Wei Liang
Orcid: 0000-0003-3813-3223Affiliations:
- Xiamen University of Technology, School of Opto-Electronic and Communication Engineering, China
- Hunan University, College of Mathematics and Econometrics, Changsha, China (former)
- Hunan University of Science and Technology, School of Computer Science and Engineering, Xiangtan, China (former)
According to our database1,
Wei Liang
authored at least 193 papers
between 2010 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
J. Supercomput., January, 2025
2024
On Identity, Transaction, and Smart Contract Privacy on Permissioned and Permissionless Blockchain: A Comprehensive Survey.
ACM Comput. Surv., December, 2024
Connect. Sci., December, 2024
Collaborative Federated Learning in Mobile Vehicle Clouds for Online Ride-Hailing Passenger Zones Recommendation.
IEEE Internet Things J., November, 2024
A smart contract-driven access control scheme with integrity checking for electronic health records.
Clust. Comput., November, 2024
Per-Packet Traffic Measurement in Storage, Computation and Bandwidth Limited Data Plane.
IEEE/ACM Trans. Netw., October, 2024
Uncovering Malicious Accounts in Open Mobile Social Networks Using a Graph- and Text-Based Attention Fusion Algorithm.
IEEE Internet Things J., October, 2024
J. Supercomput., September, 2024
A Computational Framework for Predicting Novel Drug Indications Using Graph Convolutional Network With Contrastive Learning.
IEEE J. Biomed. Health Informatics, August, 2024
IEEE Internet Things J., July, 2024
IEEE Internet Things J., July, 2024
Multiply Complementary Priors for Image Compressive Sensing Reconstruction in Impulsive Noise.
ACM Trans. Multim. Comput. Commun. Appl., June, 2024
An Unsupervised Image Dehazing Method Using Patch-Line and Fuzzy Clustering-Line Priors.
IEEE Trans. Fuzzy Syst., June, 2024
An Anonymous Authenticated Group Key Agreement Scheme for Transfer Learning Edge Services Systems.
ACM Trans. Sens. Networks, May, 2024
DSTGCS: an intelligent dynamic spatial-temporal graph convolutional system for traffic flow prediction in ITS.
Soft Comput., May, 2024
QoS Prediction and Adversarial Attack Protection for Distributed Services Under DLaaS.
IEEE Trans. Computers, March, 2024
IEEE Trans. Consumer Electron., February, 2024
TS-DP: An Efficient Data Processing Algorithm for Distribution Digital Twin Grid for Industry 5.0.
IEEE Trans. Consumer Electron., February, 2024
IEEE Trans. Consumer Electron., February, 2024
Secure Access Control for Electronic Health Records in Blockchain-Enabled Consumer Internet of Medical Things.
IEEE Trans. Consumer Electron., February, 2024
FineMon: An Innovative Adaptive Network Telemetry Scheme for Fine-Grained, Multi-Metric Data Monitoring with Dynamic Frequency Adjustment and Enhanced Data Recovery.
Proc. ACM Manag. Data, February, 2024
BAKA: Biometric Authentication and Key Agreement Scheme Based on Fuzzy Extractor for Wireless Body Area Networks.
IEEE Internet Things J., February, 2024
A Trajectory Privacy-Preserving Scheme Based on Transition Matrix and Caching for IIoT.
IEEE Internet Things J., February, 2024
MMDS: A secure and verifiable multimedia data search scheme for cloud-assisted edge computing.
Future Gener. Comput. Syst., February, 2024
Blockchain-Based Hybrid Reliable User Selection Scheme for Task Allocation in Mobile Crowd Sensing.
IEEE Trans. Netw. Sci. Eng., 2024
HCVC: A High-Capacity Off-Chain Virtual Channel Scheme Based on Bidirectional Locking Mechanism.
IEEE Trans. Netw. Sci. Eng., 2024
M$^{2}$STL: Multi-Range Multi-Level Spatial-Temporal Learning Model for Network Traffic Prediction.
IEEE Trans. Netw. Sci. Eng., 2024
IEEE Trans. Netw. Sci. Eng., 2024
ULBRF: A Framework for Maximizing Influence in Dynamic Networks Based on Upper and Lower Bounds of Propagation.
IEEE Trans. Netw. Sci. Eng., 2024
IEEE Trans. Netw. Sci. Eng., 2024
MC-DSC: A Dynamic Secure Resource Configuration Scheme Based on Medical Consortium Blockchain.
IEEE Trans. Inf. Forensics Secur., 2024
Inf. Sci., 2024
TrustBCFL: Mitigating Data Bias in IoT Through Blockchain-Enabled Federated Learning.
