default search action
Youliang Tian
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j91]Zhengqing Xiao, Youliang Tian, Changgen Peng, Yangyang Long, Chuanda Cai:
Ghost-Weight protocol: a highly efficient blockchain consensus for IoT. J. Supercomput. 81(1): 61 (2025) - 2024
- [j90]Axin Xiang, Hongfeng Gao, Youliang Tian, Linjie Wang, Jinbo Xiong:
Attribute-based key management for patient-centric and trusted data access in blockchain-enabled IoMT. Comput. Networks 246: 110425 (2024) - [j89]Renwan Bi, Mingfeng Zhao, Zuobin Ying, Youliang Tian, Jinbo Xiong:
Achieving dynamic privacy measurement and protection based on reinforcement learning for mobile edge crowdsensing of IoT. Digit. Commun. Networks 10(2): 380-388 (2024) - [j88]Rong Ma, Tao Feng, Jinbo Xiong, Qi Li, Youliang Tian:
DScPA: A Dynamic Subcluster Privacy-Preserving Aggregation Scheme for Mobile Crowdsourcing in Industrial IoT. IEEE Internet Things J. 11(2): 1880-1892 (2024) - [j87]Dequan Xu, Changgen Peng, Weizheng Wang, Kapal Dev, Sunder Ali Khowaja, Youliang Tian:
Multikeyword-Ranked Search Scheme Supporting Extreme Environments for Internet of Vehicles. IEEE Internet Things J. 11(3): 3868-3880 (2024) - [j86]Zhenyong Zhang, Bingdong Wang, Mengxiang Liu, Yan Qin, Jingpei Wang, Youliang Tian, Jianfeng Ma:
Limitation of Reactance Perturbation Strategy Against False Data Injection Attacks on IoT-Based Smart Grid. IEEE Internet Things J. 11(7): 11619-11631 (2024) - [j85]Mengqian Li, Youliang Tian, Junpeng Zhang, Zhou Zhou, Dongmei Zhao, Jianfeng Ma:
IMFL: An Incentive Mechanism for Federated Learning With Personalized Protection. IEEE Internet Things J. 11(13): 23862-23877 (2024) - [j84]Xianyu Mu, Youliang Tian, Zhou Zhou, Shuai Wang, Jinbo Xiong:
RVFL: Rational Verifiable Federated Learning Secure Aggregation Protocol. IEEE Internet Things J. 11(14): 25147-25161 (2024) - [j83]Jing Li, Youliang Tian, Zhou Zhou, Axin Xiang, Shuai Wang, Jinbo Xiong:
PSFL: Ensuring Data Privacy and Model Security for Federated Learning. IEEE Internet Things J. 11(15): 26234-26252 (2024) - [j82]Axin Xiang, Hongfeng Gao, Youliang Tian, Jinbo Xiong, Linjie Wang, Changgen Peng:
H²CT: Asynchronous Distributed Key Generation With High-Computational Efficiency and Threshold Security in Blockchain Network. IEEE Internet Things J. 11(20): 33758-33772 (2024) - [j81]Qijia Zhang, Youliang Tian:
Cryptanalysis and improvement of "group public key encryption scheme supporting equality test without bilinear pairings". Inf. Sci. 665: 120349 (2024) - [j80]Qingyi He, Youliang Tian, Shuai Wang, Jinbo Xiong:
RRFL: A rational and reliable federated learning incentive framework for mobile crowdsensing. J. King Saud Univ. Comput. Inf. Sci. 36(3): 101977 (2024) - [j79]Ze Yang, Youliang Tian:
A coding computation scheme for secure aggregation. J. King Saud Univ. Comput. Inf. Sci. 36(5): 102073 (2024) - [j78]Jinbo Xiong, Renwan Bi, Yuanyuan Zhang, Qi Li, Li Lin, Youliang Tian:
Privacy-Preserving Outsourcing Learning for Connected Autonomous Vehicles: Challenges, Solutions, and Perspectives. IEEE Netw. 38(3): 41-47 (2024) - [j77]Qi Jiang, Guichuan Zhao, Xindi Ma, Meng Li, Youliang Tian, Xinghua Li:
