Yi-Ning Liu
Orcid: 0000-0002-6487-7595Affiliations:
- Guilin University of Electronic Technology, Guilin, China
According to our database1,
Yi-Ning Liu
authored at least 87 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on scholat.com
On csauthors.net:
Bibliography
2024
Physically Secure and Privacy-Preserving Charging Authentication Framework With Data Aggregation in Vehicle-to-Grid Networks.
IEEE Trans. Intell. Transp. Syst., November, 2024
Practical and Secure Password Authentication and Key-Agreement-Scheme-Based Dual Server for IoT Devices in 5G Network.
IEEE Internet Things J., November, 2024
Efficient and Privacy-Preserving Skyline Queries Over Encrypted Data Under a Blockchain-Based Audit Architecture.
IEEE Trans. Knowl. Data Eng., September, 2024
IEEE Trans. Smart Grid, July, 2024
Privacy-Preserving Truth Discovery Based on Secure Multi-Party Computation in Vehicle-Based Mobile Crowdsensing.
IEEE Trans. Intell. Transp. Syst., July, 2024
SVCA: Secure and Verifiable Chained Aggregation for Privacy-Preserving Federated Learning.
IEEE Internet Things J., May, 2024
TridentShell: An enhanced covert and scalable backdoor injection attack on web applications.
J. Netw. Comput. Appl., March, 2024
A game-theory-based scheme to facilitate consensus latency minimization in sharding blockchain.
Inf. Sci., February, 2024
Efficient Pairing-Free Certificateless Signcryption Scheme for Secure Data Transmission in IoMT.
IEEE Internet Things J., February, 2024
Data Verifiable Personalized Access Control Electronic Healthcare Record Sharing Based on Blockchain in IoT Environment.
IEEE Internet Things J., February, 2024
Lightweight three-party key agreement for V2G networks with physical unclonable function.
Veh. Commun., 2024
An Efficient and Dynamic Privacy-Preserving Federated Learning System for Edge Computing.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Forward Private Verifiable Dynamic Searchable Symmetric Encryption With Efficient Conjunctive Query.
IEEE Trans. Dependable Secur. Comput., 2024
J. Syst. Archit., 2024
A secure and lightweight cloud data deduplication scheme with efficient access control and key management.
Comput. Commun., 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
IEEE Trans. Smart Grid, September, 2023
IEEE Trans. Intell. Transp. Syst., September, 2023
PPRT: Privacy Preserving and Reliable Trust-Aware Platoon Recommendation Scheme in IoV.
IEEE Syst. J., September, 2023
IEEE Trans. Veh. Technol., June, 2023
VFAS: Reliable and Privacy-Preserving V2F Authentication Scheme for Road Condition Monitoring System in IoV.
IEEE Trans. Veh. Technol., June, 2023
Scan-free verifiable public-key searchable encryption supporting efficient user updates in distributed systems.
J. Inf. Secur. Appl., May, 2023
Neural Comput. Appl., April, 2023
Secure Long-Range Autonomous Valet Parking: A Reservation Scheme With Three-Factor Authentication and Key Agreement.
IEEE Trans. Veh. Technol., March, 2023
IEEE Syst. J., March, 2023
Analysis and Improvement of an Efficient Certificateless Aggregate Signature With Conditional Privacy Preservation in VANETs.
IEEE Syst. J., March, 2023
IEEE Trans. Netw. Sci. Eng., 2023
OPERA: Optional Dimensional Privacy-Preserving Data Aggregation for Smart Healthcare Systems.
IEEE Trans. Ind. Informatics, 2023
A Scalable Sharding Protocol Based on Cross-Shard Dynamic Transaction Confirmation for Alliance Chain in Intelligent Systems.
Int. J. Semantic Web Inf. Syst., 2023
An Identity Privacy-Preserving Scheme against Insider Logistics Data Leakage Based on One-Time-Use Accounts.
Future Internet, 2023
IEEE Access, 2023
Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering, 2023
2022
ACM Trans. Internet Techn., November, 2022
IEEE Trans. Intell. Transp. Syst., 2022
IEEE Trans. Intell. Transp. Syst., 2022
EAFS: An Efficient, Accurate, and Forward Secure Searchable Encryption Scheme Supporting Range Search.
IEEE Syst. J., 2022
Int. J. Inf. Comput. Secur., 2022
Int. J. Commun. Syst., 2022
Frontiers Comput. Sci., 2022
Comput. Stand. Interfaces, 2022
Proceedings of the Science of Cyber Security - 4th International Conference, 2022
Proceedings of the Information and Communications Security - 24th International Conference, 2022
2021
Wirel. Commun. Mob. Comput., 2021
IEEE Trans. Intell. Transp. Syst., 2021
IEEE Trans. Ind. Informatics, 2021
IEEE Trans. Emerg. Top. Comput., 2021
IEEE Syst. J., 2021
A secure and trustworthy medical record sharing scheme based on searchable encryption and blockchain.
Comput. Networks, 2021
Proceedings of the Information Security - 24th International Conference, 2021
BAVC: Efficient Blockchain-Based Authentication Scheme for Vehicular Secure Communication.
Proceedings of the 13th International Conference on Advanced Computational Intelligence, 2021
2020
Wirel. Commun. Mob. Comput., 2020
IEEE Syst. J., 2020
Decentralized Privacy-Preserving Data Aggregation Scheme for Smart Grid Based on Blockchain.
Sensors, 2020
Lightweight privacy-preserving data aggregation protocol against internal attacks in smart grid.
J. Inf. Secur. Appl., 2020
Decentralizing Privacy-Preserving Data Aggregation Scheme Using Blockchain in Smart Grid.
Proceedings of the Security and Privacy in Digital Economy, 2020
2019
IEEE Trans. Ind. Informatics, 2019
An Information Theoretically Secure E-Lottery Scheme Based on Symmetric Bivariate Polynomials.
Symmetry, 2019
Symmetry, 2019
Secur. Commun. Networks, 2019
J. Inf. Secur. Appl., 2019
Int. J. Commun. Syst., 2019
Comput. Networks, 2019
2018
IEEE Access, 2018
Proceedings of the Information Security Practice and Experience, 2018
2017
Int. J. Commun. Syst., 2017
2016
KSII Trans. Internet Inf. Syst., 2016
Proceedings of the Cloud Computing and Security - Second International Conference, 2016
2014
2013
IEEE Trans. Computers, 2013
Secur. Commun. Networks, 2013
2011
Int. J. Intell. Syst., 2011
A novel reputation computation model based on subjective logic for mobile ad hoc networks.
Future Gener. Comput. Syst., 2011
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011
2010
IEEE Signal Process. Lett., 2010
2009
A Novel Reputation Computation Model Based on Subjective Logic for Mobile Ad Hoc Networks.
Proceedings of the Third International Conference on Network and System Security, 2009
2008
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008