800009)
Xuening Liao, Yuanyu Zhang, Zhenqiang Wu, Yulong Shen, Xiaohong Jiang and Hiroshi Inamura, On security-delay trade-off in two-hop wireless networks with buffer-aided relay selection, IEEE Transactions on Wireless Communications, vol. 17, no. 3, pp. 1893-1906, March 2018. (WOS:000427226500035)
Xiaochen Li, Yuanyu Zhang*, Shuangrui Zhao, Yulong Shen and Xiaohong Jiang, Exact secrecy throughput capacity study in mobile ad hoc networks, Ad Hoc Networks, vol. 72, pp. 105-114, April 2018. (WOS:000427337100009)
Jianxiong Wan, Xiang Gui, Shoji Kasahara, Yuanyu Zhang, and Ran Zhang, Air flow measurement and management for improving cooling and energy efficiency in raised-floor data centers: A survey, in IEEE Access, vol. 6, pp. 48867-48901, 2018. (WOS:000445467900001)
Yuanyu Zhang, Yulong Shen*, Hua Wang and Xiaohong Jiang, On secure wireless communications for IoT under eavesdropper collusion, IEEE Transactions on Automation Science and Engineering, vol. 13, no. 3, pp. 1281-1293, 2016. (WOS:000380028300006)
Yuanyu Zhang*, Yulong Shen*, Jinxiao Zhu and Xiaohong Jiang, Eavesdropper-tolerance capability in two-hop wireless networks via cooperative jamming, Ad Hoc & Sensor Wireless Networks 29(1-4): 113-131 (2015). (WOS:000364500200006)
Yulong Shen, Yuanyu Zhang*, Transmission protocol for secure big data in two-hop wireless networks with cooperative jamming, Information Sciences, 281: 201-210 (2014). (WOS:000340315600013)
Yulong Shen, Yuanyu Zhang, Exploring relay cooperation for secure and reliable transmission in two-hop wireless networks, EAI Endorsed Trans. Scalable Information Systems 1(2): e2 (2014)
International Conference Papers (Peer-reviewed)
Siyu Zhu, Yuanyu Zhang, Jinxiao Zhu, Yin Chen, Yulong Shen and Xiaohong Jiang, 3D Convolution-Based Radio Frequency Fingerprinting for Satellite Authentication, IEEE GLOBECOM 2023, accepted.
Haiyang Wang, Yuanyu Zhang, Jinxiao Zhu, Yin Chen, Yulong Shen and Xiaohong Jiang, Novel Replay Attacks Against Galileo Open Service Navigation Message Authentication, ION GNSS+ 2023, accepted.
Yuanyu Zhang*, Ji He, Qianyue Qu and Zhiwei Zhang, Wiretapping or Jamming: On Eavesdropper Attacking Strategy in mmWave Ad Hoc Networks, NaNA 2021, accepted. (Best Paper Award)
Wiraatmaja Christopher, Yuanyu Zhang*, Masahiro Sasabe and Shoji Kasahara, Cost-Efficient Blockchain-Based Access Control for the Internet of Things, IEEE GLOBECOM 2021, accepted.
Kentaro Fujita, Yuanyu Zhang*, Masahiro Sasabe and Shoji Kasahara, Intelligent Mining Pool Selection in the Case of Unobservable Block Withholding Attack, 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2021), accepted on Feb. 18, 2021.
Takeaki Matsunaga, Yuanyu Zhang, Masahiro Sasabe and Shoji Kasahara, Reward and Penalty Mechanism in Proof-of-Stake Consensus Algorithm for Blockchain, 2020 International Conference on Emerging Technologies for Communications (ICETC2020). (Student Presentation Award).
Qianyue Qu, Yuanyu Zhang* and Shoji Kasahara, On Eavesdropper Region Characterization in Hybrid Wireless Communications, 2020 International Conference on Networking and Network Applications (NaNA2020), accepted on 13 Sep. 2020.
Kentaro Fujita, Yuanyu Zhang*, Masahiro Sasabe and Shoji Kasahara, Mining Pool Selection Problem in the Presence of Block Withholding Attack, 3rd IEEE international conference on blockchain (Blockchain 2020), pp. 321-326, Dec. 2020 (Short paper, acceptance rate: 24.9%).
Ruka Nakanishi, Yuanyu Zhang*, Masahiro Sasabe and Shoji Kasahara, IOTA-based access control framework for the Internet of Things, Proceedings of 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), Paris, France, September 28-30, 2020, pp. 87-95, doi: 10.1109/BRAINS49436.2020.9223293.
Mirei Yutaka, Yuanyu Zhang*, Masahiro Sasabe and Shoji Kasahara, Using ethereum blockchain for distributed attribute-based access control in the internet of things, IEEE GLOBECOM 2019, 9-13 December 2019. (WOS:000552238605094)
Yuta Nakamura, Yuanyu Zhang*, Masahiro Sasabe and Shoji Kasahara, Capability-based access control for the internet of things: An ethereum blockchain-based scheme, IEEE GLOBECOM 2019, 9-13 December. 2019. (WOS:000552238601062)
Xuening Liao, Yuanyu Zhang, Bo Liu and Zhenqiang Wu, Secure communication in two-hop buffer-aided networks with limited packet lifetime, 2019 International Conference on Networking and Network Applications (NaNA2019), 29 Jul. Daegu, South Korea, 2019.
Xuening Liao, Zhenqiang Wu, Yuanyu Zhang and Xiaohong Jiang, The delay-security trade-off in two-hop buffer-aided relay wireless network, 2016 International Conference on Networking and Network Applications (NaNA2016), pp. 173-177, Hakodate, Japan, 2016. (WOS:000389237400033)
Xiaochen Li, Shuangrui Zhao, Yuanyu Zhang, Yulong Shen and Xiaohong Jiang, Exact secrecy throughput of manets with guard zone, 2016 International Conference on Networking and Network Applications (NaNA2016), pp. 167-172, Hakodate, Japan, 2016. (WOS:000389237400032)
Ji He, Yuanyu Zhang, Yulong Shen and Xiaohong Jiang, Link selection for secure two-hop transmissions in buffer-aided relay wireless networks, 2016 International Conference on Networking and Network Applications (NaNA2016), pp. 64-68, Hakodate, Japan, 2016. (WOS:000389237400012)
Pinchang Zhang, Yuanyu Zhang and Bin Yang, Optimal relay-destination pair selection mechanism for secure communications in wireless cooperative relay networks, 2016 International Conference on Networking and Network Applications (NaNA2016), pp. 84-89, Hakodate, Japan, 2016. (WOS:000389237400016)
Bo Liu, Yuanyu Zhang, Xiaohong Jiang, and Zhenqiang Wu, An energy-efficient data collection scheme in body area nanonetworks, 2015 Third International Symposium on Computing and Networking (CANDAR2015), pp. 240-245. 2015. (WOS:000399160300034)
Yuanyu Zhang, Yulong Shen, Yuezhi Zhou, and Xiaohong Jiang, Eavesdropper-tolerance capability of two-hop wireless networks with cooperative jamming and opportunistic relaying, The 9th FTRA International Conference on Future Information Technology (FutureTech2014), vol. 309, pp. 145-150, 2014.
Yuanyu Zhang, Yulong Shen and Xiaohong Jiang, Eavesdropper tolerance capability study in two-hop cooperative wireless networks, 2nd IEEE/CIC International Conference on Communications in China (ICCC2013), pp. 219–223, Xi'an, China, 2013. (WOS:000334936200040)
Books and Monographs
Yulong Shen, Yuanyu Zhang*, Xiaohong Jiang, Secrecy, Covertness and Authentication in Wireless Communications, Wireless Networks Book Series, Springer Publisher, September, 2023
Others
Yoshiro Minamoto, Yuanyu Zhang, Masahiro Sasabe, Shoji Kasahara, “Reputation-Based Reward Distribution Mechanism for Blockchain-Based Scientific Paper Publishing Systems,” 電子情報通信学会技術研究報告, vol. 120, no. 413, pp. 287-292, 2021.3.5.
藤田 健太郎, 張 元玉, 笹部 昌弘, 笠原 正治, “Block Withholding Attackが存在する場合のマイニングプール選択問題,” 電子情報通信学会技術研究報告, vol. 119, no. 460, pp. 71-76, 2020.3.5.
豊 美玲, 張 元玉, 笹部 昌弘, 笠原 正治, “Ethereumブロックチェーンを用いたIoT向け分散型属性ベース・アクセス制御方式のコスト評価,” 電子情報通信学会技術研究報告, vol. 119, no. 460, pp. 77-82, 2020.3.5.
山本 将成, 笹部 昌弘, 張 元玉, 笠原 正治, “ビットコインネットワークにおけるブロック拡散妨害攻撃への対抗策 ~ 推定ダウンロード速度に基づくブロック取得先選択 ~,” 電子情報通信学会技術研究報告, vol. 119, no. 460, pp. 83-88, 2020.3.5.
中西 瑠海, 張 元玉, 笹部 昌弘, 笠原 正治, “IOTAに基づいたIoTアクセス制御方式の設計と実装,” 電子情報通信学会技術研究報告, vol. 119, no. 460, pp. 295-300, 2020.3.6.
豊 美鈴, 張 元玉, 笹部 昌弘, 笠原 正治, “IoTのための柔軟な分散型属性ベース・アクセス制御の実現 ~ Ethereumブロックチェーンベースのフレームワーク ~,” 電子情報通信学会技術研究報告, vol. 118, no. 465, pp. 343-348, 2019.3.4.
中村 優太, 張 元玉, 笹部 昌弘, 笠原 正治, “IoTに向けたEthereumブロックチェーンを用いたCapability-Based Access Controlの実装 ~ アクションレベルでのCapabilityの構築 ~,” 電子情報通信学会技術研究報告, vol. 118, no. 465, pp. 349-354, 2019.3.4
豊 美鈴, 張 元玉, 笹部 昌弘, 笠原 正治, “Ethereumブロックチェーンを用いたIoTのための属性ベース・アクセス制御の実現,” インターネット技術第 163 委員会 (ITRC) 新世代ネットワーク構築のための基盤技術研究分科会 (NWGN) ワークショップ, 2019.9.19.
中村 優太, 張 元玉, 笹部 昌弘, 笠原 正治, “IoTに向けたEthereumブロック・チェーンを用いたCapability-Based Access Control,” インターネット技術第 163 委員会 (ITRC) 新世代ネットワーク構築のための基盤技術研究分科会 (NWGN) ワークショップ, 2019.9.20.