Cross-Modal Learning Based Flexible Bimodal Biometric Authentication With Template Protection. IEEE Trans. Inf. Forensics Secur. 19: 3593-3607 (2024) - [j76]Zhenyong Zhang, Kedi Yang, Youliang Tian, Jianfeng Ma:
An Anti-Disguise Authentication System Using the First Impression of Avatar in Metaverse. IEEE Trans. Inf. Forensics Secur. 19: 6393-6408 (2024) - [j75]Renwan Bi, Jinbo Xiong, Changqing Luo, Jianting Ning, Ximeng Liu, Youliang Tian, Yan Zhang:
Communication-Efficient Privacy-Preserving Neural Network Inference via Arithmetic Secret Sharing. IEEE Trans. Inf. Forensics Secur. 19: 6722-6737 (2024) - [j74]Zheng Yuan, Youliang Tian, Zhou Zhou, Ta Li, Shuai Wang, Jinbo Xiong:
Trustworthy Federated Learning Against Malicious Attacks in Web 3.0. IEEE Trans. Netw. Sci. Eng. 11(5): 3969-3982 (2024) - [i7]Yun Wu, Hao Xu, Maohua Gu, Zhongchuan Jiang, Jun Xu, Youliang Tian:
Masked Latent Transformer with the Random Masking Ratio to Advance the Diagnosis of Dental Fluorosis. CoRR abs/2404.13564 (2024) - [i6]Kedi Yang, Zhenyong Zhang, Youliang Tian:
Traceable AI-driven Avatars Using Multi-factors of Physical World and Metaverse. CoRR abs/2408.17121 (2024) - [i5]Zhenyong Zhang, Kedi Yang, Youliang Tian, Jianfeng Ma:
An Anti-disguise Authentication System Using the First Impression of Avatar in Metaverse. CoRR abs/2409.10850 (2024) - 2023
- [j73]Axin Xiang, Hongfeng Gao, Youliang Tian, Liang Wan:
DBKEM-AACS: a distributed key escrow model in blockchain with anonymous authentication and committee selection. Sci. China Inf. Sci. 66(3) (2023) - [j72]Zhou Zhou, Youliang Tian, Changgen Peng, Nan Yang, Shigong Long:
VFLF: A verifiable federated learning framework against malicious aggregators in Industrial Internet of Things. Concurr. Comput. Pract. Exp. 35(20) (2023) - [j71]Xiaoqi Duan, Tong Zhang, Zhibang Xu, Qiao Wan, Jinbiao Yan, Wangshu Wang, Youliang Tian:
Discovering urban mobility structure: a spatio-temporal representational learning approach. Int. J. Digit. Earth 16(2): 4044-4072 (2023) - [j70]Chun Liu, Youliang Tian, Jinchuan Tang, Shuping Dang, Gaojie Chen:
A novel local differential privacy federated learning under multi-privacy regimes. Expert Syst. Appl. 227: 120266 (2023) - [j69]Renwan Bi, Jinbo Xiong, Youliang Tian, Qi Li, Kim-Kwang Raymond Choo:
Achieving Lightweight and Privacy-Preserving Object Detection for Connected Autonomous Vehicles. IEEE Internet Things J. 10(3): 2314-2329 (2023) - [j68]Hai Liu, Youliang Tian, Changgen Peng, Zhenqiang Wu:
Privacy-utility equilibrium data generation based on Wasserstein generative adversarial networks. Inf. Sci. 642: 119069 (2023) - [j67]Nan Yang, Youliang Tian, Zhou Zhou, Qijia Zhang:
A provably secure collusion-resistant identity-based proxy re-encryption scheme based on NTRU. J. Inf. Secur. Appl. 78: 103604 (2023) - [j66]Zhangyu Liu, Zhi Li, Guomei Wang, Youliang Tian, Long Zheng:
Robust zero-watermarking algorithm for diffusion-weighted images based on multiscale feature fusion. Multim. Syst. 29(5): 2791-2807 (2023) - [j65]Yan Zhou, Changgen Peng, Youliang Tian, Zuolong Li, Weijie Tan:
