


default search action
Yongjian Liao
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j44]Nabeil Eltayieb
, Rashad Elhabob
, Abdeldime M. S. Abdelgader
, Yongjian Liao
, Fagen Li, Shijie Zhou:
Certificateless Proxy Re-encryption with Cryptographic Reverse Firewalls for Secure Cloud Data Sharing. Future Gener. Comput. Syst. 162: 107478 (2025) - [j43]Wen Huang
, Zhishuo Zhang
, Weixin Zhao, Jian Peng, Wenzheng Xu, Yongjian Liao
, Shijie Zhou, Ziming Wang:
Auditing privacy budget of differentially private neural network models. Neurocomputing 614: 128756 (2025) - [j42]Chaofeng Wu
, Zijie Huang
, Nan Huang
, Chuanyu Fu
, Yongjian Liao
, Qiku Cao
, Guoxin Zhang
, Hongxin Peng
, Ziquan Ding, Zhe Fu
, Yuan Liu
, Xiaoming Xiong
, Shuting Cai
:
LF-MVS: Line Features-Assisted PatchMatch Multiview Stereo. IEEE Trans. Instrum. Meas. 74: 1-13 (2025) - 2024
- [j41]Hongxin Peng, Yongjian Liao, Weijun Li, Chuanyu Fu, Guoxin Zhang, Ziquan Ding, Zijie Huang, Qiku Cao, Shuting Cai:
Segmentation-aware prior assisted joint global information aggregated 3D building reconstruction. Adv. Eng. Informatics 62: 102904 (2024) - [j40]Emmanuel Antwi-Boasiako
, Shijie Zhou, Yongjian Liao, Isaac Amankona Obiri
, Eric Kuada, Ebenezer Kwaku Danso, Acheampong Edward Mensah:
Enhanced multi-key privacy-preserving distributed deep learning protocol with application to diabetic retinopathy diagnosis. Concurr. Comput. Pract. Exp. 36(25) (2024) - [j39]Emmanuel Antwi-Boasiako
, Shijie Zhou, Yongjian Liao, Eric Kuada, Ebenezer Kwaku Danso
:
Enhanced privacy-preserving distributed deep learning with application to fog-based IoT. Internet Things 26: 101183 (2024) - [j38]Zhishuo Zhang
, Wen Huang
, Ying Huang, Yongjian Liao
, Zhun Zhang, Shijie Zhou
:
A Domain Isolated Tripartite Authenticated Key Agreement Protocol With Dynamic Revocation and Online Public Identity Updating for IIoT. IEEE Internet Things J. 11(9): 15616-15632 (2024) - [j37]Zhishuo Zhang
, Ying Huang, Wen Huang
, Wenbo Pan, Yongjian Liao
, Shijie Zhou
:
An Auto-Upgradable End-to-End Preauthenticated Secure Communication Protocol for UAV-Aided Perception Intelligent System. IEEE Internet Things J. 11(18): 30187-30203 (2024) - [j36]Nabeil Eltayieb
, Rashad Elhabob
, Yongjian Liao
, Fagen Li, Shijie Zhou:
A heterogeneous signcryption scheme with Cryptographic Reverse Firewalls for IoT and its application. J. Inf. Secur. Appl. 83: 103763 (2024) - [j35]Zhishuo Zhang
, Ying Huang, Wen Huang
, Yongjian Liao
, Shijie Zhou
:
A Fully Auditable Data Propagation Scheme With Dynamic Vehicle Management for EC-ITS. IEEE Trans. Intell. Transp. Syst. 25(7): 7861-7877 (2024) - [j34]Wen Huang
, Ganglin Zhang
, Yongjian Liao
, Jian Peng
, Feihu Huang
, Julong Yang
:
Secure Neural Network Prediction in the Cloud-Based Open Neural Network Service. IEEE Trans. Serv. Comput. 17(2): 659-673 (2024) - [i5]Wen Huang, Zhishuo Zhang, Weixin Zhao, Jian Peng, Yongjian Liao, Yuyu Wang:
Double Index Calculus Algorithm: Faster Solving Discrete Logarithm Problem in Finite Prime Field. CoRR abs/2409.08784 (2024) - [i4]Hongxin Peng, Yongjian Liao, Weijun Li, Chuanyu Fu, Guoxin Zhang, Ziquan Ding, Zijie Huang, Qiku Cao, Shuting Cai:
Segmentation-aware Prior Assisted Joint Global Information Aggregated 3D Building Reconstruction. CoRR abs/2410.18433 (2024) - [i3]Shuhan Zeng, Yongjian Liao, Chuanhao Zhou, Jinlin He, Hongwei Wang:
A Deniably Authenticated Searchable Public Key Encryption Scheme in Mobile Electronic Mail System. IACR Cryptol. ePrint Arch. 2024: 394 (2024) - 2023
- [j33]Wen Huang
, Ming Zhuo, Tianqing Zhu
, Shijie Zhou, Yongjian Liao:
Differential privacy: Review of improving utility through cryptography-based technologies. Concurr. Comput. Pract. Exp. 35(5) (2023) - [j32]Zhishuo Zhang
, Wen Huang
, Lin Yang, Yongjian Liao
, Shijie Zhou
:
A Stronger Secure Ciphertext Fingerprint-Based Commitment Scheme for Robuster Verifiable OD-CP-ABE in IMCC. IEEE Internet Things J. 10(18): 16531-16547 (2023) - [j31]Emmanuel Antwi-Boasiako
, Shijie Zhou, Yongjian Liao
, Yingjie Dong:
Privacy-preserving distributed deep learning via LWE-based Certificateless Additively Homomorphic Encryption (CAHE). J. Inf. Secur. Appl. 74: 103462 (2023) - [j30]Chuanyu Fu, Nan Huang, Zijie Huang, Yongjian Liao, Xiaoming Xiong, Xuexi Zhang, Shuting Cai:
Confidence-Guided Planar-Recovering Multiview Stereo for Weakly Textured Plane of High-Resolution Image Scenes. Remote. Sens. 15(9): 2474 (2023) - [c18]Yingjie Dong, Yongjian Liao, Zhishuo Zhang, Wen Huang:
Certificateless Aggregate Signature Without Trapdoor for Cloud Storage. SecureComm (1) 2023: 350-368 - 2022
- [j29]Zhishuo Zhang
, Wen Huang
, Songying Cai, Lin Yang, Yongjian Liao, Shijie Zhou:
An efficient reusable attribute-based signature scheme for mobile services with multi access policies in fog computing. Comput. Commun. 196: 9-22 (2022) - [j28]Wen Huang
, Shijie Zhou
, Tianqing Zhu
, Yongjian Liao
:
Privately Publishing Internet of Things Data: Bring Personalized Sampling Into Differentially Private Mechanisms. IEEE Internet Things J. 9(1): 80-91 (2022) - [j27]Zhishuo Zhang
, Wen Huang
, Shijie Zhou, Yongjian Liao:
A revocable multi-authority fine-grained access control architecture against ciphertext rollback attack for mobile edge computing. J. Syst. Archit. 129: 102589 (2022) - [c17]Acheampong Edward Mensah
, Shijie Zhou, Yongjian Liao, Emmanuel Antwi-Boasiako, Isaac Amankona Obiri:
Smart Health Records Sharing Scheme based on Partially Policy-Hidden CP-ABE with Leakage Resilience. HPCC/DSS/SmartCity/DependSys 2022: 1408-1415 - [c16]Acheampong Edward Mensah
, Shijie Zhou, Yongjian Liao, Emmanuel Antwi-Boasiako, Isaac Amankona Obiri:
Authentication Scheme Based on Non-Interactive Zero-Knowledge Proof for Mobile Health. HPCC/DSS/SmartCity/DependSys 2022: 1690-1696 - 2021
- [j26]Emmanuel Antwi-Boasiako
, Shijie Zhou, Yongjian Liao
, Qihe Liu, Yuyu Wang, Kwabena Owusu-Agyemang
:
Privacy preservation in Distributed Deep Learning: A survey on Distributed Deep Learning, privacy preservation techniques used and interesting research directions. J. Inf. Secur. Appl. 61: 102949 (2021) - [j25]Tingyun Gan
, Yongjian Liao, Yikuan Liang, Zijun Zhou, Ganglin Zhang:
Partial policy hiding attribute-based encryption in vehicular fog computing. Soft Comput. 25(16): 10543-10559 (2021) - [j24]Wen Huang
, Shijie Zhou
, Yongjian Liao
:
Unexpected Information Leakage of Differential Privacy Due to the Linear Property of Queries. IEEE Trans. Inf. Forensics Secur. 16: 3123-3137 (2021) - [c15]Wen Huang, Shijie Zhou, Yongjian Liao:
Improving the Number of Queries Supported by Differentially Private Mechanisms. BigDataSE 2021: 65-71 - [c14]Ganglin Zhang, Yongjian Liao, Shijie Zhou:
A privacy-preserving revocable framework in the deep-learning-as-a-service platform system based on non software as a service. DASC/PiCom/CBDCom/CyberSciTech 2021: 1-9 - [c13]Emmanuel Antwi-Boasiako, Shijie Zhou, Yongjian Liao, Ebenezer Kwaku Danso:
