Youliang Tian

Orcid: 0000-0002-5974-1570

According to our database1, Youliang Tian authored at least 108 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Limitation of Reactance Perturbation Strategy Against False Data Injection Attacks on IoT-Based Smart Grid.
IEEE Internet Things J., April, 2024

Multikeyword-Ranked Search Scheme Supporting Extreme Environments for Internet of Vehicles.
IEEE Internet Things J., February, 2024

DScPA: A Dynamic Subcluster Privacy-Preserving Aggregation Scheme for Mobile Crowdsourcing in Industrial IoT.
IEEE Internet Things J., January, 2024

2023
Discovering urban mobility structure: a spatio-temporal representational learning approach.
Int. J. Digit. Earth, December, 2023

A provably secure collusion-resistant identity-based proxy re-encryption scheme based on NTRU.
J. Inf. Secur. Appl., November, 2023

Robust zero-watermarking algorithm for diffusion-weighted images based on multiscale feature fusion.
Multim. Syst., October, 2023

A novel local differential privacy federated learning under multi-privacy regimes.
Expert Syst. Appl., October, 2023

Blockchain-Enabled Secure and Trusted Federated Data Sharing in IIoT.
IEEE Trans. Ind. Informatics, May, 2023

DBKEM-AACS: a distributed key escrow model in blockchain with anonymous authentication and committee selection.
Sci. China Inf. Sci., March, 2023

Achieving Lightweight and Privacy-Preserving Object Detection for Connected Autonomous Vehicles.
IEEE Internet Things J., February, 2023

FVP-EOC: Fair, Verifiable, and Privacy-Preserving Edge Outsourcing Computing in 5G-Enabled IIoT.
IEEE Trans. Ind. Informatics, 2023

SPMA: Stealthy Physics-Manipulated Attack and Countermeasures in Cyber-Physical Smart Grid.
IEEE Trans. Inf. Forensics Secur., 2023

A Secure Authentication Framework to Guarantee the Traceability of Avatars in Metaverse.
IEEE Trans. Inf. Forensics Secur., 2023

Privacy-Preserving Dynamic Multi-Keyword Ranked Search Scheme in Multi-User Settings.
IEEE Trans. Consumer Electron., 2023

Privacy-utility equilibrium data generation based on Wasserstein generative adversarial networks.
Inf. Sci., 2023

VFLF: A verifiable federated learning framework against malicious aggregators in Industrial Internet of Things.
Concurr. Comput. Pract. Exp., 2023

FLAP: Federated Learning Aggregation Scheme Based on Privileged Secret Sharing.
Proceedings of the International Conference on Networking and Network Applications, 2023

Resisting Membership Inference Attacks by Dynamically Adjusting Loss Targets.
Proceedings of the International Conference on Networking and Network Applications, 2023

An Efficient Blockchain-Based Certificateless Anonymous Authentication Scheme for VANETs.
Proceedings of the International Conference on Networking and Network Applications, 2023

Impact Analysis of Moving Target Defense on the Small-Signal Stability in Power Systems.
Proceedings of the 6th IEEE International Conference on Industrial Cyber-Physical Systems, 2023

A Verifiable Privacy-Preserving Outsourced Prediction Scheme Based on Blockchain in Smart Healthcare.
Proceedings of the IEEE International Conference on E-health Networking, 2023

Text Laundering: Mitigating Malicious Features Through Knowledge Distillation of Large Foundation Models.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

POSTER: Collaborative Authority-Based Searchable Encryption Using Access Control Encryption.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

2022
Edge-Cooperative Privacy-Preserving Object Detection Over Random Point Cloud Shares for Connected Autonomous Vehicles.
IEEE Trans. Intell. Transp. Syst., 2022

Toward Cross-Domain Dynamic Accumulator Authentication Based on Blockchain in Internet of Things.
IEEE Trans. Ind. Informatics, 2022

A Blockchain-Based Machine Learning Framework for Edge Services in IIoT.
IEEE Trans. Ind. Informatics, 2022

Game-based Theory Rational Delegation Learning Scheme.
J. Inf. Sci. Eng., 2022

K -implicit Tracking Data Publishing Scheme against Geo-matching Attacks.
J. Inf. Sci. Eng., 2022

A privacy preserving homomorphic computing toolkit for predictive computation.
Inf. Process. Manag., 2022

A Double-Benefit Moving Target Defense Against Cyber-Physical Attacks in Smart Grid.
IEEE Internet Things J., 2022

Toward Lightweight, Privacy-Preserving Cooperative Object Classification for Connected Autonomous Vehicles.
IEEE Internet Things J., 2022

