Yining Liu

Orcid: 0000-0002-9240-9131

Affiliations:
  • Dalian University of Technology, Dalian, China


According to our database1, Yining Liu authored at least 17 papers between 2015 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Cryptanalysis and Improvement of a Group Authentication Scheme with Multiple Trials and Multiple Authentications.
Secur. Commun. Networks, 2020

An improved EAAP scheme for vehicular ad hoc networks.
Int. J. Commun. Syst., 2020

The Role of Attribute Ranker using classification for Software Defect-Prone Data-sets Model: An Empirical Comparative Study.
Proceedings of the IEEE International Systems Conference, 2020

2019
A Parameter-Selection-Based Chaotic System.
IEEE Trans. Circuits Syst. II Express Briefs, 2019

A Secure Authentication Protocol for Internet of Vehicles.
IEEE Access, 2019

Dummy Trajectory Generation Scheme Based on Deep Learning.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

IMES: An Automatically Scalable Invisible Membrane Image Encryption for Privacy Protection on IoT Sensors.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

Empirical and Comparative Study of Various Classifiers with Forecast Deformity Prone Software Models.
Proceedings of the 4th International Conference on Control, Robotics and Cybernetics, 2019

2018
Recommendation in a Changing World: Exploiting Temporal Dynamics in Ratings and Reviews.
ACM Trans. Web, 2018

On the Soundness and Security of Privacy-Preserving SVM for Outsourcing Data Classification.
IEEE Trans. Dependable Secur. Comput., 2018

Personal Tastes vs. Fashion Trends: Predicting Ratings Based on Visual Appearances and Reviews.
IEEE Access, 2018

2017
A Novel Micropayment Scheme with Variable Denomination.
Int. J. Netw. Secur., 2017

Practical Secure Naïve Bayesian Classification Over Encrypted Big Data in Cloud.
Int. J. Found. Comput. Sci., 2017

A Ciphertext-Policy Attribute-Based Encryption Based on an Ordered Binary Decision Diagram.
IEEE Access, 2017

2016
A Robust Electronic Voting Scheme Against Side Channel Attack.
J. Inf. Sci. Eng., 2016

2015
Security analysis of a homomorphic signature scheme for network coding.
Secur. Commun. Networks, 2015

基于FOO投票协议的无收据电子投票方案 (Receipt-freeness Electronic Voting Scheme Based on FOO Voting Protocol).
计算机科学, 2015


  Loading...