Tianhan Gao

Orcid: 0000-0002-9250-3777

Affiliations:
  • Northeastern University, Software College, Shenyang, China


According to our database1, Tianhan Gao authored at least 94 papers between 2004 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Trust my IDS: An explainable AI integrated deep learning-based transparent threat detection system for industrial networks.
Comput. Secur., 2025

2024
Phasic parallel-network policy: a deep reinforcement learning framework based on action correlation.
Computing, October, 2024

An Explainable and Resilient Intrusion Detection System for Industry 5.0.
IEEE Trans. Consumer Electron., February, 2024

An Intrusion Detection System for Edge-Envisioned Smart Agriculture in Extreme Environment.
IEEE Internet Things J., 2024

Novel Dynamic Difficulty Adjustment Methods for Niche Games.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2024

An Intelligent and Interpretable Intrusion Detection System for Unmanned Aerial Vehicles.
Proceedings of the IEEE International Conference on Communications, 2024

2023
LA-MGFM: A legal judgment prediction method via sememe-enhanced graph neural networks and multi-graph fusion mechanism.
Inf. Process. Manag., September, 2023

TSVFN: Two-Stage Visual Fusion Network for multimodal relation extraction.
Inf. Process. Manag., May, 2023

PCAS: Cryptanalysis and improvement of pairing-free certificateless aggregate signature scheme with conditional privacy-preserving for VANETs.
Ad Hoc Networks, May, 2023

A novel chinese relation extraction method using polysemy rethinking mechanism.
Appl. Intell., April, 2023

Mental Pressure Recognition Method Based on CNN Model and EEG Signal under Cross Session.
Symmetry, 2023

IMF-PR: An Improved Morton-Filter-Based Pseudonym-Revocation Scheme in VANETs.
Sensors, 2023

PEPA: Paillier cryptosystem-based efficient privacy-preserving authentication scheme for VANETs.
J. Syst. Archit., 2023

FOG-Empowered Augmented-Intelligence-Based Proactive Defensive Mechanism for IoT-Enabled Smart Industries.
IEEE Internet Things J., 2023

An Approach to Optimize Replay Buffer in Value-Based Reinforcement Learning.
Proceedings of the 18th Annual System of Systems Engineering Conference, 2023

An Aircraft Assembly System Based on Improved YOLOv5.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2023

An Efficient Privacy-Preserving Authentication Scheme Based on Shamir Secret Sharing for VANETs.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2023

General Dynamic Difficulty Adjustment System for Major Game Genres.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2023

2022
A pseudonym-based certificateless privacy-preserving authentication scheme for VANETs.
Veh. Commun., 2022

A Hybrid Intelligent Framework to Combat Sophisticated Threats in Secure Industries.
Sensors, 2022

Attention enhancement system for college students with brain biofeedback signals based on virtual reality.
Multim. Tools Appl., 2022

Adaptive rubber-banding system of dynamic difficulty adjustment in racing games.
J. Int. Comput. Games Assoc., 2022

PCP: A Pseudonym Change Scheme for Location Privacy Preserving in VANETs.
Entropy, 2022

Side-Scrolling Platform Game Levels Reachability Repair Method and Its Applications to Super Mario Bros.
Proceedings of the RIVF International Conference on Computing and Communication Technologies, 2022

Multi-Scale and Kernel-Predicting Convolutional Networks for Monte Carlo Denoising.
Proceedings of the PRIS 2022: 4th International Conference on Pattern Recognition and Intelligent Systems, Wuhan, China, July 29, 2022

Efficient Privacy-Preserving Authentication and Group Key Agreement Scheme in Fog-Enabled VANET.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing - Proceedings of the 16th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2022), June 29, 2022

An Anonymous Authentication Scheme Based on Self-generated Pseudonym for VANETs.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing - Proceedings of the 16th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2022), June 29, 2022

3D Reconstruction Based on the Depth Image: A Review.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing - Proceedings of the 16th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2022), June 29, 2022

A Secure Data Sharing Scheme Based on CP-ABE in VANETs.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing - Proceedings of the 16th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2022), June 29, 2022

Procedural Generation of Game Levels and Maps: A Review.
Proceedings of the 2022 International Conference on Artificial Intelligence in Information and Communication, 2022

A Survey of Procedural Content Generation of Natural Objects in Games.
Proceedings of the 2022 International Conference on Artificial Intelligence in Information and Communication, 2022

A Survey of Markov Model in Reinforcement Learning.
Proceedings of the 2022 International Conference on Artificial Intelligence in Information and Communication, 2022

2021
A Hybrid Deep Learning-Driven SDN Enabled Mechanism for Secure Communication in Internet of Things (IoT).
Sensors, 2021

VANETs Road Condition Warning and Vehicle Incentive Mechanism Based on Blockchain.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021

An Authentication Scheme for Car-Home Connectivity Services in Vehicular Ad-Hoc Networks.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021

Combination of Pseudonym Changing with Blockchain-Based Data Credibility for Verifying Accuracy of Latest Vehicle Information in VANETs.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021

Improved Optimal Reciprocal Collision Avoidance Algorithm in Racing Games.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021

2020
A location privacy protection scheme based on random encryption period for VSNs.
J. Ambient Intell. Humaniz. Comput., 2020

An anonymous authentication scheme for edge computing-based car-home connectivity services in vehicular networks.
Future Gener. Comput. Syst., 2020

A Privacy-Preserving Authentication and Pseudonym Revocation Scheme for VANETs.
IEEE Access, 2020

Electronic Payment Schemes Based on Blockchain in VANETs.
IEEE Access, 2020

An EEG Emotion Classification System Based on One-Dimension Convolutional Neural Networks and Virtual Reality.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020

A Visual Particle System Based on Mechanism Model Data in Digital Twin.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020

Pseudonym Schemes Based on Location Privacy Protection in VANETs: A Survey.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020

A Convolutional Neural Network Model for Object Detection Based on Receptive Field.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020

2019
AIM: Activation increment minimization strategy for preventing bad information diffusion in OSNs.
Future Gener. Comput. Syst., 2019

APPAS: A Privacy-Preserving Authentication Scheme Based on Pseudonym Ring in VSNs.
IEEE Access, 2019

Improved Collaborative Filtering Algorithm Based on Stacked Denoising AutoEncoders.
Proceedings of the Mobile Internet Security - 4th International Symposium, 2019

End-to-End 3D Face Model Reconstruction Method Based on Fusion-CNN.
Proceedings of the Mobile Internet Security - 4th International Symposium, 2019

A Dynamic Scene Recognition Method for Event-Based Social Network.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019

Emotion Recognition Scheme via EEG Signal Analysis.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019

Real-Time Ray Tracing Algorithm for Dynamic Scene.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019

Enemy Attack Management Algorithm for Action Role-Playing Games.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019

Recommendation System Based on Deep Learning.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019

A Brief Survey: 3D Face Reconstruction.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019

2018
An anonymous access authentication scheme for vehicular ad hoc networks under edge computing.
Int. J. Distributed Sens. Networks, 2018

Independent Mix Zone for Location Privacy in Vehicular Networks.
IEEE Access, 2018

PAAS: PMIPv6 Access Authentication Scheme Based on Identity-Based Signature in VANETs.
IEEE Access, 2018

An Anonymous Authentication Scheme based on PMIPv6 for VANETs.
IEEE Access, 2018

Location Privacy Protection Scheme Based on Random Encryption Period in VANETs.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

Improve Memory for Alzheimer Patient by Employing Mind Wave on Virtual Reality with Deep Learning.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

An Anonymous Access Authentication Scheme for VANETs Based on ID-Based Group Signature.
Proceedings of the Advances on Broadband and Wireless Computing, 2018

