Junguo Liao
Orcid: 0000-0003-3514-6299
According to our database1,
Junguo Liao
authored at least 27 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
MBB-YOLO: A comprehensively improved lightweight algorithm for crowded object detection.
Concurr. Comput. Pract. Exp., October, 2024
2023
A multikey fully homomorphic encryption privacy protection protocol based on blockchain for edge computing system.
Concurr. Comput. Pract. Exp., February, 2023
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
2022
An adaptive traffic sign recognition scheme based on deep learning in complex environment.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022
2021
Blockchain Privacy Protection Algorithm Based on Pedersen Commitment and Zero-knowledge Proof.
Proceedings of the ICBTA 2021: 4th International Conference on Blockchain Technology and Applications, Xi'an, China, December 17, 2021
2020
Proceedings of the Smart Computing and Communication - 5th International Conference, 2020
Privacy Security Classification (PSC) Model for the Attributes of Social Network Users.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020
2019
Proceedings of the 2019 11th International Conference on Machine Learning and Computing, 2019
2018
A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things.
IEEE Internet Things J., 2018
2017
A Trajectory Privacy-Preserving Scheme Based on Dual-K Mechanism for Continuous Location-Based Services.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
2016
Robust three-factor remote user authentication scheme with key agreement for multimedia systems.
Secur. Commun. Networks, 2016
A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity.
Secur. Commun. Networks, 2016
An Extended Chaotic Maps Based Authenticated Key Agreement Protocol Without Using Password.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016
2015
Wirel. Pers. Commun., 2015
A New Dynamic ID-Based User Authentication Scheme Using Mobile Device: Cryptanalysis, the Principles and Design.
Wirel. Pers. Commun., 2015
Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update.
Int. J. Commun. Syst., 2015
2014
Int. J. Ad Hoc Ubiquitous Comput., 2014
Cryptanalysis of a robust smart card authentication scheme for multi-server architecture.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014
Proceedings of the IEEE Computers, 2014
2013
J. Netw. Comput. Appl., 2013
Security Analysis and Enhancement of a Dynamic Identity Based Authentication Scheme Using Smart Cards.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013
Robust Biometrics Based Three-Factor Remote User Authentication Scheme with Key Agreement.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013
2011
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
2009
Proceedings of the Eighth IEEE International Conference on Dependable, 2009
2007
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007
2006
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006
2005
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005