Yamin Liu

Orcid: 0000-0003-4659-3529

According to our database1, Yamin Liu authored at least 41 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Chaotic Systems-Based Secure Communication Scheme for Detection of Wind Turbines.
IEEE Trans. Smart Grid, November, 2023

Outlier-Resistant Nonfragile Control of T-S Fuzzy Neural Networks With Reaction-Diffusion Terms and Its Application in Image Secure Communication.
IEEE Trans. Fuzzy Syst., September, 2023

Long-Term Privacy-Preserving Aggregation With User-Dynamics for Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2023

HLG: A framework for computing graphs in Residue Number System and its application in Fully Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2023

Multi-Class Arrhythmia Classification and R-Peak Detection Method of ECG Signal Based on One-Dimensional U-Net with Skip-Connection and Data Augmentation.
Proceedings of the Fuzzy Systems and Data Mining IX, 2023

SpriteHyper2vec: A SCSPRITE Data Completion Method Based on Hypergraph Random Walk.
Proceedings of the 9th IEEE International Conference on Cloud Computing and Intelligent Systems, 2023

2022
H∞ state estimation for T-S fuzzy reaction-diffusion delayed neural networks with randomly occurring gain uncertainties and semi-Markov jump parameters.
Neurocomputing, 2022

Influence of trees' canopy occupation on pedestrian thermal environment in summer.
Proceedings of the 29th International Conference on Geoinformatics, 2022

An Optimized Automatic P Wave Delineation Method Based on Phasor Transform.
Proceedings of the Computing in Cardiology, 2022

2021
A New Structured Domain Adversarial Neural Network for Transfer Fault Diagnosis of Rolling Bearings Under Different Working Conditions.
IEEE Trans. Instrum. Meas., 2021

A MATLAB GUI teaching application for ferroresonance simulation.
Comput. Appl. Eng. Educ., 2021

Unreadable Segment Recognition of Single-Lead ECG Signals Based on XGBoost: Fuision of Shannon Energy Envelope and Empirical Mode Decomposition.
Proceedings of the Modern Management based on Big Data II and Machine Learning and Intelligent Systems III, 2021

Multi-Label Classification of Multi-lead ECG Based on Deep 1D Convolutional Neural Networks With Residual and Attention Mechanism.
Proceedings of the Computing in Cardiology, CinC 2021, Brno, 2021

Pipa: Privacy-preserving Password Checkup via Homomorphic Encryption.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Resilient fault-tolerant anti-synchronization for stochastic delayed reaction-diffusion neural networks with semi-Markov jump parameters.
Neural Networks, 2020

IBE with tight security against selective opening and chosen-ciphertext attacks.
Des. Codes Cryptogr., 2020

Sampled-data exponential synchronization of time-delay neural networks subject to random controller gain perturbations.
Appl. Math. Comput., 2020

L2-L∞ consensus of stochastic delayed multi-agent systems with ADT switching interaction topologies.
Appl. Math. Comput., 2020

2019
Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy.
Secur. Commun. Networks, 2019

Imbalanced Fault Diagnosis of Rolling Bearing Based on Generative Adversarial Network: A Comparative Study.
IEEE Access, 2019

2018
LAC: Practical Ring-LWE Based Public-Key Encryption with Byte-Level Modulus.
IACR Cryptol. ePrint Arch., 2018

2017
A User-Friendly Centrally Banked Cryptocurrency.
Proceedings of the Information Security Practice and Experience, 2017

Towards Tightly Secure Deterministic Public Key Encryption.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2016
Approximate-Deterministic Public Key Encryption from Hard Learning Problems.
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016

Lossy Key Encapsulation Mechanism and Its Applications.
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016

(Deterministic) Hierarchical Identity-based Encryption from Learning with Rounding over Small Modulus.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Lossy Projective Hashing and Its Applications.
Proceedings of the Progress in Cryptology - INDOCRYPT 2015, 2015

2014
Lossy Trapdoor Relation and Its Applications to Lossy Encryption and Adaptive Trapdoor Relation.
Proceedings of the Provable Security - 8th International Conference, 2014

On the Lossiness of 2 k -th Power and the Instantiability of Rabin-OAEP.
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014

2013
Stable Orthogonal Local Discriminant Embedding for Linear Dimensionality Reduction.
IEEE Trans. Image Process., 2013

Joint geometry and variability for image recognition.
Neurocomputing, 2013

Improving the Message-ciphertext Rate of Lewko's Fully Secure IBE Scheme.
IACR Cryptol. ePrint Arch., 2013

How to Remove the Exponent GCD in HK09.
Proceedings of the Provable Security - 7th International Conference, 2013

RSA-OAEP is RKA Secure.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

Efficient Lossy Trapdoor Functions Based on Subgroup Membership Assumptions.
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013

2012
Improved Efficiency of Chosen Ciphertext Secure Encryption from Factoring.
Proceedings of the Information Security Practice and Experience, 2012

2011
Encryption Simulatability Reconsidered.
Proceedings of the Information Security Practice and Experience, 2011

Improved Tradeoff between Encapsulation and Decapsulation of HK09.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

Efficient CCA-Secure CDH Based KEM Balanced between Ciphertext and Key.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
PA1 and IND-CCA2 Do Not Guarantee PA2: Brief Examples.
Proceedings of the Advances in Information and Computer Security, 2010

Directional Principal Component Analysis for Image Matrix.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2010


  Loading...