Wei Liang

Orcid: 0000-0003-3813-3223

Affiliations:
  • Xiamen University of Technology, School of Opto-Electronic and Communication Engineering, China
  • Hunan University, College of Mathematics and Econometrics, Changsha, China (former)
  • Hunan University of Science and Technology, School of Computer Science and Engineering, Xiangtan, China (former)


According to our database1, Wei Liang authored at least 152 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Blockchain-based privacy-preserving multi-tasks federated learning framework.
Connect. Sci., December, 2024

QoS Prediction and Adversarial Attack Protection for Distributed Services Under DLaaS.
IEEE Trans. Computers, March, 2024

BAKA: Biometric Authentication and Key Agreement Scheme Based on Fuzzy Extractor for Wireless Body Area Networks.
IEEE Internet Things J., February, 2024

A Trajectory Privacy-Preserving Scheme Based on Transition Matrix and Caching for IIoT.
IEEE Internet Things J., February, 2024

MMDS: A secure and verifiable multimedia data search scheme for cloud-assisted edge computing.
Future Gener. Comput. Syst., February, 2024

2023
FTMaster: A Detection and Mitigation System of Low-Rate Flow Table Overflow Attacks via SDN.
IEEE Trans. Netw. Serv. Manag., December, 2023

Real-Time Monitoring and Mitigation of SDoS Attacks Using the SDN and New Metrics.
IEEE Trans. Cogn. Commun. Netw., December, 2023

Exploring latent weight factors and global information for food-oriented cross-modal retrieval.
Connect. Sci., December, 2023

An efficiency control strategy of dual-motor multi-gear drive algorithm.
Connect. Sci., December, 2023

Low cost network traffic measurement and fast recovery via redundant row subspace-based matrix completion.
Connect. Sci., December, 2023

PrivBCS: a privacy-preserving and efficient crowdsourcing system with fine-grained worker selection based on blockchain.
Connect. Sci., December, 2023

MKSS: An Effective Multi-authority Keyword Search Scheme for edge-cloud collaboration.
J. Syst. Archit., November, 2023

Deep Adversarial Tensor Completion for Accurate Network Traffic Measurement.
IEEE/ACM Trans. Netw., October, 2023

Post-Quantum Security: Opportunities and Challenges.
Sensors, October, 2023

UHIR: An effective information dissemination model of online social hypernetworks based on user and information attributes.
Inf. Sci., October, 2023

Multi-graph fusion based graph convolutional networks for traffic prediction.
Comput. Commun., October, 2023

DRJOA: intelligent resource management optimization through deep reinforcement learning approach in edge computing.
Clust. Comput., October, 2023

Spatial-Temporal Aware Inductive Graph Neural Network for C-ITS Data Recovery.
IEEE Trans. Intell. Transp. Syst., August, 2023

CTDM: cryptocurrency abnormal transaction detection method with spatio-temporal and global representation.
Soft Comput., August, 2023

An efficient intelligent control algorithm for drying rack system.
IET Commun., August, 2023

A Caching-Based Dual K-Anonymous Location Privacy-Preserving Scheme for Edge Computing.
IEEE Internet Things J., June, 2023

Deep reinforcement learning-based microservice selection in mobile edge computing.
Clust. Comput., April, 2023

A Novel Spatial-Temporal Multi-Scale Alignment Graph Neural Network Security Model for Vehicles Prediction.
IEEE Trans. Intell. Transp. Syst., January, 2023

PDPChain: A Consortium Blockchain-Based Privacy Protection Scheme for Personal Data.
IEEE Trans. Reliab., 2023

A DRL-Based Decentralized Computation Offloading Method: An Example of an Intelligent Manufacturing Scenario.
IEEE Trans. Ind. Informatics, 2023

A Regularized Cross-Layer Ladder Network for Intrusion Detection in Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2023

VASERP: An Adaptive, Lightweight, Secure, and Efficient RFID-Based Authentication Scheme for IoV.
Sensors, 2023

GTxChain: A Secure IoT Smart Blockchain Architecture Based on Graph Neural Network.
IEEE Internet Things J., 2023

Fairness constraint efficiency optimization for multiresource allocation in a cluster system serving internet of things.
Int. J. Commun. Syst., 2023

A real-time privacy-preserving scheme based on grouping queries for continuous location-based services.
Concurr. Comput. Pract. Exp., 2023

Research on global register allocation for code containing array-unit dual-usage register names.
Concurr. Comput. Pract. Exp., 2023

LightNestle: Quick and Accurate Neural Sequential Tensor Completion via Meta Learning.
Proceedings of the IEEE INFOCOM 2023, 2023

Reducing the Length Divergence Bias for Textual Matching Models via Alternating Adversarial Training.
Proceedings of the 10th IEEE International Conference on Cyber Security and Cloud Computing, 2023

A Review of Blockchain-based Privacy Computing Research.
Proceedings of the 10th IEEE International Conference on Cyber Security and Cloud Computing, 2023

Automotive Lightweight Design Modeling And Intelligent Optimization Learn Key Technologies.
Proceedings of the 10th IEEE International Conference on Cyber Security and Cloud Computing, 2023

Achieving Efficient and Secure Task Allocation Scheme in Mobile Crowd Sensing.
Proceedings of the 10th IEEE International Conference on Cyber Security and Cloud Computing, 2023

An Efficient Virtual Channel Scheme Based on Multi-hop Payment Channel.
Proceedings of the 10th IEEE International Conference on Cyber Security and Cloud Computing, 2023

Adaboost-based Graph Convolutional Networks with Channel Attention for Intrusion Detection in Internet-of-Things.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

An Efficient Decentralized Mutual Authentication Scheme Between Avatars for Metaverse.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

2022
A Mutual Security Authentication Method for RFID-PUF Circuit Based on Deep Learning.
ACM Trans. Internet Techn., 2022

An Efficient Service Recommendation Algorithm for Cyber-Physical-Social Systems.
IEEE Trans. Netw. Sci. Eng., 2022

A Time-Sensitive Token-Based Anonymous Authentication and Dynamic Group Key Agreement Scheme for Industry 5.0.
IEEE Trans. Ind. Informatics, 2022

A Blockchain-Based Auditable Access Control System for Private Data in Service-Centric IoT Environments.
IEEE Trans. Ind. Informatics, 2022

TraceChain: A blockchain-based scheme to protect data confidentiality and traceability.
Softw. Pract. Exp., 2022

A Survey of Dummy-Based Location Privacy Protection Techniques for Location-Based Services.
Sensors, 2022

Multi-range bidirectional mask graph convolution based GRU networks for traffic prediction.
J. Syst. Archit., 2022

Data Fusion Approach for Collaborative Anomaly Intrusion Detection in Blockchain-Based Systems.
IEEE Internet Things J., 2022

Deep Neural Network Security Collaborative Filtering Scheme for Service Recommendation in Intelligent Cyber-Physical Systems.
IEEE Internet Things J., 2022

Graph learning-based spatial-temporal graph convolutional neural networks for traffic forecasting.
Connect. Sci., 2022

5GSS: a framework for 5G-secure-smart healthcare monitoring.
Connect. Sci., 2022

Privacy preserving personalized blockchain reliability prediction via federated learning in IoT environments.
Clust. Comput., 2022

An Investigation of Blockchain-Based Sharding.
Proceedings of the Smart Computing and Communication - 7th International Conference, 2022

Overview of Medical Data Privacy Protection based on Blockchain Technology.
Proceedings of the 7th IEEE International Conference on Smart Cloud, SmartCloud 2022, 2022

Routing Protocol Based on Mission-Oriented Opportunistic Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2022

Forward and Backward Private Searchable Symmetric Encryption with Efficient Updates.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

A Lightweight Authentication Protocol for NFC-enabled Drug Anti-Counterfeiting System.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

Dual chain authentication and key agreement protocol based on blockchain Technology in Edge Computing.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

2021
A Fast Defogging Image Recognition Algorithm Based on Bilateral Hybrid Filtering.
ACM Trans. Multim. Comput. Commun. Appl., 2021

Hierarchical Bidirectional RNN for Safety-Enhanced B5G Heterogeneous Networks.
IEEE Trans. Netw. Sci. Eng., 2021

Circuit Copyright Blockchain: Blockchain-Based Homomorphic Encryption for IP Circuit Protection.
IEEE Trans. Emerg. Top. Comput., 2021

Multi-level graph convolutional recurrent neural network for semantic image segmentation.
Telecommun. Syst., 2021

A blockchain-based Roadside Unit-assisted authentication and key agreement protocol for Internet of Vehicles.
J. Parallel Distributed Comput., 2021

Secure fusion approach for the Internet of Things in smart autonomous multi-robot systems.
Inf. Sci., 2021

One enhanced secure access scheme for outsourced data.
Inf. Sci., 2021

An efficient transmission algorithm for power grid data suitable for autonomous multi-robot systems.
Inf. Sci., 2021

PRICE: Privacy and Reliability-Aware Real-Time Incentive System for Crowdsensing.
IEEE Internet Things J., 2021

SBBS: A Secure Blockchain-Based Scheme for IoT Data Credibility in Fog Environment.
IEEE Internet Things J., 2021

FSVA-data: a flexible solution for the visualisation and analysis of basin-scale water quality monitoring data.
Int. J. Embed. Syst., 2021

A novel blockchain-based privacy-preserving framework for online social networks.
Connect. Sci., 2021

NFMF: neural fusion matrix factorisation for QoS prediction in service selection.
Connect. Sci., 2021

A lightweight authentication scheme for telecare medical information system.
Connect. Sci., 2021

A novel approach for anti-pollution attacks in network coding.
Connect. Sci., 2021

A novel data representation framework based on nonnegative manifold regularisation.
Connect. Sci., 2021

An efficient and DoS-resilient name lookup for NDN interest forwarding.
Connect. Sci., 2021

A secure and computationally efficient authentication and key agreement scheme for Internet of Vehicles.
Comput. Electr. Eng., 2021

A lightweight anonymous cross-regional mutual authentication scheme using blockchain technology for internet of vehicles.
Comput. Electr. Eng., 2021

Active Malicious Accounts Detection with Multimodal Fusion Machine Learning Algorithm.
Proceedings of the Ubiquitous Security - First International Conference, 2021

The Design and Realization of a Novel Intelligent Drying Rack System Based on STM32.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

A Fast Authentication and Key Agreement Protocol Based on Time-Sensitive Token for Mobile Edge Computing.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

Collaborative QoS Prediction via Context-Aware Factorization Machine.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

CRFST-GCN: A Deeplearning Spatial-Temporal Frame to Predict Traffic Flow.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

Multi-community Opportunistic Routing Algorithm Based on Machine Learning In the Internet of Vehicles.
Proceedings of the 8th IEEE International Conference on Cyber Security and Cloud Computing, 2021

Microservice Selection in Edge-Cloud Collaborative Environment: A Deep Reinforcement Learning Approach.
Proceedings of the 8th IEEE International Conference on Cyber Security and Cloud Computing, 2021

2020
An Industrial Network Intrusion Detection Algorithm Based on Multifeature Data Clustering Optimization Model.
IEEE Trans. Ind. Informatics, 2020

Secure Data Storage and Recovery in Industrial Blockchain Network Environments.
IEEE Trans. Ind. Informatics, 2020

On the Exploitation of Blockchain for Distributed File Storage.
J. Sensors, 2020

Deep Reinforcement Learning for Resource Protection and Real-Time Detection in IoT Environment.
IEEE Internet Things J., 2020

An algorithm for determining data forwarding strategy based on recommended trust value in MANET.
Int. J. Embed. Syst., 2020

An Efficient Privacy-Preserving Multi-Keyword Query Scheme in Location Based Services.
IEEE Access, 2020

A Secure Framework for Data Sharing in Private Blockchain-Based WBANs.
IEEE Access, 2020

A Novel Research in Internet Finance Combining With Blockchain and Network Coding.
Proceedings of the 3rd International Conference on Smart BlockChain, 2020

GraphMF: QoS Prediction for Large Scale Blockchain Service Selection.
Proceedings of the 3rd International Conference on Smart BlockChain, 2020

High-Accuracy Reliability Prediction Approach for Blockchain Services Under BaaS.
Proceedings of the Blockchain and Trustworthy Systems - Second International Conference, 2020

2019
A Secure FaBric Blockchain-Based Data Transmission Technique for Industrial Internet-of-Things.
IEEE Trans. Ind. Informatics, 2019

Hausdorff Distance Model-Based Identity Authentication for IP Circuits in Service-Centric Internet-of-Things Environment.
Sensors, 2019

A double PUF-based RFID identity authentication protocol in service-centric internet of things environments.
Inf. Sci., 2019

A Novel Debt-Credit Mechanism for Blockchain-Based Data-Trading in Internet of Vehicles.
IEEE Internet Things J., 2019

Predicting new composition relations between web services via link analysis.
Int. J. Comput. Sci. Eng., 2019

TBRS: A trust based recommendation scheme for vehicular CPS network.
Future Gener. Comput. Syst., 2019

Efficient data packet transmission algorithm for IPV6 mobile vehicle network based on fast switching model with time difference.
Future Gener. Comput. Syst., 2019

A secure privacy preserving deduplication scheme for cloud computing.
Future Gener. Comput. Syst., 2019

A framework for Fog-assisted healthcare monitoring.
Comput. Sci. Inf. Syst., 2019

A Lightweight Mutual Authentication and Key Agreement Scheme for Medical Internet of Things.
IEEE Access, 2019

A Factorization Machine-Based QoS Prediction Approach for Mobile Service Selection.
IEEE Access, 2019

PUF-Based Anonymous Authentication Scheme for Hardware Devices and IPs in Edge Computing Environment.
IEEE Access, 2019

A Shamir Threshold Model Based Recoverable IP Watermarking Scheme.
Proceedings of the Smart Computing and Communication - 4th International Conference, 2019

A Hybrid Mutual Authentication Scheme Based on Blockchain Technology for WBANs.
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019

A Dual-Chain Digital Copyright Registration and Transaction System Based on Blockchain Technology.
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019

Image Clustering Based on Graph Regularized Robust Principal Component Analysis.
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019

An Anonymous Mutual Authentication and Key Agreement Scheme in WBAN.
Proceedings of the 5th IEEE International Conference on Big Data Security on Cloud, 2019

A New Multilevel Circuit Partitioning Algorithm Based on the Improved KL Algorithm.
Proceedings of the 5th IEEE International Conference on Big Data Security on Cloud, 2019

2018
A Security Situation Prediction Algorithm Based on HMM in Mobile Network.
Wirel. Commun. Mob. Comput., 2018

SIRSE: A secure identity recognition scheme based on electroencephalogram data with multi-factor feature.
Comput. Electr. Eng., 2018

A Novel Bidirectional RFID Identity Authentication Protocol.
Proceedings of the 2018 IEEE SmartWorld, 2018

A Leakage-Resilient FPGA-Based IP Identity Authentication Protocol.
Proceedings of the 2018 IEEE SmartWorld, 2018

A Novel Identity Authentication for FPGA Based IP Designs.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Study on IP Protection Techniques for Integrated Circuit in IOT Environment.
Proceedings of the Internet of Everything - Technology, Communications and Computing, 2018

2017
A new publicly verifiable blind detection scheme for intellectual property protection.
Int. J. Syst. Assur. Eng. Manag., 2017

Device-to-Device Relay Cooperative Transmission Based on Network Coding.
KSII Trans. Internet Inf. Syst., 2017

A distributed data secure transmission scheme in wireless sensor network.
Int. J. Distributed Sens. Networks, 2017

Comparison between CAN and CAN FD: A Quantified Approach.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Multiscale Entropy-Based Weighted Hidden Markov Network Security Situation Prediction Model.
Proceedings of the 2017 IEEE International Congress on Internet of Things, 2017

2016
A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity.
Secur. Commun. Networks, 2016

Study on PUF based secure protection for IC design.
Microprocess. Microsystems, 2016

RESH: A Secure Authentication Algorithm Based on Regeneration Encoding Self-Healing Technology in WSN.
J. Sensors, 2016

Identity Recognition Using Biological Electroencephalogram Sensors.
J. Sensors, 2016

An Alert Fusion Method Based on Grey Relation and Attribute Similarity Correlation.
Int. J. Online Eng., 2016

A two-step MF signal acquisition method for wireless underground sensor networks.
Comput. Sci. Inf. Syst., 2016

An Extended Chaotic Maps Based Authenticated Key Agreement Protocol Without Using Password.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
An Enhancement of a Smart Card Authentication Scheme for Multi-server Architecture.
Wirel. Pers. Commun., 2015

A New Dynamic ID-Based User Authentication Scheme Using Mobile Device: Cryptanalysis, the Principles and Design.
Wirel. Pers. Commun., 2015

On Efficient Feature Ranking Methods for High-Throughput Data Analysis.
IEEE ACM Trans. Comput. Biol. Bioinform., 2015

A Novel Digital Certificate Based Remote Data Access Control Scheme in WSN.
J. Sensors, 2015

Trust-Aware and Low Energy Consumption Security Topology Protocol of Wireless Sensor Network.
J. Sensors, 2015

Signature Restoration for Enhancing Robustness of FPGA IP Designs.
Int. J. Inf. Secur. Priv., 2015

Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update.
Int. J. Commun. Syst., 2015

TDCM: An IP watermarking algorithm based on two dimensional chaotic mapping.
Comput. Sci. Inf. Syst., 2015

A Fault-Tolerant Watermarking Algorithm for FPGA IP Protection.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Novel Data Sharing Mechanism via Cloud-Based Dynamic Audit for Social Internet of Vehicles.
Proceedings of the Internet of Vehicles - Safe and Intelligent Mobility, 2015

2014
Gene Selection Using Locality Sensitive Laplacian Score.
IEEE ACM Trans. Comput. Biol. Bioinform., 2014

Robust dynamic ID-based remote user authentication scheme using smart cards.
Int. J. Ad Hoc Ubiquitous Comput., 2014

Cryptanalysis of a robust smart card authentication scheme for multi-server architecture.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

Accelerate NDN name lookup using FPGA: Challenges and a scalable approach.
Proceedings of the 24th International Conference on Field Programmable Logic and Applications, 2014

From GPU to FPGA: A Pipelined Hierarchical Approach to Fast and Memory-Efficient NDN Name Lookup.
Proceedings of the 22nd IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, 2014

2013
An Efficient and Lightweight Source Privacy Protecting Scheme for Sensor Networks Using Group Knowledge.
Int. J. Distributed Sens. Networks, 2013

Securing sensor data storage and query based on <i>k</i>-out-of- <i>n</i> coding.
Int. J. Commun. Syst., 2013

An IP Protection Algorithm by Watermarking Multiple Scan Chains Based on Minimum Correlation Degree of Vectors.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

2011
Inter-cluster route algorithm based on the gateway for wireless sensor networks.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

An FPGA-based distributed IP watermarking method.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

2010
JPEG image steganalysis using joint discrete cosine transform domain features.
J. Electronic Imaging, 2010

Watermarking 3D Triangular Mesh with High Visual Quality.
J. Digit. Content Technol. its Appl., 2010

Watermarking-based intellectual property protection for sensor streaming data.
Int. J. Comput. Appl. Technol., 2010


  Loading...