Jiaqing Mo

Orcid: 0000-0002-2252-7562

According to our database1, Jiaqing Mo authored at least 14 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An end-to-end algorithm for predicting missing load data based on waveGAIN.
Proceedings of the International Joint Conference on Neural Networks, 2024

HiparaLog: Improving Log-based Anomaly Detection through Parameter Feature Integration.
Proceedings of the International Joint Conference on Neural Networks, 2024

Log anomaly detection based on parallel fusion of CNN and GRU.
Proceedings of the International Joint Conference on Neural Networks, 2024

2022
Optical Fiber Vibration Signal Identification Method Based on Improved YOLOv4.
Sensors, 2022

Optical Fiber Vibration Signal Recognition Based on the Fusion of Multi-Scale Features.
Sensors, 2022

A Provably Secure Three-Factor Authentication Protocol Based on Chebyshev Chaotic Mapping for Wireless Sensor Network.
IEEE Access, 2022

2021
Use AF-CNN for End-to-End Fiber Vibration Signal Recognition.
IEEE Access, 2021

2020
An Improved Anonymous Authentication Protocol for Wearable Health Monitoring Systems.
Wirel. Commun. Mob. Comput., 2020

Cryptanalysis and Security Improvement of Two Authentication Schemes for Healthcare Systems Using Wireless Medical Sensor Networks.
Secur. Commun. Networks, 2020

2019
An Efficient and Provably Secure Anonymous User Authentication and Key Agreement for Mobile Cloud Computing.
Wirel. Commun. Mob. Comput., 2019

A Lightweight Secure User Authentication and Key Agreement Protocol for Wireless Sensor Networks.
Secur. Commun. Networks, 2019

2018
Remote user authentication and key agreement for mobile client-server environments on elliptic curve cryptography.
J. Supercomput., 2018

An Efficient Privacy-Preserving Handover Authentication Scheme for Mobile Wireless Network.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2016
A User Authentication Scheme Based on Trusted Platform for Cloud Computing.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016


  Loading...