default search action
Yulong Fu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j21]Ruyan Lin, Yulong Fu, Wei Yi, Jincheng Yang, Jin Cao, Zhiqiang Dong, Fei Xie, Hui Li:
Vulnerabilities and Security Patches Detection in OSS: A Survey. ACM Comput. Surv. 57(1): 23:1-23:37 (2025) - 2024
- [j20]Xuefei Cao, Lanjun Dang, Kai Fan, Xingwen Zhao, Yulong Fu, Yingzi Luan:
A Dynamic and Efficient Self-Certified Authenticated Group Key Agreement Protocol for VANET. IEEE Internet Things J. 11(17): 29146-29156 (2024) - 2023
- [c14]Jiahui Wang, Yulong Fu, Mengru Liu, Jin Cao, Hui Li, Zheng Yan:
Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft Biometrics. ISPEC 2023: 52-73 - 2022
- [j19]Kedong Zhao, Yongrong Sun, Hua Li, Ling Wu, Yulong Fu:
Monocular Visual Pose Estimation for Flexible Drogue by Decoupling the Deformation. IEEE Trans. Instrum. Meas. 71: 1-11 (2022) - [c13]Han Zeng, Ze-Tong Li, Tian Luan, Yulong Fu, Xutao Yu, Zaichen Zhang:
Optimized meta-VQE Algorithm for Better Trend Learning of Ground State Energy. WCSP 2022: 800-803 - 2021
- [j18]Jingwen Wang, Xuyang Jing, Zheng Yan, Yulong Fu, Witold Pedrycz, Laurence T. Yang:
A Survey on Trust Evaluation Based on Machine Learning. ACM Comput. Surv. 53(5): 107:1-107:36 (2021) - [j17]Jin Cao, Maode Ma, Yulong Fu, Hui Li, Yinghui Zhang:
CPPHA: Capability-Based Privacy-Protection Handover Authentication Mechanism for SDN-Based 5G HetNets. IEEE Trans. Dependable Secur. Comput. 18(3): 1182-1195 (2021) - 2020
- [j16]Jin Cao, Zheng Yan, Ruhui Ma, Yinghui Zhang, Yulong Fu, Hui Li:
LSAA: A Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks. IEEE Internet Things J. 7(6): 5329-5344 (2020) - [j15]Yulong Fu, Hanlu Chen, Qinghua Zheng, Zheng Yan, Raimo Kantola, Xuyang Jing, Jin Cao, Hui Li:
An Adaptive Security Data Collection and Composition Recognition method for security measurement over LTE/LTE-A networks. J. Netw. Comput. Appl. 155: 102549 (2020) - [j14]Xuefei Cao, Yulong Fu, Bo Chen:
Packet-Based Intrusion Detection Using Bayesian Topic Models in Mobile Edge Computing. Secur. Commun. Networks 2020: 8860418:1-8860418:12 (2020)
2010 – 2019
- 2019
- [j13]Yali Wu, Xinrui Wang, Yulong Fu, Guoting Li:
Many-Objective Brain Storm Optimization Algorithm. IEEE Access 7: 186572-186586 (2019) - [j12]Huaqing Lin, Zheng Yan, Yulong Fu:
Adaptive security-related data collection with context awareness. J. Netw. Comput. Appl. 126: 88-103 (2019) - [j11]Xiaolong Xin, Yulong Fu, Yanyan Lai, Juntao Wang:
Monadic pseudo BCI-algebras and corresponding logics. Soft Comput. 23(5): 1499-1510 (2019) - [c12]Guoquan Li, Yulong Fu, Zheng Yan, Weilin Hao:
Quantifiable Network Security Measurement: A Study Based on an Index System. ML4CS 2019: 47-62 - [c11]Yulong Fu, Xinyi Yuan, Ke Wang, Zheng Yan, Hui Li:
A Security Formal Model for Multiple Channels Communication. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1425-1430 - [c10]Yulong Fu, Guoquan Li, Mohammed Atiquzzaman, Zheng Yan, Jin Cao, Hui Li:
A Study and Enhancement to the Security of MANET AODV Protocol Against Black Hole Attacks. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1431-1436 - [p1]Yali Wu, Xinrui Wang, Yingruo Xu, Yulong Fu:
