• An enhanced public key infrastructure to secure smart grid wireless communication networks 

      He, Daojing; Chan, Sammy; Zhang, Yan; Guizani, Mohsen; Chen, Chun; ... more authors (2014 , Article)
      It is expected that the smart grid will radically add new functionalities to legacy electrical power systems. However, we believe that this will in turn introduce many new security risks. With the smart grid's backbone ...
    • Battery status-aware authentication scheme for V2G networks in smart grid 

      Liu, Hong; Ning, Huansheng; Zhang, Yan; Guizani, Mohsen (2013 , Article)
      Vehicle-to-grid (V2G) is emerging as an attractive paradigm in smart grid, and provides power and information services by periodically collecting power status of battery vehicles (BVs). During a BV's interaction with power ...
    • Compliance checking for usage-constrained credentials in trust negotiation systems 

      Hu, Jinwei; Khan, Khaled M.; Bai, Yun; Zhang, Yan ( Springer Berlin Heidelberg , 2012 , Conference)
      We propose an approach to placing usage-constraints on RT credentials; issuers specify constraints by designing non-deterministic finite automata. We show by examples that this approach can express constraints of practical ...
    • Constraint-enhanced role engineering via answer set programming 

      Hu, Jinwei; Khan, Khaled M.; Bai, Yun; Zhang, Yan ( Association for Computing Machinery , 2012 , Conference)
      Role engineering (RE) aims to develop and maintain appropriate role-based access control (RBAC) configurations. However, RE with constraints in place is not well-studied. Constraints usually describe organizations' security ...
    • Distributed resource allocation in cloud-based wireless multimedia social networks 

      Nan, Guofang; Mao, Zhifei; Li, Minqiang; Zhang, Yan; Gjessing, Stein; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2014 , Article)
      With the rapid penetration of mobile devices, more users prefer to watch multimedia live-streaming via their mobile terminals. Quality of service provision is normally a critical challenge in such multimedia sharing ...
    • Enhancing spectral-energy efficiency for LTE-Advanced heterogeneous networks: A users social pattern perspective 

      Zhang, Xing; Zhang, Yan; Yu, Rong; Wang, Wenbo; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2014 , Article Review)
      The development of LTE-Advanced and beyond cellular networks is expected to offer considerably higher data rates than the existing 3G networks. Among the many potential technologies in LTE-Advanced systems, users' ...
    • Logic programs with ordered disjunction: First-order semantics and expressiveness 

      Asuncion, Vernon; Zhang, Yan; Zhang, Heng ( AAAI Press , 2014 , Conference)
      Logic programs with ordered disjunction (LPODs) (Brewka 2002) generalize normal logic programs by combining alternative and ranked options in the heads of rules. It has been showed that LPODs are useful in a number of areas ...
    • Nitrogen Deficiency Accelerates Rice Leaf Senescence Through ABA Signaling and Sugar Metabolic Shifts 

      Asad, Muhmmad Asad Ullah; Guan, Xianyue; Zhang, Yan; Zhou, Lujian; Bartas, Martin; ... more authors ( Wiley , 2025 , Article)
      Nitrogen (N) deficiency is one of the critical factors that induce leaf senescence by integrating with abscisic acid (ABA) metabolism, which results in a shortened leaf photosynthetic period and markedly lowered grain ...
    • Role updating in information systems using model checking 

      Hu, Jinwei; Khan, Khaled M.; Zhang, Yan; Bai, Yun; Li, Ruixuan ( Springer London , 2017 , Article)
      The role-based access control (RBAC) has significantly simplified the management of users and permissions in information systems. In dynamic environments, systems are constantly undergoing changes, and accordingly, the ...
    • Secure service provision in smart grid communications 

      He, Daojing; Chen, Chun; Bu, Jiajun; Chan, Sammy; Zhang, Yan; ... more authors (2012 , Article)
      The smart grid provides a platform for thirdparty service providers to remotely monitor and manage energy usage for consumers. At the same time, the involvement of service providers brings a new set of security threats to ...
    • Securing cognitive radio networks against primary user emulation attacks 

      Yu, Rong; Zhang, Yan; Liu, Yi; Gjessing, Stein; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article)
      CR is a promising technology for next-generation wireless networks in order to efficiently utilize the limited spectrum resources and satisfy the rapidly increasing demand for wireless applications and services. Security ...
    • Securing vehicle-to-grid communications in the smart grid 

      Zhang, Yan; Gjessing, Stein; Liu, Hong; Ning, Huansheng; Yang, Laurence T.; ... more authors (2013 , Article)
      Using vehicle-to-grid (V2G) services, battery vehicles (BVs) may help the smart grid alleviate peaks in power consumption. However, wireless communications infrastructure between BVs and the smart grid also introduce severe ...
    • Security and privacy in emerging networks: Part 1 [Guest Editorial] 

      Guizani, Mohsen; He, Daojing; Ren, Kui; Rodrigues, Joel; Chan, Sammy; ... more authors ( IEEE , 2015 , Article)
      With the recent advancements in networking technologies, some new emerging networks are being implemented that have the potential to be deployed broadly and on a large scale in the near future. In the wired domain, these ...
    • Security and privacy in emerging networks: Part II [Guest Editorial] 

      Guizani, Mohsen; He, Daojing; Ren, Kui; Rodrigues, Joel J. P.; Chan, Sammy; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article Review)
      This is the second part of the " Security and Privacy in Emerging Networks" Feature Topic. In Part I, which was published in April 2015, we selected those contributions that dealt with the theory behind the security and ...
    • Social access control language (SocACL) 

      Caprin, Edward; Zhang, Yan; Khan, Khaled M. ( Association for Computing Machinery , 2013 , Conference)
      Online Social Networks hold vast amounts of readily accessible personal information leaving them particularly vulnerable to privacy breach attacks [6]. With the impact these breaches varying from simply embarrassing the ...
    • Tracking and constraining authorization provenance 

      Hu, Jinwei; Khan, Khaled M.; Bai, Yun; Zhang, Yan ( Springer Berlin Heidelberg , 2012 , Conference)
      Authorization provenance concerns how an authorization is derived. It appears important to define authorization provenance to (1) analyze policy bases, (2) defend against a class of attacks, and (3) audit authorizations. ...