Yongjian Liao
Orcid: 0000-0003-3139-8528
According to our database1,
Yongjian Liao
authored at least 62 papers
between 2008 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Neurocomputing, 2025
Certificateless Proxy Re-encryption with Cryptographic Reverse Firewalls for Secure Cloud Data Sharing.
Future Gener. Comput. Syst., 2025
2024
Enhanced multi-key privacy-preserving distributed deep learning protocol with application to diabetic retinopathy diagnosis.
Concurr. Comput. Pract. Exp., November, 2024
An Auto-Upgradable End-to-End Preauthenticated Secure Communication Protocol for UAV-Aided Perception Intelligent System.
IEEE Internet Things J., September, 2024
A Fully Auditable Data Propagation Scheme With Dynamic Vehicle Management for EC-ITS.
IEEE Trans. Intell. Transp. Syst., July, 2024
A Domain Isolated Tripartite Authenticated Key Agreement Protocol With Dynamic Revocation and Online Public Identity Updating for IIoT.
IEEE Internet Things J., May, 2024
IEEE Trans. Serv. Comput., 2024
A heterogeneous signcryption scheme with Cryptographic Reverse Firewalls for IoT and its application.
J. Inf. Secur. Appl., 2024
Enhanced privacy-preserving distributed deep learning with application to fog-based IoT.
Internet Things, 2024
A Deniably Authenticated Searchable Public Key Encryption Scheme in Mobile Electronic Mail System.
IACR Cryptol. ePrint Arch., 2024
Double Index Calculus Algorithm: Faster Solving Discrete Logarithm Problem in Finite Prime Field.
CoRR, 2024
2023
A Stronger Secure Ciphertext Fingerprint-Based Commitment Scheme for Robuster Verifiable OD-CP-ABE in IMCC.
IEEE Internet Things J., September, 2023
Confidence-Guided Planar-Recovering Multiview Stereo for Weakly Textured Plane of High-Resolution Image Scenes.
Remote. Sens., May, 2023
Privacy-preserving distributed deep learning via LWE-based Certificateless Additively Homomorphic Encryption (CAHE).
J. Inf. Secur. Appl., May, 2023
Differential privacy: Review of improving utility through cryptography-based technologies.
Concurr. Comput. Pract. Exp., February, 2023
2022
A revocable multi-authority fine-grained access control architecture against ciphertext rollback attack for mobile edge computing.
J. Syst. Archit., 2022
Privately Publishing Internet of Things Data: Bring Personalized Sampling Into Differentially Private Mechanisms.
IEEE Internet Things J., 2022
An efficient reusable attribute-based signature scheme for mobile services with multi access policies in fog computing.
Comput. Commun., 2022
Authentication Scheme Based on Non-Interactive Zero-Knowledge Proof for Mobile Health.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
Smart Health Records Sharing Scheme based on Partially Policy-Hidden CP-ABE with Leakage Resilience.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
2021
Unexpected Information Leakage of Differential Privacy Due to the Linear Property of Queries.
IEEE Trans. Inf. Forensics Secur., 2021
Soft Comput., 2021
Privacy preservation in Distributed Deep Learning: A survey on Distributed Deep Learning, privacy preservation techniques used and interesting research directions.
J. Inf. Secur. Appl., 2021
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021
A privacy-preserving revocable framework in the deep-learning-as-a-service platform system based on non software as a service.
Proceedings of the IEEE Intl Conf on Dependable, 2021
Proceedings of the 15th IEEE International Conference on Big Data Science and Engineering, 2021
2020
IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks.
Mob. Networks Appl., 2020
Revisit of Certificateless Signature Scheme Used to Remote Authentication Schemes for Wireless Body Area Networks.
IEEE Internet Things J., 2020
IEEE Access, 2020
Secure and Efficient Protocol for Outsourcing Large-Scale Matrix Multiplication to the Cloud.
IEEE Access, 2020
Identity-Based Signature With Server-Aided Verification Scheme for 5G Mobile Systems.
IEEE Access, 2020
Cost-Efficient Outsourced Decryption of Attribute-Based Encryption Schemes for Both Users and Cloud Server in Green Cloud Computing.
IEEE Access, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Spark Performance Optimization Analysis In Memory Management with Deploy Mode In Standalone Cluster Computing.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020
Privacy-Preservation in Distributed Deep Neural Networks via Encryption of Selected Gradients.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020
2019
IEEE Internet Things J., 2019
IEEE Access, 2019
Cryptanalysis of an Identity-Based Encryption Scheme With Equality Test and Improvement.
IEEE Access, 2019
An Intelligent Learning System Based on Random Search Algorithm and Optimized Random Forest Model for Improved Heart Disease Detection.
IEEE Access, 2019
IEEE Access, 2019
IEEE Access, 2019
Identity-Based Auditing for Shared Cloud Data With Efficient and Secure Sensitive Information Hiding.
IEEE Access, 2019
Spark Performance Optimization Analysis in Memory Tuning On GC Overhead for Big Data Analytics.
Proceedings of the 8th International Conference on Networks, Communication and Computing, 2019
Proceedings of the 4th IEEE International Conference on Advanced Robotics and Mechatronics, 2019
2018
Analysis of a mobile payment protocol with outsourced verification in cloud server and the improvement.
Comput. Stand. Interfaces, 2018
IEEE Access, 2018
2017
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017
2015
Proceedings of the 1st Workshop on Context Sensing and Activity Recognition, 2015
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
2012
Int. J. Secur. Networks, 2012
Comput. Electr. Eng., 2012
2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011
2009
Comput. Math. Appl., 2009
Proceedings of the International Forum on Information Technology and Applications, 2009
2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008