Unbounded Attribute-Based Encryption Supporting Non-Monotonic Access Structure and Traceability without Key Escrow. Mob. Networks Appl. 28(5): 1625-1635 (2023) - [j64]Rong Ma, Tao Feng, Youliang Tian, Jinbo Xiong:
EPMA: Edge-Assisted Hierarchical Privacy-Preserving Multidimensional Data Aggregation Mechanism. Mob. Networks Appl. 28(5): 1831-1841 (2023) - [j63]Dequan Xu, Changgen Peng, Weizheng Wang, Hai Liu, Shoaib Ahmed Shaikh, Youliang Tian:
Privacy-Preserving Dynamic Multi-Keyword Ranked Search Scheme in Multi-User Settings. IEEE Trans. Consumer Electron. 69(4): 890-901 (2023) - [j62]Zhenyong Zhang, Ruilong Deng, Youliang Tian, Peng Cheng, Jianfeng Ma:
SPMA: Stealthy Physics-Manipulated Attack and Countermeasures in Cyber-Physical Smart Grid. IEEE Trans. Inf. Forensics Secur. 18: 581-596 (2023) - [j61]Kedi Yang, Zhenyong Zhang, Youliang Tian, Jianfeng Ma:
A Secure Authentication Framework to Guarantee the Traceability of Avatars in Metaverse. IEEE Trans. Inf. Forensics Secur. 18: 3817-3832 (2023) - [j60]Ta Li, Youliang Tian, Jinbo Xiong, Md. Zakirul Alam Bhuiyan:
FVP-EOC: Fair, Verifiable, and Privacy-Preserving Edge Outsourcing Computing in 5G-Enabled IIoT. IEEE Trans. Ind. Informatics 19(1): 940-950 (2023) - [j59]Zhou Zhou, Youliang Tian, Jinbo Xiong, Jianfeng Ma, Changgen Peng:
Blockchain-Enabled Secure and Trusted Federated Data Sharing in IIoT. IEEE Trans. Ind. Informatics 19(5): 6669-6681 (2023) - [c32]Dequan Xu, Changgen Peng, Youliang Tian, Hai Liu, Ziyue Wang, Weizheng Wang:
POSTER: Collaborative Authority-Based Searchable Encryption Using Access Control Encryption. ACNS Workshops 2023: 722-726 - [c31]Yi Jiang, Chenghui Shi, Oubo Ma, Youliang Tian, Shouling Ji:
Text Laundering: Mitigating Malicious Features Through Knowledge Distillation of Large Foundation Models. Inscrypt (2) 2023: 3-23 - [c30]Ta Li, Youliang Tian, Jinbo Xiong, Linjie Wang:
A Verifiable Privacy-Preserving Outsourced Prediction Scheme Based on Blockchain in Smart Healthcare. HealthCom 2023: 265-270 - [c29]Bingdong Wang, Junjie Song, Liang Wan, Youliang Tian, Xin Wang, Zhenyong Zhang:
Impact Analysis of Moving Target Defense on the Small-Signal Stability in Power Systems. ICPS 2023: 1-6 - [c28]Xihua Ma, Youliang Tian, Zehua Ding:
Resisting Membership Inference Attacks by Dynamically Adjusting Loss Targets. NaNA 2023: 574-579 - [c27]Xianyu Mu, Youliang Tian, Jinbo Xiong, Shuai Wang, Boxiang Gong:
FLAP: Federated Learning Aggregation Scheme Based on Privileged Secret Sharing. NaNA 2023: 588-594 - [c26]Changbing Bi, Youliang Tian, Ta Li, Shihong Wu, Hua Zhou:
An Efficient Blockchain-Based Certificateless Anonymous Authentication Scheme for VANETs. NaNA 2023: 649-654 - [c25]Qing Yang, Youliang Tian, Jinbo Xiong:
DFedXGB: An XGB Vertical Federated Learning Framework with Data Desensitization. TrustCom 2023: 157-164 - 2022
- [j58]Yun Wu, Jianyong Jiang, Zimeng Huang, Youliang Tian:
FPANet: Feature pyramid aggregation network for real-time semantic segmentation. Appl. Intell. 52(3): 3319-3336 (2022) - [j57]Linjie Wang, Youliang Tian, Jinbo Xiong:
Achieving reliable and anti-collusive outsourcing computation and verification based on blockchain in 5G-enabled IoT. Digit. Commun. Networks 8(5): 644-653 (2022) - [j56]Duo Zhang, Youliang Tian, Linjie Wang:
