Youliang Tian(田有亮)
Youliang Tian(田有亮)
Guizhou University
Verified email at - Homepage
Cited by
Cited by
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
Q Jiang, J Ma, X Lu, Y Tian
Peer-to-peer Networking and Applications 8, 1070-1081, 2015
A personalized privacy protection framework for mobile crowdsensing in IIoT
J Xiong, R Ma, L Chen, Y Tian, Q Li, X Liu, Z Yao
IEEE Transactions on Industrial Informatics 16 (6), 4231-4241, 2019
An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks
Q Jiang, J Ma, F Wei, Y Tian, J Shen, Y Yang
Journal of Network and Computer Applications 76, 37-48, 2016
A blockchain-based secure key management scheme with trustworthiness in DWSNs
Y Tian, Z Wang, J Xiong, J Ma
IEEE Transactions on Industrial Informatics 16 (9), 6193-6202, 2020
An AI-enabled three-party game framework for guaranteed data privacy in mobile edge crowdsensing of IoT
J Xiong, M Zhao, MZA Bhuiyan, L Chen, Y Tian
IEEE Transactions on Industrial Informatics 17 (2), 922-933, 2019
Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems
Q Jiang, J Ma, X Lu, Y Tian
Journal of medical systems 38, 1-8, 2014
A blockchain-based machine learning framework for edge services in IIoT
Y Tian, T Li, J Xiong, MZA Bhuiyan, J Ma, C Peng
IEEE Transactions on Industrial Informatics 18 (3), 1918-1929, 2021
Three-factor authentication protocol using physical unclonable function for IoV
Q Jiang, X Zhang, N Zhang, Y Tian, X Ma, J Ma
Computer Communications 173, 45-55, 2021
Rational protocols and attacks in blockchain system
T Li, Y Chen, Y Wang, Y Wang, M Zhao, H Zhu, Y Tian, X Yu, Y Yang
Security and communication networks 2020 (1), 8839047, 2020
Data sharing and tracing scheme based on blockchain
Z Wang, Y Tian, J Zhu
2018 8th international conference on logistics, Informatics and Service …, 2018
Cryptanalysis of smart‐card‐based password authenticated key agreement protocol for session initiation protocol of Zhang et al.
Q Jiang, J Ma, Y Tian
International Journal of Communication Systems 28 (7), 1340-1351, 2015
A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth
Q Jiang, X Lian, C Yang, J Ma, Y Tian, Y Yang
Journal of medical systems 40, 1-10, 2016
Toward lightweight, privacy-preserving cooperative object classification for connected autonomous vehicles
J Xiong, R Bi, Y Tian, X Liu, D Wu
IEEE Internet of Things Journal 9 (4), 2787-2801, 2021
FPANet: Feature pyramid aggregation network for real-time semantic segmentation
Y Wu, J Jiang, Z Huang, Y Tian
Applied Intelligence 52 (3), 3319-3336, 2022
R-Net: A relationship network for efficient and accurate scene text detection
Y Wang, H Xie, Z Zha, Y Tian, Z Fu, Y Zhang
IEEE Transactions on Multimedia 23, 1316-1329, 2020
Constant-round authenticated and dynamic group key agreement protocol for D2D group communications
L Wang, Y Tian, D Zhang, Y Lu
Information Sciences 503, 61-71, 2019
IPBSM: an optimal bribery selfish mining in the presence of intelligent and pure attackers
G Yang, Y Wang, Z Wang, Y Tian, X Yu, S Li
International Journal of Intelligent Systems 35 (11), 1735-1748, 2020
Fair (t, n) threshold secret sharing scheme
Y Tian, J Ma, C Peng, Q Jiang
IET Information Security 7 (2), 106-112, 2013
Blockchain-enabled secure and trusted federated data sharing in IIoT
Z Zhou, Y Tian, J Xiong, J Ma, C Peng
IEEE Transactions on Industrial Informatics, 2022
Two-factor authentication protocol using physical unclonable function for IoV
Q Jiang, X Zhang, N Zhang, Y Tian, X Ma, J Ma
2019 IEEE/CIC International Conference on Communications in China (ICCC …, 2019
The system can't perform the operation now. Try again later.
Articles 1–20