Yajun Guo

Orcid: 0000-0003-2257-7321

According to our database1, Yajun Guo authored at least 49 papers between 1999 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Design of anonymous authentication scheme for vehicle fog services using blockchain.
Wirel. Networks, January, 2024

BSRA: Blockchain-Based Secure Remote Authentication Scheme for Fog-Enabled Internet of Things.
IEEE Internet Things J., January, 2024

2023
A puf-based three-party authentication key establishment scheme for fog-enabled smart home.
Pervasive Mob. Comput., October, 2023

A decentralized lightweight blockchain-based authentication mechanism for Internet of Vehicles.
Peer Peer Netw. Appl., May, 2023

Fog-enabled private blockchain-based identity authentication scheme for smart home.
Comput. Commun., May, 2023

CS-LAKA: A Lightweight Authenticated Key Agreement Protocol With Critical Security Properties for IoT Environments.
IEEE Trans. Serv. Comput., 2023

2022
A PUF-based anonymous authentication protocol for wireless medical sensor networks.
Wirel. Networks, 2022

Anonymous Authenticated Key Agreement and Group Proof Protocol for Wearable Computing.
IEEE Trans. Mob. Comput., 2022

SecFHome: Secure remote authentication in fog-enabled smart home environment.
Comput. Networks, 2022

2021
Fog-Centric Authenticated Key Agreement Scheme Without Trusted Parties.
IEEE Syst. J., 2021

The provision of patron services in Chinese academic libraries responding to the COVID-19 pandemic.
Libr. Hi Tech, 2021

Does the layout of the Android unlock pattern affect the security and usability of the password?
J. Inf. Secur. Appl., 2021

Video anomaly detection with multi-scale feature and temporal information fusion.
Neurocomputing, 2021

Superword: A honeyword system for achieving higher security goals.
Comput. Secur., 2021

FogHA: An efficient handover authentication for mobile devices in fog computing.
Comput. Secur., 2021

2020
A Global Optimal Model for Protecting Privacy.
Wirel. Pers. Commun., 2020

Corrigendum to "Optiwords: A new password policy for creating memorable and strong password" [Computers & Security, Volume 85, 2019, Pages 423-435].
Comput. Secur., 2020

Nudging personalized password policies by understanding users' personality.
Comput. Secur., 2020

2019
A Probability-Based Anti-Collision Protocol for RFID Tag Identification.
Wirel. Pers. Commun., 2019

Behavioral ordered weighted averaging operator and the application in multiattribute decision making.
Int. J. Intell. Syst., 2019

An empirical study of mnemonic password creation tips.
Comput. Secur., 2019

<i>Optiwords</i>: A new password policy for creating memorable and strong passwords.
Comput. Secur., 2019

Temporal Action Detection Based on Temporal Convolutional Network with Coarse-Grained Clips Construction.
Proceedings of the 14th IEEE International Conference on Intelligent Systems and Knowledge Engineering, 2019

Fire Detection Method Based on Improved Deep Convolution Neural Network.
Proceedings of the ICCPR '19: 8th International Conference on Computing and Pattern Recognition, 2019

Retinal Vessel Segmentation Method Based on Improved Deep U-Net.
Proceedings of the Biometric Recognition - 14th Chinese Conference, 2019

2018
Quantile induced heavy ordered weighted averaging operators and its application in incentive decision making.
Int. J. Intell. Syst., 2018

2017
一种新的超轻量级RFID认证协议 (New Ultra-lightweight RFID Authentication Protocol).
计算机科学, 2017

2016
A Trajectory Privacy Model for Radio-Frequency Identification System.
Wirel. Pers. Commun., 2016

2013
Multiperiod multiattribute decision-making method based on trend incentive coefficient.
Int. Trans. Oper. Res., 2013

An Efficient Adaptive Anticollision Algorithm Based on 4-Ary Pruning Query Tree.
Int. J. Distributed Sens. Networks, 2013

2012
Computer Simulation on Agglomerating Location of Home-country FDI.
J. Comput., 2012

2011
A Multi-Attribute Group Decision Method Based on Triangular Intuitionistic Fuzzy Number.
Proceedings of the Information Computing and Applications, 2011

The Intrinsic Relationship between Security Mechanisms and Trust Mechanisms.
Proceedings of the Applied Informatics and Communication - International Conference, 2011

Reusable Pseudonym Privacy Protection in Pervasive Computing.
Proceedings of the Advances in Computer Science, 2011

2010
Water Pollution Forecasting Model of the Back-Propagation Neural Network Based on One Step Secant Algorithm.
Proceedings of the Information Computing and Applications - International Conference, 2010

Fitting with Interpolation to Resolve the Construction of Roads in Mountains.
Proceedings of the Information Computing and Applications - International Conference, 2010

The Optimization Model of Hospital Sick Beds' Rational Arrangements.
Proceedings of the Information Computing and Applications - International Conference, 2010

2009
A Domain-Based Trust Model in Peer-to-Peer Environment.
Int. J. Distributed Sens. Networks, 2009

A Reputation-Based Trust Evaluation Model for P2P E-Commerce.
Int. J. Distributed Sens. Networks, 2009

A Reputation System with Anti-Pollution Mechanism in P2P File Sharing Systems.
Int. J. Distributed Sens. Networks, 2009

Trust Architecture in Dynamic Systems.
Int. J. Distributed Sens. Networks, 2009

A Key Agreement Scheme Based on Bilinear Pairing for Wireless Sensor Network.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

2008
A Fuzzy Anonymity Analysis Model for Mobility in Anonymity System.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

2007
Predicting the distance between antibody's interface residue and antigen to recognize antigen types by support vector machine.
Neural Comput. Appl., 2007

Comparison study of two kernel-based learning algorithms for predicting the distance range between antibody interface residues and antigen surface.
Int. J. Comput. Math., 2007

A Group-Based Trust Model in Peer-to-Peer Environment.
Proceedings of the Integration and Innovation Orient to E-Society, 2007

2005
A Distributed Monitoring Mechanism for Mobile Ad Hoc Networks.
Proceedings of the 8th International Symposium on Parallel Architectures, 2005

Drawing Undirected Graphs with Genetic Algorithms.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

1999
A forecasting method for manpower requirement and related optimal decisions.
Ann. Oper. Res., 1999


  Loading...