Yanqing Yao

Orcid: 0000-0002-2111-2533

According to our database1, Yanqing Yao authored at least 35 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A lattice-based unordered certificateless aggregate signature scheme for cloud medical health monitoring system.
Peer Peer Netw. Appl., January, 2024

Signer Revocability for Threshold Ring Signatures.
IACR Cryptol. ePrint Arch., 2024

A Certificateless Linearly Homomorphic Signature Scheme Based on Lattice for Network Coding.
Comput. J., 2024

2023
On Improving Bounding Box Representations for Oriented Object Detection.
IEEE Trans. Geosci. Remote. Sens., 2023

Lattice-Based Secret Sharing Scheme (Chinese Remainder Theorem).
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023

Improvement of an Identity-Based Aggregate Signature Protocol from Lattice.
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023

2022
An improved stochastic gradient descent algorithm based on Rényi differential privacy.
Int. J. Intell. Syst., December, 2022

Dual-Aligned Oriented Detector.
IEEE Trans. Geosci. Remote. Sens., 2022

Anchor-Free Oriented Proposal Generator for Object Detection.
IEEE Trans. Geosci. Remote. Sens., 2022

A certificateless ring signature scheme based on lattice.
Concurr. Comput. Pract. Exp., 2022

An SM2-based Traceable Ring Signature Scheme for Smart Grid Privacy Protection.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Robust Secure Aggregation with Lightweight Verification for Federated Learning.
Proceedings of the IEEE International Conference on Trust, 2022

Differentially Private Generative Model with Ratio-Based Gradient Clipping.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

2021
Optimizing deep learning and neural network to explore enterprise technology innovation model.
Neural Comput. Appl., 2021

2020
A unified framework of identity-based sequential aggregate signatures from 2-level HIBE schemes.
Inf. Sci., 2020

Deep Learning Algorithms Design and Implementation Based on Differential Privacy.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

Recommender Systems with Condensed Local Differential Privacy.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

An Improved Privacy-Preserving Stochastic Gradient Descent Algorithm.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

2019
Lean production and technological innovation in manufacturing industry based on SVM algorithms and data mining technology.
J. Intell. Fuzzy Syst., 2019

Lattice-Based Key-Aggregate (Searchable) Encryption in Cloud Storage.
IEEE Access, 2019

A Generalized Constraint of Privacy: $\alpha$ -Mutual Information Security.
IEEE Access, 2019

2018
Differential Privacy With Bias-Control Limited Sources.
IEEE Trans. Inf. Forensics Secur., 2018

2016
Security of weak secrets based cryptographic primitives via the Rényi entropy.
IET Inf. Secur., 2016

2015
Achieving Differential Privacy with Bias-Control Limited Source.
IACR Cryptol. ePrint Arch., 2015

Non-malleable Extractors with Shorter Seeds and Their Applications.
Proceedings of the Progress in Cryptology - INDOCRYPT 2015, 2015

Privacy with Imperfect Randomness.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

2014
Non-Malleable Extractors with Shorter Seeds and Min-Entropy Rate <1/2.
IACR Cryptol. ePrint Arch., 2014

Privacy and Imperfect Randomness.
IACR Cryptol. ePrint Arch., 2014

A novel variable precision (θ, σ)-fuzzy rough set model based on fuzzy granules.
Fuzzy Sets Syst., 2014

A novel fuzzy identity based signature scheme based on the short integer solution problem.
Comput. Electr. Eng., 2014

2013
Efficient and dynamic key management for multiple identities in identity-based systems.
Inf. Sci., 2013

Overcoming Weak Expectations via the Rényi Entropy and the Expanded Computational Entropy.
Proceedings of the Information Theoretic Security - 7th International Conference, 2013

2011
The Construction of Fuzzy Concept Lattices Based on (θ, σ)-Fuzzy Rough Approximation Operators.
Fundam. Informaticae, 2011

Attribute reduction based on generalized fuzzy evidence theory in fuzzy decision systems.
Fuzzy Sets Syst., 2011

2009
Fuzzy Concept Lattices Determined by (theta, sigma)-Fuzzy Rough Approximation Operators.
Proceedings of the Rough Sets and Knowledge Technology, 4th International Conference, 2009


  Loading...