An LWE-Based Multi-Key Privacy-Preserving Distributed Deep Learning. HPCC/DSS/SmartCity/DependSys 2021: 533-542 - 2020
- [j23]Yongjian Liao
, Ganglin Zhang, Hongjie Chen:
Cost-Efficient Outsourced Decryption of Attribute-Based Encryption Schemes for Both Users and Cloud Server in Green Cloud Computing. IEEE Access 8: 20862-20869 (2020) - [j22]Ganglin Zhang
, Yongjian Liao
, Yu Fan
, Yikuan Liang
:
Security Analysis of an Identity-Based Signature From Factorization Problem. IEEE Access 8: 23277-23283 (2020) - [j21]Mohammed Ramadan
, Yongjian Liao
, Fagen Li, Shijie Zhou
:
Identity-Based Signature With Server-Aided Verification Scheme for 5G Mobile Systems. IEEE Access 8: 51810-51820 (2020) - [j20]Yu Wu
, Yongjian Liao
, Yikuan Liang
, Yulu Liu:
Secure and Efficient Protocol for Outsourcing Large-Scale Matrix Multiplication to the Cloud. IEEE Access 8: 227556-227565 (2020) - [j19]Yongjian Liao
, Yulu Liu, Yukuan Liang, Yu Wu, Xuyun Nie
:
Revisit of Certificateless Signature Scheme Used to Remote Authentication Schemes for Wireless Body Area Networks. IEEE Internet Things J. 7(3): 2160-2168 (2020) - [j18]Mohammed Ramadan
, Yongjian Liao, Fagen Li, Shijie Zhou, Hisham Abdalla:
IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks. Mob. Networks Appl. 25(1): 223-233 (2020) - [c12]Emmanuel Antwi-Boasiako, Shijie Zhou, Yongjian Liao, Qihe Liu:
Privacy-Preservation in Distributed Deep Neural Networks via Encryption of Selected Gradients. HPCC/DSS/SmartCity 2020: 816-823 - [c11]Deleli Mesay Adinew, Shijie Zhou, Yongjian Liao:
Spark Performance Optimization Analysis In Memory Management with Deploy Mode In Standalone Cluster Computing. ICDE 2020: 2049-2053 - [c10]Wen Huang, Shijie Zhou, Tianqing Zhu, Yongjian Liao, Chunjiang Wu, Shilin Qiu:
Improving Laplace Mechanism of Differential Privacy by Personalized Sampling. TrustCom 2020: 623-630 - [i2]Wen Huang, Shijie Zhou, Yongjian Liao:
Unexpected Information Leakage of Differential Privacy Due to Linear Property of Queries. CoRR abs/2010.08958 (2020) - [i1]Wen Huang, Shijie Zhou, Tianqing Zhu, Yongjian Liao:
the Connection between Cryptography and Differential Privacy: a Survey. CoRR abs/2011.00976 (2020)
2010 – 2019
- 2019
- [j17]Yongjian Liao
, Hongjie Chen, Wen Huang, Mohammed Ramadan
, Hongtao Pan, Shijie Zhou:
Insecurity of an IBEET Scheme and an ABEET Scheme. IEEE Access 7: 25087-25094 (2019) - [j16]Wen Huang
, Yongjian Liao
, Shijie Zhou, Hongjie Chen:
An Efficient Deniable Authenticated Encryption Scheme for Privacy Protection. IEEE Access 7: 43453-43461 (2019) - [j15]Yongjian Liao
, Yu Fan, Yukuan Liang, Yulu Liu, Mohammed Ramadan
:
Cryptanalysis of an Identity-Based Encryption Scheme With Equality Test and Improvement. IEEE Access 7: 75067-75072 (2019) - [j14]Yongjian Liao
, Yikuan Liang, Adeniyi Wisdom Oyewole, Xuyun Nie
:
Security Analysis of a Certificateless Provable Data Possession Scheme in Cloud. IEEE Access 7: 93259-93263 (2019) - [j13]Yu Fan
, Yongjian Liao
, Fagen Li, Shijie Zhou, Ganglin Zhang
:
Identity-Based Auditing for Shared Cloud Data With Efficient and Secure Sensitive Information Hiding. IEEE Access 7: 114246-114260 (2019) - [j12]Ashir Javeed
, Shijie Zhou, Yongjian Liao
, Iqbal Qasim
, Adeeb Noor
, Redhwan Nour:
An Intelligent Learning System Based on Random Search Algorithm and Optimized Random Forest Model for Improved Heart Disease Detection. IEEE Access 7: 180235-180243 (2019) - [j11]Wen Huang