Achieving Graph Clustering Privacy Preservation Based on Structure Entropy in Social IoT.
IEEE Internet Things J., 2022

Non-interactive verifiable privacy-preserving federated learning.
Future Gener. Comput. Syst., 2022

GDP vs. LDP: A Survey from the Perspective of Information-Theoretic Channel.
Entropy, 2022

A potential game-based outsourcing computation framework for multiple calculators.
Digit. Commun. Networks, 2022

Achieving reliable and anti-collusive outsourcing computation and verification based on blockchain in 5G-enabled IoT.
Digit. Commun. Networks, 2022

FPANet: Feature pyramid aggregation network for real-time semantic segmentation.
Appl. Intell., 2022

Secure YOLOv3-SPP: Edge-Cooperative Privacy-preserving Object Detection for Connected Autonomous Vehicles.
Proceedings of the International Conference on Networking and Network Applications, 2022

Outsourced and Practical Privacy-Preserving K-Prototype Clustering supporting Mixed Data.
Proceedings of the IEEE International Conference on Communications, 2022

Experimental Validation of Encrypted Quadratic Optimization Implemented on Raspberry Pi.
Proceedings of the 13th Asian Control Conference, 2022

2021
Privacy-Preserving Federated Learning Framework with General Aggregation and Multiparty Entity Matching.
Wirel. Commun. Mob. Comput., 2021

R-Net: A Relationship Network for Efficient and Accurate Scene Text Detection.
IEEE Trans. Multim., 2021

An AI-Enabled Three-Party Game Framework for Guaranteed Data Privacy in Mobile Edge Crowdsensing of IoT.
IEEE Trans. Ind. Informatics, 2021

Balancing Privacy-Utility of Differential Privacy Mechanism: A Collaborative Perspective.
Secur. Commun. Networks, 2021

Corrigendum to "Rational Protocols and Attacks in Blockchain System".
Secur. Commun. Networks, 2021

High-throughput secure multiparty multiplication protocol via bipartite graph partitioning.
Peer-to-Peer Netw. Appl., 2021

Scale channel attention network for image segmentation.
Multim. Tools Appl., 2021

Secure and Usable Handshake Based Pairing for Wrist-Worn Smart Devices on Different Users.
Mob. Networks Appl., 2021

Towards DDoS detection mechanisms in Software-Defined Networking.
J. Netw. Comput. Appl., 2021

Towards reducing delegation overhead in replication-based verification: An incentive-compatible rational delegation computing scheme.
Inf. Sci., 2021

ImpSuic: A quality updating rule in mixing coins with maximum utilities.
Int. J. Intell. Syst., 2021

Structural Mutual Information and Its Application.
IACR Cryptol. ePrint Arch., 2021

Three-factor authentication protocol using physical unclonable function for IoV.
Comput. Commun., 2021

An incentive-compatible rational secret sharing scheme using blockchain and smart contract.
Sci. China Inf. Sci., 2021

Towards Attack and Defense Views to (t, n)-threshold Secret Sharing Scheme Using Information Theory.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

The Trade-off Between Privacy and Utility in Local Differential Privacy.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

Random verifiable multi-server searchable encryption scheme.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

2020
Secure limitation analysis of public-key cryptography for smart card settings.
World Wide Web, 2020

A Personalized Privacy Protection Framework for Mobile Crowdsensing in IIoT.
IEEE Trans. Ind. Informatics, 2020

A Blockchain-Based Secure Key Management Scheme With Trustworthiness in DWSNs.
IEEE Trans. Ind. Informatics, 2020

Rational Protocols and Attacks in Blockchain System.
Secur. Commun. Networks, 2020

Belief and fairness: A secure two-party protocol toward the view of entropy for IoT devices.
J. Netw. Comput. Appl., 2020

Inference attacks on genomic privacy with an improved HMM and an RCNN model for unrelated individuals.
Inf. Sci., 2020

Verifiable Secret Sharing Based On Micali-Rabin's Random Vector Representations Technique.
Int. J. Netw. Secur., 2020

IPBSM: An optimal bribery selfish mining in the presence of intelligent and pure attackers.
Int. J. Intell. Syst., 2020

Cooperate Delegation of Computation for Rational Party Using Zero-Determinant Strategy Approach.
IEEE Access, 2020

Bitcoin-Based Anti-collusion Fair Payments for Outsourcing Computations in Cloud Computing.
Proceedings of the Security and Privacy in Digital Economy, 2020

Rational Delegation of Computation Based on Reputation and Contract Theory in the UC Framework.
Proceedings of the Security and Privacy in Digital Economy, 2020

Rational Delegation Learning Outsourcing Scheme Based on Game Theory.
Proceedings of the International Conference on Networking and Network Applications, 2020

