Youliang Tian
Orcid: 0000-0002-5974-1570
According to our database1,
Youliang Tian
authored at least 133 papers
between 2011 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
J. Supercomput., January, 2025
Membership inference attacks via spatial projection-based relative information loss in MLaaS.
Inf. Process. Manag., 2025
2024
Wasserstein Generative Adversarial Networks Based Differential Privacy Metaverse Data Sharing.
IEEE J. Biomed. Health Informatics, November, 2024
H²CT: Asynchronous Distributed Key Generation With High-Computational Efficiency and Threshold Security in Blockchain Network.
IEEE Internet Things J., October, 2024
IEEE Internet Things J., July, 2024
IEEE Internet Things J., July, 2024
Privacy-Preserving Outsourcing Learning for Connected Autonomous Vehicles: Challenges, Solutions, and Perspectives.
IEEE Netw., May, 2024
Limitation of Reactance Perturbation Strategy Against False Data Injection Attacks on IoT-Based Smart Grid.
IEEE Internet Things J., April, 2024
Multikeyword-Ranked Search Scheme Supporting Extreme Environments for Internet of Vehicles.
IEEE Internet Things J., February, 2024
DScPA: A Dynamic Subcluster Privacy-Preserving Aggregation Scheme for Mobile Crowdsourcing in Industrial IoT.
IEEE Internet Things J., January, 2024
IEEE Trans. Netw. Sci. Eng., 2024
An Anti-Disguise Authentication System Using the First Impression of Avatar in Metaverse.
IEEE Trans. Inf. Forensics Secur., 2024
Cross-Modal Learning Based Flexible Bimodal Biometric Authentication With Template Protection.
IEEE Trans. Inf. Forensics Secur., 2024
Communication-Efficient Privacy-Preserving Neural Network Inference via Arithmetic Secret Sharing.
IEEE Trans. Inf. Forensics Secur., 2024
J. King Saud Univ. Comput. Inf. Sci., 2024
RRFL: A rational and reliable federated learning incentive framework for mobile crowdsensing.
J. King Saud Univ. Comput. Inf. Sci., 2024
Cryptanalysis and improvement of "group public key encryption scheme supporting equality test without bilinear pairings".
Inf. Sci., 2024
IEEE Internet Things J., 2024
Achieving dynamic privacy measurement and protection based on reinforcement learning for mobile edge crowdsensing of IoT.
Digit. Commun. Networks, 2024
CoRR, 2024
Masked Latent Transformer with the Random Masking Ratio to Advance the Diagnosis of Dental Fluorosis.
CoRR, 2024
Attribute-based key management for patient-centric and trusted data access in blockchain-enabled IoMT.
Comput. Networks, 2024
Proceedings of the International Conference on Networking and Network Applications, 2024
Proceedings of the International Conference on Networking and Network Applications, 2024
Proceedings of the International Conference on Networking and Network Applications, 2024
2023
Discovering urban mobility structure: a spatio-temporal representational learning approach.
Int. J. Digit. Earth, December, 2023
A provably secure collusion-resistant identity-based proxy re-encryption scheme based on NTRU.
J. Inf. Secur. Appl., November, 2023
Unbounded Attribute-Based Encryption Supporting Non-Monotonic Access Structure and Traceability without Key Escrow.
Mob. Networks Appl., October, 2023
EPMA: Edge-Assisted Hierarchical Privacy-Preserving Multidimensional Data Aggregation Mechanism.
Mob. Networks Appl., October, 2023
Robust zero-watermarking algorithm for diffusion-weighted images based on multiscale feature fusion.
Multim. Syst., October, 2023
Expert Syst. Appl., October, 2023
IEEE Trans. Ind. Informatics, May, 2023
DBKEM-AACS: a distributed key escrow model in blockchain with anonymous authentication and committee selection.
Sci. China Inf. Sci., March, 2023
Achieving Lightweight and Privacy-Preserving Object Detection for Connected Autonomous Vehicles.
IEEE Internet Things J., February, 2023
FVP-EOC: Fair, Verifiable, and Privacy-Preserving Edge Outsourcing Computing in 5G-Enabled IIoT.
IEEE Trans. Ind. Informatics, 2023
SPMA: Stealthy Physics-Manipulated Attack and Countermeasures in Cyber-Physical Smart Grid.