A potential game-based outsourcing computation framework for multiple calculators. Digit. Commun. Networks 8(5): 654-663 (2022) - [j55]Hai Liu, Changgen Peng, Youliang Tian, Shigong Long, Feng Tian, Zhenqiang Wu:
GDP vs. LDP: A Survey from the Perspective of Information-Theoretic Channel. Entropy 24(3): 430 (2022) - [j54]Yi Xu, Changgen Peng, Weijie Tan, Youliang Tian, Minyao Ma, Kun Niu:
Non-interactive verifiable privacy-preserving federated learning. Future Gener. Comput. Syst. 128: 365-380 (2022) - [j53]Youliang Tian, Zhiying Zhang, Jinbo Xiong, Lei Chen, Jianfeng Ma, Changgen Peng:
Achieving Graph Clustering Privacy Preservation Based on Structure Entropy in Social IoT. IEEE Internet Things J. 9(4): 2761-2777 (2022) - [j52]Jinbo Xiong, Renwan Bi, Youliang Tian, Ximeng Liu, Dapeng Wu:
Toward Lightweight, Privacy-Preserving Cooperative Object Classification for Connected Autonomous Vehicles. IEEE Internet Things J. 9(4): 2787-2801 (2022) - [j51]Zhenyong Zhang, Youliang Tian, Ruilong Deng, Jianfeng Ma:
A Double-Benefit Moving Target Defense Against Cyber-Physical Attacks in Smart Grid. IEEE Internet Things J. 9(18): 17912-17925 (2022) - [j50]Kaiyang Zhao, Xu An Wang, Bo Yang, Youliang Tian, Jindan Zhang:
A privacy preserving homomorphic computing toolkit for predictive computation. Inf. Process. Manag. 59(2): 102880 (2022) - [j49]Kun Niu, Changgen Peng, Youliang Tian, Weijie Tan:
K -implicit Tracking Data Publishing Scheme against Geo-matching Attacks. J. Inf. Sci. Eng. 38(1): 1-16 (2022) - [j48]Kang Xiang, Youliang Tian, Sheng Gao, Changgen Peng, Weijie Tan:
Game-based Theory Rational Delegation Learning Scheme. J. Inf. Sci. Eng. 38(1): 57-82 (2022) - [j47]Youliang Tian, Ta Li, Jinbo Xiong, Md. Zakirul Alam Bhuiyan, Jianfeng Ma, Changgen Peng:
A Blockchain-Based Machine Learning Framework for Edge Services in IIoT. IEEE Trans. Ind. Informatics 18(3): 1918-1929 (2022) - [j46]Linjie Wang, Youliang Tian, Duo Zhang:
Toward Cross-Domain Dynamic Accumulator Authentication Based on Blockchain in Internet of Things. IEEE Trans. Ind. Informatics 18(4): 2858-2867 (2022) - [j45]Renwan Bi, Jinbo Xiong, Youliang Tian, Qi Li, Ximeng Liu:
Edge-Cooperative Privacy-Preserving Object Detection Over Random Point Cloud Shares for Connected Autonomous Vehicles. IEEE Trans. Intell. Transp. Syst. 23(12): 24979-24990 (2022) - [c24]Ze Yang, Zhenyong Zhang, Youliang Tian:
Experimental Validation of Encrypted Quadratic Optimization Implemented on Raspberry Pi. ASCC 2022: 2018-2023 - [c23]Renwan Bi, Jinbo Xiong, Jie Lin, Min Zhao, Youliang Tian:
Outsourced and Practical Privacy-Preserving K-Prototype Clustering supporting Mixed Data. ICC 2022: 5645-5650 - [c22]Yongjie Zhou, Jinbo Xiong, Renwan Bi, Youliang Tian:
Secure YOLOv3-SPP: Edge-Cooperative Privacy-preserving Object Detection for Connected Autonomous Vehicles. NaNA 2022: 82-89 - [i4]Kedi Yang, Zhenyong Zhang, Youliang Tian, Jianfeng Ma:
A Secure Authentication Framework to Guarantee the Traceability of Avatars in Metaverse. CoRR abs/2209.08893 (2022) - 2021
