WANT A PROFILE LIKE THIS?
Create my FREE Plan Or learn about other options
Yue Zhang
PeerJ Editor
2,970 Points

Contributions by role

Editor 2,970

Contributions by subject area

Algorithms and Analysis of Algorithms
Data Mining and Machine Learning
Security and Privacy
Neural Networks
Artificial Intelligence
Cryptography
Distributed and Parallel Computing
Emerging Technologies
Autonomous Systems
Computer Networks and Communications
Mobile and Ubiquitous Computing
Internet of Things
Blockchain
Sentiment Analysis
Human-Computer Interaction
Computer Education
World Wide Web and Web Science
Software Engineering
Cryptocurrency
Text Mining
Data Science
Databases
Quantum Computing
Network Science and Online Social Networks
Embedded Computing

Yue Zhang

PeerJ Editor

Summary

Yue Zhang is an assistant professor at Drexel University’s Computer Science department. His research primarily focuses on system security, specifically in the areas of IoT Security and mobile security. He has published more than 40 papers in security conferences (e.g., USENIX Security, ACM CCS, and NDSS) and journals (e.g., TDSC, TPDS). He received a Best Paper Honorable Mention Award at ACM CCS 2022, and the Best Paper Award at 2019 IEEE International Conference on Industrial Internet. He has also served on the organization committees of the conferences (e.g., general chair of EAI ICECI, track chair for IEEE MSN and IEEE MASS) and technical program committee of the conferences (e.g., USENIX Security, NDSS, ACM CCS, RAID). He serves as an Associate Editor for IEEE T-IFS, HCC and Editor Member of the Blockchain Journal, Electronics Journal, and CMC. His research had led to the discovery of many vendor-acknowledged vulnerabilities, such as by Bluetooth SIG, Apple, Google, and Texas Instruments, and had attracted intense media attention such as Hacker News, and Mirage News.

Computer Networks & Communications Internet of Things Mobile & Ubiquitous Computing Security & Privacy Software Engineering

Editorial Board Member

PeerJ Computer Science

Past or current institution affiliations

Drexel University
Ohio State University

Work details

Assistant Professor

Drexel University
September 2023
Computer Science

Post Doc

Ohio State University
September 2020 - September 2023

Websites

  • Homepage
  • Google Scholar

PeerJ Contributions

  • Edited 16

Academic Editor on

January 23, 2025
Blockchain enabled policy-based access control mechanism to restrict unauthorized access to electronic health records
Nadeem Yaqub, Jianbiao Zhang, Muhammad Irfan Khalid, Weiru Wang, Markus Helfert, Mansoor Ahmed, Jungsuk Kim
https://doi.org/10.7717/peerj-cs.2647
December 20, 2024
Blockchain-enabled data governance for privacy-preserved sharing of confidential data
Jingchi Zhang, Anwitaman Datta
https://doi.org/10.7717/peerj-cs.2581
November 27, 2024
A review of organization-oriented phishing research
Kholoud Althobaiti, Nawal Alsufyani
https://doi.org/10.7717/peerj-cs.2487
November 22, 2024
Efficient phrase search with reliable verification over encrypted cloud-IoT data
Wanshan Xu, Ze Zhu, Muhammad Irfan Khalid
https://doi.org/10.7717/peerj-cs.2235
November 22, 2024
An enhanced integrated fuzzy logic-based deep learning techniques (EIFL-DL) for the recommendation system on industrial applications
Yasir Rafique, Jue Wu, Abdul Wahab Muzaffar, Bilal Rafique
https://doi.org/10.7717/peerj-cs.2529
September 6, 2024
An empirical evaluation of link quality utilization in ETX routing for VANETs
Raad Al-Qassas, Malik Qasaimeh
https://doi.org/10.7717/peerj-cs.2259
August 28, 2024
Wormhole attack detection and mitigation model for Internet of Things and WSN using machine learning
Asma Hassan Alshehri
https://doi.org/10.7717/peerj-cs.2257
August 9, 2024
An efficient secure and energy resilient trust-based system for detection and mitigation of sybil attack detection (SAN)
Muhammad Zunnurain Hussain, Zurina Mohd Hanapi, Azizol Abdullah, Masnida Hussin, Mohd Izuan Hafez Ninggal
https://doi.org/10.7717/peerj-cs.2231
June 28, 2024
Connect attack in IoT-WSN detect through cyclic analysis based on forward and backward elimination
Tamil Selvi S., Visalakshi P.
https://doi.org/10.7717/peerj-cs.2130
June 24, 2024
Comparative evaluation of machine learning algorithms for phishing site detection
Noura Fahad Almujahid, Mohd Anul Haq, Mohammed Alshehri
https://doi.org/10.7717/peerj-cs.2131
June 17, 2024
Outlier detection for keystroke biometric user authentication
Mahmoud G. Ismail, Mohammed A.-M. Salem, Mohamed A. Abd El Ghany, Eman Abdullah Aldakheel, Safia Abbas
https://doi.org/10.7717/peerj-cs.2086
June 12, 2024
Detection of malicious nodes based on consortium blockchain
Song Luo, Lianghai Lai, Tan Hu, Xin Hu
https://doi.org/10.7717/peerj-cs.2108
April 26, 2024
Security risk models against attacks in smart grid using big data and artificial intelligence
Yazeed Yasin Ghadi, Tehseen Mazhar, Khursheed Aurangzeb, Inayatul Haq, Tariq Shahzad, Asif Ali Laghari, Muhammad Shahid Anwar
https://doi.org/10.7717/peerj-cs.1840
March 26, 2024
Blockchain-enabled infrastructural security solution for serverless consortium fog and edge computing
Abdullah Ayub Khan, Asif Ali Laghari, Abdullah M. Baqasah, Roobaea Alroobaea, Ahmad Almadhor, Gabriel Avelino Sampedro, Natalia Kryvinska
https://doi.org/10.7717/peerj-cs.1933
March 26, 2024
What are developers talking about information security? A large-scale study using semantic analysis of Q&A posts
Fatih Gurcan
https://doi.org/10.7717/peerj-cs.1954
December 20, 2023
Attribute identification based IoT fog data security control and forwarding
Jingxu Xiao, Chaowen Chang, Ping Wu, Yingying Ma
https://doi.org/10.7717/peerj-cs.1747