IEEE Trans. Inf. Forensics Secur., 2023
A Secure Authentication Framework to Guarantee the Traceability of Avatars in Metaverse.
IEEE Trans. Inf. Forensics Secur., 2023
Privacy-Preserving Dynamic Multi-Keyword Ranked Search Scheme in Multi-User Settings.
IEEE Trans. Consumer Electron., 2023
Privacy-utility equilibrium data generation based on Wasserstein generative adversarial networks.
Inf. Sci., 2023
VFLF: A verifiable federated learning framework against malicious aggregators in Industrial Internet of Things.
Concurr. Comput. Pract. Exp., 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the International Conference on Networking and Network Applications, 2023
Proceedings of the International Conference on Networking and Network Applications, 2023
An Efficient Blockchain-Based Certificateless Anonymous Authentication Scheme for VANETs.
Proceedings of the International Conference on Networking and Network Applications, 2023
Impact Analysis of Moving Target Defense on the Small-Signal Stability in Power Systems.
Proceedings of the 6th IEEE International Conference on Industrial Cyber-Physical Systems, 2023
A Verifiable Privacy-Preserving Outsourced Prediction Scheme Based on Blockchain in Smart Healthcare.
Proceedings of the IEEE International Conference on E-health Networking, 2023
Text Laundering: Mitigating Malicious Features Through Knowledge Distillation of Large Foundation Models.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
POSTER: Collaborative Authority-Based Searchable Encryption Using Access Control Encryption.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023
2022
Edge-Cooperative Privacy-Preserving Object Detection Over Random Point Cloud Shares for Connected Autonomous Vehicles.
IEEE Trans. Intell. Transp. Syst., 2022
Toward Cross-Domain Dynamic Accumulator Authentication Based on Blockchain in Internet of Things.
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Ind. Informatics, 2022
J. Inf. Sci. Eng., 2022
Inf. Process. Manag., 2022
IEEE Internet Things J., 2022
Toward Lightweight, Privacy-Preserving Cooperative Object Classification for Connected Autonomous Vehicles.
IEEE Internet Things J., 2022
Achieving Graph Clustering Privacy Preservation Based on Structure Entropy in Social IoT.
IEEE Internet Things J., 2022
Future Gener. Comput. Syst., 2022
Entropy, 2022
Digit. Commun. Networks, 2022
Achieving reliable and anti-collusive outsourcing computation and verification based on blockchain in 5G-enabled IoT.
Digit. Commun. Networks, 2022
Appl. Intell., 2022
Secure YOLOv3-SPP: Edge-Cooperative Privacy-preserving Object Detection for Connected Autonomous Vehicles.
Proceedings of the International Conference on Networking and Network Applications, 2022
Outsourced and Practical Privacy-Preserving K-Prototype Clustering supporting Mixed Data.
Proceedings of the IEEE International Conference on Communications, 2022
Experimental Validation of Encrypted Quadratic Optimization Implemented on Raspberry Pi.
Proceedings of the 13th Asian Control Conference, 2022
2021
Privacy-Preserving Federated Learning Framework with General Aggregation and Multiparty Entity Matching.
Wirel. Commun. Mob. Comput., 2021
IEEE Trans. Multim., 2021
An AI-Enabled Three-Party Game Framework for Guaranteed Data Privacy in Mobile Edge Crowdsensing of IoT.
IEEE Trans. Ind. Informatics, 2021
Balancing Privacy-Utility of Differential Privacy Mechanism: A Collaborative Perspective.
Secur. Commun. Networks, 2021
Secur. Commun. Networks, 2021
High-throughput secure multiparty multiplication protocol via bipartite graph partitioning.
Peer-to-Peer Netw. Appl., 2021
Secure and Usable Handshake Based Pairing for Wrist-Worn Smart Devices on Different Users.
Mob. Networks Appl., 2021
J. Netw. Comput. Appl., 2021
Towards reducing delegation overhead in replication-based verification: An incentive-compatible rational delegation computing scheme.
Inf. Sci., 2021
Int. J. Intell. Syst., 2021
Comput. Commun., 2021
An incentive-compatible rational secret sharing scheme using blockchain and smart contract.
Sci. China Inf. Sci., 2021
Towards Attack and Defense Views to (t, n)-threshold Secret Sharing Scheme Using Information Theory.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021
2020
World Wide Web, 2020
IEEE Trans. Ind. Informatics, 2020
IEEE Trans. Ind. Informatics, 2020
Belief and fairness: A secure two-party protocol toward the view of entropy for IoT devices.
J. Netw. Comput. Appl., 2020
Inference attacks on genomic privacy with an improved HMM and an RCNN model for unrelated individuals.
Inf. Sci., 2020
Verifiable Secret Sharing Based On Micali-Rabin's Random Vector Representations Technique.
Int. J. Netw. Secur., 2020
IPBSM: An optimal bribery selfish mining in the presence of intelligent and pure attackers.
Int. J. Intell. Syst., 2020
Cooperate Delegation of Computation for Rational Party Using Zero-Determinant Strategy Approach.
IEEE Access, 2020
Bitcoin-Based Anti-collusion Fair Payments for Outsourcing Computations in Cloud Computing.
Proceedings of the Security and Privacy in Digital Economy, 2020
Rational Delegation of Computation Based on Reputation and Contract Theory in the UC Framework.
Proceedings of the Security and Privacy in Digital Economy, 2020
Proceedings of the International Conference on Networking and Network Applications, 2020
Spatial Ciphertext Aggregation Computing Scheme for Mobile Crowd Sensing Privacy Protection.
Proceedings of the International Conference on Networking and Network Applications, 2020
Law Is Order: Protecting Multimedia Network Transmission by Game Theory and Mechanism Design.
Proceedings of the MultiMedia Modeling - 26th International Conference, 2020
Proceedings of the MultiMedia Modeling - 26th International Conference, 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the Pattern Recognition. ICPR International Workshops and Challenges, 2020
Usable and Secure Pairing Based on Handshake for Wrist-Worn Smart Devices on Different Users.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2020
2019
Constant-round authenticated and dynamic group key agreement protocol for D2D group communications.
Inf. Sci., 2019
Int. J. High Perform. Comput. Netw., 2019
How to Construct Rational Protocols with Nash Equilibrium Consistency in the UC framework.
IACR Cryptol. ePrint Arch., 2019
IEEE Access, 2019
IEEE Access, 2019
Efficient Privacy-Preserving Access Control of Mobile Multimedia Data in Cloud Computing.
IEEE Access, 2019
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019
Proceedings of the MMAsia '19: ACM Multimedia Asia, Beijing, China, December 16-18, 2019, 2019
Proceedings of the IEEE International Conference on Industrial Internet, 2019
Proceedings of the 2019 IEEE/CIC International Conference on Communications in China, 2019
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019
2018
Achieving Incentive, Security, and Scalable Privacy Protection in Mobile Crowdsensing Services.
Wirel. Commun. Mob. Comput., 2018
MAIM: A Novel Incentive Mechanism Based on Multi-Attribute User Selection in Mobile Crowdsensing.
IEEE Access, 2018
2017
Toward better data veracity in mobile cloud computing: A context-aware and incentive-based reputation mechanism.
Inf. Sci., 2017
A trustworthy and energy-aware routing protocol in software-defined wireless mesh networks.
Comput. Electr. Eng., 2017
Proceedings of the 2017 IEEE Global Conference on Signal and Information Processing, 2017
2016
Publicly verifiable secret sharing scheme and its application with almost optimal information rate.
Secur. Commun. Networks, 2016
An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks.
J. Netw. Comput. Appl., 2016
A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth.
J. Medical Syst., 2016
A Publicly Verifiable Secret Sharing Scheme Based on Multilinear Diffie-Hellman Assumption.
Int. J. Netw. Secur., 2016
Cryptanalysis and Improvement of a Smart Card Based Mutual Authentication Scheme in Cloud Computing.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016
2015
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks.
Peer-to-Peer Netw. Appl., 2015
Cryptanalysis of smart-card-based password authenticated key agreement protocol for session initiation protocol of Zhang et al.
Int. J. Commun. Syst., 2015
Sci. China Inf. Sci., 2015
2014
Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems.
J. Medical Syst., 2014
2013
2012
Int. J. Netw. Secur., 2012
2011
Proceedings of the IEEE 10th International Conference on Trust, 2011