Qiliang Yang

ORCID: 0000-0002-3059-1900
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Blockchain Technology Applications and Security
  • Advanced Authentication Protocols Security
  • Mobile Crowdsensing and Crowdsourcing
  • Advanced Software Engineering Methodologies
  • Complexity and Algorithms in Graphs
  • Business Process Modeling and Analysis
  • Service-Oriented Architecture and Web Services
  • Advanced Steganography and Watermarking Techniques
  • Software Engineering Research
  • Cryptography and Residue Arithmetic
  • Semantic Web and Ontologies
  • X-ray Diffraction in Crystallography
  • Crystallization and Solubility Studies
  • Complementary and Alternative Medicine Studies
  • Cloud Data Security Solutions
  • Saffron Plant Research Studies
  • Context-Aware Activity Recognition Systems
  • Heavy Metals in Plants
  • Internet Traffic Analysis and Secure E-voting
  • Software System Performance and Reliability
  • IoT-based Smart Home Systems
  • Security in Wireless Sensor Networks
  • IoT and Edge/Fog Computing

Shaanxi Normal University
2019-2022

Second Military Medical University
2021

Nanjing University
2011-2012

United States Army Corps of Engineers
2011

To achieve security of mobile payments within insecure public communication networks, in 2018, a secure transaction scheme for is constructed by Yeh from certificateless signature (CLS) without bilinear pairing Yeh, (2008). However, we point out that this CLS insecure, and malicious users can create valid forged on any new message performing key replacement attacks. The flaws the underlying cause upper cannot keep its claimed security. In article, describe how forgery attack works against...

10.1109/jsyst.2020.3046450 article EN IEEE Systems Journal 2021-01-22

In recent years, the development of Internet Things technology has led to a surge in interest vehicular ad hoc network (VANET), which greatly improved travel efficiency and facilitated vehicle data sharing. To ensure privacy security both vehicles personnel, researchers have proposed various measures for securing VANET systems. Recently, certificate-based aggregate signature (CBAS) schemes been design an identity authentication protocol prevent tampering corruption private data. this study,...

10.1109/jiot.2023.3330580 article EN IEEE Internet of Things Journal 2023-11-07

In Industrial Internet of Things (IIoT), the certificate-based aggregate signature (CBAS) scheme was used to ensure privacy and security IIoT, thus, concrete construction CBAS without bilinear pairing has proposed, which employed as an underlying building block create efficient data aggregation protocol. this article, we first point out that previous cannot keep its claimed security. Particularly, a malicious KGC can compute valid forgery signature, because it knowledge master secret key....

10.1109/jsyst.2022.3188012 article EN IEEE Systems Journal 2022-07-19

Crowdsourcing for healthcare, which is an application of crowd intelligence, has become a novel and important auxiliary way traditional showing huge perspective. In crowdsourcing platform patients can act as requesters who recruit workers, such doctors, to provide professional advice by posting task. However, privacy concerns pose significant obstacle willing participate in crowdsourcing, task data often contain sensitive personal information. To address this issue, we propose...

10.1109/tsc.2023.3292498 article EN IEEE Transactions on Services Computing 2023-07-05

WS-BPEL processes can facilitate service discovery when the services have multiple interfaces in certain order. Current approaches derive abstract directly from corresponding executable ones by hiding or omitting internal activities. However, these simple may prevent being found valuable potential partners at stage. To address this problem, we propose a novel approach to refactoring and for discovery. We show application of our through typical travel agency service.

10.1109/icws.2011.12 article EN 2011-07-01

As an important method of protecting data confidentiality in the Internet Things (IoT), access control has been widely concerned. Because attribute-based mechanisms are dynamic, it is not only suitable to solve dynamic problem IoT, but also deal with caused by node movement and change. The traditional centralized mechanism some problems: due large number devices central trusted entity may become bottleneck whole system. Moreover, when a under distributed denial-of-service (DDoS) attack,...

10.3390/electronics10151855 article EN Electronics 2021-08-01

Blockchain-enabled Internet of Things (IoT) provides a secure sharing data and resources to the various miners IoT network, removes centralized control, can overcome part existing challenges in traditional IoT. However, ecosystem faces some great terms security, such as privacy leaking, eavesdropping, so on, which seriously impede deployment ecosystem. Verifiable searchable encryption (SE) make owners (DOs) dispel concerns about users (DUs) believe they get correct search results. For...

10.1109/jiot.2022.3175859 article EN IEEE Internet of Things Journal 2022-05-17

Blockchain‐based crowdsourcing systems can mitigate some known limitations of the centralized platform, such as single point failure and Sybil attacks. However, blockchain‐based still endure issues privacy security. Participants’ sensitive information (e.g., identity, address, expertise) have risk disclosure. Sensitive tasks location‐based data collection labeling images including faces also need privacy‐preserving. Moreover, current work fails to balance anonymity public auditing workers....

10.1155/2021/3758782 article EN cc-by Wireless Communications and Mobile Computing 2021-01-01

To stay on the cutting edge, Web services ought to adapt themselves evolving business requirements and changing environments. For a long-running service choreography, its member may need evolve even at run-time. However, inconsistencies or spurious results (e.g., unspecified receptions deadlocks) occur if these dynamically in an uncoordinated manner. cope with this problem, we propose approach that supports dynamic evolution of choreographies. In our approach, two mechanisms are proposed...

10.1109/apscc.2012.40 article EN 2012-12-01

Abstract To ensure privacy and security of healthcare wireless medical sensor networks (HWMSNs), several concrete constructions efficient certificateless aggregate signature (CLAS) scheme without bilinear pairing were proposed in the last few years. However, many previous CLAS found to be impractical, which either fail meet claimed or contain design flaws. For example, some proposals, any adversary can forge a valid on new message. In this paper, we first demonstrate issues flaws proposals...

10.1093/comjnl/bxac123 article EN The Computer Journal 2022-09-09

Signcryption has been adopted in several areas because it is more effificient than signature- then-encryption. In the actual application, to keep original security, a cryptography primitive should withstand various leakage attacks, and previous leakage- resilient certifificateless signcryption scheme contains true-simulation extractable non- interactive zeroknowledge argument, which makes computation effificiency of corresponding construction low. To further solve above problem, we propose...

10.1109/gcwkshps45667.2019.9024321 article EN 2022 IEEE Globecom Workshops (GC Wkshps) 2019-12-01

10.1504/ijspm.2020.110175 article EN International Journal of Simulation and Process Modelling 2020-01-01

The central management platforms in traditional crowd-sourced software testing networks are easy to become the target of attack by enemies, and when platform is attacked, it cause a single point failure bring whole system down. In addition, selecting engineers for crowd-sourcing tasks, most mechanisms select based on their credits. This approach too one-sided fails achieve fine-grained engineer selection. order solve above problems, we have proposed non-interactive selection mechanism. our...

10.1109/qrs-c57518.2022.00040 article EN 2022-12-01
Coming Soon ...