


default search action
Yatao Yang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Yatao Yang 0001
— Beijing Electronic Science and Technology Institute, Department of Electronic and Communication Engineering, China (and 1 more) - Yatao Yang 0002
— Alibaba Group, Hangzhou, China (and 1 more) - Yatao Yang 0003
— Shenzhen University, College of Electronics and Information Engineering, China (and 4 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j15]Yatao Yang, Ruoyan Zhao, Fangrui Yin, Ke Wang:
K-PAKE: post quantum password authentication key exchange protocol for satellite networks. Clust. Comput. 28(4): 223 (2025)
[j14]Yanshuo Zhang, Yuqi Yuan
, Ziyang Yan, Yatao Yang, Kejun Zhang:
Practical periodic deniable signature scheme based on ISRSAC. J. King Saud Univ. Comput. Inf. Sci. 37(7) (2025)
[j13]Ronglei Hu, Hao Zhang, Xiaohong Fan, Yatao Yang:
Unlinkable V2V communication protocol with cross-domain anonymity preservation. J. King Saud Univ. Comput. Inf. Sci. 37(10) (2025)
[c11]Yatao Yang, Deng Pan, Liangyu Chen, Xin Chang:
RRSC: Revocable Ring Signature Scheme over CRYSTALS-Dilithium for VANETs. DSPP (2) 2025: 137-152- 2024
[j12]Nasir Ud Din
, Li Zhang, M. Saqib Nawaz, Yatao Yang:
Multi-model feature aggregation for classification of laser welding images with vision transformer. J. King Saud Univ. Comput. Inf. Sci. 36(5): 102049 (2024)- 2023
[j11]Yatao Yang, Hui Dong, Zhaofu Li, Song Xiao:
LWED: Lightweight white-box encryption communication system for drones over CARX algorithm. J. King Saud Univ. Comput. Inf. Sci. 35(9): 101727 (2023)
[j10]Nasir Ud Din
, Li Zhang, Yatao Yang:
Automated Battery Making Fault Classification Using Over-Sampled Image Data CNN Features. Sensors 23(4): 1927 (2023)- 2022
[j9]Yatao Yang, Yuqing He, Haolin Guo, Ziliang Chen, Li Zhang:
Semantic segmentation supervised deep-learning algorithm for welding-defect detection of new energy batteries. Neural Comput. Appl. 34(22): 19471-19484 (2022)- 2021
[c10]Faheem Ullah Khan, Shahid Mehmood
, Xiaojin Zhao, Yatao Yang, Xiaofang Pan
:
Ultra-Sensitive Bimetallic Alloy Loaded with Porous Architecture MOF for Ammonia Detection at Room Temperature. ISCAS 2021: 1-5- 2020
[j8]Yatao Yang, Sankhyabrata Bandyopadhyay, Li-Yang Shao
, Jiahao Jiang, Zeng Peng
, Shuaiqi Liu, Jie Hu
, Perry Ping Shum
, Jiandong Hu, Xuming Zhang:
Anomalous Sensitivity Enhancement of D-Shaped Fiber-Based Sandwiched Structure Optofluidic Sensor. IEEE Access 8: 105207-105216 (2020)
[j7]Li Zhang, Can Pan, Dezheng Zeng, Yanzhao Yang, Yatao Yang, Junxian Ma:
A Hybrid-Plasmonic-Waveguide-Based Polarization-Independent Directional Coupler. IEEE Access 8: 134268-134275 (2020)
[j6]Yatao Yang, Runze Yang, Longhui Pan, Junxian Ma, Yishuang Zhu, Tao Diao, Li Zhang:
A lightweight deep learning algorithm for inspection of laser welding defects on safety vent of power battery. Comput. Ind. 123: 103306 (2020)
2010 – 2019
- 2019
[j5]Mingdong Tang
, Wei Liang
, Yatao Yang, Jianguo Xie:
A Factorization Machine-Based QoS Prediction Approach for Mobile Service Selection. IEEE Access 7: 32961-32970 (2019)- 2018
[j4]Qingqian Guo, Ruipeng Chen, Xiaoquan Sun, Min Jiang, Haifeng Sun, Shun Wang, Liuzheng Ma, Yatao Yang, Jiandong Hu:
A Non-Destructive and Direction-Insensitive Method Using a Strain Sensor and Two Single Axis Angle Sensors for Evaluating Corn Stalk Lodging Resistance. Sensors 18(6): 1852 (2018)
[c9]Yatao Yang, Guangcan Cao, Ming Qu, Jierun Huang, Yuan Gao:
HSATA: Improved SATA Protocol with HMAC. ICCCN 2018: 1-6
[c8]Juanmei Zhang, Zichen Li, Yafei Sun, Boya Liu, Yatao Yang:
A Homomorphic Masking Defense Scheme Based on RSA Cryptography Algorithm. ICCCS (3) 2018: 393-402- 2016
[j3]Yatao Yang, Chao Wu, Zichen Li, Junming Yang:
Efficient FPGA implementation of modular multiplication based on Montgomery algorithm. Microprocess. Microsystems 47: 209-215 (2016)- 2014
[j2]Yan-Bing Li, Qiaoyan Wen, Zi-Chen Li, Su-Juan Qin, Ya-Tao Yang:
Cheat sensitive quantum bit commitment via pre- and post-selected quantum states. Quantum Inf. Process. 13(1): 141-149 (2014)
[c7]Zehui Li, Ruoqing Zhang, Yatao Yang, Zichen Li:
A Provable Secure Mutual RFID Authentication Protocol Based on Error-Correct Code. CyberC 2014: 73-78- 2013
[c6]Zhiwei Chen, Ruoqing Zhang, Yatao Yang, Zichen Li:
A Homomorphic ElGamal Variant Based on BGN's Method. CyberC 2013: 1-5- 2012
[c5]Yatao Yang, Burkhard Stiller:
A non-repudiation scheme for user postings based on BAC in Mesh networks. NOMS 2012: 1187-1190- 2011
[c4]Shidou Yan, Yatao Yang, Zichen Li:
Design of U Disk Remote Monitoring System in Trusted Computing Environment. IIH-MSP 2011: 365-368
2000 – 2009
- 2009
[j1]Yatao Yang, Shaoming Pan:
Improved Cross Authentication Model Based on Threshold Method in Wireless Network. Int. J. Distributed Sens. Networks 5(1): 86 (2009)- 2008
[c3]Yatao Yang, Yonghao Gu, Xi Tan, Lina Ma:
A New Wireless Mesh Network Authentication Scheme Based on Threshold Method. ICYCS 2008: 2260-2265- 2007
[c2]Ya-tao Yang, Zheng Yuan, Yong Fang, Ping Zeng:
A Novel Authentication Scheme Based on Trust-value Updated Model in Adhoc Network. COMPSAC (1) 2007: 643-645
[c1]Ya-tao Yang, Ping Zeng, Yong Fang, Yaping Chi:
An Feasible Key Management Scheme in Ad Hoc Network. SNPD (1) 2007: 300-303
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-01-18 23:20 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







