His main research concerns Computer network, Computer security, Wireless sensor network, Authentication and Cryptography. As part of his studies on Computer network, Yanchao Zhang often connects relevant subjects like Radio resource management. His work investigates the relationship between Computer security and topics such as Wireless ad hoc network that intersect with problems in Mobile ad hoc network.
His Wireless sensor network study integrates concerns from other disciplines, such as Video tracking, Key distribution in wireless sensor networks, Data security and Message authentication code. Yanchao Zhang interconnects Roaming, Wireless mesh network, The Internet and Enterprise information security architecture in the investigation of issues within Authentication. The study incorporates disciplines such as Sybil attack and Public-key cryptography in addition to Cryptography.
Yanchao Zhang spends much of his time researching Computer network, Computer security, Wireless sensor network, Key distribution in wireless sensor networks and Wireless ad hoc network. His Computer network research incorporates themes from Distributed computing and Cryptography. The concepts of his Computer security study are interwoven with issues in Object, Mobile device, Internet privacy and Botnet.
The Wireless sensor network study which covers Overhead that intersects with Resilience. The various areas that Yanchao Zhang examines in his Key distribution in wireless sensor networks study include Scalability and Correctness. His studies deal with areas such as Routing protocol and Network packet as well as Wireless ad hoc network.
Authentication, Computer security, Internet privacy, Social media and Server are his primary areas of study. His Authentication research is multidisciplinary, incorporating elements of Key and Usability. His Computer security study frequently links to adjacent areas such as Botnet.
His work deals with themes such as Adversarial system and Mobile payment, which intersect with Internet privacy. Yanchao Zhang usually deals with Mobile authentication and limits it to topics linked to Cognitive neuroscience of visual object recognition and Computer network. His Computer network research is multidisciplinary, relying on both ISM band and Enhanced Data Rates for GSM Evolution.
His primary areas of study are Computer security, Crowdsourcing, Differential privacy, Internet privacy and Social media. His Computer security study frequently draws connections between adjacent fields such as Botnet. The various areas that he examines in his Crowdsourcing study include Construct and Human–computer interaction.
His research in Differential privacy intersects with topics in Privacy preserving, Information privacy and Data outsourcing. His Internet privacy research integrates issues from Adversarial system and Social network analysis. Social media and User privacy are frequently intertwined in his study.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Securing wireless sensor networks: a survey
Yun Zhou;Yuguang Fang;Yanchao Zhang.
IEEE Communications Surveys and Tutorials (2008)
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Yanchao Zhang;Wei Liu;Wenjing Lou;Yuguang Fang.
IEEE Journal on Selected Areas in Communications (2006)
An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks
Jinyuan Sun;Chi Zhang;Yanchao Zhang;Yuguang Fang.
IEEE Transactions on Parallel and Distributed Systems (2010)
Anonymous communications in mobile ad hoc networks
Yanchao Zhang;Wei Liu;Wenjing Lou.
international conference on computer communications (2005)
PriSense: Privacy-Preserving Data Aggregation in People-Centric Urban Sensing Systems
Jing Shi;Rui Zhang;Yunzhong Liu;Yanchao Zhang.
international conference on computer communications (2010)
Securing Mobile Ad Hoc Networks with Certificateless Public Keys
Yanchao Zhang;Wei Liu;Wenjing Lou;Yuguang Fang.
IEEE Transactions on Dependable and Secure Computing (2006)
LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks
Kui Ren;Wenjing Lou;Yanchao Zhang.
IEEE Transactions on Mobile Computing (2008)
MASK: anonymous on-demand routing in mobile ad hoc networks
Yanchao Zhang;Wei Liu;Wenjing Lou;Yuguang Fang.
IEEE Transactions on Wireless Communications (2006)
Multi-User Broadcast Authentication in Wireless Sensor Networks
Kui Ren;Shucheng Yu;Wenjing Lou;Yanchao Zhang.
IEEE Transactions on Vehicular Technology (2009)
Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance
Q. Wang;K. Ren;W. Lou;Y. Zhang.
international conference on computer communications (2009)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
City University of Hong Kong
Virginia Tech
University of Science and Technology of China
Zhejiang University
Arizona State University
Rice University
Pennsylvania State University
Chinese Academy of Sciences
Stevens Institute of Technology
George Mason University
Hefei University of Technology
Cardiff University
Zhejiang University
University of Wisconsin–Madison
University of Zurich
National University of Río Cuarto
Rutgers, The State University of New Jersey
Indiana University
University of Utah
Stanford University
University of Calgary
University at Buffalo, State University of New York
Yale University
Ludwig-Maximilians-Universität München
University of Leeds
Space Telescope Science Institute