Follow
Youliang Tian(田有亮)
Youliang Tian(田有亮)
Guizhou University
Verified email at gzu.edu.cn - Homepage
Title
Cited by
Cited by
Year
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
Q Jiang, J Ma, X Lu, Y Tian
Peer-to-peer Networking and Applications 8, 1070-1081, 2015
2182015
A personalized privacy protection framework for mobile crowdsensing in IIoT
J Xiong, R Ma, L Chen, Y Tian, Q Li, X Liu, Z Yao
IEEE Transactions on Industrial Informatics 16 (6), 4231-4241, 2019
2032019
An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks
Q Jiang, J Ma, F Wei, Y Tian, J Shen, Y Yang
Journal of Network and Computer Applications 76, 37-48, 2016
1942016
A blockchain-based secure key management scheme with trustworthiness in DWSNs
Y Tian, Z Wang, J Xiong, J Ma
IEEE Transactions on Industrial Informatics 16 (9), 6193-6202, 2020
1142020
An AI-enabled three-party game framework for guaranteed data privacy in mobile edge crowdsensing of IoT
J Xiong, M Zhao, MZA Bhuiyan, L Chen, Y Tian
IEEE Transactions on Industrial Informatics 17 (2), 922-933, 2019
1102019
Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems
Q Jiang, J Ma, X Lu, Y Tian
Journal of medical systems 38, 1-8, 2014
982014
A blockchain-based machine learning framework for edge services in IIoT
Y Tian, T Li, J Xiong, MZA Bhuiyan, J Ma, C Peng
IEEE Transactions on Industrial Informatics 18 (3), 1918-1929, 2021
762021
Rational protocols and attacks in blockchain system
T Li, Y Chen, Y Wang, Y Wang, M Zhao, H Zhu, Y Tian, X Yu, Y Yang
Security and Communication Networks 2020, 1-11, 2020
732020
Three-factor authentication protocol using physical unclonable function for IoV
Q Jiang, X Zhang, N Zhang, Y Tian, X Ma, J Ma
Computer Communications 173, 45-55, 2021
682021
Data sharing and tracing scheme based on blockchain
Z Wang, Y Tian, J Zhu
2018 8th international conference on logistics, Informatics and Service …, 2018
612018
Cryptanalysis of smart‐card‐based password authenticated key agreement protocol for session initiation protocol of Zhang et al.
Q Jiang, J Ma, Y Tian
International Journal of Communication Systems 28 (7), 1340-1351, 2015
592015
A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth
Q Jiang, X Lian, C Yang, J Ma, Y Tian, Y Yang
Journal of medical systems 40, 1-10, 2016
582016
Toward lightweight, privacy-preserving cooperative object classification for connected autonomous vehicles
J Xiong, R Bi, Y Tian, X Liu, D Wu
IEEE Internet of Things Journal 9 (4), 2787-2801, 2021
532021
FPANet: Feature pyramid aggregation network for real-time semantic segmentation
Y Wu, J Jiang, Z Huang, Y Tian
Applied Intelligence 52 (3), 3319-3336, 2022
442022
R-Net: A relationship network for efficient and accurate scene text detection
Y Wang, H Xie, Z Zha, Y Tian, Z Fu, Y Zhang
IEEE Transactions on Multimedia 23, 1316-1329, 2020
432020
Constant-round authenticated and dynamic group key agreement protocol for D2D group communications
L Wang, Y Tian, D Zhang, Y Lu
Information Sciences 503, 61-71, 2019
412019
Fair (t, n) threshold secret sharing scheme
Y Tian, J Ma, C Peng, Q Jiang
IET Information Security 7 (2), 106-112, 2013
392013
IPBSM: an optimal bribery selfish mining in the presence of intelligent and pure attackers
G Yang, Y Wang, Z Wang, Y Tian, X Yu, S Li
International Journal of Intelligent Systems 35 (11), 1735-1748, 2020
382020
Two-factor authentication protocol using physical unclonable function for IoV
Q Jiang, X Zhang, N Zhang, Y Tian, X Ma, J Ma
2019 IEEE/CIC International Conference on Communications in China (ICCC …, 2019
342019
Information entropy models and privacy metrics methods for privacy protection
彭长根, 丁红发, 朱义杰, 田有亮, 符祖峰
Journal of Software 27 (8), 1891-1903, 2016
342016
The system can't perform the operation now. Try again later.
Articles 1–20