Shaojiang Deng

Orcid: 0000-0003-1246-7399

According to our database1, Shaojiang Deng authored at least 48 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Memory-Augmented Autoencoder Based Continuous Authentication on Smartphones With Conditional Transformer GANs.
IEEE Trans. Mob. Comput., May, 2024

A Revocable and Fair Outsourcing Attribute-Based Access Control Scheme in Metaverse.
IEEE Trans. Consumer Electron., February, 2024

A projected decentralized variance-reduction algorithm for constrained optimization problems.
Neural Comput. Appl., January, 2024

A Lightweight Mutual Privacy Preserving $k$-Means Clustering in Industrial IoT.
IEEE Trans. Netw. Sci. Eng., 2024

Mixed Automatic Adversarial Augmentation Network for Finger-Vein Recognition.
IEEE Trans. Instrum. Meas., 2024

AG-NAS: An Attention GRU-Based Neural Architecture Search for Finger-Vein Recognition.
IEEE Trans. Inf. Forensics Secur., 2024

2023
Privacy Protection Decentralized Economic Dispatch Over Directed Networks With Accurate Convergence.
IEEE Trans. Emerg. Top. Comput. Intell., December, 2023

SearchAuth: Neural Architecture Search-based Continuous Authentication Using Auto Augmentation Search.
ACM Trans. Sens. Networks, November, 2023

Adaptive Deep Feature Fusion for Continuous Authentication With Data Augmentation.
IEEE Trans. Mob. Comput., October, 2023

An event-triggering algorithm for decentralized stochastic optimization over networks.
J. Frankl. Inst., September, 2023

A Minimizing Energy Consumption Scheme for Real-Time Embedded System Based on Metaheuristic Optimization.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., July, 2023

Asynchronous Algorithms for Decentralized Resource Allocation Over Directed Networks.
IEEE Trans. Parallel Distributed Syst., 2023

Transformer Based Defense GAN Against Palm-Vein Adversarial Attacks.
IEEE Trans. Inf. Forensics Secur., 2023

Contrastive Learning-Based Finger-Vein Recognition with Automatic Adversarial Augmentation.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2023

2022
A Decentralized Stochastic Algorithm for Coupled Composite Optimization With Linear Convergence.
IEEE Trans. Signal Inf. Process. over Networks, 2022

DeFFusion: CNN-based Continuous Authentication Using Deep Feature Fusion.
ACM Trans. Sens. Networks, 2022

ET-DASG: An Efficient Decentralized Algorithm for Convex Optimization Over Networks.
IEEE Trans. Netw. Sci. Eng., 2022

An Event-Triggered Approach for Gradient Tracking in Consensus-Based Distributed Optimization.
IEEE Trans. Netw. Sci. Eng., 2022

CNN-Based Continuous Authentication on Smartphones With Conditional Wasserstein Generative Adversarial Network.
IEEE Internet Things J., 2022

2021
Differentially Private Consensus With Quantized Communication.
IEEE Trans. Cybern., 2021

CNN-Based Continuous Authentication on Smartphones with Auto Augmentation Search.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

2020
R²PEDS: A Recoverable and Revocable Privacy-Preserving Edge Data Sharing Scheme.
IEEE Internet Things J., 2020

Using Feature Fusion Strategies in Continuous Authentication on Smartphones.
IEEE Internet Comput., 2020

An Efficient Revocable Attribute-Based Signcryption Scheme With Outsourced Unsigncryption in Cloud Computing.
IEEE Access, 2020

2019
Differentially Private Consensus With an Event-Triggered Mechanism.
IEEE Trans. Control. Netw. Syst., 2019

Exploring spatial-temporal relations via deep convolutional neural networks for traffic flow prediction with incomplete data.
Appl. Soft Comput., 2019

An Efficient Revocable Attribute-Based Signcryption Scheme with Outsourced Designcryption in Cloud Computing.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

Towards Effective Mutation for Knowledge Transfer in Multifactorial Differential Evolution.
Proceedings of the IEEE Congress on Evolutionary Computation, 2019

2018
An Efficient V2I Authentication Scheme for VANETs.
Mob. Inf. Syst., 2018

Sensor-Based Continuous Authentication Using Cost-Effective Kernel Ridge Regression.
IEEE Access, 2018

2017
An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks.
Sensors, 2017

An Attribute-Based Secure and Scalable Scheme for Data Communications in Smart Grids.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

2013
Discrete-time Markov Model for Wireless Link Burstiness Simulations.
Wirel. Pers. Commun., 2013

Communication Energy Modeling and Optimization through Joint Packet Size Analysis of BSN and WiFi Networks.
IEEE Trans. Parallel Distributed Syst., 2013

Improvement and performance analysis of a novel hash function based on chaotic neural network.
Neural Comput. Appl., 2013

2012
Parallel chaotic Hash function construction based on cellular neural network.
Neural Comput. Appl., 2012

Keyed hash function based on a dynamic lookup table of functions.
Inf. Sci., 2012

Towards Energy Optimization Using Joint Data Rate Adaptation for BSN and WiFi Networks.
Proceedings of the Seventh IEEE International Conference on Networking, 2012

2011
Chaos Based Hash Function.
Proceedings of the Chaos-Based Cryptography - Theory, Algorithms and Applications, 2011

Parallel Hash function construction based on chaotic maps with changeable parameters.
Neural Comput. Appl., 2011

A novel Hash algorithm construction based on chaotic neural network.
Neural Comput. Appl., 2011

Energy modeling and optimization through joint packet size analysis of BSN and WiFi networks.
Proceedings of the 30th IEEE International Performance Computing and Communications Conference, 2011

2009
Asymptotic stability analysis of certain neutral differential equations: A descriptor system approach.
Math. Comput. Simul., 2009

2008
Using time-stamp to improve the security of a chaotic maps-based key agreement protocol.
Inf. Sci., 2008

2007
A novel key agreement protocol based on chaotic maps.
Inf. Sci., 2007

Neural Networks Based Image Recognition: A New Approach.
Proceedings of the Advances in Neural Networks, 2007

2005
A New Image Protection and Authentication Technique Based on ICA.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

Image Encryption Scheme Based on Chaotic Neural System.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005


  Loading...