- [j44]Zerui Chen, Youliang Tian, Changgen Peng:
An incentive-compatible rational secret sharing scheme using blockchain and smart contract. Sci. China Inf. Sci. 64(10) (2021) - [j43]Qi Jiang, Xin Zhang, Ning Zhang, Youliang Tian, Xindi Ma, Jianfeng Ma:
Three-factor authentication protocol using physical unclonable function for IoV. Comput. Commun. 173: 45-55 (2021) - [j42]Xinying Yu, Zhaojie Wang, Yilei Wang, Fengyin Li, Tao Li, Yuling Chen, Youliang Tian, Xiaomei Yu:
ImpSuic: A quality updating rule in mixing coins with maximum utilities. Int. J. Intell. Syst. 36(3): 1182-1198 (2021) - [j41]Zerui Chen, Youliang Tian, Jinbo Xiong, Changgen Peng, Jianfeng Ma:
Towards reducing delegation overhead in replication-based verification: An incentive-compatible rational delegation computing scheme. Inf. Sci. 568: 286-316 (2021) - [j40]Yunhe Cui, Qing Qian, Chun Guo, Guowei Shen, Youliang Tian, Huanlai Xing, Lianshan Yan:
Towards DDoS detection mechanisms in Software-Defined Networking. J. Netw. Comput. Appl. 190: 103156 (2021) - [j39]Guichuan Zhao, Qi Jiang, Xiaohan Huang, Xindi Ma, Youliang Tian, Jian Feng Ma:
Secure and Usable Handshake Based Pairing for Wrist-Worn Smart Devices on Different Users. Mob. Networks Appl. 26(6): 2407-2422 (2021) - [j38]Jianjun Chen, Youliang Tian, Wei Ma, Zhengdong Mao, Yue Hu:
Scale channel attention network for image segmentation. Multim. Tools Appl. 80(11): 16473-16489 (2021) - [j37]Yi Xu, Changgen Peng, Weijie Tan, Youliang Tian, Minyao Ma, Hongfa Ding:
High-throughput secure multiparty multiplication protocol via bipartite graph partitioning. Peer-to-Peer Netw. Appl. 14(3): 1414-1430 (2021) - [j36]Hai Liu, Changgen Peng, Youliang Tian, Shigong Long, Zhenqiang Wu:
Balancing Privacy-Utility of Differential Privacy Mechanism: A Collaborative Perspective. Secur. Commun. Networks 2021: 5592191:1-5592191:14 (2021) - [j35]Tao Li, Yuling Chen, Yanli Wang, Yilei Wang, Minghao Zhao, Haojia Zhu, Youliang Tian, Xiaomei Yu, Yixian Yang:
Corrigendum to "Rational Protocols and Attacks in Blockchain System". Secur. Commun. Networks 2021: 9856969:1-9856969:2 (2021) - [j34]Jinbo Xiong, Mingfeng Zhao, Md. Zakirul Alam Bhuiyan, Lei Chen, Youliang Tian:
An AI-Enabled Three-Party Game Framework for Guaranteed Data Privacy in Mobile Edge Crowdsensing of IoT. IEEE Trans. Ind. Informatics 17(2): 922-933 (2021) - [j33]Yuxin Wang, Hongtao Xie, Zhengjun Zha, Youliang Tian, Zilong Fu, Yongdong Zhang:
R-Net: A Relationship Network for Efficient and Accurate Scene Text Detection. IEEE Trans. Multim. 23: 1316-1329 (2021) - [j32]Zhou Zhou, Youliang Tian, Changgen Peng:
Privacy-Preserving Federated Learning Framework with General Aggregation and Multiparty Entity Matching. Wirel. Commun. Mob. Comput. 2021: 6692061:1-6692061:14 (2021) - [c21]Ze Yang, Youliang Tian:
Towards Attack and Defense Views to (t, n)-threshold Secret Sharing Scheme Using Information Theory. NaNA 2021: 52-58 - [c20]Yu He, Youliang Tian, Hua Xu:
Random verifiable multi-server searchable encryption scheme. NaNA 2021: 88-93 - [c19]Mengqian Li, Youliang Tian, Junpeng Zhang, Dandan Fan, Dongmei Zhao:
