Hongyue Liu

ORCID: 0009-0002-5457-1055
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Vehicular Ad Hoc Networks (VANETs)
  • Industrial Vision Systems and Defect Detection
  • Cryptography and Data Security
  • Industrial Automation and Control Systems
  • Security and Verification in Computing
  • User Authentication and Security Systems
  • Opportunistic and Delay-Tolerant Networks
  • Privacy-Preserving Technologies in Data
  • Advanced Manufacturing and Logistics Optimization
  • Access Control and Trust
  • Peer-to-Peer Network Technologies
  • Biometric Identification and Security
  • Advanced Authentication Protocols Security
  • Cloud Data Security Solutions

Henan University of Technology
2012-2023

Shandong Academy of Sciences
2023

Qilu University of Technology
2023

Institute of Oceanographic Instrumentation
2023

As the distributed computing applications represent comprehensive dynamics and user requirements in them are significant difference, they require dynamic differentiated fine-grained resource access control policies taking context factors into consideration before making decisions. With regards to this, paper investigates impact functions of policy decision, proposes a context-aware method. Firstly, is analyzed classifiedly formalized from four aspects including platform security context,...

10.1109/csss.2012.278 article EN International Conference on Computer Science and Service System 2012-08-01

It has been envisioned that vehicular ad hoc networks (VANETs) would play an important role in future traffic monitoring applications. This paper investigates how VANETs can overcome the strictly limited bandwidth and privacy issues. Firstly, aggregation scheme is presented to minimize requi red overall bandwidth. Subsequently, a algorithm capable of ensuring user applications proposed. proposed mechanism not only protect private data each individual against adversaries with arbitrary...

10.3233/jhs-160544 article EN Journal of High Speed Networks 2016-06-02

Summary Due to the proliferation of wireless communication technologies, we are now in era ubiquitous computing. People can enjoy services almost any time and location based on mobile intelligent devices. Meanwhile, more personal information transmitted through network. To protect these sensitive information, authentication privacy protection primary concerns environments. However, traditional physical‐based biometric scheme usually requires explicit cooperation user, which is inconvenient...

10.1002/dac.5578 article EN International Journal of Communication Systems 2023-07-25

At present, the wire harness packaging machine used in domestic and foreign markets is mainly semi-automatic, which has caused certain work pressure to operators, but can not reach fully automatic machine. In modern manufacturing industry, industrial robot technology become main technical means for enterprises carry out production intelligent manufacturing. Based on robot, an line covering system designed. Firstly, basic structure of with described, its technological requirements conditions...

10.1145/3606043.3606089 article EN 2023-06-17
Coming Soon ...