, Shijie Zhou
, Yongjian Liao
, Ming Zhuo
:
Optimizing Query Times for Multiple Users Scenario of Differential Privacy. IEEE Access 7: 183292-183299 (2019) - [j10]Wen Huang
, Shijie Zhou
, Yongjian Liao
, Hongjie Chen:
An Efficient Differential Privacy Logistic Classification Mechanism. IEEE Internet Things J. 6(6): 10620-10626 (2019) - [j9]Hongjie Chen, Yongjian Liao
:
Improvement of an outsourced attribute-based encryption scheme. Soft Comput. 23(22): 11409-11417 (2019) - [c9]Jianing Zhang, Yongjian Liao, Runcheng Zhang, Yiming Liu, Yonghao Ma, Zhijia Zhao:
Adaptive Robust Stabilization of a Flexible Timoshenko Manipulator. ICARM 2019: 565-569 - [c8]Deleli Mesay Adinew, Shijie Zhou, Yongjian Liao:
Spark Performance Optimization Analysis in Memory Tuning On GC Overhead for Big Data Analytics. ICNCC 2019: 75-78 - 2018
- [j8]Yongjian Liao
, Hongjie Chen, Fagen Li, Shaoquan Jiang, Shijie Zhou, Mohammed Ramadan
:
Insecurity of A Key-Policy Attribute Based Encryption Scheme With Equality Test. IEEE Access 6: 10189-10196 (2018) - [j7]Yongjian Liao, Yichuan He, Fagen Li, Shijie Zhou:
Analysis of a mobile payment protocol with outsourced verification in cloud server and the improvement. Comput. Stand. Interfaces 56: 101-106 (2018) - [j6]Shaoquan Jiang, Jue Li, Yongjian Liao:
Efficient approximate message authentication scheme. IET Inf. Secur. 12(1): 100-106 (2018) - [j5]Yongjian Liao
, Yichuan He, Fagen Li, Shaoquan Jiang, Shijie Zhou:
Analysis of an ABE Scheme with Verifiable Outsourced Decryption. Sensors 18(1): 176 (2018) - 2017
- [c7]Zhangyun Liu, Yongjian Liao, Xiaowei Yang, Yichuan He, Kun Zhao:
Identity-Based Remote Data Integrity Checking of Cloud Storage From Lattices. BigCom 2017: 128-135 - 2015
- [c6]Wenqing Zhang, Shijie Zhou, Jiaqing Luo, Hongrong Cheng, Yongjian Liao:
A Lightweight Detection of the RFID Unauthorized Reading Using RF Scanners. CSCloud 2015: 317-322 - [c5]Jiaqing Luo, Shijie Zhou, Hongrong Cheng, Yongjian Liao, Kai Bu:
A Range-Free Localization of Passive RFID Tags Using Mobile Readers. MASS 2015: 445-446 - [c4]Jiaqing Luo, Shijie Zhou, Hongrong Cheng, Yongjian Liao, Bin Guo
:
The Design and Implementation of A Cost-effective RFID Indoor Localization System. CSAR@SenSys 2015: 1-6 - 2012
- [j4]Fagen Li
, Yongjian Liao, Zhiguang Qin, Tsuyoshi Takagi:
Further improvement of an identity-based signcryption scheme in the standard model. Comput. Electr. Eng. 38(2): 413-421 (2012) - [j3]Zhaohu Xu, Xuyun Nie, Hui Wang, Yongjian Liao:
Cryptanalysis of an improved MFE public key cryptosystem. Int. J. Secur. Networks 7(3): 174-180 (2012) - 2011
- [j2]Fagen Li
, Yongjian Liao, Zhiguang Qin:
Analysis of an Identity-Based Signcryption Scheme in the Standard Model. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 268-269 (2011) - [c3]Xuyun Nie, Zhaohu Xu, Li Lu, Yongjian Liao:
Security Analysis of an Improved MFE Public Key Cryptosystem. CANS 2011: 118-125
2000 – 2009
- 2009
- [j1]Yong Yu
, Chunxiang Xu, Xiaosong Zhang, Yongjian Liao:
Designated verifier proxy signature scheme without random oracles. Comput. Math. Appl. 57(8): 1352-1364 (2009) - [c2]Jin Wu, Yongjian Liao, Xuyun Nie, Mengjuan Liu:
The Trust Management Model of Trusted Software. IFITA (3) 2009: 534-537 - 2008
- [c1]Yongjian Liao, Qing Lu, Zhiguang Qin:
Designated Verifier Proxy Signature Scheme. IIH-MSP 2008: 235-238
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-09 21:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint