Yatao Yang

Orcid: 0000-0002-0174-0997

According to our database1, Yatao Yang authored at least 39 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


On csauthors.net:


LWARX: Lightweight ARX white-box cipher for satellite communications.
J. King Saud Univ. Comput. Inf. Sci., 2024

Multi-model feature aggregation for classification of laser welding images with vision transformer.
J. King Saud Univ. Comput. Inf. Sci., 2024

WAS: improved white-box cryptographic algorithm over AS iteration.
Cybersecur., December, 2023

A 3.02 pJ/Bit 3T-APS-Based In-Sensor Strong PUF Featuring Near-100% Hardware Reuse Ratio and High Resilience to Machine Learning Attacks.
IEEE Trans. Circuits Syst. II Express Briefs, November, 2023

LWED: Lightweight white-box encryption communication system for drones over CARX algorithm.
J. King Saud Univ. Comput. Inf. Sci., October, 2023

Robust Transmission Design for RIS-Aided Wireless Communication With Both Imperfect CSI and Transceiver Hardware Impairments.
IEEE Internet Things J., March, 2023

Automated Battery Making Fault Classification Using Over-Sampled Image Data CNN Features.
Sensors, February, 2023

Design on Face Recognition System with Privacy Preservation Based on Homomorphic Encryption.
Wirel. Pers. Commun., 2022

Semantic segmentation supervised deep-learning algorithm for welding-defect detection of new energy batteries.
Neural Comput. Appl., 2022

Optimized Implementations for ZUC-256 on FPGA.
Wirel. Pers. Commun., 2021

A Location-Based Factorization Machine Model for Web Service QoS Prediction.
IEEE Trans. Serv. Comput., 2021

Determination of Thermal Conductivities for Thin-Film Materials in CMOS MEMS Process.
IEEE Trans. Instrum. Meas., 2021

Deep-VFog: When Artificial Intelligence Meets Fog Computing in V2X.
IEEE Syst. J., 2021

Optimal task partitioning, Bit allocation and trajectory for D2D-assisted UAV-MEC systems.
Peer-to-Peer Netw. Appl., 2021

A Lightweight Multiscale Attention Semantic Segmentation Algorithm for Detecting Laser Welding Defects on Safety Vent of Power Battery.
IEEE Access, 2021

FINN: Feedback Interactive Neural Network for Intent Recommendation.
Proceedings of the WWW '21: The Web Conference 2021, 2021

Ultra-Sensitive Bimetallic Alloy Loaded with Porous Architecture MOF for Ammonia Detection at Room Temperature.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2021

A lightweight deep learning algorithm for inspection of laser welding defects on safety vent of power battery.
Comput. Ind., 2020

A Hybrid-Plasmonic-Waveguide-Based Polarization-Independent Directional Coupler.
IEEE Access, 2020

INAKA: Improved Authenticated Key Agreement Protocol Based on Newhope.
IEEE Access, 2020

Anomalous Sensitivity Enhancement of D-Shaped Fiber-Based Sandwiched Structure Optofluidic Sensor.
IEEE Access, 2020

Deep and Embedded Learning Approach for Traffic Flow Prediction in Urban Informatics.
IEEE Trans. Intell. Transp. Syst., 2019

Research on Grid Scroll Chaotic Extended Sequence Algorithm and Its Circuit Implementation for F-OFDM System.
Complex., 2019

A Factorization Machine-Based QoS Prediction Approach for Mobile Service Selection.
IEEE Access, 2019

On the Outage Probability and Power Control of D2D Underlaying NOMA UAV-Assisted Networks.
IEEE Access, 2019

An Active and Deep Semantic Matching Framework for Query Rewrite in E-Commercial Search Engine.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019

Wide and Deep Convolutional Neural Networks for Electricity-Theft Detection to Secure Smart Grids.
IEEE Trans. Ind. Informatics, 2018

A Non-Destructive and Direction-Insensitive Method Using a Strain Sensor and Two Single Axis Angle Sensors for Evaluating Corn Stalk Lodging Resistance.
Sensors, 2018

A Homomorphic Masking Defense Scheme Based on RSA Cryptography Algorithm.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

HSATA: Improved SATA Protocol with HMAC.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Collaborative Web Service Quality Prediction via Exploiting Matrix Factorization and Network Map.
IEEE Trans. Netw. Serv. Manag., 2016

Efficient FPGA implementation of modular multiplication based on Montgomery algorithm.
Microprocess. Microsystems, 2016

A Novel Hybrid Data Mining Framework for Credit Evaluation.
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016

A Provable Secure Mutual RFID Authentication Protocol Based on Error-Correct Code.
Proceedings of the 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2014

A Homomorphic ElGamal Variant Based on BGN's Method.
Proceedings of the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2013

A non-repudiation scheme for user postings based on BAC in Mesh networks.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

Design of U Disk Remote Monitoring System in Trusted Computing Environment.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

Improved Cross Authentication Model Based on Threshold Method in Wireless Network.
Int. J. Distributed Sens. Networks, 2009

A New Wireless Mesh Network Authentication Scheme Based on Threshold Method.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008