Yatao Yang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2025
K-PAKE: post quantum password authentication key exchange protocol for satellite networks.
Clust. Comput., August, 2025

Syntactic paraphrase-based synthetic data generation for backdoor attacks against Chinese language models.
Inf. Fusion, 2025

2024
Multi-model feature aggregation for classification of laser welding images with vision transformer.
J. King Saud Univ. Comput. Inf. Sci., 2024

2023
LWED: Lightweight white-box encryption communication system for drones over CARX algorithm.
J. King Saud Univ. Comput. Inf. Sci., October, 2023

Automated Battery Making Fault Classification Using Over-Sampled Image Data CNN Features.
Sensors, February, 2023

2022
Semantic segmentation supervised deep-learning algorithm for welding-defect detection of new energy batteries.
Neural Comput. Appl., 2022

2021
Ultra-Sensitive Bimetallic Alloy Loaded with Porous Architecture MOF for Ammonia Detection at Room Temperature.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2021

2020
A lightweight deep learning algorithm for inspection of laser welding defects on safety vent of power battery.
Comput. Ind., 2020

A Hybrid-Plasmonic-Waveguide-Based Polarization-Independent Directional Coupler.
IEEE Access, 2020

Anomalous Sensitivity Enhancement of D-Shaped Fiber-Based Sandwiched Structure Optofluidic Sensor.
IEEE Access, 2020

2019
A Factorization Machine-Based QoS Prediction Approach for Mobile Service Selection.
IEEE Access, 2019

2018
A Non-Destructive and Direction-Insensitive Method Using a Strain Sensor and Two Single Axis Angle Sensors for Evaluating Corn Stalk Lodging Resistance.
Sensors, 2018

A Homomorphic Masking Defense Scheme Based on RSA Cryptography Algorithm.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

HSATA: Improved SATA Protocol with HMAC.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

2016
Efficient FPGA implementation of modular multiplication based on Montgomery algorithm.
Microprocess. Microsystems, 2016

2014
Cheat sensitive quantum bit commitment via pre- and post-selected quantum states.
Quantum Inf. Process., 2014

A Provable Secure Mutual RFID Authentication Protocol Based on Error-Correct Code.
Proceedings of the 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2014

2013
A Homomorphic ElGamal Variant Based on BGN's Method.
Proceedings of the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2013

2012
A non-repudiation scheme for user postings based on BAC in Mesh networks.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

2011
Design of U Disk Remote Monitoring System in Trusted Computing Environment.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

2009
Improved Cross Authentication Model Based on Threshold Method in Wireless Network.
Int. J. Distributed Sens. Networks, 2009

2008
A New Wireless Mesh Network Authentication Scheme Based on Threshold Method.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

2007
An Feasible Key Management Scheme in Ad Hoc Network.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

A Novel Authentication Scheme Based on Trust-value Updated Model in Adhoc Network.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007


  Loading...