Monocular Camera Tracking Curve Optimization Algorithm in Augmented Reality.
Proceedings of the Advances on Broadband and Wireless Computing, 2018

A Pseudonym Ring Building Scheme for Anonymous Authentication in VANETs.
Proceedings of the Advances on Broadband and Wireless Computing, 2018

2017
An Anonymous Access Authentication Scheme Based on Proxy Ring Signature for CPS-WMNs.
Mob. Inf. Syst., 2017

SAAS: A Secure Anonymous Authentication Scheme for PMIPv6.
Proceedings of the Mobile Internet Security - Second International Symposium, 2017

An Anonymous Access Authentication Scheme for VANETs Based on ISGS.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017

An Anonymous Authentication Scheme Based on Group IBS for PMIPv6 Network.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017

2016
Random oracle-based anonymous credential system for efficient attributes proof on smart devices.
Soft Comput., 2016

Privacy-preserving and efficient attributes proof based on selective aggregate CL-signature scheme.
Int. J. Comput. Math., 2016

An Access Authentication Scheme Based on Hierarchical IBS for Proxy Mobile IPV6 Network.
Intell. Autom. Soft Comput., 2016

Anonymous authentication scheme based on identity-based proxy group signature for wireless mesh network.
EURASIP J. Wirel. Commun. Netw., 2016

A Novel Hybrid Algorithm Based on Hill Matrix and Haar Domain Sequence.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

An Emergency Communication System Based on UAV-assisted Self-Organizing Network.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

Access Authentication Schemes for PMIPV6: A Survey.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

Indicator-Based Multi-objective Bacterial Foraging Algorithm with Adaptive Searching Mechanism.
Proceedings of the Bio-inspired Computing - Theories and Applications, 2016

2015
Secure Mobility Management for MIPv6 with Identity-Based Cryptography.
Proceedings of the Information and Communication Technology, 2015

2014
Privacy-Preserving Predicate Proof of Attributes with CL-Anonymous Credential.
J. Internet Serv. Inf. Secur., 2014

PPS: A privacy-preserving security scheme for multi-operator wireless mesh networks with enhanced user experience.
Comput. Sci. Inf. Syst., 2014

Anonymous Authentication Scheme Based on Proxy Group Signature for Wireless MESH Network.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

2013
LEAS: Localized efficient authentication scheme for multi-operator wireless mesh network with identity-based proxy signature.
Math. Comput. Model., 2013

A hybrid approach to secure hierarchical mobile IPv6 networks.
Comput. Sci. Inf. Syst., 2013

Anonymity Scheme with Unlinkability Property in Wireless Mesh Networks.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

2012
Delegation-Based Mutual Authentication Scheme for Multi-operator Wireless Mesh Network.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

BPVrfy: Hybrid Cryptographic Scheme Based - Federate Identity Attributes Verification Model for Business Processes.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Aggregated Privacy-Preserving Identity Verification for Composite Web Services.
Proceedings of the IEEE International Conference on Web Services, 2011

2009
A Distributed Security MIPv6 Model Based on Dynamic Policies.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

2008
A Comprehensive Six-Dimensional Quality of Web Services Assessment Model.
Proceedings of the 2008 IEEE International Conference on Web Services (ICWS 2008), 2008

Policy-Based Distributed Security Management Scheme in MIPv6.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Trusted Assessment of Web Services Based on a Six-Dimensional QoS Model.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

A Trusted Quality of Web Services Management Framework Based on Six Dimensional QoWS Model and End-to-End Monitoring.
Proceedings of the Challenges for Next Generation Network Operations and Service Management, 2008

2007
Distributed and Scalable Event Correlation Based on Causality Graph.
Proceedings of the Managing Next Generation Networks and Services, 2007

2004
Distributed Plug-and-Play Network Management Model Based on Mobile Agents.
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004

A Self-Adapting Mobile Ipv6 Model Based on MAP.
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004


  Loading...