Zhen Yang
Shihezi University(CN)Shanghai Medical College of Fudan University(CN)Beijing University of Posts and Telecommunications(CN)University of Shanghai for Science and Technology(CN)China Aerospace Science and Industry Corporation (China)(CN)Nanjing Normal University(CN)National University of Singapore(SG)Liaoning Technical University(CN)Beijing University of Chinese Medicine(CN)Second Military Medical University(CN)Ludong University(CN)Anhui University of Science and Technology(CN)Wuhan University of Technology(CN)Chinese Academy of Sciences(CN)Harbin Institute of Technology(CN)Hainan University(CN)Fudan University(CN)Xi'an Polytechnic University(CN)Xinjiang Production and Construction Corps(CN)Chinese PLA General Hospital(CN)Guangxi Normal University(CN)Huzhou University(CN)Henan University of Technology(CN)Beijing University of Technology(CN)Jiangxi Science and Technology Normal University(CN)Suzhou Institute of Nano-tech and Nano-bionics(CN)Guizhou Academy of Agricultural Sciences(CN)Henan University of Engineering(CN)China General Nuclear Power Corporation (China)(CN)Institute of Disaster Prevention(CN)Shanghai Power Equipment Research Institute(CN)Anhui Science and Technology University(CN)Beijing National Laboratory for Molecular Sciences(CN)Second Hospital of Tianjin Medical University(CN)National Research Center for Rehabilitation Technical Aids(CN)Beijing Academy of Quantum Information Sciences(CN)Shanghai Pudong New Area Gongli Hospital(CN)Guizhou Institute of Technology(CN)Chinese People's Liberation Army(CN)State Key Laboratory of Advanced Technology For Materials Synthesis and ProcessingChongqing University of Technology(CN)Tianjin Medical University(CN)Sichuan Normal University(CN)City University of Macau(MO)Beijing University of Chemical Technology(CN)Nanjing Medical University(CN)Northwest A&F University(CN)Taiyuan University of Technology(CN)Tsinghua University(CN)
Publications by Year
Research Areas
Cryptography and Data Security, Privacy-Preserving Technologies in Data, Topic Modeling, Cloud Data Security Solutions, Blockchain Technology Applications and Security
Most-Cited Works
- → A systematic literature review of methods and datasets for anomaly-based network intrusion detection(2022)312 cited
- → Learning a Dilated Residual Network for SAR Image Despeckling(2018)231 cited
- → A Blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing(2020)130 cited
- → Decentralized Big Data Auditing for Smart City Environments Leveraging Blockchain Technology(2018)130 cited
- → Decorrelation of Neutral Vector Variables: Theory and Applications(2016)127 cited
- → Adsorption and catalysis of peroxymonosulfate on carbocatalysts for phenol degradation: The role of pyrrolic-nitrogen(2022)120 cited