(1) Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authentication in VANETs, Yujue Wang, Yong Ding*, Qianhong Wu,Yongzhuang Wei, Bo Qin, and Huiyong Wang, IEEE Transactions on Information Forensics and Security(CCF A, 通讯作者)
(2) Yong Ding, Bingyao Wang, Yujue Wang, Kun Zhang, Huiyong Wang.Secure Metering Data Aggregation With Batch Verification in Industrial Smart Grid. IEEE Transactions on Industrial Informatics,2020,16(10):6607-6616. (1区)
(3) Securing Messaging Services Through Efficient Signcryption with Designated Equality Test,Y Wang, HH Pang, RH Deng, Y Ding*, Q Wu, B Qin, Information Science(CCF B, 中科院1区)
(4) 丁勇,王冰尧,袁方,王玉珏,张昆,田磊,支持第三方仲裁的智能电网数据安全聚合方案, 电子学报,2020,48(2):350-358。
(5) 丁勇,李佳慧, 唐士杰, 王会勇,基于随机映射技术的声纹识别模板保护, 计算机研究与发展,2020。
(6) Ding Y, Xu Z, Ye J, et al. Secure outsourcing of modular exponentiations under single untrused programme model[J]. Journal of Computer & System Sciences, 2016, 90.(CCF B)
(7) Yong Ding, Kwok-wo Wong, and Yu-min Wang, A w-NNAF Method for the Efficient Computation of Scalar Multiplication in Elliptic Curve Cryptography, Applied Mathematics and Computation, Vol.167, No.1, PP.81-93,Aug. 2005.(SCI , JCR 2区)
(8) Ding Y, Xu Z, Zhang Y, et al. Fast lane detection based on bird’s eye view and improved random sample consensus algorithm[J]. Multimedia Tools & Applications, 2016:1-20.(CCF C)
(9) Yong Ding, Hong Yinfang, Gui Feng, Zhaoxie Zheng, An Efficient Algorithm for Elliptic Curve Scalar Multiplication Using Extended Double-Base Chain and Point Halving, Journal of Internet Technology,Vol.12, No.4, pp.593-599, July, 2011(SCI index)
(10) Ye J, Xu Z, Ding Y. Secure outsourcing of modular exponentiations in cloud and cluster computing[J].Cluster Computing, 2016, 19(2):811-820.(CCF C)
(11) DING, Yong, Xiumin, et al. A Novel Fully Homomorphic Encryption Scheme Bsed on LWE[J]. Wuhan University Journal of Natural Sciences, 2016, 21(1):84-92.(EI)
(12) Wu, Qianhong; Zhou, Xiuwen; Qin, Bo; Hu, Jiankun; Liu, Jianwei; *Ding, Yong. Secure joint Bitcoin trading with partially blind fuzzy signatures, Soft Computing, (2015-12-29): 1-12, December 29, 2015(CCF C 通信作者)
(13) Wu, Qianhong; Sun, Yang; Qin, Bo; Hu, Jiankun; Liu, Weiran; Liu, Jianwei; *Ding, Yong, Batch Public Key Cryptosystem with batch multi-exponentiation, Future Generation Computer Systems, Volume 62, September 2016, Pages 196–204(CCF C,通讯作者)
(14) Kezan Li, Hong Yu, Zhaorong Zeng, Yong Ding, Zhongjun Ma,Epidemic transmission on random mobile network with diverseinfection periods. Commun Nonlinear Sci Numer Simulat 22 (2015) 596–604 (JCR 1区,通讯作者)
(15) Kezan Li, Haifeng Zhangb, Xinchu Fu, Yong Ding∗, Michael Small. Epidemic threshold determined by the first moments of network with alternating degree distributions, Physica A 419 (2015) 585–593. (SCI,通讯作者)
(16) Li Ke-Zan(李科赞), Xu Zhong-Pu(徐忠朴)a), Zhu Guang-Hu(祝光湖), and Ding Yong(丁勇)*,Global stability of a susceptible-infected-susceptible epidemic model on networks with individual awareness,Chin. Phys. B Vol. 23, No. 11 (2014) 118904. (SCI)
(17) Kezan L, Wenwu Yu,Yong Ding. Successive lag synchronization on nonlinear dynamical networks via linear feedback control, Nonlinear Dynamic, DOI 10.1007/s11071-014-1879-y. (JCR 2区)
(18) Yong Ding, Decun Luo, Hengkui Xiang, Wenyao Liu and Yujue Wang. Design and Implementation of Blockchain-based Digital Advertising Media Promotion System. Peer-to-Peer Networking and Applications, 2020. (CCF C)
(19) Zhenyu Li, Yong Ding, Yujue Wang, and Sheng Wen. Evil Chaincode: APT Attacks Based on Smart Contract. International Conference on Frontiers in Cyber Security , 2020. (EI检索)
(20) Yujue Wang, HweeHwa Pang, Robert H. Deng, Yong Ding, Qianhong Wu, Bo Qin,Kefeng Fan.Secure server-aided data sharing clique with attestation. Information Sciences, 2020, 522: 80-98. (CCF B)
(21) Hua Deng, Zheng Qin, Qianhong Wu, Zhenyu Guan, Robert H. Deng, Yujue Wang, Yunya Zhou, Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud.IEEE Transactions on Information Forensics and Security, 2020, 15: 3168-3180. (CCF A)
(22) Lingang Liu, Meng Zhao, Yong Ding∗ , Yujue Wang, Hua Deng and Huiyong Wang. Privacy Preserving Multi-Keyword Search over Outsourced Data for Resource-Constrained Dev ices. International Conference on Blockchain and Trustworthy Systems 2020. (EI检索)
(23) Meng Zhao, Yong Ding∗, Yujue Wang, Huiyong Wang, Bo Han. Verififiable and Privacy-Preserving Outsourcing of Matrix Multiplications. CyberC 2020. (EI检索)
(24) Meng Zhao, Yong Ding, Qianhong Wu, Yujue Wang, Bo Qin, Kefeng Fan. Privacy-Preserving Lightweight Data Monitoring in Internet of Things Environments. Wireless Personal Communications, 2020. (SCI,4区)
(25) Chenjun Tang,Hai Liang, YongDing, Yujue Wang,Shijie Tang. Hyperparameter optimization of ICS intrusion detection classifier based on improved hybrid algorithm. International Conference on Security and Privacy in Digital Economy 2020. (EI检索)
(26) Yong Ding, Wenyao Liu,Yi Qin, Yujue Wang . SmartWatchdog: A Lightweight Defending Mechanism against Adversarial Transfer Learning. International Conference on Security and Privacy in Digital Economy 2020. (EI检索)
(27) Yong Ding, Hui Xu, Yujue Wang. Group authentication for sensors in wireless body area network. International Conference on Security, Privacy and Anonymity in Computation Communication and Storage (SpaCCS2020). (EI检索)
(28) 丁勇,桂丰, 基于GCD算法的GF(2m)上高速带模除法, 通信学报, 29卷第10期, 2008年10月,199-204页。(EI检索)
(29) 丁勇, 一种用椭圆曲线密码构建的传感网络密钥管理方案,西安电子科技大学学报, 35卷,第4期, 2008年8月, 739-742页。(EI检索)
(30) 丁勇,相恒奎,罗得寸,邹秀清,梁海, 一种结合Fabric技术的电子存证方案, 西安电子科技大学学报,2020年。(EI检索)
(31) 王会勇,唐士杰,丁勇,等. 生物特征识别模板保护综述[J]. 计算机研究与发展, 2020(7). 2020年7月 (EI检索)
(32) Liu LG., Zhao M., Ding Y., Wang Y., Deng H., Wang H. (2020) Privacy-Preserving Multi-keyword Search over Outsourced Data for Resource-Constrained Devices[C]//BlockSys 2020. Communications in Computer and Information Science, vol 1267. Springer, Singapore. https://doi.org/10.1007/978-981-15-9213-3_22(EI检索)
(33) 丁勇、赵萌、唐士杰、梁海、王会勇、王玉珏. 基于云平台的多用户可验证数据分享方案[J]. 乐动网页版学报, 2020, v.40; No.169(04):51-55.
(34) Jingyi Li; Meng Zhao; Yong Ding*; Dennis Y. W. Liu; Yujue Wang; Hai Liang. An Aggregate Authentication Framework for Unmanned Aerial Vehicle Cluster Network. The 19th International Conference on Ubiquitous Computing and Communications, England, UK, 2020-12-17 To 2020-12-19. 2020年12-19 (EI检索)
(35) 邹秀清, 罗得寸, 林平, 沈世平, 谢振平, 王玉珏, 丁勇. 基于区块链的河长制水质信息存证系统. 应用科学学报. 2020, 38(1): 65-80
丁勇, 李世杰, 王玉珏, 陈锦雯, 袁方, 张昆. 面向关系数据库的可搜索加密审计证书系统研究[J]. 密码学报, 2020, 7(1): 1{12. 2020年7月,中文核心