The Trade-off Between Privacy and Utility in Local Differential Privacy. NaNA 2021: 373-378 - [i3]Youliang Tian, Zhiying Zhang, Jinbo Xiong, Jianfeng Ma:
Structural Mutual Information and Its Application. IACR Cryptol. ePrint Arch. 2021: 1356 (2021) - 2020
- [j31]Duo Zhang, Youliang Tian, Chaoyue Yue, Meimei Fan:
Cooperate Delegation of Computation for Rational Party Using Zero-Determinant Strategy Approach. IEEE Access 8: 27734-27743 (2020) - [j30]Guoyu Yang, Yilei Wang, Zhaojie Wang, Youliang Tian, Xiaomei Yu, Shouzhe Li:
IPBSM: An optimal bribery selfish mining in the presence of intelligent and pure attackers. Int. J. Intell. Syst. 35(11): 1735-1748 (2020) - [j29]Haiou Yang, Youliang Tian:
Verifiable Secret Sharing Based On Micali-Rabin's Random Vector Representations Technique. Int. J. Netw. Secur. 22(5): 809-814 (2020) - [j28]Hongfa Ding, Youliang Tian, Changgen Peng, Youshan Zhang, Shuwen Xiang:
Inference attacks on genomic privacy with an improved HMM and an RCNN model for unrelated individuals. Inf. Sci. 512: 207-218 (2020) - [j27]Yilei Wang, Guoyu Yang, Tao Li, Fengyin Li, Youliang Tian, Xiaomei Yu:
Belief and fairness: A secure two-party protocol toward the view of entropy for IoT devices. J. Netw. Comput. Appl. 161: 102641 (2020) - [j26]Tao Li, Yuling Chen, Yanli Wang, Yilei Wang, Minghao Zhao, Haojia Zhu, Youliang Tian, Xiaomei Yu, Yixian Yang:
Rational Protocols and Attacks in Blockchain System. Secur. Commun. Networks 2020: 8839047:1-8839047:11 (2020) - [j25]Jinbo Xiong, Rong Ma, Lei Chen, Youliang Tian, Qi Li, Ximeng Liu, Zhiqiang Yao:
A Personalized Privacy Protection Framework for Mobile Crowdsensing in IIoT. IEEE Trans. Ind. Informatics 16(6): 4231-4241 (2020) - [j24]Youliang Tian, Zuan Wang, Jinbo Xiong, Jianfeng Ma:
A Blockchain-Based Secure Key Management Scheme With Trustworthiness in DWSNs. IEEE Trans. Ind. Informatics 16(9): 6193-6202 (2020) - [j23]Youliang Tian, Qiuxian Li, Jia Hu, Hui Lin:
Secure limitation analysis of public-key cryptography for smart card settings. World Wide Web 23(2): 1423-1440 (2020) - [c18]Xiaohan Huang, Guichuan Zhao, Qi Jiang, Xindi Ma, Youliang Tian, Jianfeng Ma:
Usable and Secure Pairing Based on Handshake for Wrist-Worn Smart Devices on Different Users. CollaborateCom (1) 2020: 493-510 - [c17]Zixiao Wang, Hai Xu, Youliang Tian, Hongtao Xie:
Hierarchical Consistency and Refinement for Semi-supervised Medical Segmentation. ICPR Workshops (6) 2020: 267-276 - [c16]Duo Zhang, Youliang Tian, Linjie Wang, Sheng Gao, Jianfeng Ma:
Cooperative Game Model of Delegation Computing: Verifier Separated from Calculators. INFOCOM Workshops 2020: 62-67 - [c15]Chuanbin Liu, Youliang Tian, Hongtao Xie:
Law Is Order: Protecting Multimedia Network Transmission by Game Theory and Mechanism Design. MMM (2) 2020: 651-668 - [c14]Qiuxian Li, Youliang Tian:
Rational Delegation Computing Using Information Theory and Game Theory Approach. MMM (2) 2020: 669-680 - [c13]Kang Xiang, Youliang Tian, Sheng Gao, Changgen Peng, Weijie Tan:
Rational Delegation Learning Outsourcing Scheme Based on Game Theory. NaNA 2020: 130-135 - [c12]Kun Niu, Changgen Peng, Youliang Tian, Weijie Tan:
Spatial Ciphertext Aggregation Computing Scheme for Mobile Crowd Sensing Privacy Protection. NaNA 2020: 388-393 - [c11]Duo Zhang, Xiaodong Zhang, Sheng Gao, Youliang Tian:
Bitcoin-Based Anti-collusion Fair Payments for Outsourcing Computations in Cloud Computing. SPDE 2020: 309-321 - [c10]Xiaoxia Jiang, Youliang Tian:
Rational Delegation of Computation Based on Reputation and Contract Theory in the UC Framework. SPDE 2020: 322-335
2010 – 2019
- 2019
- [j22]Youliang Tian, Jie Guo, Yulei Wu, Hui Lin:
Towards Attack and Defense Views of Rational Delegation of Computation. IEEE Access 7: 44037-44049 (2019) - [j21]Qi Li, Youliang Tian, Yinghui Zhang, Limin Shen, Jingjing Guo:
Efficient Privacy-Preserving Access Control of Mobile Multimedia Data in Cloud Computing. IEEE Access 7: 131534-131542 (2019) - [j20]Cheng Liu, Youliang Tian, Jinbo Xiong, Yanhua Lu, Qiuxian Li, Changgen Peng:
Towards Attack and Defense Views to K-Anonymous Using Information Theory Approach. IEEE Access 7: 156025-156032 (2019) - [j19]Hongfa Ding, Changgen Peng, Youliang Tian, Shuwen Xiang:
A risk adaptive access control model based on Markov for big data in the cloud. Int. J. High Perform. Comput. Netw. 13(4): 464-475 (2019) - [j18]Linjie Wang, Youliang Tian, Duo Zhang, Yanhua Lu:
Constant-round authenticated and dynamic group key agreement protocol for D2D group communications. Inf. Sci. 503: 61-71 (2019) - [c9]Duo Zhang, Youliang Tian, Chaoyue Yue:
Cooperate Delegation Computation for Rational Party Using Zero-Determinant Strategy. GLOBECOM Workshops 2019: 1-6 - [c8]Qi Jiang, Xin Zhang, Ning Zhang, Youliang Tian, XinDi Ma, Jianfeng Ma:
Two-Factor Authentication Protocol Using Physical Unclonable Function for IoV. ICCC 2019: 195-200 - [c7]Rong Ma, Lei Chen, Jinbo Xiong, Youliang Tian, Qi Li, Ximeng Liu:
A Personalized Privacy Protection Data Uploading Scheme for Mobile Crowdsensing. ICII 2019: 227-232 - [c6]Shaobo Min, Hongtao Xie, Youliang Tian, Hantao Yao, Yongdong Zhang:
Adaptive Bilinear Pooling for Fine-grained Representation Learning. MMAsia 2019: 2:1-2:6 - [c5]Zeyu Zhang, Zhiyang Lu, Youliang Tian:
Data Privacy Quantification and De-identification Model Based on Information Theory. NaNA 2019: 213-222 - [c4]Hongfa Ding, Changgen Peng, Youliang Tian, Shuwen Xiang:
A Game Theoretical Analysis of Risk Adaptive Access Control for Privacy Preserving. NaNA 2019: 253-258 - [i2]Xiaoxia Jiang, Youliang Tian:
How to Construct Rational Protocols with Nash Equilibrium Consistency in the UC framework. IACR Cryptol. ePrint Arch. 2019: 1398 (2019) - 2018
- [j17]Jinbo Xiong, Xiuhua Chen, Youliang Tian, Rong Ma, Lei Chen, Zhiqiang Yao:
MAIM: A Novel Incentive Mechanism Based on Multi-Attribute User Selection in Mobile Crowdsensing. IEEE Access 6: 65384-65396 (2018) - [j16]Hailong Wang, Youliang Tian, Xin Yin:
基于区块链的大数据确权方案 (Blockchain-based Big Data Right Confirmation Scheme). 计算机科学 45(2): 15-19 (2018) - [j15]Jinbo Xiong, Rong Ma, Lei Chen, Youliang Tian, Li Lin, Biao Jin:
Achieving Incentive, Security, and Scalable Privacy Protection in Mobile Crowdsensing Services. Wirel. Commun. Mob. Comput. 2018: 8959635:1-8959635:12 (2018) - 2017
