Journal Papers (Peer-reviewed, *: Corresponding Author)
Qianyue Qu, Yuanyu Zhang* and Shoji Kasahara, Analysis of Eavesdropping Region in Hybrid mmWave-Microwave Wireless Systems, Wireless Communications and Mobile Computing, vol. 2023, article ID 3178335.
Huihui Wu, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang and Tarik Taleb, Achieving Covertness and Secrecy: The Interplay Between Detection and Eavesdropping Attacks, IEEE Internet of Things, Early Access.
Yuanyu Zhang, Zhumeng Zheng, Ji He, Shuangrui Zhao, Qianyue Qu, Yulong Shen and Xiaohong Jiang, Opportunistic Wiretapping/Jamming: A New Attack Model in Millimeter-Wave Wireless Networks, IEEE Transactions on Wireless Communications, Available online 16 May 2023.
Wei Tong, Xuewen Dong, Yulong Shen, Yuanyu Zhang, Xiaohong Jiang and Wensheng Tian, CHChain: Secure and parallel crowdsourcing driven by hybrid blockchain, Future Generation Computer Systems, Available online 7 February 2022.
Yuanyu Zhang, Yulong Shen*, Xiaohong Jiang and Shoji Kasahara, Secure millimeter-wave ad hoc communications using physical layer security, IEEE Transactions on Information Forensics and Security, vol. 17, pp. 99-114, 2022, doi: 10.1109/TIFS.2021.3054507 (WOS:000736739100001).
Masahiro Sasabe, Masanari Yamamoto, Yuanyu Zhang, Shoji Kasahara, Block diffusion delay attack and its countermeasures in a Bitcoin network, International Journal of Network Management, accepted on 7th October, 2021 (WOS:000713587600001).
Takeaki Matsunaga, Yuanyu Zhang, Masahiro Sasabe and Shoji Kasahara, An Incentivization Mechanism with Validator Voting Profile in Proof-of-Stake-Based Blockchain, IEICE Transactions on Communications, accepted on 20 July, 2021.
Xuening Liao, Zhenqiang Wu, Yuanyu Zhang* and Xiaohong Jiang, Trust-Aware Buffer-Aided Relay Selection for Secure Communications in Cooperative Wireless Networks, Computer Networks, vol. 199, article no. 108456, 9 November 2021 (WOS:000702870600008).
Yuanyu Zhang*, Ruka Nakanishi, Masahiro Sasabe and Shoji Kasahara, Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things, vol. 21, no. 15, article no.5053, Sensors, July 26, 2021 (WOS:000682318200001).
Xuewen Dong, Yuanyu Zhang*, Yuanxiong Guo, Yanmin Gong, Yulong Shen and Jianfeng Ma, PRAM: a Practical Sybil-Proof Auction Mechanism for Dynamic Spectrum Access with Untruthful Attackers, IEEE Transactions on Mobile Computing, accepted on 11th June, 2021.
Xuening Liao, Zhenqiang Wu, Yuanyu Zhang* and Xiaohong Jiang, Buffer-Aided Relay Selection for Secure Communication in Two-Hop Wireless Networks with Limited Packet Lifetime, Ad Hoc Networks, vol. 121, article no. 102580, 1 October 2021. (WOS:000694870500002).
Kentaro Fujita, Yuanyu Zhang*, Masahiro Sasabe and Shoji Kasahara, Mining Pool Selection under Block WithHolding Attack, Applied Sciences, vol. 11, no. 4, article no. 1617, Feb. 3, 2021. (WOS:000632142400001)
Xiaochen Li, Yuanyu Zhang*, Yulong Shen and Xiaohong Jiang, Secrecy transmission capacity in mobile ad hoc networks with security-aware aloha protocol, IET Communications, vol. 14, no. 22, pp. 4135-4141, Dec. 2020. (WOS:000633000300022)
Yuanyu Zhang*, Yutaka Mirei, Masahiro Sasabe and Shoji Kasahara, Attribute-based access control for smart cities: A smart contract-driven framework, IEEE Internet of Things Journal, vol. 8, no. 8, pp. 6372-6384, 15 April 2021 (WOS:000638402100022).
Yuta Nakamura, Yuanyu Zhang*, Masahiro Sasabe and Shoji Kasahara, Exploiting smart contracts for capability-based access control in the internet of things, Sensors, vol. 20, no. 6, article no. 1793, 24 March 2020. (WOS:000529139700251)
Huihui Wu*, Yuanyu Zhang, Xuening Liao, Yulong Shen and Xiaohong Jiang, On covert throughput performance of two-way relay covert wireless communications, Wireless Networks, vol. 26, no.5, pp. 3275–3289, January 2020. (WOS:000508717000002)
Xuening Liao, Yuanyu Zhang*, Zhenqiang Wu and Xiaohong Jiang, Buffer-aided relay selection for secure two-hop wireless networks with decode-and-forward relays and a diversity-combining eavesdropper, Ad Hoc Networks, vol. 98, 102039, March 2020. (WOS:000513987100008)
Yuanyu Zhang, Shoji Kasahara, Yulong Shen*, Xiaohong Jiang and Jianxiong Wan, Smart contract-based access control for the internet of things, IEEE Internet of Things Journal, vol. 6, no. 2, pp. 1594-1605, April 2019. (WOS:000467564700032, ESI Highly Cited Paper)
Yuanyu Zhang, Yulong Shen*, Xiaohong Jiang and Shoji Kasahara, Mode selection and spectrum partition for D2D inband communications: A physical layer security perspective, IEEE Transactions on Communications, vol. 67, no. 1, pp. 623-638, Jan. 2019. (WOS:000457304400048)
Yuanyu Zhang*, Yulong Shen* and Xiaohong Jiang, Friendship-based cooperative jamming for secure communication in poisson networks, Wireless Networks, vol. 25, pp. 4077-4095, 2019. (WOS:000511331200026)
Yuanyu Zhang*, Yulong Shen, Hua Wang, Yanchun Zhang and Xiaohong Jiang, On secure wireless communications for service oriented computing, IEEE Transactions on Services Computing, vol. 11, no. 2, pp. 318-328, 2018. (WOS:000429798800009)
Xuening Liao, Yuanyu Zhang, Zhenqiang Wu, Yulong Shen, Xiaohong Jiang and Hiroshi Inamura, On security-delay trade-off in two-hop wireless networks with buffer-aided relay selection, IEEE Transactions on Wireless Communications, vol. 17, no. 3, pp. 1893-1906, March 2018. (WOS:000427226500035)
Xiaochen Li, Yuanyu Zhang*, Shuangrui Zhao, Yulong Shen and Xiaohong Jiang, Exact secrecy throughput capacity study in mobile ad hoc networks, Ad Hoc Networks, vol. 72, pp. 105-114, April 2018. (WOS:000427337100009)
Jianxiong Wan, Xiang Gui, Shoji Kasahara, Yuanyu Zhang, and Ran Zhang, Air flow measurement and management for improving cooling and energy efficiency in raised-floor data centers: A survey, in IEEE Access, vol. 6, pp. 48867-48901, 2018. (WOS:000445467900001)
Yuanyu Zhang, Yulong Shen*, Hua Wang and Xiaohong Jiang, On secure wireless communications for IoT under eavesdropper collusion, IEEE Transactions on Automation Science and Engineering, vol. 13, no. 3, pp. 1281-1293, 2016. (WOS:000380028300006)
Yuanyu Zhang*, Yulong Shen*, Jinxiao Zhu and Xiaohong Jiang, Eavesdropper-tolerance capability in two-hop wireless networks via cooperative jamming, Ad Hoc & Sensor Wireless Networks 29(1-4): 113-131 (2015). (WOS:000364500200006)
Yulong Shen, Yuanyu Zhang*, Transmission protocol for secure big data in two-hop wireless networks with cooperative jamming, Information Sciences, 281: 201-210 (2014). (WOS:000340315600013)
Yulong Shen, Yuanyu Zhang, Exploring relay cooperation for secure and reliable transmission in two-hop wireless networks, EAI Endorsed Trans. Scalable Information Systems 1(2): e2 (2014)