| A survey on trust management for Internet of Things Z Yan, P Zhang, AV Vasilakos Journal of network and computer applications 42, 120-134, 2014 | 662 | 2014 |
| Active ticket with dynamic characteristic such as appearance with various validation options P Saarinen, M Lahteenmaki, Z Yan US Patent App. 10/675,857, 2005 | 251 | 2005 |
| System and method for controlled copying and moving of content between devices and domains based on conditional encryption of content key depending on usage J Alve, PK Chiu, Z Yan, J Hietasarka US Patent 7,487,363, 2009 | 244 | 2009 |
| Trust evaluation based security solution in ad hoc networks Z Yan, P Zhang, T Virtanen Proceedings of the Seventh Nordic Workshop on Secure IT Systems 14, 2003 | 230 | 2003 |
| From cloud to fog computing: A review and a conceptual live VM migration framework O Osanaiye, S Chen, Z Yan, R Lu, KKR Choo, M Dlodlo IEEE Access 5, 8284-8300, 2017 | 144 | 2017 |
| Trust modeling and management: from social trust to digital trust Z Yan, S Holtmanns Computer security, privacy and politics: current issues, challenges and …, 2008 | 138 | 2008 |
| Method and a device for providing digital tickets in a mobile communications environment Z Yan, M Lähteenmäki, P Cofta US Patent 7,555,284, 2009 | 112 | 2009 |
| Autonomic trust management for a component-based software system Z Yan, C Prehofer IEEE Transactions on Dependable and Secure Computing 8 (6), 810-823, 2010 | 110 | 2010 |
| Deduplication on encrypted big data in cloud Z Yan, W Ding, X Yu, H Zhu, RH Deng IEEE transactions on big data 2 (2), 138-150, 2016 | 90 | 2016 |
| A security and trust framework for virtualized networks and software‐defined networking Z Yan, P Zhang, AV Vasilakos Security and communication networks 9 (16), 3059-3069, 2016 | 88 | 2016 |
| Flexible data access control based on trust and reputation in cloud computing Z Yan, X Li, M Wang, AV Vasilakos IEEE transactions on cloud Computing 5 (3), 485-498, 2015 | 80 | 2015 |
| System and method to establish and maintain conditional trust by stating signal of distrust Z Yan, PL Cofta US Patent 7,634,807, 2009 | 72 | 2009 |
| A survey on security in D2D communications M Wang, Z Yan Mobile Networks and Applications 22 (2), 195-208, 2017 | 58 | 2017 |
| A QoS-aware system for mobile cloud computing P Zhang, Z Yan 2011 IEEE International Conference on Cloud Computing and Intelligence …, 2011 | 54 | 2011 |
| An efficient deep learning model to predict cloud workload for industry informatics Q Zhang, LT Yang, Z Yan, Z Chen, P Li IEEE transactions on industrial informatics 14 (7), 3170-3178, 2018 | 48 | 2018 |
| Security in D2D communications: A review M Wang, Z Yan 2015 IEEE Trustcom/BigDataSE/ISPA 1, 1199-1204, 2015 | 47 | 2015 |
| TruBeRepec: a trust-behavior-based reputation and recommender system for mobile applications Z Yan, P Zhang, RH Deng Personal and Ubiquitous Computing 16 (5), 485-506, 2012 | 46 | 2012 |
| Two schemes of privacy-preserving trust evaluation Z Yan, W Ding, V Niemi, AV Vasilakos Future Generation Computer Systems 62, 175-189, 2016 | 45 | 2016 |
| Encrypted data management with deduplication in cloud computing Z Yan, M Wang, Y Li, AV Vasilakos IEEE Cloud Computing 3 (2), 28-35, 2016 | 45 | 2016 |
| SecIoT: a security framework for the Internet of Things X Huang, P Craig, H Lin, Z Yan Security and communication networks 9 (16), 3083-3094, 2016 | 43 | 2016 |