Spatial Ciphertext Aggregation Computing Scheme for Mobile Crowd Sensing Privacy Protection.
Proceedings of the International Conference on Networking and Network Applications, 2020

Law Is Order: Protecting Multimedia Network Transmission by Game Theory and Mechanism Design.
Proceedings of the MultiMedia Modeling - 26th International Conference, 2020

Rational Delegation Computing Using Information Theory and Game Theory Approach.
Proceedings of the MultiMedia Modeling - 26th International Conference, 2020

Cooperative Game Model of Delegation Computing: Verifier Separated from Calculators.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Hierarchical Consistency and Refinement for Semi-supervised Medical Segmentation.
Proceedings of the Pattern Recognition. ICPR International Workshops and Challenges, 2020

Usable and Secure Pairing Based on Handshake for Wrist-Worn Smart Devices on Different Users.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2020

2019
Constant-round authenticated and dynamic group key agreement protocol for D2D group communications.
Inf. Sci., 2019

A risk adaptive access control model based on Markov for big data in the cloud.
Int. J. High Perform. Comput. Netw., 2019

How to Construct Rational Protocols with Nash Equilibrium Consistency in the UC framework.
IACR Cryptol. ePrint Arch., 2019

Towards Attack and Defense Views of Rational Delegation of Computation.
IEEE Access, 2019

Towards Attack and Defense Views to K-Anonymous Using Information Theory Approach.
IEEE Access, 2019

Efficient Privacy-Preserving Access Control of Mobile Multimedia Data in Cloud Computing.
IEEE Access, 2019

Data Privacy Quantification and De-identification Model Based on Information Theory.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

A Game Theoretical Analysis of Risk Adaptive Access Control for Privacy Preserving.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Adaptive Bilinear Pooling for Fine-grained Representation Learning.
Proceedings of the MMAsia '19: ACM Multimedia Asia, Beijing, China, December 16-18, 2019, 2019

A Personalized Privacy Protection Data Uploading Scheme for Mobile Crowdsensing.
Proceedings of the IEEE International Conference on Industrial Internet, 2019

Two-Factor Authentication Protocol Using Physical Unclonable Function for IoV.
Proceedings of the 2019 IEEE/CIC International Conference on Communications in China, 2019

Cooperate Delegation Computation for Rational Party Using Zero-Determinant Strategy.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

2018
Achieving Incentive, Security, and Scalable Privacy Protection in Mobile Crowdsensing Services.
Wirel. Commun. Mob. Comput., 2018

基于区块链的大数据确权方案 (Blockchain-based Big Data Right Confirmation Scheme).
计算机科学, 2018

MAIM: A Novel Incentive Mechanism Based on Multi-Attribute User Selection in Mobile Crowdsensing.
IEEE Access, 2018

2017
Toward better data veracity in mobile cloud computing: A context-aware and incentive-based reputation mechanism.
Inf. Sci., 2017

A trustworthy and energy-aware routing protocol in software-defined wireless mesh networks.
Comput. Electr. Eng., 2017

A hybrid encryption scheme based on the satisfiability problem.
Proceedings of the 2017 IEEE Global Conference on Signal and Information Processing, 2017

2016
Publicly verifiable secret sharing scheme and its application with almost optimal information rate.
Secur. Commun. Networks, 2016

An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks.
J. Netw. Comput. Appl., 2016

A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth.
J. Medical Syst., 2016

A Publicly Verifiable Secret Sharing Scheme Based on Multilinear Diffie-Hellman Assumption.
Int. J. Netw. Secur., 2016

Cryptanalysis and Improvement of a Smart Card Based Mutual Authentication Scheme in Cloud Computing.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks.
Peer-to-Peer Netw. Appl., 2015

Cryptanalysis of smart-card-based password authenticated key agreement protocol for session initiation protocol of Zhang et al.
Int. J. Commun. Syst., 2015

Bayesian mechanism for rational secret sharing scheme.
Sci. China Inf. Sci., 2015

A strongly secure identity-based authenticated group key exchange protocol.
Sci. China Inf. Sci., 2015

2014
Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems.
J. Medical Syst., 2014

Universally Composable Secure Group Communication.
IACR Cryptol. ePrint Arch., 2014

2013
A rational framework for secure communication.
Inf. Sci., 2013

Fair (t, n) threshold secret sharing scheme.
IET Inf. Secur., 2013

2012
Publicly Verifiable Secret Sharing Schemes Using Bilinear Pairings.
Int. J. Netw. Secur., 2012

2011
Secret Sharing Scheme with Fairness.
Proceedings of the IEEE 10th International Conference on Trust, 2011


  Loading...