Follow
Youliang Tian(田有亮)
Youliang Tian(田有亮)
Guizhou University
Verified email at gzu.edu.cn - Homepage
Title
Cited by
Cited by
Year
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
Q Jiang, J Ma, X Lu, Y Tian
Peer-to-peer Networking and Applications 8, 1070-1081, 2015
2172015
A personalized privacy protection framework for mobile crowdsensing in IIoT
J Xiong, R Ma, L Chen, Y Tian, Q Li, X Liu, Z Yao
IEEE Transactions on Industrial Informatics 16 (6), 4231-4241, 2019
1982019
An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks
Q Jiang, J Ma, F Wei, Y Tian, J Shen, Y Yang
Journal of Network and Computer Applications 76, 37-48, 2016
1922016
A blockchain-based secure key management scheme with trustworthiness in DWSNs
Y Tian, Z Wang, J Xiong, J Ma
IEEE Transactions on Industrial Informatics 16 (9), 6193-6202, 2020
1132020
An AI-enabled three-party game framework for guaranteed data privacy in mobile edge crowdsensing of IoT
J Xiong, M Zhao, MZA Bhuiyan, L Chen, Y Tian
IEEE Transactions on Industrial Informatics 17 (2), 922-933, 2019
1102019
Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems
Q Jiang, J Ma, X Lu, Y Tian
Journal of medical systems 38, 1-8, 2014
982014
Rational protocols and attacks in blockchain system
T Li, Y Chen, Y Wang, Y Wang, M Zhao, H Zhu, Y Tian, X Yu, Y Yang
Security and Communication Networks 2020, 1-11, 2020
732020
A blockchain-based machine learning framework for edge services in IIoT
Y Tian, T Li, J Xiong, MZA Bhuiyan, J Ma, C Peng
IEEE Transactions on Industrial Informatics 18 (3), 1918-1929, 2021
722021
Three-factor authentication protocol using physical unclonable function for IoV
Q Jiang, X Zhang, N Zhang, Y Tian, X Ma, J Ma
Computer Communications 173, 45-55, 2021
682021
Cryptanalysis of smart‐card‐based password authenticated key agreement protocol for session initiation protocol of Zhang et al.
Q Jiang, J Ma, Y Tian
International Journal of Communication Systems 28 (7), 1340-1351, 2015
592015
Data sharing and tracing scheme based on blockchain
Z Wang, Y Tian, J Zhu
2018 8th international conference on logistics, Informatics and Service …, 2018
582018
A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth
Q Jiang, X Lian, C Yang, J Ma, Y Tian, Y Yang
Journal of medical systems 40, 1-10, 2016
582016
Toward lightweight, privacy-preserving cooperative object classification for connected autonomous vehicles
J Xiong, R Bi, Y Tian, X Liu, D Wu
IEEE Internet of Things Journal 9 (4), 2787-2801, 2021
522021
R-Net: A relationship network for efficient and accurate scene text detection
Y Wang, H Xie, Z Zha, Y Tian, Z Fu, Y Zhang
IEEE Transactions on Multimedia 23, 1316-1329, 2020
432020
FPANet: Feature pyramid aggregation network for real-time semantic segmentation
Y Wu, J Jiang, Z Huang, Y Tian
Applied Intelligence 52 (3), 3319-3336, 2022
422022
Constant-round authenticated and dynamic group key agreement protocol for D2D group communications
L Wang, Y Tian, D Zhang, Y Lu
Information Sciences 503, 61-71, 2019
402019
Fair (t, n) threshold secret sharing scheme
Y Tian, J Ma, C Peng, Q Jiang
IET Information Security 7 (2), 106-112, 2013
382013
IPBSM: an optimal bribery selfish mining in the presence of intelligent and pure attackers
G Yang, Y Wang, Z Wang, Y Tian, X Yu, S Li
International Journal of Intelligent Systems 35 (11), 1735-1748, 2020
372020
Information entropy models and privacy metrics methods for privacy protection
彭长根, 丁红发, 朱义杰, 田有亮, 符祖峰
Journal of Software 27 (8), 1891-1903, 2016
342016
Publicly Verifiable Secret Sharing Schemes Using Bilinear Pairings
Y Tian, C Peng, J Ma
International Journal of Network Security 14 (1), 116-122, 2012
342012
The system can't perform the operation now. Try again later.
Articles 1–20