- [j14]Hui Lin, Jia Hu, Li Xu, Youliang Tian, Lei Liu, Stewart Blakeway:
A trustworthy and energy-aware routing protocol in software-defined wireless mesh networks. Comput. Electr. Eng. 64: 407-419 (2017) - [j13]Hui Lin, Jia Hu, Youliang Tian, Li Yang, Li Xu:
Toward better data veracity in mobile cloud computing: A context-aware and incentive-based reputation mechanism. Inf. Sci. 387: 238-253 (2017) - [c3]Rui Sun, Qiao Peng, Youliang Tian:
A hybrid encryption scheme based on the satisfiability problem. GlobalSIP 2017: 1363-1367 - 2016
- [j12]Qiao Peng, Youliang Tian:
A Publicly Verifiable Secret Sharing Scheme Based on Multilinear Diffie-Hellman Assumption. Int. J. Netw. Secur. 18(6): 1192-1200 (2016) - [j11]Qi Jiang, Xinxin Lian, Chao Yang, Jianfeng Ma, Youliang Tian, Yuanyuan Yang:
A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth. J. Medical Syst. 40(11): 231:1-231:10 (2016) - [j10]Qi Jiang, Jianfeng Ma, Fushan Wei, Youliang Tian, Jian Shen, Yuanyuan Yang:
An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks. J. Netw. Comput. Appl. 76: 37-48 (2016) - [j9]Qiao Peng, Youliang Tian:
Publicly verifiable secret sharing scheme and its application with almost optimal information rate. Secur. Commun. Networks 9(18): 6227-6238 (2016) - [c2]Qi Jiang, Bingyan Li, Jianfeng Ma, Youliang Tian, Yuanyuan Yang:
Cryptanalysis and Improvement of a Smart Card Based Mutual Authentication Scheme in Cloud Computing. ICCCS (1) 2016: 311-321 - 2015
- [j8]Youliang Tian, Changgen Peng, Dongdai Lin, Jianfeng Ma, Qi Jiang, Wenjiang Ji:
Bayesian mechanism for rational secret sharing scheme. Sci. China Inf. Sci. 58(5): 1-13 (2015) - [j7]Jikai Teng, Chuankun Wu, Chunming Tang, Youliang Tian:
A strongly secure identity-based authenticated group key exchange protocol. Sci. China Inf. Sci. 58(9): 1-12 (2015) - [j6]Qi Jiang, Jianfeng Ma, Youliang Tian:
Cryptanalysis of smart-card-based password authenticated key agreement protocol for session initiation protocol of Zhang et al. Int. J. Commun. Syst. 28(7): 1340-1351 (2015) - [j5]Qi Jiang, Jianfeng Ma, Xiang Lu, Youliang Tian:
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Netw. Appl. 8(6): 1070-1081 (2015) - 2014
- [j4]Qi Jiang, Jianfeng Ma, Xiang Lu, Youliang Tian:
Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems. J. Medical Syst. 38(2): 12 (2014) - [i1]Youliang Tian, Changgen Peng:
Universally Composable Secure Group Communication. IACR Cryptol. ePrint Arch. 2014: 647 (2014) - 2013
- [j3]Youliang Tian, Jianfeng Ma, Changgen Peng, Qi Jiang:
Fair (t, n) threshold secret sharing scheme. IET Inf. Secur. 7(2) (2013) - [j2]Youliang Tian, Jianfeng Ma, Changgen Peng, Yichuan Wang, Liumei Zhang:
A rational framework for secure communication. Inf. Sci. 250: 215-226 (2013) - 2012
- [j1]Youliang Tian, Changgen Peng, Jianfeng Ma:
Publicly Verifiable Secret Sharing Schemes Using Bilinear Pairings. Int. J. Netw. Secur. 14(3): 142-148 (2012) - 2011
- [c1]Youliang Tian, Jianfeng Ma, Changgen Peng, Jianming Zhu:
Secret Sharing Scheme with Fairness. TrustCom 2011: 494-500
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 21:07 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint