Youliang Tian

ORCID: 0000-0002-5974-1570
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Blockchain Technology Applications and Security
  • Cloud Data Security Solutions
  • User Authentication and Security Systems
  • Advanced Authentication Protocols Security
  • Privacy, Security, and Data Protection
  • Mobile Crowdsensing and Crowdsourcing
  • Complexity and Algorithms in Graphs
  • Stochastic Gradient Optimization Techniques
  • Adversarial Robustness in Machine Learning
  • Internet Traffic Analysis and Secure E-voting
  • Chaos-based Image/Signal Encryption
  • Security in Wireless Sensor Networks
  • IoT and Edge/Fog Computing
  • Access Control and Trust
  • Advanced Neural Network Applications
  • Biometric Identification and Security
  • Smart Grid Security and Resilience
  • Advanced Steganography and Watermarking Techniques
  • Human Mobility and Location-Based Analysis
  • Wireless Body Area Networks
  • Network Security and Intrusion Detection
  • Color Science and Applications
  • Vehicular Ad Hoc Networks (VANETs)

Guizhou University
2016-2025

National University of Defense Technology
2025

Guizhou Academy of Environmental Science and Design
2025

Shandong University of Science and Technology
2025

Beijing Institute of Big Data Research
2021-2023

State Key Laboratory of Cryptology
2019-2023

Fujian Normal University
2022

Hisense (China)
2018-2021

Chinese Academy of Sciences
2014-2016

Institute of Information Engineering
2014-2016

With the rapid digitalization of various industries, mobile crowdsensing (MCS), an intelligent data collection and processing paradigm industrial Internet Things, has provided a promising opportunity to construct powerful systems provide services. The existing unified privacy strategy for all sensing results in excessive or insufficient protection low quality services (QoCS) MCS. To tackle this issue, article we propose personalized (PERIO) framework based on game theory encryption....

10.1109/tii.2019.2948068 article EN IEEE Transactions on Industrial Informatics 2019-10-17

Metaverse is a vast virtual environment parallel to the physical world in which users enjoy variety of services acting as an avatar. To build secure living habitat, it's vital ensure virtual-physical traceability that tracking malicious player via his avatars space. In this paper, we propose two-factor authentication framework based on biometric-based and chameleon signature. First, aiming at disguise space, design avatar's identity model verifiability identity. Second, facing efficiency...

10.1109/tifs.2023.3288689 article EN IEEE Transactions on Information Forensics and Security 2023-01-01

Federated learning of deep neural networks has emerged as an evolving paradigm for distributed machine learning, gaining widespread attention due to its ability update parameters without collecting raw data from users, especially in digital healthcare applications. However, the traditional centralized architecture federated suffers several problems (e.g., single point failure, communication bottlenecks, etc.), malicious servers inferring gradients and causing gradient leakage. To tackle...

10.1109/tcbb.2023.3243932 article EN IEEE/ACM Transactions on Computational Biology and Bioinformatics 2023-03-03

The mobile crowdsensing (MCS) technology with a large number of Internet Things (IoT) devices provides an economic and efficient solution to participation in coordinated large-scale sensing tasks. Edge computing powers MCS form the edge (MECS) framework. Privacy disclosure data multiple stages is significant challenge MECS. To tackle this issue, combining machine learning game theory, article, we propose artificial intelligence (AI)-enabled three-party (ATG) framework for guaranteed privacy...

10.1109/tii.2019.2957130 article EN IEEE Transactions on Industrial Informatics 2019-12-02

Dynamic wireless sensor networks (DWSNs) as an important means of industrial data collection are a key part Internet Things (IIoT), where security and reliability characteristics trustworthiness. However, due to dynamics, the management is caused by nontrusted base station (BS) that easily targeted. For distribution scheme, avianized BS also causes additional heavy overhead on sensors. To tackle these issues, in this article, we propose blockchain-based secure scheme (BC-EKM). First, stake...

10.1109/tii.2020.2965975 article EN IEEE Transactions on Industrial Informatics 2020-01-14

Edge services provide an effective and superior means of real-time transmissions rapid processing information in the Industrial Internet Things (IIoT). However, continuous increase number smart devices results privacy leakage insufficient model accuracy edge services. To tackle these challenges, this article, we propose a blockchain-based machine learning framework for (BML-ES) IIoT. Specifically, construct novel contracts to encourage multiparty participation improve efficiency data...

