Login / Signup
Yuzi Yi
ORCID
Publication Activity (10 Years)
Years Active: 2018-2024
Publications (10 Years): 10
Top Topics
Game Theory
Sensitive Data
Online Social Networks
Privacy Protection
Top Venues
Trans. Emerg. Telecommun. Technol.
Secur. Priv.
WISE
Multim. Tools Appl.
</>
Publications
</>
Yuzi Yi
,
Nafei Zhu
,
Jingsha He
,
Anca Delia Jurcut
,
Xiangjun Ma
,
Yehong Luo
A privacy-sensitive data identification model in online social networks.
Trans. Emerg. Telecommun. Technol.
35 (1) (2024)
Yuzi Yi
,
Nafei Zhu
,
Jingsha He
,
Anca Delia Jurcut
,
Xiangjun Ma
,
Yehong Luo
An Evolutionary Game Theory-Based Cooperation Framework for Countering Privacy Inference Attacks.
IEEE Trans. Comput. Soc. Syst.
11 (3) (2024)
Yuzi Yi
,
Nafei Zhu
,
Jingsha He
,
Xiangjun Ma
,
Yehong Luo
Priv-S: Privacy-Sensitive Data Identification in Online Social Networks.
WISE
(2023)
Yuzi Yi
,
Nafei Zhu
,
Jingsha He
,
Anca Delia Jurcut
,
Xiangjun Ma
,
Yehong Luo
A privacy-dependent condition-based privacy-preserving information sharing scheme in online social networks.
Comput. Commun.
200 (2023)
Yuzi Yi
,
Jingsha He
,
Nafei Zhu
,
Xiangjun Ma
Social influence-based privacy inference attacks in online social networks.
Secur. Priv.
5 (2) (2022)
Yuzi Yi
,
Nafei Zhu
,
Jingsha He
,
Anca Delia Jurcut
,
Bin Zhao
Toward pragmatic modeling of privacy information propagation in online social networks.
Comput. Networks
219 (2022)
Yajing Wang
,
Jingsha He
,
Nafei Zhu
,
Yuzi Yi
,
Qingqing Zhang
,
Hongyu Song
,
Ruixin Xue
Security enhancement technologies for smart contracts in the blockchain: A survey.
Trans. Emerg. Telecommun. Technol.
32 (12) (2021)
Junshe Wang
,
Zheng Li
,
Hongbin Zhang
,
Yuzi Yi
A study of situation awareness-based resource management scheme in cloud environment.
Int. J. Commun. Networks Distributed Syst.
24 (2) (2020)
Hongbin Zhang
,
Yuzi Yi
,
Junshe Wang
,
Ning Cao
,
Qiang Duan
Network attack prediction method based on threat intelligence for IoT.
Multim. Tools Appl.
78 (21) (2019)
Junshe Wang
,
Yuzi Yi
,
Hongbin Zhang
,
Ning Cao
Network Attack Prediction Method Based on Threat Intelligence.
ICCCS (3)
(2018)