Profil

ZHANG Yang

University of Luxembourg

Main Referenced Co-authors
PANG, Jun  (10)
Ceulemans, B. (1)
Cheng, Ran (1)
Chu, Dalin (1)
Copmans, D. (1)
Main Referenced Keywords
Animalia (1); Article (1); Danio rerio (1); Data mining (1); Elliptic Curve Cryptography (1);
Main Referenced Unit & Research Centers
Luxembourg Centre for Systems Biomedicine (LCSB): Chemical Biology (Crawford Group) (1)
Main Referenced Disciplines
Computer science (12)
Human health sciences: Multidisciplinary, general & others (1)

Publications (total 13)

The most downloaded
451 downloads
Chu, D., Groszschädl, J., Liu, Z., Müller, V., & Zhang, Y. (2013). Twisted Edwards-Form Elliptic Curve Cryptography for 8-bit AVR-based Sensor Nodes. In K. Chen, Q. Xie, W. Qiu, S. Xu, ... Y. Zhao (Eds.), Proceedings of the first ACM Workshop on Asia Public-Key Cryptography (ASIAPKC 2013) (pp. 39-44). ACM Press. doi:10.1145/2484389.2484398 https://hdl.handle.net/10993/14765

The most cited

86 citations (Scopus®)

Zhang, Y., Kecskés, A., Copmans, D., Langlois, M., Crawford, A. D., Ceulemans, B., Lagae, L., De Witte, P. A. M., & Esguerra, C. V. (2015). Pharmacological characterization of an antisense knockdown zebrafish model of Dravet syndrome: Inhibition of epileptic seizures by the serotonin agonist fenfluramine. PLoS ONE, 10 (5). doi:10.1371/journal.pone.0125898 https://hdl.handle.net/10993/27294

Zhang, Y. (2016). To Share or not to Share: Access Control and Information Inference in Social Networks [Doctoral thesis, Unilu - University of Luxembourg]. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/29218

Ni, M., Zhang, Y., Han, W., & Pang, J. (2016). An Empirical Study on User Access Control in Online Social Networks. In Proceedings of the 21st ACM Symposium on Access Control Models and Technologies (SACMAT'16) (pp. 13-23). ACM. doi:10.1145/2914642.2914644
Peer reviewed

Pang, J., & Zhang, Y. (2015). Cryptographic protocols for enforcing relationship-based access control policies. In Proceedings of the 39th Annual IEEE Computers, Software & Applications Conference (COMPSAC'15) (IEEE CS, pp. 484-493).
Peer reviewed

Cheng, R., Pang, J., & Zhang, Y. (2015). Inferring friendship from check-in data of location-based social networks. In Proceedings of the 7th International Conference on Advances in Social Networks Analysis and Mining (ASONAM'15) (pp. 1284-1291). IEEE CS.
Peer reviewed

Pang, J., & Zhang, Y. (2015). Event prediction with community leaders. In Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES'15) (pp. 238-243). IEEE CS.
Peer reviewed

Zhang, Y., & Pang, J. (2015). Community-Driven Social Influence Analysis and Applications. In Proceedings of the 15th International Conference on Web Engineering. Springer.
Peer reviewed

Pang, J., & Zhang, Y. (2015). Exploring communities for effective location prediction. In Proceedings of the 24th World Wide Web Conference. ACM. doi:10.1145/2740908.2742720
Peer reviewed

Zhang, Y., Kecskés, A., Copmans, D., Langlois, M., Crawford, A. D., Ceulemans, B., Lagae, L., De Witte, P. A. M., & Esguerra, C. V. (2015). Pharmacological characterization of an antisense knockdown zebrafish model of Dravet syndrome: Inhibition of epileptic seizures by the serotonin agonist fenfluramine. PLoS ONE, 10 (5). doi:10.1371/journal.pone.0125898
Peer Reviewed verified by ORBi

Pang, J., & Zhang, Y. (2015). Location prediction: Communities speak louder than friends. In Proceedings of the 3rd ACM Conference on Online Social Networks (COSN'15) (pp. 161-171). ACM.
Peer reviewed

Cramer, M., Pang, J., & Zhang, Y. (2015). A logical approach to restricting access in online social networks. In Proceedings of the 20th ACM Symposium on Access Control Models and Technologies. ACM.
Peer reviewed

Pang, J., & Zhang, Y. (2015). A new access control scheme for Facebook-style social networks. Computers and Security, 54, 44-59. doi:10.1016/j.cose.2015.04.013
Peer reviewed

Pang, J., & Zhang, Y. (2014). A new access control scheme for Facebook-style social networks. In Proceedings of the 9th Conference on Availability, Reliability and Security (ARES 2014, Best Paper Award) (pp. 1-10). IEEE CS. doi:10.1109/ARES.2014.9
Peer reviewed

Chu, D., Groszschädl, J., Liu, Z., Müller, V., & Zhang, Y. (2013). Twisted Edwards-Form Elliptic Curve Cryptography for 8-bit AVR-based Sensor Nodes. In K. Chen, Q. Xie, W. Qiu, S. Xu, ... Y. Zhao (Eds.), Proceedings of the first ACM Workshop on Asia Public-Key Cryptography (ASIAPKC 2013) (pp. 39-44). ACM Press. doi:10.1145/2484389.2484398
Peer reviewed

Contact ORBilu