10.1109/tii.2021.3097131 article EN IEEE Transactions on Industrial Informatics 2021-08-24

Federated learning breaks down data silos and promotes the intelligence of Industrial Internet Things (IIoT). However, principal–agent architecture commonly used in federated not only increases cost but also fails to take into account privacy protection trustworthiness flexible on-demand sharing. To tackle above challenges, we propose a secure trusted sharing (STFS) based on blockchain. Initially, construct an autonomous reliable extreme gradient boosting algorithm crack isolation problem,...

10.1109/tii.2022.3215192 article EN IEEE Transactions on Industrial Informatics 2022-11-03

In the era of Web 3.0, federated learning has emerged as a crucial technical method in resolving conflicts between data security and open sharing. However, is susceptible to various malicious behaviors, including inference attacks, poisoning free-riding attacks. These adversarial activities can lead privacy breaches, unavailability global models, unfair training processes. To tackle these challenges, we propose trustworthy scheme (TWFL) that resist above Specifically, firstly novel adaptive...

10.1109/tnse.2024.3350365 article EN IEEE Transactions on Network Science and Engineering 2024-01-05

Blockchain has been an emerging technology, which comprises lots of fields such as distributed systems and Internet Things (IoT). As is well known, blockchain the underlying technology bitcoin, whose initial motivation derived from economic incentives. Therefore, components (e.g., consensus mechanism) can be constructed toward view game theory. In this paper, we highlight combination theory blockchain, including rational smart contracts, theoretic attacks, mining strategies. When put...

10.1155/2020/8839047 article EN cc-by Security and Communication Networks 2020-09-24

Collaborative perception enables autonomous vehicles to exchange sensor data among each other achieve cooperative object classification, which is considered an effective means improve the accuracy of connected (CAVs). To protect information privacy in perception, we propose a lightweight, privacy-preserving classification framework that allows CAVs raw (e.g., images captured by HD camera), without leaking private information. Leveraging chaotic encryption and additive secret sharing...

10.1109/jiot.2021.3093573 article EN IEEE Internet of Things Journal 2021-06-30

The existing data sharing models have some issues such as poor transparency of transactions, without security assurance and lacking effective tracking methods. This paper proposed a brand-new scheme based on blockchain technology. Firstly, double-chain structure about was introduced, one chain used to store the original another transaction generated by transactions. separated storage Secondly, combined with proxy re-encryption technology, safe reliable were achieved. Finally, new design...

10.1109/liss.2018.8593225 article EN 2018-08-01

This paper introduces a novel bi-directional con-volutional framework to cope with the large-variance scale problem in scene text detection. Due lack of normalization recent CNN-based methods, instances are activated inconsistently feature maps, which makes it hard for methods accurately locate multi-size instances. Thus, we propose relationship network (R-Net) that maps multi-scale convolutional features scale-invariant space obtain consistent activation Firstly, implement an FPN-like...

10.1109/tmm.2020.2995290 article EN IEEE Transactions on Multimedia 2020-05-19

Connected autonomous vehicles (CAVs) are capable of capturing high-definition images from onboard sensors, which can be used to facilitate the detection objects in vicinity. Such may, however, contain sensitive information (e.g., human faces and license plates) as well indirect location CAVs. To protect object privacy shared by CAVs, this article proposes a privacy-preserving (P2OD) framework. Specifically, we propose multiple secure computing protocols designed construct Faster...

10.1109/jiot.2022.3212464 article EN IEEE Internet of Things Journal 2022-10-06

Face and voice are two of the most popular traits used for authentication tasks in daily life, as they can be easily captured using low-cost visual audio sensors on smartphones, laptops, tablets, <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">etc</i> . Many bimodal biometric schemes based these have been presented to provide higher accuracy than unimodal systems. However, inflexibility due requirement submitting simultaneously, lack template...

10.1109/tifs.2024.3364092 article EN IEEE Transactions on Information Forensics and Security 2024-01-01
Coming Soon ...