Rongtao Liao

According to our database1, Rongtao Liao authored at least 14 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Secure and Efficient Data Processing for Cloud Computing with Fine-Grained Access Control.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2023

Dynamic capacity increase method of transmission line.
Proceedings of the International Conference on Computers, 2023

2022
Dynamic distribution and planning for traffic flow of the urban ecological road network based on blockchain technology.
Int. J. Inf. Technol. Manag., 2022

The model of fast face recognition against age interference in deep learning.
Int. J. Biom., 2022

Research on digital forensics method of 5G communication system in the future based on direct intermediate frequency sampling.
Int. J. Auton. Adapt. Commun. Syst., 2022

Security state monitoring method for perception node in the power internet of things based on a low rank model.
Int. J. Auton. Adapt. Commun. Syst., 2022

Short-Dataset-Driven Prediction on Area Electricity Consumption with Adaptive Training Window Selection.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022

Reliability Analysis and Optimization for Sensing Data Collection and Processing in New Energy Internet Systems.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022

A Communication-efficient Semi Asynchronous Federated Learning Network in Power Grid.
Proceedings of the 9th IEEE International Conference on Cyber Security and Cloud Computing, 2022

2021
Multi-view face pose recognition model construction based on a typical correlation analysis algorithm.
Int. J. Biom., 2021

2020
Falsified data filtering method for smart grid wireless communication based on SVM.
Int. J. Internet Protoc. Technol., 2020

Vulnerability Discovery and Security Protection Based on Web Application.
Proceedings of the 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy, 2020

2019
Real-time reliability allocation algorithm of high-throughput communication channel under strong interference.
Int. J. Internet Protoc. Technol., 2019

2007
SecureCast: A Secure Media Streaming Scheme over Peer-to-Peer Networks.
Proceedings of the Workshop on Intelligent Information Technology Application, 2007


  Loading...