default search action
Shaojiang Deng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j37]Shaojiang Deng, Shanfu Gao, Qingguo Lü, Yantao Li, Huaqing Li:
A projected decentralized variance-reduction algorithm for constrained optimization problems. Neural Comput. Appl. 36(2): 913-928 (2024) - [j36]Conghao Ruan, Chunqiang Hu, Xingwang Li, Shaojiang Deng, Zewei Liu, Jiguo Yu:
A Revocable and Fair Outsourcing Attribute-Based Access Control Scheme in Metaverse. IEEE Trans. Consumer Electron. 70(1): 3781-3791 (2024) - [j35]Huafeng Qin, Chao Fan, Shaojiang Deng, Yantao Li, Mounim A. El-Yacoubi, Gang Zhou:
AG-NAS: An Attention GRU-Based Neural Architecture Search for Finger-Vein Recognition. IEEE Trans. Inf. Forensics Secur. 19: 1699-1713 (2024) - [j34]Yantao Li, Congyi Tang, Shaojiang Deng, Huafeng Qin, Hongyu Huang:
Mixed Automatic Adversarial Augmentation Network for Finger-Vein Recognition. IEEE Trans. Instrum. Meas. 73: 1-10 (2024) - [j33]Yantao Li, Li Liu, Shaojiang Deng, Huafeng Qin, Mounim A. El-Yacoubi, Gang Zhou:
Memory-Augmented Autoencoder Based Continuous Authentication on Smartphones With Conditional Transformer GANs. IEEE Trans. Mob. Comput. 23(5): 4467-4482 (2024) - [j32]Chunqiang Hu, Jianshuo Liu, Hui Xia, Shaojiang Deng, Jiguo Yu:
A Lightweight Mutual Privacy Preserving $k$-Means Clustering in Industrial IoT. IEEE Trans. Netw. Sci. Eng. 11(2): 2138-2152 (2024) - 2023
- [j31]Yantao Li, Yingjue Chen, Qingguo Lü, Shaojiang Deng, Huaqing Li:
An event-triggering algorithm for decentralized stochastic optimization over networks. J. Frankl. Inst. 360(13): 9329-9354 (2023) - [j30]Zewei Liu, Chunqiang Hu, Baolin Wang, Jiajun Chen, Shaojiang Deng, Jiguo Yu:
A Minimizing Energy Consumption Scheme for Real-Time Embedded System Based on Metaheuristic Optimization. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(7): 2276-2289 (2023) - [j29]Qingguo Lü, Shaojiang Deng, Huaqing Li, Tingwen Huang:
Privacy Protection Decentralized Economic Dispatch Over Directed Networks With Accurate Convergence. IEEE Trans. Emerg. Top. Comput. Intell. 7(6): 1702-1716 (2023) - [j28]Yantao Li, Song Ruan, Huafeng Qin, Shaojiang Deng, Mounim A. El-Yacoubi:
Transformer Based Defense GAN Against Palm-Vein Adversarial Attacks. IEEE Trans. Inf. Forensics Secur. 18: 1509-1523 (2023) - [j27]Yantao Li, Li Liu, Huafeng Qin, Shaojiang Deng, Mounim A. El-Yacoubi, Gang Zhou:
Adaptive Deep Feature Fusion for Continuous Authentication With Data Augmentation. IEEE Trans. Mob. Comput. 22(10): 5690-5705 (2023) - [j26]Yantao Li, Jiaxing Luo, Shaojiang Deng, Gang Zhou:
SearchAuth: Neural Architecture Search-based Continuous Authentication Using Auto Augmentation Search. ACM Trans. Sens. Networks 19(4): 92:1-92:23 (2023) - [j25]Qingguo Lü, Xiaofeng Liao, Shaojiang Deng, Huaqing Li:
Asynchronous Algorithms for Decentralized Resource Allocation Over Directed Networks. IEEE Trans. Parallel Distributed Syst. 34(1): 16-32 (2023) - [c10]Shaojiang Deng, Huaxiu Luo, Huafeng Qin, Yantao Li:
Contrastive Learning-Based Finger-Vein Recognition with Automatic Adversarial Augmentation. CollaborateCom (2) 2023: 495-513 - 2022
