A personalized privacy protection framework for mobile crowdsensing in IIoT J Xiong, R Ma, L Chen, Y Tian, Q Li, X Liu, Z Yao IEEE Transactions on Industrial Informatics 16 (6), 4231-4241, 2019 | 231 | 2019 |
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks Q Jiang, J Ma, X Lu, Y Tian Peer-to-peer Networking and Applications 8, 1070-1081, 2015 | 227 | 2015 |
An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks Q Jiang, J Ma, F Wei, Y Tian, J Shen, Y Yang Journal of Network and Computer Applications 76, 37-48, 2016 | 207 | 2016 |
A blockchain-based secure key management scheme with trustworthiness in DWSNs Y Tian, Z Wang, J Xiong, J Ma IEEE Transactions on Industrial Informatics 16 (9), 6193-6202, 2020 | 127 | 2020 |
An AI-enabled three-party game framework for guaranteed data privacy in mobile edge crowdsensing of IoT J Xiong, M Zhao, MZA Bhuiyan, L Chen, Y Tian IEEE Transactions on Industrial Informatics 17 (2), 922-933, 2019 | 116 | 2019 |
Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems Q Jiang, J Ma, X Lu, Y Tian Journal of medical systems 38, 1-8, 2014 | 100 | 2014 |
A blockchain-based machine learning framework for edge services in IIoT Y Tian, T Li, J Xiong, MZA Bhuiyan, J Ma, C Peng IEEE Transactions on Industrial Informatics 18 (3), 1918-1929, 2021 | 97 | 2021 |
Three-factor authentication protocol using physical unclonable function for IoV Q Jiang, X Zhang, N Zhang, Y Tian, X Ma, J Ma Computer Communications 173, 45-55, 2021 | 84 | 2021 |
Rational protocols and attacks in blockchain system T Li, Y Chen, Y Wang, Y Wang, M Zhao, H Zhu, Y Tian, X Yu, Y Yang Security and Communication Networks 2020 (1), 8839047, 2020 | 80 | 2020 |
Data sharing and tracing scheme based on blockchain Z Wang, Y Tian, J Zhu 2018 8th international conference on logistics, Informatics and Service …, 2018 | 67 | 2018 |
Toward lightweight, privacy-preserving cooperative object classification for connected autonomous vehicles J Xiong, R Bi, Y Tian, X Liu, D Wu IEEE Internet of Things Journal 9 (4), 2787-2801, 2021 | 61 | 2021 |
FPANet: Feature pyramid aggregation network for real-time semantic segmentation Y Wu, J Jiang, Z Huang, Y Tian Applied Intelligence 52 (3), 3319-3336, 2022 | 60 | 2022 |
Cryptanalysis of smart‐card‐based password authenticated key agreement protocol for session initiation protocol of Zhang et al. Q Jiang, J Ma, Y Tian International Journal of Communication Systems 28 (7), 1340-1351, 2015 | 60 | 2015 |
A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth Q Jiang, X Lian, C Yang, J Ma, Y Tian, Y Yang Journal of medical systems 40, 1-10, 2016 | 58 | 2016 |
Blockchain-enabled secure and trusted federated data sharing in IIoT Z Zhou, Y Tian, J Xiong, J Ma, C Peng IEEE Transactions on Industrial Informatics 19 (5), 6669-6681, 2022 | 55 | 2022 |
A secure authentication framework to guarantee the traceability of avatars in metaverse K Yang, Z Zhang, T Youliang, J Ma IEEE Transactions on Information Forensics and Security 18, 3817-3832, 2023 | 51 | 2023 |
R-Net: A relationship network for efficient and accurate scene text detection Y Wang, H Xie, Z Zha, Y Tian, Z Fu, Y Zhang IEEE Transactions on Multimedia 23, 1316-1329, 2020 | 48 | 2020 |
Constant-round authenticated and dynamic group key agreement protocol for D2D group communications L Wang, Y Tian, D Zhang, Y Lu Information Sciences 503, 61-71, 2019 | 46 | 2019 |
IPBSM: An optimal bribery selfish mining in the presence of intelligent and pure attackers G Yang, Y Wang, Z Wang, Y Tian, X Yu, S Li International Journal of Intelligent Systems 35 (11), 1735-1748, 2020 | 43 | 2020 |
Two-factor authentication protocol using physical unclonable function for IoV Q Jiang, X Zhang, N Zhang, Y Tian, X Ma, J Ma 2019 IEEE/CIC International Conference on Communications in China (ICCC …, 2019 | 41 | 2019 |