Yihuai Liang

ORCID: 0000-0002-6254-9969
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Blockchain Technology Applications and Security
  • Mobile Crowdsensing and Crowdsourcing
  • Advanced Database Systems and Queries
  • Privacy-Preserving Technologies in Data
  • Data Management and Algorithms
  • Cryptography and Data Security
  • User Authentication and Security Systems
  • Human Mobility and Location-Based Analysis
  • Evacuation and Crowd Dynamics
  • Cloud Data Security Solutions
  • Algorithms and Data Compression
  • Data Quality and Management
  • Chaos-based Image/Signal Encryption
  • Semantic Web and Ontologies
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Distributed systems and fault tolerance
  • Service-Oriented Architecture and Web Services
  • IoT and Edge/Fog Computing
  • Advanced Image Processing Techniques
  • Computer Graphics and Visualization Techniques
  • Cryptographic Implementations and Security
  • Generative Adversarial Networks and Image Synthesis

Inha University
2020-2024

Southwest Jiaotong University
2024

Pusan National University
2018-2019

Abstract We consider medical image transformation problems where a grayscale is transformed into color image. The colorized should have the same features as input because extra synthesized can increase possibility of diagnostic errors. In this paper, to secure images and improve quality images, well leverage unpaired training data, colorization network proposed based on cycle generative adversarial (CycleGAN) model, combining perceptual loss function total variation (TV) function. Visual...

10.1007/s11042-020-10468-6 article EN cc-by Multimedia Tools and Applications 2021-01-18

10.1016/j.future.2024.01.026 article EN Future Generation Computer Systems 2024-01-24

Crowdsensing applications provide platforms for sharing sensing data collected by mobile devices. A blockchain system has the potential to replace a traditional centralized trusted third party crowdsensing services perform operations that involve evaluating quality of data, finishing payment, and storing so forth. The requirements which are codified as smart contracts executed evaluate in blockchain. However, regardless fact may actually be sufficient, one key challenge is malicious...

10.3390/s20113172 article EN cc-by Sensors 2020-06-03

Crowdsourcing for Human Intelligence Tasks (HIT) has been widely used to crowdsource human knowledge, such as image annotation machine learning. We use a public blockchain play the role of traditional centralized HIT systems, that deals with cryptocurrency payments and acts trustworthy judge resolve disputes between worker requester in decentralized setting, preventing false-reporting free-riding. Our approach neither uses expensive cryptographic tools, zero-knowledge proofs, nor sends...

10.14778/3538598.3538609 article EN Proceedings of the VLDB Endowment 2022-05-01

Machine learning (ML) has led to disruptive innovations in many fields, such as medical diagnoses. A key enabler for ML is large training data, but existing are not fully exploited by because of data silos and privacy concerns. Federated (FL) a promising distributed paradigm address this problem. On the other hand, FL approaches vulnerable poisoning attacks or leakage from malicious aggregator client. This article proposes an auditable scheme with Byzantine robustness against client: The...

10.1109/tcss.2023.3266019 article EN IEEE Transactions on Computational Social Systems 2023-04-24

On a battlefield, tactical moving objects, such as airplanes and tanks, need to track monitor. It is crucial for headquarters know the event occurrence, especially complex events, of objects in real time, jet fighter invading ship collision. However, radars or other sensors are only able detect primitive simple events objects. challenge manage large amounts incoming analyze their relationships infer time. In this paper, we provide clear solution dealing with challenges by using processing...

10.1109/compcomm.2018.8780603 article EN 2018-12-01

10.1007/s12083-024-01668-0 article EN Peer-to-Peer Networking and Applications 2024-03-02

Human intelligence tasks (HITs) are widely utilized for crowdsourcing human knowledge, such as labeling images machine learning. Centralized platforms face challenges of a single point failure and lack service transparency. Existing blockchain-based approaches overlook the low scalability problem permissionless blockchains or inconveniently rely on existing ground-truth data root trust to evaluate quality workers' answers. We propose scheme ensuring dual fairness (i.e., preventing...

10.1016/j.bcra.2024.100213 article EN Blockchain Research and Applications 2024-06-25

10.1109/tdsc.2024.3497965 article EN IEEE Transactions on Dependable and Secure Computing 2024-01-01

10.32604/cmc.2021.016682 article EN Computers, materials & continua/Computers, materials & continua (Print) 2021-01-01

Complex Event Processing (CEP) over tactical moving objects would detect threats in real time and response defense timely. The input data are stream collected by radar, sonar or other sensors. From the beginning of preprocessing to end threat detection defense, system CEP goes through a series complicated procedures, working based on rules be defined dynamically users. In this paper, we design implement rule-based that allows users insert, update delete rule specifications without code programming.

10.1109/inista.2019.8778299 article EN 2019-07-01
Coming Soon ...