- [j24]Yantao Li, Jiaxing Luo, Shaojiang Deng, Gang Zhou:
CNN-Based Continuous Authentication on Smartphones With Conditional Wasserstein Generative Adversarial Network. IEEE Internet Things J. 9(7): 5447-5460 (2022) - [j23]Lan Gao, Shaojiang Deng, Huaqing Li, Chaojie Li:
An Event-Triggered Approach for Gradient Tracking in Consensus-Based Distributed Optimization. IEEE Trans. Netw. Sci. Eng. 9(2): 510-523 (2022) - [j22]Qingguo Lü, Xiaofeng Liao, Shaojiang Deng, Huaqing Li:
ET-DASG: An Efficient Decentralized Algorithm for Convex Optimization Over Networks. IEEE Trans. Netw. Sci. Eng. 9(3): 1789-1801 (2022) - [j21]Yantao Li, Peng Tao, Shaojiang Deng, Gang Zhou:
DeFFusion: CNN-based Continuous Authentication Using Deep Feature Fusion. ACM Trans. Sens. Networks 18(2): 18:1-18:20 (2022) - [j20]Qingguo Lü, Xiaofeng Liao, Shaojiang Deng, Huaqing Li:
A Decentralized Stochastic Algorithm for Coupled Composite Optimization With Linear Convergence. IEEE Trans. Signal Inf. Process. over Networks 8: 627-640 (2022) - 2021
- [j19]Lan Gao, Shaojiang Deng, Wei Ren, Chunqiang Hu:
Differentially Private Consensus With Quantized Communication. IEEE Trans. Cybern. 51(8): 4075-4088 (2021) - [c9]Shaojiang Deng, Jiaxing Luo, Yantao Li:
CNN-Based Continuous Authentication on Smartphones with Auto Augmentation Search. ICICS (1) 2021: 169-186 - 2020
- [j18]Ningzhi Deng, Shaojiang Deng, Chunqiang Hu, Kaiwen Lei:
An Efficient Revocable Attribute-Based Signcryption Scheme With Outsourced Unsigncryption in Cloud Computing. IEEE Access 8: 42805-42815 (2020) - [j17]Yantao Li, Bin Zou, Shaojiang Deng, Gang Zhou:
Using Feature Fusion Strategies in Continuous Authentication on Smartphones. IEEE Internet Comput. 24(2): 49-56 (2020) - [j16]Yuwen Pu, Chunqiang Hu, Shaojiang Deng, Arwa Alrawais:
R²PEDS: A Recoverable and Revocable Privacy-Preserving Edge Data Sharing Scheme. IEEE Internet Things J. 7(9): 8077-8089 (2020)
2010 – 2019
- 2019
- [j15]Shaojiang Deng, Shuyuan Jia, Jing Chen:
Exploring spatial-temporal relations via deep convolutional neural networks for traffic flow prediction with incomplete data. Appl. Soft Comput. 78: 712-721 (2019) - [j14]Lan Gao, Shaojiang Deng, Wei Ren:
Differentially Private Consensus With an Event-Triggered Mechanism. IEEE Trans. Control. Netw. Syst. 6(1): 60-71 (2019) - [c8]Lei Zhou, Liang Feng, Kai Liu, Chao Chen, Shaojiang Deng, Tao Xiang, Siwei Jiang:
Towards Effective Mutation for Knowledge Transfer in Multifactorial Differential Evolution. CEC 2019: 1541-1547 - [c7]Ningzhi Deng, Shaojiang Deng, Chunqiang Hu, Kaiwen Lei:
An Efficient Revocable Attribute-Based Signcryption Scheme with Outsourced Designcryption in Cloud Computing. WASA 2019: 84-97 - 2018
- [j13]Yantao Li, Hailong Hu, Gang Zhou, Shaojiang Deng:
Sensor-Based Continuous Authentication Using Cost-Effective Kernel Ridge Regression. IEEE Access 6: 32554-32565 (2018) - [j12]Yousheng Zhou, Siling Liu, Min Xiao, Shaojiang Deng, Xiaojun Wang:
An Efficient V2I Authentication Scheme for VANETs. Mob. Inf. Syst. 2018: 4070283:1-4070283:11 (2018) - 2017
- [j11]Yousheng Zhou, Xiaofeng Zhao, Yi Jiang, Fengjun Shang, Shaojiang Deng, Xiaojun Wang:
An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks. Sensors 17(12): 2854 (2017) - [c6]Chunqiang Hu, Yan Huo, Liran Ma, Hang Liu, Shaojiang Deng, Liping Feng:
An Attribute-Based Secure and Scalable Scheme for Data Communications in Smart Grids. WASA 2017: 469-482 - 2013
- [j10]Yantao Li, Di Xiao, Shaojiang Deng, Gang Zhou:
Improvement and performance analysis of a novel hash function based on chaotic neural network. Neural Comput. Appl. 22(2): 391-402 (2013) - [j9]Yantao Li, Xin Qi, Matthew Keally, Zhen Ren, Gang Zhou, Di Xiao, Shaojiang Deng:
Communication Energy Modeling and Optimization through Joint Packet Size Analysis of BSN and WiFi Networks. IEEE Trans. Parallel Distributed Syst. 24(9): 1741-1751 (2013) - [j8]Yantao Li, Daniel Graham, Gang Zhou, Xin Qi, Shaojiang Deng, Di Xiao:
Discrete-time Markov Model for Wireless Link Burstiness Simulations. Wirel. Pers. Commun. 72(2): 987-1004 (2013) - 2012
- [j7]Yantao Li, Di Xiao, Shaojiang Deng:
Keyed hash function based on a dynamic lookup table of functions. Inf. Sci. 214: 56-75 (2012) - [j6]Yantao Li, Di Xiao, Huaqing Li, Shaojiang Deng:
Parallel chaotic Hash function construction based on cellular neural network. Neural Comput. Appl. 21(7): 1563-1573 (2012) - [c5]Yantao Li, Ge Peng, Xin Qi, Gang Zhou, Di Xiao, Shaojiang Deng, Hongyu Huang:
Towards Energy Optimization Using Joint Data Rate Adaptation for BSN and WiFi Networks. NAS 2012: 235-244 - 2011
- [j5]Yantao Li, Shaojiang Deng, Di Xiao:
A novel Hash algorithm construction based on chaotic neural network. Neural Comput. Appl. 20(1): 133-141 (2011) - [j4]Yantao Li, Di Xiao, Shaojiang Deng, Qi Han, Gang Zhou:
Parallel Hash function construction based on chaotic maps with changeable parameters. Neural Comput. Appl. 20(8): 1305-1312 (2011) - [c4]Yantao Li, Xin Qi, Zhen Ren, Gang Zhou, Di Xiao, Shaojiang Deng:
Energy modeling and optimization through joint packet size analysis of BSN and WiFi networks. IPCCC 2011: 1-8 - [p1]Di Xiao, Xiaofeng Liao, Shaojiang Deng:
Chaos Based Hash Function. Chaos-Based Cryptography 2011: 137-203
2000 – 2009
- 2009
- [j3]Shaojiang Deng, Xiaofeng Liao, Songtao Guo:
Asymptotic stability analysis of certain neutral differential equations: A descriptor system approach. Math. Comput. Simul. 79(10): 2981-2993 (2009) - 2008
- [j2]Di Xiao, Xiaofeng Liao, Shaojiang Deng:
Using time-stamp to improve the security of a chaotic maps-based key agreement protocol. Inf. Sci. 178(6): 1598-1602 (2008) - 2007
- [j1]Di Xiao, Xiaofeng Liao, Shaojiang Deng:
A novel key agreement protocol based on chaotic maps. Inf. Sci. 177(4): 1136-1142 (2007) - [c3]Jiyun Yang, Xiaofeng Liao, Shaojiang Deng, Miao Yu, Hongying Zheng:
Neural Networks Based Image Recognition: A New Approach. ISNN (2) 2007: 724-729 - 2005
- [c2]Shaojiang Deng, Linhua Zhang, Di Xiao:
Image Encryption Scheme Based on Chaotic Neural System. ISNN (2) 2005: 868-872 - [c1]Linhua Zhang, Shaojiang Deng, Xuebing Wang:
A New Image Protection and Authentication Technique Based on ICA. ISNN (1) 2005: 991-996
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-23 21:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint