Yi-Ning Liu

Orcid: 0000-0002-6487-7595

Affiliations:
  • Guilin University of Electronic Technology, Guilin, China


According to our database1, Yi-Ning Liu authored at least 75 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
TridentShell: An enhanced covert and scalable backdoor injection attack on web applications.
J. Netw. Comput. Appl., March, 2024

A game-theory-based scheme to facilitate consensus latency minimization in sharding blockchain.
Inf. Sci., February, 2024

Efficient Pairing-Free Certificateless Signcryption Scheme for Secure Data Transmission in IoMT.
IEEE Internet Things J., February, 2024

Data Verifiable Personalized Access Control Electronic Healthcare Record Sharing Based on Blockchain in IoT Environment.
IEEE Internet Things J., February, 2024

An Efficient and Dynamic Privacy-Preserving Federated Learning System for Edge Computing.
IEEE Trans. Inf. Forensics Secur., 2024

Forward Private Verifiable Dynamic Searchable Symmetric Encryption With Efficient Conjunctive Query.
IEEE Trans. Dependable Secur. Comput., 2024

2023
Privacy-Preserving Electricity Theft Detection Based on Blockchain.
IEEE Trans. Smart Grid, September, 2023

Unlinkable Signcryption Scheme for Multi-Receiver in VANETs.
IEEE Trans. Intell. Transp. Syst., September, 2023

PPRT: Privacy Preserving and Reliable Trust-Aware Platoon Recommendation Scheme in IoV.
IEEE Syst. J., September, 2023

Physically Secure and Conditional-Privacy Authenticated Key Agreement for VANETs.
IEEE Trans. Veh. Technol., June, 2023

VFAS: Reliable and Privacy-Preserving V2F Authentication Scheme for Road Condition Monitoring System in IoV.
IEEE Trans. Veh. Technol., June, 2023

Scan-free verifiable public-key searchable encryption supporting efficient user updates in distributed systems.
J. Inf. Secur. Appl., May, 2023

Dummy trajectory generation scheme based on generative adversarial networks.
Neural Comput. Appl., April, 2023

Secure Long-Range Autonomous Valet Parking: A Reservation Scheme With Three-Factor Authentication and Key Agreement.
IEEE Trans. Veh. Technol., March, 2023

FSDA: Flexible Subset Data Aggregation for Smart Grid.
IEEE Syst. J., March, 2023

A Robust and Optional Privacy Data Aggregation Scheme for Fog-Enhanced IoT Network.
IEEE Syst. J., March, 2023

Analysis and Improvement of an Efficient Certificateless Aggregate Signature With Conditional Privacy Preservation in VANETs.
IEEE Syst. J., March, 2023

EPPDA: An Efficient Privacy-Preserving Data Aggregation Federated Learning Scheme.
IEEE Trans. Netw. Sci. Eng., 2023

OPERA: Optional Dimensional Privacy-Preserving Data Aggregation for Smart Healthcare Systems.
IEEE Trans. Ind. Informatics, 2023

A Scalable Sharding Protocol Based on Cross-Shard Dynamic Transaction Confirmation for Alliance Chain in Intelligent Systems.
Int. J. Semantic Web Inf. Syst., 2023

An Identity Privacy-Preserving Scheme against Insider Logistics Data Leakage Based on One-Time-Use Accounts.
Future Internet, 2023

Federated Learning-Based Privacy-Preserving Data Aggregation Scheme for IIoT.
IEEE Access, 2023

2022
PPRP: Preserving-Privacy Route Planning Scheme in VANETs.
ACM Trans. Internet Techn., November, 2022

PLVA: Privacy-Preserving and Lightweight V2I Authentication Protocol.
IEEE Trans. Intell. Transp. Syst., 2022

PPVF: Privacy-Preserving Protocol for Vehicle Feedback in Cloud-Assisted VANET.
IEEE Trans. Intell. Transp. Syst., 2022

EAFS: An Efficient, Accurate, and Forward Secure Searchable Encryption Scheme Supporting Range Search.
IEEE Syst. J., 2022

RPPTD: Robust Privacy-Preserving Truth Discovery Scheme.
IEEE Syst. J., 2022

A fault tolerance data aggregation scheme for fog computing.
Int. J. Inf. Comput. Secur., 2022

LPTM: Lightweight and privacy-preserving traffic monitoring scheme.
Int. J. Commun. Syst., 2022

MSDA: multi-subset data aggregation scheme without trusted third party.
Frontiers Comput. Sci., 2022

A new secure arrangement for privacy-preserving data collection.
Comput. Stand. Interfaces, 2022

BlockRAT: An Enhanced Remote Access Trojan Framework via Blockchain.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022

Lightweight and Practical Privacy-Preserving Image Masking in Smart Community.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

2021
FPETD: Fault-Tolerant and Privacy-Preserving Electricity Theft Detection.
Wirel. Commun. Mob. Comput., 2021

HDMA: Hybrid D2D Message Authentication Scheme for 5G-Enabled VANETs.
IEEE Trans. Intell. Transp. Syst., 2021

Fault-Tolerant Multisubset Aggregation Scheme for Smart Grid.
IEEE Trans. Ind. Informatics, 2021

Lightweight Privacy-Preserving Raw Data Publishing Scheme.
IEEE Trans. Emerg. Top. Comput., 2021

SEMA: Secure and Efficient Message Authentication Protocol for VANETs.
IEEE Syst. J., 2021

A secure and trustworthy medical record sharing scheme based on searchable encryption and blockchain.
Comput. Networks, 2021

TridentShell: a Covert and Scalable Backdoor Injection Attack on Web Applications.
Proceedings of the Information Security - 24th International Conference, 2021

BAVC: Efficient Blockchain-Based Authentication Scheme for Vehicular Secure Communication.
Proceedings of the 13th International Conference on Advanced Computational Intelligence, 2021

2020
Fault-Tolerant Privacy-Preserving Data Aggregation for Smart Grid.
Wirel. Commun. Mob. Comput., 2020

A Dynamic Membership Data Aggregation (DMDA) Protocol for Smart Grid.
IEEE Syst. J., 2020

Decentralized Privacy-Preserving Data Aggregation Scheme for Smart Grid Based on Blockchain.
Sensors, 2020

Lightweight privacy-preserving data aggregation protocol against internal attacks in smart grid.
J. Inf. Secur. Appl., 2020

Secret sharing with secure secret reconstruction.
Inf. Sci., 2020

An improved FOO voting scheme using blockchain.
Int. J. Inf. Sec., 2020

Decentralizing Privacy-Preserving Data Aggregation Scheme Using Blockchain in Smart Grid.
Proceedings of the Security and Privacy in Digital Economy, 2020

2019
E-voting scheme using secret sharing and K-anonymity.
World Wide Web, 2019

A Practical Privacy-Preserving Data Aggregation (3PDA) Scheme for Smart Grid.
IEEE Trans. Ind. Informatics, 2019

An Information Theoretically Secure E-Lottery Scheme Based on Symmetric Bivariate Polynomials.
Symmetry, 2019

An Efficient Essential Secret Image Sharing Scheme Using Derivative Polynomial.
Symmetry, 2019

Detection of Dummy Trajectories Using Convolutional Neural Networks.
Secur. Commun. Networks, 2019

A progressively essential secret image sharing scheme using hierarchy shadow.
J. Inf. Secur. Appl., 2019

Dynamic anonymous identity authentication (DAIA) scheme for VANET.
Int. J. Commun. Syst., 2019

Privacy-preserving raw data collection without a trusted authority for IoT.
Comput. Networks, 2019

2018
A novel multiple-level secret image sharing scheme.
Multim. Tools Appl., 2018

An improved threshold multi-level image recovery scheme.
J. Inf. Secur. Appl., 2018

A Privacy-Preserving Online Medical Prediagnosis Scheme for Cloud Environment.
IEEE Access, 2018

Privacy-Preserving Data Collection for Mobile Phone Sensing Tasks.
Proceedings of the Information Security Practice and Experience, 2018

2017
A Fairness-Enhanced Micropayment Scheme.
Wirel. Pers. Commun., 2017

LVAP: Lightweight V2I authentication protocol using group communication in VANETs.
Int. J. Commun. Syst., 2017

A secure data backup scheme using multi-factor authentication.
IET Inf. Secur., 2017

2016
A Privacy-Preserving Health Data Aggregation Scheme.
KSII Trans. Internet Inf. Syst., 2016

A practical lottery using oblivious transfer.
Int. J. Commun. Syst., 2016

FPAP: Fast Pre-distribution Authentication Protocol for V2I.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2014
An improved <i>t</i>-out-of-<i>n</i> e-lottery protocol.
Int. J. Commun. Syst., 2014

2013
An Improved Authenticated Group Key Transfer Protocol Based on Secret Sharing.
IEEE Trans. Computers, 2013

A lightweight micropayment scheme based on Lagrange interpolation formula.
Secur. Commun. Networks, 2013

2011
A GroupTrust model based on service similarity evaluation in P2P networks.
Int. J. Intell. Syst., 2011

A novel reputation computation model based on subjective logic for mobile ad hoc networks.
Future Gener. Comput. Syst., 2011

An Improved Electronic Voting Scheme without a Trusted Random Number Generator.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

2010
A Novel Class of 2-D Binary Sequences With Zero Correlation Zone.
IEEE Signal Process. Lett., 2010

2009
A Novel Reputation Computation Model Based on Subjective Logic for Mobile Ad Hoc Networks.
Proceedings of the Third International Conference on Network and System Security, 2009

2008
A Trust Model Based on Similarity Evaluation in P2P Networks.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008


  Loading...