Research

Founded Projects

  • The National Key Research and Development Program of China, 2022-2025
  • The Major Research Plan of National Natural Science Foundation of China, 2022-2025
  • The  Importation and Development of High-Caliber Talents Project of Beijing Municipal  Institutions, 2020-2022
  • The Ministry of Industry and Information Technology – Industrial Internet Innovation development PTechnology Project (Sub-project: Artificial Intelligence),2020-2022
  • The Ministry of Industry and Information Technology – Industrial Internet Innovation development Project (Sub-project: Reference Model), 2018-2020
  • The Ministry of Industry and Information Technology – Industrial Internet Innovation development Project (Sub-project: Emergency Response), 2018-2020
  • The National Key Research and Development Program of China (SubTask: Standardization), 2017-2020
  • The National Key Research and Development Program of China (SubTask: Temporal Summarization), 2017-2020
  • The National Natural Science Foundation of China, 2017-2021
  • The National Standardization Foundation, 2015-2016
  • The Beijing Excellent Talent Development Foundation, 2013-2015
  • The Importation and Development of High Caliber Talents Project of Beijing Municipal Institutions, 2013-2015
  • The National Information Security 242 Project of China, 2014-2015
  • The National Soft Science Program of China, 2011-2012
  • The National Natural Science Foundation of China, 2011-2014
  • The Scientific Research Common Program of Beijing Municipal Commission of Education, 2011-2014
  • The Beijing Natural Science Foundation, 2010-2013

Editor of Proceeding

  • Yung M, Zhang J, Yang Z (Eds.). Trusted Systems-7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015. INTRUST 2015, LNCS 9565, 2016

Standards

  • Yang Z (Editor), Li T (Co-Editor), Karl Waedt, Lin Yanghuichen. Information technology- Security techniques-Security reference model for industrial internet platfrom. ISO/IEC 24392, 2023 July Published.
  • 《信息安全技术 物联网数据传输安全技术要求(GB/T37025—2018)》, 国家标准. 杨震; 范科峰; 丁治明; 赖英旭; 刘贤刚; 黄剑; 李健; 龚洁中; 李琳; 李怡德; 马占宇; 段立娟; 秦华; 丁丽萍; 顾健; 齐力; 杨明; 陈书义; 裴庆祺; 张志勇; 曹占峰; 聂祥飞; 涂山山; 何通海; 魏欣; 吴亚玺; 李童; 刘静; 蔡伟; 邹仕洪. 2018年12月28日发布,2019年7月1日实施。
  • 《信息安全技术 物联网安全参考模型及通用要求(37044—2018 )》, 国家标准. 龚洁中; 李琳; 范科峰; 杨震; 李京春; 姚相振; 周睿康; 周松奕; 刘军明; 蒋昊; 顾健; 齐力; 杨明; 陈书义; 马占宇; 常亮; 王勇; 陶晓玲; 谷大武; 陈恭亮; 曹占峰. 2018年12月28日发布,2019年7月1日实施。

Selected Papers

Data Mining / Artificial Intelligence Theory and Application

  • Ma Z*, Lu X, Xie J, Yang Z*, Xue Jao, Tan Z, Xiao B, Guo J. On the Comparisons of Decorrelation Approaches for Non-Gaussian Neutral Vector Variables,” in IEEE Transactions on Neural Networks and Learning Systems, vol. 34, no. 4, pp. 1823-1837, April 2023, doi: 10.1109/TNNLS.2020.2978858.
  • Liu Y, Li T, Huang Z, Yang Z. BARA: A Dynamic State-based Serious Game for Teaching Requirements Elicitation, has been accepted to ICSE 2023. CCF A
  • Gengyu Lyu, Songhe Feng, Shaokai Wang, and Zhen Yang. 2023. Prior Knowledge Constrained Adaptive Graph Framework for Partial Label Learning. ACM Trans. Intell. Syst. Technol. 14, 2, Article 25 (April 2023), 16 pages. https://doi.org/10.1145/3569421
  • Lu N, Yang Z*, Huang J, Wu Y, Wang H. Silence or Outbreak – a Real-time Emergent Topic Identification System (RealTIS) for Social Media, AAAI 2022 (Demonstration Track), 13194-13196. CCF A
  • Liu Y, Yang Z, Li T, Wu D. A novel POI recommendation model based on joint spatiotemporal effects and four-way interaction. Appl. Intell. 52(5): 5310-5324 (2022)
  • Du Y, Li T, Pathan M, Tekehaimanot H, Yang Z. An Effective Sarcasm Detection Approach Based on Sentimental Context and Individual Expression Habits. Cogn. Comput. 14(1): 78-90 (2022)
  • Liu Y, Yang Z, Li T, Wu D. A novel POI recommendation model based on joint spatiotemporal effects and four-way interaction. Appl. Intell. 52(5): 5310-5324 (2022)
  • Yang Z, Liu X, Li T, Wu D, Wang J, Zhao Y, Han H. A systematic literature review of methods and datasets for anomaly-based network intrusion detection. Comput. Secur. 116: 102675 (2022)
  • Liu J, Yang Z, Li T, Wu D, Wang R. SPR: Similarity pairwise ranking for personalized recommendation. Knowl. Based Syst. 239: 107828 (2022)
  • Li Z, Li T, Zhang R, Wu D, Yang Z. A Novel Network Alert Classification Model based on Behavior Semantic. SEKE 2022: 553-558
  • Feng W, Li T, Yang Z. COAT: A Music Recommendation Model based on Chord Progression and Attention Mechanisms. SEKE 2022: 616-621
  • Yang Z, Wu D, Li T*, Feng W, Tu S. A Mulit-objective Cluster Head SelectionOptimization Algorithm for Industrial Wireless Sensor Networks. 2021 IEEE 6th International Conference on Image, Vision and Computing (ICIVC). IEEE, 2021. Ms. Wu Di Awarded Excellent Paper Presentation Award Winners
  • Feng, Weite, Tong Li*, Haiyang Yu, and Zhen Yang. A Hybrid Music Recommendation Algorithm Based on Attention Mechanism. In International Conference on Multimedia Modeling, pp. 328-339. Springer, Cham, 2021.
  • Kidu H, Misgna H, Li T, Yang Z. User Response-Based Fake News Detection on Social Media. ICAI 2021: 173-187
  • Feng W, Li T, Yu H, Yang Z. A Hybrid Music Recommendation Algorithm Based on Attention Mechanism. MMM (1) 2021: 328-339
  • Zhi Y, Li T, Yang Z. Extracting features from app descriptions based on POS and dependency. SAC 2021: 1354-1358
  • Zhao G, Li T, Yang Z. An Extended Knowledge Representation Learning Approach for Context-Based Traceability Link Recovery: Extended Abstract. AIRE@RE 2020: 22
  • Wang R, Li T, Yang Z, Yu H. Predicting Polypharmacy Side Effects Based on an Enhanced Domain Knowledge Graph. ICAI 2020: 89-103
  • Zhao G, Li T, Yang Z. An Extended Knowledge Representation Learning Approach for Context-based Traceability Link Recovery. SEKE 2020: 77-82
  • Ruiyi Wang, Tong Li* and Zhen Yang. Predicting Polypharmacy Side Effects Based on an Enhanced Domain Knowledge Graph. International Conference on Applied Informatics, 2020, pp. 89–103.
  • Yang Z*, Yao Y, Tu S. Exploiting Sparse Topics Mining for Temporal Event Summarization. 2020 IEEE 5th International Conference on Image, Vision and Computing (ICIVC). IEEE, 2020: 322-331. Best Paper Award
  • Wang S, Li T, Yang Z. Exploring Semantics of Software Artifacts to Improve Requirements Traceability Recovery: A Hybrid Approach. APSEC 2019: 39-46
  • Wang S, Li T, Yang Z. Using Graph Embedding to Improve Requirements Traceability Recovery. ICAI 2019: 533-545
  • Yang Z*, Yu H, Tang J, Liu H. Toward Keyword Extraction in Constrained Information Retrieval in Vehicle Social Network. IEEE Transactions on Vehicular Technology, 2019, 68(5): 4285-4294. (5-year Impact factor: 5.119)
  • Ma, Z., Xue, J. H., Leijon, A., Tan, Z. H., Yang, Z., Guo, J. Decorrelation of neutral vector variables: Theory and applications. IEEE Transactions on Neural Network and Learning Systems (TNNLS), 2018, 29(1): 129-143. (5-year Impact factor: 8.823)
  • Yang Z, Chen W, Huang J. Enhancing recommendation on extremely sparse data with blocks-coupled non-negative matrix factorization. Neurocomputing, 2018, 278: 126-133.
  • Yang Z*, Tang J, Liu H. Cloud Information Retrieval: Model Description and Scheme Design. IEEE Access, 2018, 6: 15420-15430.
  • Yang Z, Gao K, Huang J. External Expansion Risk Management: Enhancing Microblogging Filtering Using Implicit Query. Wireless Personal Communications, 2018, 102(3): 2199-2209.
  • Yang Z, Yao F, Fan K, Huang J. Text Dimensionality Reduction with Mutual Information Preserving Mapping. Chinese Journal of Electronics 26.5 (2017): 919-925.
  • Yang Z, Gao K, Fan K, Lai Y. “Sensational Headline Identification By Normalized Cross Entropy-Based Metric.” The Computer Journal, 2015, 58 (4): 644-655.
  • Yang Z*, Issac J, Hu X, Liu H. “Finding the Right Social Media Site for Questions.” 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM’15), August 25-28, 2015, Paris, France, 639-644. (A demo Q&A system ‘Social Answer’ was demonstrated in ICDM’15)
  • Dani H, Morstatter F, Xia H, Yang Z, and Liu H. Social Answer: A System for Finding Appropriate Sites for Questions in Social Media. In 2015 IEEE International Conference on Data Mining Workshop (ICDMW), pp. 1632-1635. IEEE, 2015 (This is a demo track paper that demonstrates a Q&A system ‘Social Answer’ proposed in our ASONAM’15 paper!)
  • Yang Z, Fan K, Lai Y, Gao K, Wang Y. “Short Texts Classification Through Reference Document Expansion.” Chinese Journal of Electronics, 2014, 23(2): 315-321.
  • Yang Z, Wang L, Lai Y. “ Online comment clustering based on an improved semantic distance.” Ruan Jian Xue Bao/Journal of Software, 2014, 25(12): 2777-2789. (in Chinese, 杨震, 王来涛, 赖英旭. 基于改进语义距离的网络评论聚类研究. 软件学报, 25(12): 2777-278, 2014)
  • Yang Z, Wang L, Fan K, Lai Y. “Exemplar-Based Clustering Analysis Optimized by Genetic Algorithm.” Chinese Journal of Electronics, 2013, 22(4): 735-740.
  • Yang Z*, Lei J, Fan K, Lai Y. “Keyword Extraction by Entropy Difference Between the Intrinsic and Extrinsic Mode.” Physica A: Statistical Mechanics and its Applications, 2013, 392(19): 4523-4531. [Paper, Code]
  • Yang Z, Lai Y, Duan L, Li Y, Xu X. “Spam Collaborative Filtering in Enron E-mail Network.” Acta Automatica Sinica, 2012, 38(3): 399-411. (in Chinese, 杨震, 赖英旭, 段立娟等. 邮件网络协同过滤机制研究. 自动化学报, 38(3): 399-411, 2012)
  • Yang Z, Lai Y, Duan L, Li Y. “Short Text Sentiment Classification Based on Context Reconstruction.” Acta Automatica Sinica, 2012, 38(1): 55-67. (in Chinese, 杨震, 赖英旭, 段立娟等. 基于上下文重构的短文本情感极性判别研究. 自动化学报, 38(1): 55-67, 2012)
  • Yang Z, Fan K, Lei J, Guo J. Text Manifold Based on Semantic Analysis. Acta Electronica Sinica, 37(3): 557-561, 2009. (in Chinese, 杨震, 范科峰, 雷建军, 郭军. 基于语义的文本流形研究. 电子学报, 37(3): 557-561, 2009)

Data Security / Cybersecurity

  • S. Yang, Y. Chen, Z. Yang*, B. Li and H. Liu, “Fast Secure Aggregation with High Dropout Resilience for Federated Learning,” in IEEE Transactions on Green Communications and Networking, doi: 10.1109/TGCN.2023.3277251.
  • Y. Chen, S. Yang, J. -F. Martínez, L. López and Z. Yang, “A Resilient Group-Based Multisubset Data Aggregation Scheme for Smart Grid,” in IEEE Internet of Things Journal, 10 (15) , pp.13649-13661 doi: 10.1109/JIOT.2023.3262731.
  • Shan X, Yu H, Chen Y, Yang Z. Physical Unclonable Function Based Lightweight and Verifiable Data Stream Transmission for Industrial IoT, IEEE Transactions on Industrial Informatics (IEEE TII), 2023
  • Yang Z, Zhou M,Yu H*, Sinnott R. O. and Liu H, “Efficient and Secure Federated Learning With Verifiable Weighted Average Aggregation,” in IEEE Transactions on Network Science and Engineering, 2023, 10(1): 205-222.
  • Yu H, Yang Z*, Tu S, Waqas M, Liu H Blockchain-Based Offline Auditing for the Cloud in Vehicular Networks. IEEE Trans. Netw. Serv. Manag. 19(3): 2944-2956 (2022)
  • Yu H, Yang Z, Waqas M, Tu S, Han Z, Hailm Z, Sinnott R, Parampalli U. Efficient dynamic multi-replica auditing for the cloud with geographic location. Future Gener. Comput. Syst. 125: 285-298 (2021)
  • Zhang H, Yang Z, Yu H. Lightweight and Privacy-preserving Search over Encryption Blockchain. IC-NIDC 2021: 423-427
  • Zhou M, Yang Z*, Yu H, Lai Y, Ma Z. Privacy-Preserving Verifiable Collaborative Learning with Chain Aggregation[C], 7th IEEE International Conference on Network Intelligence and Digital Content, 2021, Nov. 17-19.   Best Paper Award
  • Wu J, Yu H, Yang Z, Yin R. Disk Failure Prediction with Multiple Channel Convolutional Neural Network. IJCNN 2021: 1-8
  • Yang Z, Li T, Waedt K. Li Y. The Need of Standardizing Industrial Internet Platform: Challenges and Threats. SC 27 Journal, 2021, 1(2), 15-30.
  • Yu H, Ma S, Hu Q, Yang Z*. Blockchain-Based Continuous Auditing for Dynamic Data Sharing in Autonomous Vehicular Networks. Computer, 54 (8), 33-45 (Impact factor: 4.419) August 2021 Features Article
  • Yu H, Hu Q, Yang Z*, Liu H. Efficient Continuous Big Data Integrity Checking for Decentralized Storage. IEEE Transactions on Network Science and Engineering, 8(2), 1658-1673, 2021 (DOI: 10.1109/TNSE.2021.3068261, 5-year Impact factor: 5.213)
  • Liu X, Li T, Zhang R, Wu D, Liu Y, Yang Z. A GAN and Feature Selection-Based Oversampling Technique for Intrusion Detection. Secur. Commun. Networks 2021: 9947059:1-9947059:15 (2021)
  • Wang G, Li T, Yue H, Yang Z, Zhang R. Integrating Heterogeneous Security Knowledge Sources for Comprehensive Security Analysis. COMPSAC 2021: 714-724
  • Chen Y, Martínez J, López L, Yu H, Yang Z*. A dynamic membership group-based multiple-data aggregation scheme for smart grid. IEEE Internet of Things Journal, 8(15), 12360-12374, 2021 (5-year Impact factor: 11.705)
  • Yang Z, Zhang H, Yu H*, Li Z, Zhu B, Sinnott R O. Attribute-Based Keyword Search over the Encrypted Blockchain, Computer Modeling in Engineering and Sciences (CMES), 2021. (Accepted)
  • Wu J, Yu H, Yang Z, Yin R. Disk Failure Prediction with Multiple Channel Convolutional Neural Network, International Joint Conference on Neural Networks (IJCNN 2021), 2021. (Accepted)
  • Yu H, Yang Z, Sinnott R O. Decentralized Big Data Auditing for Smart City Environments Leveraging Blockchain Technology. IEEE Access, 2019, 7: 6288-6296.
  • Yu H, Cai Y, Sinnott R O*, Yang Z. ID-Based Dynamic Replicated Data Auditing for the Cloud, Concurrency and Computation: Practice and Experience (CCPE), 31(11): e5051, 2019.
  • Yang Z, Yang T, Fan K, Wang Y. Cloud Services Composition Based on Trust Combination. Acta Electronica Sinica, 2018,46(3):614-620. (in Chinese, 杨震, 杨甜甜, 范科峰,等. 基于信任合成的云服务动态组合机制研究. 电子学报, 2018,46(3):614-620).
  • 杨震, 刘贤刚, 范科峰. 工业互联网平台安全参考模型国际标准提案研究. 信息技术与标准化, 2018, 401(05):34-37.
  • 李怡德, 杨震*, 龚洁中, 何通海. 物联网安全参考架构研究. 信息安全研究, 2016, 2(5):417-423.
  • Guoshuai Zhao, Tong Li* and Zhen Yang. “An Extended Knowledge Representation Learning Approach for Context-Based Traceability Link Recovery (S).” International Conference on Software Engineering and Knowledge Engineering (SEKE), 2020, pp. 77–82.
  • Wang, Shiheng, Tong Li*, and Zhen Yang. “Exploring Semantics of Software Artifacts to Improve Requirements Traceability Recovery: A Hybrid Approach.” In 2019 26th Asia-Pacific Software Engineering Conference (APSEC), pp. 39-46. IEEE, 2019.
  • Wang, Shiheng, Tong Li*, and Zhen Yang. “Using Graph Embedding to Improve Requirements Traceability Recovery.” In International Conference on Applied Informatics, pp. 533-545. Springer, Cham, 2019.

More can be found in dblp!