Yongjian Liao

Orcid: 0000-0003-3139-8528

According to our database1, Yongjian Liao authored at least 63 papers between 2008 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Auditing privacy budget of differentially private neural network models.
Neurocomputing, 2025

Certificateless Proxy Re-encryption with Cryptographic Reverse Firewalls for Secure Cloud Data Sharing.
Future Gener. Comput. Syst., 2025

2024
Enhanced multi-key privacy-preserving distributed deep learning protocol with application to diabetic retinopathy diagnosis.
Concurr. Comput. Pract. Exp., November, 2024

An Auto-Upgradable End-to-End Preauthenticated Secure Communication Protocol for UAV-Aided Perception Intelligent System.
IEEE Internet Things J., September, 2024

A Fully Auditable Data Propagation Scheme With Dynamic Vehicle Management for EC-ITS.
IEEE Trans. Intell. Transp. Syst., July, 2024

A Domain Isolated Tripartite Authenticated Key Agreement Protocol With Dynamic Revocation and Online Public Identity Updating for IIoT.
IEEE Internet Things J., May, 2024

Secure Neural Network Prediction in the Cloud-Based Open Neural Network Service.
IEEE Trans. Serv. Comput., 2024

A heterogeneous signcryption scheme with Cryptographic Reverse Firewalls for IoT and its application.
J. Inf. Secur. Appl., 2024

Enhanced privacy-preserving distributed deep learning with application to fog-based IoT.
Internet Things, 2024

A Deniably Authenticated Searchable Public Key Encryption Scheme in Mobile Electronic Mail System.
IACR Cryptol. ePrint Arch., 2024

Double Index Calculus Algorithm: Faster Solving Discrete Logarithm Problem in Finite Prime Field.
CoRR, 2024

Segmentation-aware prior assisted joint global information aggregated 3D building reconstruction.
Adv. Eng. Informatics, 2024

2023
A Stronger Secure Ciphertext Fingerprint-Based Commitment Scheme for Robuster Verifiable OD-CP-ABE in IMCC.
IEEE Internet Things J., September, 2023

Confidence-Guided Planar-Recovering Multiview Stereo for Weakly Textured Plane of High-Resolution Image Scenes.
Remote. Sens., May, 2023

Privacy-preserving distributed deep learning via LWE-based Certificateless Additively Homomorphic Encryption (CAHE).
J. Inf. Secur. Appl., May, 2023

Differential privacy: Review of improving utility through cryptography-based technologies.
Concurr. Comput. Pract. Exp., February, 2023

2022
A revocable multi-authority fine-grained access control architecture against ciphertext rollback attack for mobile edge computing.
J. Syst. Archit., 2022

Privately Publishing Internet of Things Data: Bring Personalized Sampling Into Differentially Private Mechanisms.
IEEE Internet Things J., 2022

An efficient reusable attribute-based signature scheme for mobile services with multi access policies in fog computing.
Comput. Commun., 2022

Authentication Scheme Based on Non-Interactive Zero-Knowledge Proof for Mobile Health.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

Smart Health Records Sharing Scheme based on Partially Policy-Hidden CP-ABE with Leakage Resilience.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

2021
Unexpected Information Leakage of Differential Privacy Due to the Linear Property of Queries.
IEEE Trans. Inf. Forensics Secur., 2021

Partial policy hiding attribute-based encryption in vehicular fog computing.
Soft Comput., 2021

Privacy preservation in Distributed Deep Learning: A survey on Distributed Deep Learning, privacy preservation techniques used and interesting research directions.
J. Inf. Secur. Appl., 2021

An LWE-Based Multi-Key Privacy-Preserving Distributed Deep Learning.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

A privacy-preserving revocable framework in the deep-learning-as-a-service platform system based on non software as a service.
Proceedings of the IEEE Intl Conf on Dependable, 2021

Improving the Number of Queries Supported by Differentially Private Mechanisms.
Proceedings of the 15th IEEE International Conference on Big Data Science and Engineering, 2021

2020
IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks.
Mob. Networks Appl., 2020

Revisit of Certificateless Signature Scheme Used to Remote Authentication Schemes for Wireless Body Area Networks.
IEEE Internet Things J., 2020

the Connection between Cryptography and Differential Privacy: a Survey.
CoRR, 2020

Security Analysis of an Identity-Based Signature From Factorization Problem.
IEEE Access, 2020

Secure and Efficient Protocol for Outsourcing Large-Scale Matrix Multiplication to the Cloud.
IEEE Access, 2020

Identity-Based Signature With Server-Aided Verification Scheme for 5G Mobile Systems.
IEEE Access, 2020

Cost-Efficient Outsourced Decryption of Attribute-Based Encryption Schemes for Both Users and Cloud Server in Green Cloud Computing.
IEEE Access, 2020

Improving Laplace Mechanism of Differential Privacy by Personalized Sampling.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Spark Performance Optimization Analysis In Memory Management with Deploy Mode In Standalone Cluster Computing.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

Privacy-Preservation in Distributed Deep Neural Networks via Encryption of Selected Gradients.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

2019
Improvement of an outsourced attribute-based encryption scheme.
Soft Comput., 2019

An Efficient Differential Privacy Logistic Classification Mechanism.
IEEE Internet Things J., 2019

Security Analysis of a Certificateless Provable Data Possession Scheme in Cloud.
IEEE Access, 2019

Cryptanalysis of an Identity-Based Encryption Scheme With Equality Test and Improvement.
IEEE Access, 2019

Insecurity of an IBEET Scheme and an ABEET Scheme.
IEEE Access, 2019

An Intelligent Learning System Based on Random Search Algorithm and Optimized Random Forest Model for Improved Heart Disease Detection.
IEEE Access, 2019

Optimizing Query Times for Multiple Users Scenario of Differential Privacy.
IEEE Access, 2019

An Efficient Deniable Authenticated Encryption Scheme for Privacy Protection.
IEEE Access, 2019

Identity-Based Auditing for Shared Cloud Data With Efficient and Secure Sensitive Information Hiding.
IEEE Access, 2019

Spark Performance Optimization Analysis in Memory Tuning On GC Overhead for Big Data Analytics.
Proceedings of the 8th International Conference on Networks, Communication and Computing, 2019

Adaptive Robust Stabilization of a Flexible Timoshenko Manipulator.
Proceedings of the 4th IEEE International Conference on Advanced Robotics and Mechatronics, 2019

2018
Analysis of an ABE Scheme with Verifiable Outsourced Decryption.
Sensors, 2018

Efficient approximate message authentication scheme.
IET Inf. Secur., 2018

Analysis of a mobile payment protocol with outsourced verification in cloud server and the improvement.
Comput. Stand. Interfaces, 2018

Insecurity of A Key-Policy Attribute Based Encryption Scheme With Equality Test.
IEEE Access, 2018

2017
Identity-Based Remote Data Integrity Checking of Cloud Storage From Lattices.
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017

2015
The Design and Implementation of A Cost-effective RFID Indoor Localization System.
Proceedings of the 1st Workshop on Context Sensing and Activity Recognition, 2015

A Range-Free Localization of Passive RFID Tags Using Mobile Readers.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015

A Lightweight Detection of the RFID Unauthorized Reading Using RF Scanners.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2012
Cryptanalysis of an improved MFE public key cryptosystem.
Int. J. Secur. Networks, 2012

Further improvement of an identity-based signcryption scheme in the standard model.
Comput. Electr. Eng., 2012

2011
Analysis of an Identity-Based Signcryption Scheme in the Standard Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Security Analysis of an Improved MFE Public Key Cryptosystem.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011

2009
Designated verifier proxy signature scheme without random oracles.
Comput. Math. Appl., 2009

The Trust Management Model of Trusted Software.
Proceedings of the International Forum on Information Technology and Applications, 2009

2008
Designated Verifier Proxy Signature Scheme.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008


  Loading...