Multi-objective Differential-Based Brain Storm Optimization for Environmental Economic Dispatch Problem. Brain Storm Optimization Algorithms 2019: 79-104 - 2018
- [j10]Jin Cao, Maode Ma, Hui Li, Yulong Fu, Xuefeng Liu:
EGHR: Efficient group-based handover authentication protocols for mMTC in 5G wireless networks. J. Netw. Comput. Appl. 102: 1-16 (2018) - [j9]Donghao Zhou, Zheng Yan, Yulong Fu, Zhen Yao:
A survey on network data collection. J. Netw. Comput. Appl. 116: 9-23 (2018) - [j8]Guoquan Li, Zheng Yan, Yulong Fu, Hanlu Chen:
Data Fusion for Network Intrusion Detection: A Review. Secur. Commun. Networks 2018: 8210614:1-8210614:16 (2018) - [c9]Guoquan Li, Zheng Yan, Yulong Fu:
A Study and Simulation Research of Blackhole Attack on Mobile AdHoc Network. CNS 2018: 1-6 - 2017
- [j7]Yulong Fu, Zheng Yan, Hui Li, Xiao-Long Xin, Jin Cao:
A secure SDN based multi-RANs architecture for future 5G networks. Comput. Secur. 70: 648-662 (2017) - [j6]Yulong Fu, Zheng Yan, Jin Cao, Ousmane Koné, Xuefei Cao:
An Automata Based Intrusion Detection Method for Internet of Things. Mob. Inf. Syst. 2017: 1750637:1-1750637:13 (2017) - [c8]Jin Cao, Maode Ma, Hui Li, Yulong Fu, Ben Niu, Fenghua Li:
Trajectory prediction-based handover authentication mechanism for mobile relays in LTE-A high-speed rail networks. ICC 2017: 1-6 - [c7]Hanlu Chen, Yulong Fu, Zheng Yan:
Survey on Big Data Analysis Algorithms for Network Security Measurement. NSS 2017: 128-142 - [c6]Xuefei Cao, Lanjun Dang, Kai Fan, Yulong Fu:
An Attack to an Anonymous Certificateless Group Key Agreement Scheme and Its Improvement. SpaCCS 2017: 56-69 - [c5]Yali Wu, Xinrui Wang, Yulong Fu, Yingruo Xu:
Difference Brain Storm Optimization for Combined Heat and Power Economic Dispatch. ICSI (1) 2017: 519-527 - 2016
- [j5]Xiaolong Xin, Pengfei He, Yulong Fu:
States on hyper MV-algebras. J. Intell. Fuzzy Syst. 31(3): 1299-1309 (2016) - 2015
- [j4]Yulong Fu, Ousmane Koné:
Model based security verification of protocol implementation. J. Inf. Secur. Appl. 22: 17-27 (2015) - 2014
- [j3]Xiaolong Xin, Yulong Fu:
Some results of convex fuzzy sublattices. J. Intell. Fuzzy Syst. 27(1): 287-298 (2014) - [j2]Yulong Fu, Ousmane Koné:
Security and Robustness by Protocol Testing. IEEE Syst. J. 8(3): 699-707 (2014) - 2013
- [j1]Yulong Fu, Ousmane Koné:
Validation of security protocol implementations from security objectives. Comput. Secur. 36: 27-39 (2013) - [c4]Yulong Fu, Ousmane Koné:
Using transition systems to model and verify the implementation of security protocol. SIN 2013: 210-217 - [c3]Yulong Fu, Ousmane Koné:
A finite transition model for security protocol verification. SIN 2013: 368-371 - 2011
- [c2]Yulong Fu, Ousmane Koné:
Network Securing against Threatening Requests. DPM/SETOP 2011: 280-294 - [c1]Yulong Fu, Ousmane Koné:
A Robustness Testing Method for Network Security. ICGS3/e-Democracy 2011: 38-45
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 19:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint