


default search action
Yulong Fu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j25]Mohammad Bagher Dowlatshahi
, Amin Hashemi, Marjan Kuchaki Rafsanjani, Yulong Fu
:
Ant colony optimization enhanced with ensemble of pheromone vectors using multi-criteria decision making: A case study in multi-label text feature selection. Appl. Soft Comput. 185: 114001 (2025)
[j24]Yulong Fu, Yuanqi Xie, Wei Yi, Bikal Poudel, Jin Cao, Hui Li:
IPO-ZTA: An Intelligent Policy Orchestration Zero Trust Architecture for B5G and 6G. Comput. Networks 269: 111450 (2025)
[j23]Ruyan Lin
, Yulong Fu
, Wei Yi
, Jincheng Yang
, Jin Cao
, Zhiqiang Dong
, Fei Xie
, Hui Li
:
Vulnerabilities and Security Patches Detection in OSS: A Survey. ACM Comput. Surv. 57(1): 23:1-23:37 (2025)
[j22]Wei Yi
, Yulong Fu
, Jin Cao
, Lu Gan
, Lihui Xiong
, Hui Li
:
Toward Seamless 6G and AI/ML Convergence: Architectural Enhancements and Security Challenges. IEEE Netw. 39(4): 157-165 (2025)
[j21]Wei Yi
, Yulong Fu
, Jin Cao
, Yinghui Zhang
, Ben Niu
, Hui Li
:
AotmAuth: Atomic Function Module-Based 6G Authentication Protocol Combination Framework. IEEE Trans. Dependable Secur. Comput. 22(5): 4813-4828 (2025)
[c15]Jiahui Wang, Yulong Fu, Jincheng Yang:
Q-PGD: A Stealthy and Effective Speaker Recognition Adversarial Attacks Based on Quantized Projected Gradient Descent. IJCNN 2025: 1-8
[i3]Mingyang Yu, Haorui Yang, Donglin Wang, Desheng Kong, Ji Du, Yulong Fu, Wei Wang, Jing Xu:
Distributed Shared Layered Storage Quantum Simulator: A novel quantum simulation system for efficient scaling and cost optimization. CoRR abs/2508.15542 (2025)
[i2]Mingyang Yu, Haorui Yang, Donglin Wang, Desheng Kong, Ji Du, Yulong Fu, Jing Xu:
QVecOpt: An Efficient Storage and Computing Opti-mization Framework for Large-scale Quantum State Simulation. CoRR abs/2508.15545 (2025)
[i1]Donglin Wang, Weiyun Liang, Chunyuan Chen, Jing Xu, Yulong Fu:
Governable AI: Provable Safety Under Extreme Threat Models. CoRR abs/2508.20411 (2025)- 2024
[j20]Xuefei Cao
, Lanjun Dang
, Kai Fan
, Xingwen Zhao, Yulong Fu
, Yingzi Luan:
A Dynamic and Efficient Self-Certified Authenticated Group Key Agreement Protocol for VANET. IEEE Internet Things J. 11(17): 29146-29156 (2024)- 2023
[c14]Jiahui Wang, Yulong Fu, Mengru Liu, Jin Cao, Hui Li, Zheng Yan:
Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft Biometrics. ISPEC 2023: 52-73- 2022
[j19]Kedong Zhao
, Yongrong Sun
, Hua Li
, Ling Wu
, Yulong Fu
:
Monocular Visual Pose Estimation for Flexible Drogue by Decoupling the Deformation. IEEE Trans. Instrum. Meas. 71: 1-11 (2022)
[c13]Han Zeng, Ze-Tong Li, Tian Luan, Yulong Fu, Xutao Yu, Zaichen Zhang:
Optimized meta-VQE Algorithm for Better Trend Learning of Ground State Energy. WCSP 2022: 800-803- 2021
[j18]Jingwen Wang, Xuyang Jing, Zheng Yan
, Yulong Fu, Witold Pedrycz, Laurence T. Yang:
A Survey on Trust Evaluation Based on Machine Learning. ACM Comput. Surv. 53(5): 107:1-107:36 (2021)
[j17]Jin Cao
, Maode Ma
, Yulong Fu, Hui Li
, Yinghui Zhang
:
CPPHA: Capability-Based Privacy-Protection Handover Authentication Mechanism for SDN-Based 5G HetNets. IEEE Trans. Dependable Secur. Comput. 18(3): 1182-1195 (2021)- 2020
[j16]Jin Cao
, Zheng Yan
, Ruhui Ma
, Yinghui Zhang
, Yulong Fu, Hui Li
:
LSAA: A Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks. IEEE Internet Things J. 7(6): 5329-5344 (2020)
[j15]Yulong Fu, Hanlu Chen, Qinghua Zheng, Zheng Yan
, Raimo Kantola, Xuyang Jing, Jin Cao, Hui Li:
An Adaptive Security Data Collection and Composition Recognition method for security measurement over LTE/LTE-A networks. J. Netw. Comput. Appl. 155: 102549 (2020)
[j14]Xuefei Cao
, Yulong Fu
, Bo Chen:
Packet-Based Intrusion Detection Using Bayesian Topic Models in Mobile Edge Computing. Secur. Commun. Networks 2020: 8860418:1-8860418:12 (2020)
2010 – 2019
- 2019
[j13]Yali Wu
, Xinrui Wang
, Yulong Fu
, Guoting Li
:
Many-Objective Brain Storm Optimization Algorithm. IEEE Access 7: 186572-186586 (2019)
[j12]Huaqing Lin, Zheng Yan
, Yulong Fu:
Adaptive security-related data collection with context awareness. J. Netw. Comput. Appl. 126: 88-103 (2019)
[j11]Xiaolong Xin, Yulong Fu, Yanyan Lai, Juntao Wang:
Monadic pseudo BCI-algebras and corresponding logics. Soft Comput. 23(5): 1499-1510 (2019)
[c12]Guoquan Li, Yulong Fu, Zheng Yan
, Weilin Hao:
Quantifiable Network Security Measurement: A Study Based on an Index System. ML4CS 2019: 47-62
[c11]Yulong Fu, Xinyi Yuan, Ke Wang, Zheng Yan
, Hui Li:
A Security Formal Model for Multiple Channels Communication. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1425-1430
[c10]Yulong Fu, Guoquan Li, Mohammed Atiquzzaman, Zheng Yan
, Jin Cao, Hui Li:
A Study and Enhancement to the Security of MANET AODV Protocol Against Black Hole Attacks. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1431-1436
[p1]Yali Wu, Xinrui Wang, Yingruo Xu, Yulong Fu:
Multi-objective Differential-Based Brain Storm Optimization for Environmental Economic Dispatch Problem. Brain Storm Optimization Algorithms 2019: 79-104- 2018
[j10]Jin Cao, Maode Ma, Hui Li, Yulong Fu, Xuefeng Liu:
EGHR: Efficient group-based handover authentication protocols for mMTC in 5G wireless networks. J. Netw. Comput. Appl. 102: 1-16 (2018)
[j9]Donghao Zhou, Zheng Yan, Yulong Fu, Zhen Yao:
A survey on network data collection. J. Netw. Comput. Appl. 116: 9-23 (2018)
[j8]Guoquan Li, Zheng Yan
, Yulong Fu
, Hanlu Chen:
Data Fusion for Network Intrusion Detection: A Review. Secur. Commun. Networks 2018: 8210614:1-8210614:16 (2018)
[c9]Guoquan Li, Zheng Yan
, Yulong Fu:
A Study and Simulation Research of Blackhole Attack on Mobile AdHoc Network. CNS 2018: 1-6- 2017
[j7]Yulong Fu, Zheng Yan
, Hui Li, Xiao-Long Xin, Jin Cao:
A secure SDN based multi-RANs architecture for future 5G networks. Comput. Secur. 70: 648-662 (2017)
[j6]Yulong Fu
, Zheng Yan
, Jin Cao, Ousmane Koné, Xuefei Cao:
An Automata Based Intrusion Detection Method for Internet of Things. Mob. Inf. Syst. 2017: 1750637:1-1750637:13 (2017)
[c8]Jin Cao, Maode Ma, Hui Li, Yulong Fu, Ben Niu, Fenghua Li:
Trajectory prediction-based handover authentication mechanism for mobile relays in LTE-A high-speed rail networks. ICC 2017: 1-6
[c7]Hanlu Chen, Yulong Fu, Zheng Yan
:
Survey on Big Data Analysis Algorithms for Network Security Measurement. NSS 2017: 128-142
[c6]Xuefei Cao, Lanjun Dang, Kai Fan, Yulong Fu:
An Attack to an Anonymous Certificateless Group Key Agreement Scheme and Its Improvement. SpaCCS 2017: 56-69
[c5]Yali Wu, Xinrui Wang, Yulong Fu, Yingruo Xu:
Difference Brain Storm Optimization for Combined Heat and Power Economic Dispatch. ICSI (1) 2017: 519-527- 2016
[j5]Xiaolong Xin, Pengfei He, Yulong Fu:
States on hyper MV-algebras. J. Intell. Fuzzy Syst. 31(3): 1299-1309 (2016)- 2015
[j4]Yulong Fu
, Ousmane Koné:
Model based security verification of protocol implementation. J. Inf. Secur. Appl. 22: 17-27 (2015)- 2014
[j3]Xiaolong Xin, Yulong Fu:
Some results of convex fuzzy sublattices. J. Intell. Fuzzy Syst. 27(1): 287-298 (2014)
[j2]Yulong Fu, Ousmane Koné:
Security and Robustness by Protocol Testing. IEEE Syst. J. 8(3): 699-707 (2014)- 2013
[j1]Yulong Fu, Ousmane Koné:
Validation of security protocol implementations from security objectives. Comput. Secur. 36: 27-39 (2013)
[c4]Yulong Fu, Ousmane Koné:
Using transition systems to model and verify the implementation of security protocol. SIN 2013: 210-217
[c3]Yulong Fu, Ousmane Koné:
A finite transition model for security protocol verification. SIN 2013: 368-371- 2011
[c2]Yulong Fu, Ousmane Koné:
Network Securing against Threatening Requests. DPM/SETOP 2011: 280-294
[c1]Yulong Fu, Ousmane Koné:
A Robustness Testing Method for Network Security. ICGS3/e-Democracy 2011: 38-45
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-11-23 20:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







