BOOKS/CHAPTERS
[B1] Anjia Yang, Gerhard P. Hancke. RFID and Contactless Technology, Smart Cards, Tokens, Security and Applications, Springer International Publishing, ISBN 978-3-319-50500-8, pp. 351-385, 2017
(* Corresponding author)
[J28] Yingling Dai, Jian Weng, Anjia Yang, Shui Yu, Robert Deng, A Lightweight and Privacy-Preserving Answer Collection Scheme for Mobile Crowdsourcing, KSII Transactions on Internet and Information Systems, to appear, 2021
[J27] Xiang Liu, Anjia Yang*, Cheng Huang, Yuxian Li, Tao Li, and Ming Li, Decentralized Anonymous Authentication with Fair Billing for Space-Ground Integrated Networks, IEEE Transactions on Vehicular Technology, to appear, 2021
[J26] Hongwei Huang, Weiqi Luo, Guoqiang Zeng, Jian Weng, Yue Zhang, and Anjia Yang, DAMIA: Leveraging Domain Adaptation as a Defense against Membership Inference Attacks, IEEE Transactions on Dependable and Secure Computing, to appear, 2021
[J25] Anjia Yang, Dutliff Boshoff, Qiao Hu, Gerhard Hancke, Xizhao Luo, Jian Weng, Keith Mayes, and Konstantinos Markantonakis, Privacy-preserving Group Authentication for RFID Tags Using Bit-Collision Patterns, IEEE Internet of Things Journal, vol. 8(14), pp. 11607-11620, 2021
[J24] Anjia Yang, Jia Xu, Jian Weng, Jianying Zhou and Duncan S. Wong, Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage, IEEE Transactions on Cloud Computing, vol. 9(1), pp. 212-225, 2021 (Highly Cited Paper)
[J23] Qiao Hu, Yuanzhen Liu, Anjia Yang* and Gerhard Hancke, Preventing Overshadowing Attacks in Self-Jamming Audio Channels, IEEE Transactions on Dependable and Secure Computing, vol. 18(1), pp. 45-57, 2021
[J22] Yue Zhang, Jian Weng, Jiasi Weng, Lin Hou, Anjia Yang, Ming Li, Yang Xiang and Robert H. Deng, Looking Back! Using Early Versions of Android Apps as Attack Vectors, IEEE Transactions on Dependable and Secure Computing, vol. 18(2), pp. 652-666, 2021
[J21] Anjia Yang, Jian Weng, Kan Yang, Cheng Huang and Xuemin (Sherman) Shen, Delegating Authentication to Edge: A Decentralized Authentication Architecture for Vehicular Networks, IEEE Transactions on Intelligent Transportation Systems, to appear, 2020
[J20] Yunhui Zhuang, Anjia Yang*, Gerhard P. Hancke, Duncan S. Wong, Guomin Yang. Energy-Efficient Distance-Bounding with Residual Charge Computation, IEEE Transactions on Emerging Topics in Computing, vol. 8(2), pp. 365-376, 2020
[J19] Jia-Nan Liu, Xizhao Luo, Jian Weng, Anjia Yang, Xu An Wang, Ming Li and Xiaodong Lin, Enabling Efficient, Secure and Privacy-preserving Mobile Cloud Storage, IEEE Transactions on Dependable and Secure Computing, to appear, 2020
[J18] Jia-Nan Liu, Jian Weng, Anjia Yang, Yizhao Chen and Xiaodong Lin, Enabling Efficient and Privacy-Preserving Aggregation Communication and Function Query for Fog Computing based Smart Grid, IEEE Transactions on Smart Grid, vol. 11(1), pp. 247-257, 2020
[J17] Wenjie Yang, Jian Weng, Xinyi Huang, and Anjia Yang, A provably secure certificateless proxy signature scheme against malicious-but-passive KGC attacks, The Computer Journal, vol. 63(8), pp. 1139–1147, 2020
[J16] Ming Li, Jian Weng, Anjia Yang, Jia-Nan Liu and Xiaodong Lin, Towards Blockchain-based Fair and Anonymous Ad Dissemination in Vehicular Networks, IEEE Transactions on Vehicular Technology, vol. 68(11), pp. 11248-11259, 2019
[J15] Anjia Yang, Jian Weng, Nan Cheng, Jianbing Ni, Xiaodong Lin and Xuemin (Sherman) Shen, DeQoS Attack: Degrading Quality of Service in VANETs and its Mitigation, IEEE Transactions on Vehicular Technology, vol. 68(5), pp. 4834-4845, 2019
[J14] Ming Li, Jian Weng, Anjia Yang, Wei Lu, Yue Zhang, Lin Hou, Liu Jia-Nan, Yang Xiang, Robert Deng. CrowdBC: A blockchain-based decentralized framework for crowdsourcing. IEEE Transactions on Parallel and Distributed Systems, vol. 30(6), pp. 1251-1266, 2019 (Highly Cited Paper)
[J13] Wenjie Yang, Jian Weng, Anjia Yang, Congge Xie, Yaxi Yang, Notes on a provably-secure certificate-based encryption against malicious CA attacks, Information Sciences, vol. 463-464, pp. 86-91, 2018
[J12] Mohammad Saiful Islam Mamun, Chunhua Su, Anjia Yang, Atsuko Miyaji, Ali Ghorbani, OTP-IoT: An ownership transfer protocol for the Internet of Things, Journal of Information Security and Applications, vol. 43, pp. 73-82, 2018
[J11] Jiajie Zhang, Jian Weng, Weiqi Luo, Jia-Nan Liu, Anjia Yang, Jiancheng Lin, Zhijun Zhang and Hailiang Li, REMT: A Real-Time End-to-End Media Data Transmission Mechanism in UAV-Aided Networks, IEEE NETWORK, vol. 32(5), pp. 118-123, 2018
[J10] Anjia Yang, Elena Pagnin, Aikaterini Mitrokotsa, Gerhard P. Hancke, Duncan S. Wong. Two-hop Distance-Bounding Protocols: Keep your Friends Close, IEEE Transactions on Mobile Computing, vol. 17(7), pp. 1723-1736 , 2018
[J9] Anjia Yang, Yunhui Zhuang, Jian Weng*, Gerhard Hancke, Duncan S. Wong and Guomin Yang, Exploring Relationship between Indistinguishability-based and Unpredictability-Based RFID Privacy Models, Future Generation Computer Systems, vol. 82, pp. 315-326, 2018
[J8] Elena Pagnin, Anjia Yang*, Qiao Hu, Gerhard Hancke, Aikaterina Mitrokotsa, HB+DB: Distance Bounding Meets Human Based Authentication, Future Generation Computer Systems, vol. 80, pp. 627-639, 2018
[J7] Wenjie Yang, Weiqi Luo, Xizhao Luo, Jian Weng, and Anjia Yang, Fully distributed certificateless threshold signature without random oracles, SCIENCE CHINA Information Sciences, Vol. 61, pp. 098101:1–098101:3, 2018
[J6] Wenjie Yang, Jian Weng, Weiqi Luo, Anjia Yang. Strongly unforgeable certificateless signature resisting attacks from malicious-but-passive KGC, Security and Communication Networks, pp. 1-8, 2017
[J5] Leo Yu Zhang, Yushu Zhang, Yuansheng Liu, Anjia Yang, Guanrong Chen. Security analysis of some diffusion mechanisms used in chaotic ciphers, International Journal of Bifurcation and Chaos , vol 27(10), pp. 1750155-1:13, 2017
[J4] Anjia Yang*, Xiao Tan, Joonsang Baek, Duncan S. Wong, A New ADS-B Authentication Framework based on Efficient Hierarchical Identity-Based Signature with Batch Verification, IEEE Transactions on Services Computing, vol. 10(2), pp. 165-175, 2017
[J3] Qiao Hu, Lavinia Mihaela Dinca, Anjia Yang, Gerhard Hancke, Practical Limitation of Co-Operative RFID Jamming Methods in Environments without Accurate Signal Synchronization, Computer Networks, vol. 105, pp.224-236, 2016
[J2] Anjia Yang*, Kaitai Liang, Yunhui Zhuang, Duncan S. Wong, Xiaohua Jia, A New Unpredictability-Based RFID Forward Privacy Model and a Provably Secure Construction, Secure and Communication Networks, 2015, 8(16):2836-2849
[J1] Kaitai Liang, Man Ho Au, Joseph K Liu, Willy Susilo, Duncan S Wong, Guomin Yang, Yong Yu, Anjia Yang, A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing, Future Generation Computer Systems, vol.52, pp.95-108, 2014
[C8] Xiaojian Liang, Jian Weng, Anjia Yang, Lisha Yao, Zike Jiang, Zhenghao Wu, Attribute-Based Conditional Proxy Re-Encryption in the Standard Model under LWE, The 26st European Symposium on Research in Computer Security (ESORICS 2021), Darmstadt, Germany, 2021
[C7] Zhenghao Wu, Jian Weng, Anjia Yang, Lisha Yao, Xiaojian Liang, Zike Jiang, Jinghang Wen, Efficient and Fully Secure Lattice-based IBE with Equality Test, Proceedings of the 23th International Conference on Information and Communications Security (ICICS 2021), Chongqing, China, 2021
[C6] Jingyi Zhang, Anjia Yang, Qiao Hu and Gerhard P. Hancke, Security Implications of Implementing Multistate Distance-Bounding Protocols, ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC '19), in conjunction with ACM CCS'19
[C5] Jia Xu*, Anjia Yang*, Jianying Zhou, Duncan S. Wong, Lightweight Delegatable Proofs of Storage, 21st European Symposium on Research in Computer Security (ESORICS 2016), 324-343, Heraklion, Greece, 2016
[C4] Elena Pagnin, Anjia Yang, Gerhard Hancke, Katerina Mitrokotsa, Short: HB+DB, Mitigating Man-in-the-Middle Attacks Against HB+ with Distance Bounding, 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2015), 3:1-3:6, New York, USA, 2015
[C3] Yunhui Zhuang, Anjia Yang, Duncan S. Wong, Guomin Yang, Qi Xie, A Highly Efficient RFID Distance Bounding Protocol Without Real-time PRF Evaluation, Proceedings of the 7th International Conference on Network and System Security (NSS 2013), 451-464 Madrid, Spain, 2013
[C2] Anjia Yang*,Yunhui Zhuang,Duncan S. Wong,Guomin Yang,A New Unpredictability-Based RFID Privacy Model,Proceedings of the 7th International Conference on Network and System Security (NSS 2013), 479-492, Madrid, Spain, 2013
[C1] Anjia Yang*, Yunhui Zhuang, Duncan S. Wong, An Efficient Single-Slow-Phase Mutually Authenticated RFID Distance Bounding Protocol with Tag Privacy, Proceedings of the 14th International Conference on Information and Communications Security (ICICS 2012), 285-292, Hong Kong, 2012