IEEE Internet Things J., 2024
Two-Phase Sparsification With Secure Aggregation for Privacy-Aware Federated Learning.
IEEE Internet Things J., 2024
TMHD: Twin-Bridge Scheduling of Multi-Heterogeneous Dependent Tasks for Edge Computing.
Future Gener. Comput. Syst., 2024
Dynamic multi-scale spatial-temporal graph convolutional network for traffic flow prediction.
Future Gener. Comput. Syst., 2024
The security and privacy challenges toward cybersecurity of 6G networks: A comprehensive review.
Comput. Sci. Inf. Syst., 2024
Comput. Networks, 2024
Predicting associations between drugs and G protein-coupled receptors using a multi-graph convolutional network.
Comput. Biol. Chem., 2024
FA-Net: A hierarchical feature fusion and interactive attention-based network for dose prediction in liver cancer patients.
Artif. Intell. Medicine, 2024
2023
FTMaster: A Detection and Mitigation System of Low-Rate Flow Table Overflow Attacks via SDN.
IEEE Trans. Netw. Serv. Manag., December, 2023
IEEE Trans. Cogn. Commun. Netw., December, 2023
Exploring latent weight factors and global information for food-oriented cross-modal retrieval.
Connect. Sci., December, 2023
Connect. Sci., December, 2023
DOE: a dynamic object elimination scheme based on geometric and semantic constraints.
Connect. Sci., December, 2023
Low cost network traffic measurement and fast recovery via redundant row subspace-based matrix completion.
Connect. Sci., December, 2023
Connect. Sci., December, 2023
PrivBCS: a privacy-preserving and efficient crowdsourcing system with fine-grained worker selection based on blockchain.
Connect. Sci., December, 2023
MKSS: An Effective Multi-authority Keyword Search Scheme for edge-cloud collaboration.
J. Syst. Archit., November, 2023
IEEE/ACM Trans. Netw., October, 2023
UHIR: An effective information dissemination model of online social hypernetworks based on user and information attributes.
Inf. Sci., October, 2023
Comput. Commun., October, 2023
DRJOA: intelligent resource management optimization through deep reinforcement learning approach in edge computing.
Clust. Comput., October, 2023
IEEE Trans. Intell. Transp. Syst., August, 2023
CTDM: cryptocurrency abnormal transaction detection method with spatio-temporal and global representation.
Soft Comput., August, 2023
IET Commun., August, 2023
A Caching-Based Dual K-Anonymous Location Privacy-Preserving Scheme for Edge Computing.
IEEE Internet Things J., June, 2023
Clust. Comput., April, 2023
A Novel Spatial-Temporal Multi-Scale Alignment Graph Neural Network Security Model for Vehicles Prediction.
IEEE Trans. Intell. Transp. Syst., January, 2023
IEEE Trans. Reliab., 2023
A DRL-Based Decentralized Computation Offloading Method: An Example of an Intelligent Manufacturing Scenario.
IEEE Trans. Ind. Informatics, 2023
A Regularized Cross-Layer Ladder Network for Intrusion Detection in Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2023
VASERP: An Adaptive, Lightweight, Secure, and Efficient RFID-Based Authentication Scheme for IoV.
Sensors, 2023
IEEE Internet Things J., 2023
Fairness constraint efficiency optimization for multiresource allocation in a cluster system serving internet of things.
Int. J. Commun. Syst., 2023
A real-time privacy-preserving scheme based on grouping queries for continuous location-based services.
Concurr. Comput. Pract. Exp., 2023
Research on global register allocation for code containing array-unit dual-usage register names.
Concurr. Comput. Pract. Exp., 2023
LightNestle: Quick and Accurate Neural Sequential Tensor Completion via Meta Learning.
Proceedings of the IEEE INFOCOM 2023, 2023
Proceedings of the 3rd International Conference on Electronic Information Technology and Smart Agriculture, 2023
Reducing the Length Divergence Bias for Textual Matching Models via Alternating Adversarial Training.
Proceedings of the 10th IEEE International Conference on Cyber Security and Cloud Computing, 2023
Proceedings of the 10th IEEE International Conference on Cyber Security and Cloud Computing, 2023
Automotive Lightweight Design Modeling And Intelligent Optimization Learn Key Technologies.
Proceedings of the 10th IEEE International Conference on Cyber Security and Cloud Computing, 2023
Proceedings of the 10th IEEE International Conference on Cyber Security and Cloud Computing, 2023
Proceedings of the 10th IEEE International Conference on Cyber Security and Cloud Computing, 2023
Adaboost-based Graph Convolutional Networks with Channel Attention for Intrusion Detection in Internet-of-Things.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023
An Efficient Decentralized Mutual Authentication Scheme Between Avatars for Metaverse.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023
2022
ACM Trans. Internet Techn., 2022
IEEE Trans. Netw. Sci. Eng., 2022
A Time-Sensitive Token-Based Anonymous Authentication and Dynamic Group Key Agreement Scheme for Industry 5.0.
IEEE Trans. Ind. Informatics, 2022
A Blockchain-Based Auditable Access Control System for Private Data in Service-Centric IoT Environments.
IEEE Trans. Ind. Informatics, 2022
TraceChain: A blockchain-based scheme to protect data confidentiality and traceability.
Softw. Pract. Exp., 2022
A Survey of Dummy-Based Location Privacy Protection Techniques for Location-Based Services.
Sensors, 2022
Multi-range bidirectional mask graph convolution based GRU networks for traffic prediction.
J. Syst. Archit., 2022
Data Fusion Approach for Collaborative Anomaly Intrusion Detection in Blockchain-Based Systems.
IEEE Internet Things J., 2022
Deep Neural Network Security Collaborative Filtering Scheme for Service Recommendation in Intelligent Cyber-Physical Systems.
IEEE Internet Things J., 2022
Graph learning-based spatial-temporal graph convolutional neural networks for traffic forecasting.
Connect. Sci., 2022
Privacy preserving personalized blockchain reliability prediction via federated learning in IoT environments.
Clust. Comput., 2022
Proceedings of the Smart Computing and Communication - 7th International Conference, 2022
Proceedings of the 7th IEEE International Conference on Smart Cloud, SmartCloud 2022, 2022
Proceedings of the Algorithms and Architectures for Parallel Processing, 2022
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
A Lightweight Authentication Protocol for NFC-enabled Drug Anti-Counterfeiting System.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
Dual chain authentication and key agreement protocol based on blockchain Technology in Edge Computing.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2022
2021
ACM Trans. Multim. Comput. Commun. Appl., 2021
IEEE Trans. Netw. Sci. Eng., 2021
Circuit Copyright Blockchain: Blockchain-Based Homomorphic Encryption for IP Circuit Protection.
IEEE Trans. Emerg. Top. Comput., 2021
Multi-level graph convolutional recurrent neural network for semantic image segmentation.
Telecommun. Syst., 2021
A blockchain-based Roadside Unit-assisted authentication and key agreement protocol for Internet of Vehicles.
J. Parallel Distributed Comput., 2021
Secure fusion approach for the Internet of Things in smart autonomous multi-robot systems.
Inf. Sci., 2021
An efficient transmission algorithm for power grid data suitable for autonomous multi-robot systems.
Inf. Sci., 2021
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
FSVA-data: a flexible solution for the visualisation and analysis of basin-scale water quality monitoring data.
Int. J. Embed. Syst., 2021
Connect. Sci., 2021
Connect. Sci., 2021
Connect. Sci., 2021
Connect. Sci., 2021
Connect. Sci., 2021
A secure and computationally efficient authentication and key agreement scheme for Internet of Vehicles.
Comput. Electr. Eng., 2021
A lightweight anonymous cross-regional mutual authentication scheme using blockchain technology for internet of vehicles.
Comput. Electr. Eng., 2021
Active Malicious Accounts Detection with Multimodal Fusion Machine Learning Algorithm.
Proceedings of the Ubiquitous Security - First International Conference, 2021
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021
A Fast Authentication and Key Agreement Protocol Based on Time-Sensitive Token for Mobile Edge Computing.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021
Multi-community Opportunistic Routing Algorithm Based on Machine Learning In the Internet of Vehicles.
Proceedings of the 8th IEEE International Conference on Cyber Security and Cloud Computing, 2021
Microservice Selection in Edge-Cloud Collaborative Environment: A Deep Reinforcement Learning Approach.
Proceedings of the 8th IEEE International Conference on Cyber Security and Cloud Computing, 2021
2020
An Industrial Network Intrusion Detection Algorithm Based on Multifeature Data Clustering Optimization Model.
IEEE Trans. Ind. Informatics, 2020
IEEE Trans. Ind. Informatics, 2020
Deep Reinforcement Learning for Resource Protection and Real-Time Detection in IoT Environment.
IEEE Internet Things J., 2020
An algorithm for determining data forwarding strategy based on recommended trust value in MANET.
Int. J. Embed. Syst., 2020
An Efficient Privacy-Preserving Multi-Keyword Query Scheme in Location Based Services.
IEEE Access, 2020
IEEE Access, 2020
Proceedings of the Smart Computing and Communication - 5th International Conference, 2020
Proceedings of the 3rd International Conference on Smart BlockChain, 2020
Proceedings of the 3rd International Conference on Smart BlockChain, 2020
Proceedings of the Blockchain and Trustworthy Systems - Second International Conference, 2020
2019
A Secure FaBric Blockchain-Based Data Transmission Technique for Industrial Internet-of-Things.
IEEE Trans. Ind. Informatics, 2019
Hausdorff Distance Model-Based Identity Authentication for IP Circuits in Service-Centric Internet-of-Things Environment.
Sensors, 2019
A double PUF-based RFID identity authentication protocol in service-centric internet of things environments.
Inf. Sci., 2019
A Novel Debt-Credit Mechanism for Blockchain-Based Data-Trading in Internet of Vehicles.
IEEE Internet Things J., 2019
Int. J. Comput. Sci. Eng., 2019
Future Gener. Comput. Syst., 2019
Efficient data packet transmission algorithm for IPV6 mobile vehicle network based on fast switching model with time difference.
Future Gener. Comput. Syst., 2019
Future Gener. Comput. Syst., 2019
A Lightweight Mutual Authentication and Key Agreement Scheme for Medical Internet of Things.
IEEE Access, 2019
IEEE Access, 2019
PUF-Based Anonymous Authentication Scheme for Hardware Devices and IPs in Edge Computing Environment.
IEEE Access, 2019
Proceedings of the Smart Computing and Communication - 4th International Conference, 2019
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019
A Dual-Chain Digital Copyright Registration and Transaction System Based on Blockchain Technology.
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019
Proceedings of the 5th IEEE International Conference on Big Data Security on Cloud, 2019
Proceedings of the 5th IEEE International Conference on Big Data Security on Cloud, 2019
2018
Wirel. Commun. Mob. Comput., 2018
SIRSE: A secure identity recognition scheme based on electroencephalogram data with multi-factor feature.
Comput. Electr. Eng., 2018
Proceedings of the 2018 IEEE SmartWorld, 2018
Proceedings of the 2018 IEEE SmartWorld, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the Internet of Everything - Technology, Communications and Computing, 2018
2017
A new publicly verifiable blind detection scheme for intellectual property protection.
Int. J. Syst. Assur. Eng. Manag., 2017
KSII Trans. Internet Inf. Syst., 2017
Int. J. Distributed Sens. Networks, 2017
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
Multiscale Entropy-Based Weighted Hidden Markov Network Security Situation Prediction Model.
Proceedings of the 2017 IEEE International Congress on Internet of Things, 2017
2016
A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity.
Secur. Commun. Networks, 2016
RESH: A Secure Authentication Algorithm Based on Regeneration Encoding Self-Healing Technology in WSN.
J. Sensors, 2016
Int. J. Online Eng., 2016
Comput. Sci. Inf. Syst., 2016
An Extended Chaotic Maps Based Authenticated Key Agreement Protocol Without Using Password.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016
2015
Wirel. Pers. Commun., 2015
A New Dynamic ID-Based User Authentication Scheme Using Mobile Device: Cryptanalysis, the Principles and Design.
Wirel. Pers. Commun., 2015
IEEE ACM Trans. Comput. Biol. Bioinform., 2015
J. Sensors, 2015
Trust-Aware and Low Energy Consumption Security Topology Protocol of Wireless Sensor Network.
J. Sensors, 2015
Int. J. Inf. Secur. Priv., 2015
Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update.
Int. J. Commun. Syst., 2015
Comput. Sci. Inf. Syst., 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
A Novel Data Sharing Mechanism via Cloud-Based Dynamic Audit for Social Internet of Vehicles.
Proceedings of the Internet of Vehicles - Safe and Intelligent Mobility, 2015
2014
IEEE ACM Trans. Comput. Biol. Bioinform., 2014
Int. J. Ad Hoc Ubiquitous Comput., 2014
Cryptanalysis of a robust smart card authentication scheme for multi-server architecture.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014
Proceedings of the 24th International Conference on Field Programmable Logic and Applications, 2014
From GPU to FPGA: A Pipelined Hierarchical Approach to Fast and Memory-Efficient NDN Name Lookup.
Proceedings of the 22nd IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, 2014
2013
An Efficient and Lightweight Source Privacy Protecting Scheme for Sensor Networks Using Group Knowledge.
Int. J. Distributed Sens. Networks, 2013
Int. J. Commun. Syst., 2013
An IP Protection Algorithm by Watermarking Multiple Scan Chains Based on Minimum Correlation Degree of Vectors.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013
2011
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011
2010
J. Electronic Imaging, 2010
J. Digit. Content Technol. its Appl., 2010
Int. J. Comput. Appl. Technol., 2010