default search action
Jin Li 0002
Person information
- affiliation: Guangzhou University, School of Computational Science & Education Software, China
- affiliation (former): Illinois Institute of Technology, IL, USA
- affiliation (former): KAIST, Daejon, South Korea
- affiliation (PhD 2007): Sun Yat-Sen University, Hangzhou, China
Other persons with the same name
- Jin Li — disambiguation page
- Jin Li 0001 — Microsoft Research
- Jin Li 0003 (aka: Jin Jenny Li) — Amazon (and 1 more)
- Jin Li 0004 — HitGen Ltd. (and 3 more)
- Jin Li 0005 — Unilever (and 1 more)
- Jin Li 0006 — Tampere University of Technology
- Jin Li 0007 — Yunnan University, School of Software, Kunming, China
- Jin Li 0008 — Harbin Institute of Technology, School of Computer Science and Technology, China (and 1 more)
- Jin Li 0009 — CAS, Institute of Geographical Sciences and Natural Resources Research
- Jin Li 0010 — Shandong Jianzhu University, School of Science, Jinan, China (and 1 more)
- Jin Li 0011 — Xi'an Jiaotong University, School of Electronic and Information Engineering, China
- Jin Li 0012 — Harbin Engineering University, College of Automation, China
- Jin Li 0013 — University of Cambridge, Department of Engineering, Photonics and Sensors Group, UK (and 4 more)
- Jin Li 0014 — Korea Advanced Institute of Science and Technology, Department of Electrical Engineering, Daejeon, South Korea
- Jin Li 0015 — Geoscience Australia, Marine and Coastal Environment Group, Canberra, ACT, Australia
- Jin Li 0016 — Xidian University, State Key Laboratory of Integrated Service Networks, Xi'an, China (and 1 more)
- Jin Li 0017 — Shenzhen University, College of Information Engineering, ATR National Key Laboratory of Defense Technology, China (and 1 more)
- Jin Li 0018 — Chinese Academy of Sciences, Shanghai Astronomical Observatory, China
- Jin Li 0019 — Tianjin University, School of Electrical and Information Engineering, MOE Key Laboratory of Smart Grid, China
- Jin Li 0020 — Tsinghua University, Department of Automation, Beijing, China
- Jin Li 0021 — Queen's University, Department of Electrical and Computer Engineering, Kingston, ON, Canada
- Jin Li 0022 — Shandong Transport Vocational College, Department of Highway and Architecture, Weifang, China
- Jin Li 0023 — Fuzhou University, College of Electrical Engineering and Automation, Fujian Smart Electrical Engineering Technology Research Center, China
- Jin Li 0024 — Hainan Medical University, College of Biomedical Informatics and Engineering, Haikou, China (and 4 more)
- Jin Li 0025 — Cardiff University, School of Engineering, Laboratory for Microfluidics and Soft Matter Microengineering, Wales, UK
- Jin Li 0026 — University of Electronic Science and Technology of China, UESTC, School of Information and Communication Engineering, China (and 1 more)
- Jin Li 0027 — Xi'an Jiaotong University, School of Life Science and Technology, Institute of Health and Rehabilitation Science, China
- Jin Li 0028 — Yangzhou University, School of Information Engineering, China
- Jin Li 0029 — Northeastern University, College of Information Science and Engineering, Hebei Key Laboratory of Micro-Nano Precision Optical Sensing and Measurement Technology, Shenyang, China
- Jin Li 0030 — Zhejiang Wanli University, Ningbo, Zhejiang, China
- Jin Li 0031 — Sun Yat-Sen University, China
- Jin Li 0032 — Hong Kong University of Science and Technology, Guangzhou, China (and 1 more)
- Jin Li 0033 — Zhejiang University, School of Cyber Science and Technology, State Key Laboratory of Blockchain and Data Security, Hangzhou, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j201]Kanghua Mo, Peigen Ye, Xiaojun Ren, Shaowei Wang, Wenjun Li, Jin Li:
Security and Privacy Issues in Deep Reinforcement Learning: Threats and Countermeasures. ACM Comput. Surv. 56(6): 152:1-152:39 (2024) - [j200]Jiaxing Li, Jigang Wu, Lin Jiang, Jin Li:
Blockchain-based public auditing with deep reinforcement learning for cloud storage. Expert Syst. Appl. 242: 122764 (2024) - [j199]Weichu Deng, Jin Li, Hongyang Yan, Arthur Sandor Voundi Koe, Teng Huang, Jianfeng Wang, Cong Peng:
Self-sovereign identity management in ciphertext policy attribute based encryption for IoT protocols. J. Inf. Secur. Appl. 86: 103885 (2024) - [j198]Shaowei Wang, Yun Peng, Jin Li, Zikai Wen, Zhipeng Li, Shiyu Yu, Di Wang, Wei Yang:
Privacy Amplification via Shuffling: Unified, Simplified, and Tightened. Proc. VLDB Endow. 17(8): 1870-1883 (2024) - [j197]Wanqing Jie, Wangjie Qiu, Arthur Sandor Voundi Koe, Jianhong Li, Yin Wang, Yaqi Wu, Jin Li:
A Secure and Flexible Blockchain-Based Offline Payment Protocol. IEEE Trans. Computers 73(2): 408-421 (2024) - [j196]Yu Ran, Weijia Wang, Mingjie Li, Lin-Cheng Li, Yuan-Gen Wang, Jin Li:
Cross-Shaped Adversarial Patch Attack. IEEE Trans. Circuits Syst. Video Technol. 34(4): 2289-2303 (2024) - [j195]Chenxu Wang, Yunjie Deng, Zhenyu Ning, Kevin Leach, Jin Li, Shoumeng Yan, Zhengyu He, Jiannong Cao, Fengwei Zhang:
Building a Lightweight Trusted Execution Environment for Arm GPUs. IEEE Trans. Dependable Secur. Comput. 21(4): 3801-3816 (2024) - [j194]Guoyu Yang, Chang Chen, Qi Chen, Jianan Jiang, Jin Li, Debiao He:
Sweeper: Breaking the Validity-Latency Tradeoff in Asynchronous Common Subset. IEEE Trans. Inf. Forensics Secur. 19: 4534-4546 (2024) - [j193]Li Tang, Qingqing Ye, Haibo Hu, Qiao Xue, Yaxin Xiao, Jin Li:
DeepMark: A Scalable and Robust Framework for DeepFake Video Detection. ACM Trans. Priv. Secur. 27(1): 9:1-9:26 (2024) - [j192]Fei Peng, Le Qin, Min Long, Jin Li:
Detection of Adversarial Facial Accessory Presentation Attacks Using Local Face Differential. ACM Trans. Multim. Comput. Commun. Appl. 20(7): 192:1-192:28 (2024) - [c101]Yilong Zhao, Mingyu Gao, Fangxin Liu, Yiwei Hu, Zongwu Wang, Han Lin, Jin Li, He Xian, Hanlin Dong, Tao Yang, Naifeng Jing, Xiaoyao Liang, Li Jiang:
UM-PIM: DRAM-based PIM with Uniform & Shared Memory Space. ISCA 2024: 644-659 - [i19]Huali Ren, Anli Yan, Chong-zhi Gao, Hongyang Yan, Zhenxin Zhang, Jin Li:
Are You Copying My Prompt? Protecting the Copyright of Vision Prompt for VPaaS via Watermark. CoRR abs/2405.15161 (2024) - 2023
- [j191]Waixi Liu, Jun Cai, Yinghao Zhu, Junming Luo, Jin Li:
Load balancing inside programmable data planes based on network modeling prediction using a GNN with network behaviors. Comput. Networks 227: 109695 (2023) - [j190]Wenjuan Li, Yu Wang, Jin Li:
A blockchain-enabled collaborative intrusion detection framework for SDN-assisted cyber-physical systems. Int. J. Inf. Sec. 22(5): 1219-1230 (2023) - [j189]Yuling Chen, Hui Zhou, Tao Li, Jin Li, Huiyu Zhou:
Multifactor Incentive Mechanism for Federated Learning in IoT: A Stackelberg Game Approach. IEEE Internet Things J. 10(24): 21595-21606 (2023) - [j188]Wanqing Jie, Qi Chen, Jiaqi Wang, Arthur Sandor Voundi Koe, Jin Li, Pengfei Huang, Yaqi Wu, Yin Wang:
A novel extended multimodal AI framework towards vulnerability detection in smart contracts. Inf. Sci. 636: 118907 (2023) - [j187]Chun Ding, Meimin Wang, Zhili Zhou, Teng Huang, Xiaoliang Wang, Jin Li:
Siamese transformer network-based similarity metric learning for cross-source remote sensing image retrieval. Neural Comput. Appl. 35(11): 8125-8142 (2023) - [j186]Bingshi Li, Jin Li, Yang-Geng Fu:
Relation-aware Graph Contrastive Learning. Parallel Process. Lett. 33(1&2): 2340007:1-2340007:15 (2023) - [j185]Fei Peng, Tongxin Liao, Min Long, Jin Li, Wensheng Zhang, Yicong Zhou:
Semi-Fragile Reversible Watermarking for 3D Models Using Spherical Crown Volume Division. IEEE Trans. Circuits Syst. Video Technol. 33(11): 6531-6543 (2023) - [j184]Jiqiang Gao, Boyu Hou, Xiaojie Guo, Zheli Liu, Ying Zhang, Kai Chen, Jin Li:
Secure Aggregation is Insecure: Category Inference Attack on Federated Learning. IEEE Trans. Dependable Secur. Comput. 20(1): 147-160 (2023) - [j183]Kanghua Mo, Weixuan Tang, Jin Li, Xu Yuan:
Attacking Deep Reinforcement Learning With Decoupled Adversarial Policy. IEEE Trans. Dependable Secur. Comput. 20(1): 758-768 (2023) - [j182]Li Hu, Jin Li, Guanbiao Lin, Shiyu Peng, Zhenxin Zhang, Yingying Zhang, Changyu Dong:
Defending Against Membership Inference Attacks With High Utility by GAN. IEEE Trans. Dependable Secur. Comput. 20(3): 2144-2157 (2023) - [j181]Zhili Zhou, Yuecheng Su, Jin Li, Keping Yu, Q. M. Jonathan Wu, Zhangjie Fu, Yunqing Shi:
Secret-to-Image Reversible Transformation for Generative Steganography. IEEE Trans. Dependable Secur. Comput. 20(5): 4118-4134 (2023) - [j180]Qiuyu Qian, Qingqing Ye, Haibo Hu, Kai Huang, Tom Tak-Lam Chan, Jin Li:
Collaborative Sampling for Partial Multi-Dimensional Value Collection Under Local Differential Privacy. IEEE Trans. Inf. Forensics Secur. 18: 3948-3961 (2023) - [j179]Zhili Zhou, Chun Ding, Jin Li, Eman Mohammadi, Guangcan Liu, Yimin Yang, Q. M. Jonathan Wu:
Sequential Order-Aware Coding-Based Robust Subspace Clustering for Human Action Recognition in Untrimmed Videos. IEEE Trans. Image Process. 32: 13-28 (2023) - [j178]Zijie Pan, Li Hu, Weixuan Tang, Jin Li, Yi He, Zheli Liu:
Privacy-Preserving Multi-Granular Federated Neural Architecture Search - A General Framework. IEEE Trans. Knowl. Data Eng. 35(3): 2975-2986 (2023) - [j177]Nan Jiang, Jie Wen, Jin Li, Ximeng Liu, Di Jin:
GATrust: A Multi-Aspect Graph Attention Network Model for Trust Assessment in OSNs. IEEE Trans. Knowl. Data Eng. 35(6): 5865-5878 (2023) - [j176]Jiaxing Li, Jigang Wu, Long Chen, Jin Li, Siew-Kei Lam:
Blockchain-Based Secure Key Management for Mobile Edge Computing. IEEE Trans. Mob. Comput. 22(1): 100-114 (2023) - [j175]Zhili Zhou, Yujiang Li, Jin Li, Keping Yu, Guang Kou, Meimin Wang, Brij Bhooshan Gupta:
GAN-Siamese Network for Cross-Domain Vehicle Re-Identification in Intelligent Transport Systems. IEEE Trans. Netw. Sci. Eng. 10(5): 2779-2790 (2023) - [c100]Mengdie Huang, Yi Xie, Xiaofeng Chen, Jin Li, Changyu Dong, Zheli Liu, Willy Susilo:
Boost Off/On-Manifold Adversarial Robustness for Deep Learning with Latent Representation Mixup. AsiaCCS 2023: 716-730 - [c99]Bin Huang, Shiyu Yu, Jin Li, Yuyang Chen, Shaozheng Huang, Sufen Zeng, Shaowei Wang:
FirewaLLM: A Portable Data Protection and Recovery Framework for LLM Services. DMBD (2) 2023: 16-30 - [c98]Yuntong Li, Shaowei Wang, Yingying Wang, Jin Li, Yuqiu Qian, Bangzhou Xin, Wei Yang:
Fine-Grained Private Knowledge Distillation. ICASSP 2023: 1-5 - [c97]Rong Du, Qingqing Ye, Yue Fu, Haibo Hu, Jin Li, Chengfang Fang, Jie Shi:
Differential Aggregation against General Colluding Attackers. ICDE 2023: 2180-2193 - [c96]Jie Wen, Nan Jiang, Jin Li, Ximeng Liu, Honglong Chen, Yanzhi Ren, Zhaohui Yuan, Ziang Tu:
DTrust: Toward Dynamic Trust Levels Assessment in Time-Varying Online Social Networks. INFOCOM 2023: 1-10 - [c95]Haoyang Li, Qingqing Ye, Haibo Hu, Jin Li, Leixia Wang, Chengfang Fang, Jie Shi:
3DFed: Adaptive and Extensible Framework for Covert Backdoor Attack in Federated Learning. SP 2023: 1893-1907 - [e13]Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li:
Machine Learning for Cyber Security - 4th International Conference, ML4CS 2022, Guangzhou, China, December 2-4, 2022, Proceedings, Part I. Lecture Notes in Computer Science 13655, Springer 2023, ISBN 978-3-031-20095-3 [contents] - [e12]Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li:
Machine Learning for Cyber Security - 4th International Conference, ML4CS 2022, Guangzhou, China, December 2-4, 2022, Proceedings, Part II. Lecture Notes in Computer Science 13656, Springer 2023, ISBN 978-3-031-20098-4 [contents] - [e11]Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li:
Machine Learning for Cyber Security - 4th International Conference, ML4CS 2022, Guangzhou, China, December 2-4, 2022, Proceedings, Part III. Lecture Notes in Computer Science 13657, Springer 2023, ISBN 978-3-031-20101-1 [contents] - [i18]Rong Du, Qingqing Ye, Yue Fu, Haibo Hu, Jin Li, Chengfang Fang, Jie Shi:
Differential Aggregation against General Colluding Attackers. CoRR abs/2302.09315 (2023) - [i17]Huali Ren, Anli Yan, Xiaojun Ren, Pei-Gen Ye, Chong-zhi Gao, Zhili Zhou, Jin Li:
GanFinger: GAN-Based Fingerprint Generation for Deep Neural Network Ownership Verification. CoRR abs/2312.15617 (2023) - 2022
- [b1]Jin Li, Ping Li, Zheli Liu, Xiaofeng Chen, Tong Li:
Privacy-Preserving Machine Learning. Springer 2022, ISBN 978-981-16-9138-6, pp. 1-88 - [j174]Xiaozhen Lu, Jingfang Jie, Zihan Lin, Liang Xiao, Jin Li, Yanyong Zhang:
Reinforcement learning based energy efficient robot relay for unmanned aerial vehicles against smart jamming. Sci. China Inf. Sci. 65(1) (2022) - [j173]Xiaojie Guo, Jin Li, Zheli Liu, Yu Wei, Xiao Zhang, Changyu Dong:
Labrador: towards fair and auditable data sharing in cloud computing with long-term privacy. Sci. China Inf. Sci. 65(5): 1-14 (2022) - [j172]Wenjuan Li, Fei Tian, Jin Li, Yang Xiang:
Evaluating intrusion sensitivity allocation with supervised learning in collaborative intrusion detection. Concurr. Comput. Pract. Exp. 34(16) (2022) - [j171]Wenjuan Li, Yu Wang, Weizhi Meng, Jin Li, Chunhua Su:
BlockCSDN: Towards Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking. IEICE Trans. Inf. Syst. 105-D(2): 272-279 (2022) - [j170]Xuekai Wei, Jin Li, Mingliang Zhou, Xianmin Wang:
Contrastive distortion-level learning-based no-reference image-quality assessment. Int. J. Intell. Syst. 37(11): 8730-8746 (2022) - [j169]Tianqing Zhu, Wei Zhou, Dayong Ye, Zishuo Cheng, Jin Li:
Resource Allocation in IoT Edge Computing via Concurrent Federated Reinforcement Learning. IEEE Internet Things J. 9(2): 1414-1426 (2022) - [j168]Mohammed Atiquzzaman, Jin Li, Witold Pedrycz:
Special issue on new advanced techniques in security of artificial intelligence. J. Ambient Intell. Humaniz. Comput. 13(3): 1255-1257 (2022) - [j167]Wenjuan Li, Yu Wang, Jin Li:
Enhancing blockchain-based filtration mechanism via IPFS for collaborative intrusion detection in IoT networks. J. Syst. Archit. 127: 102510 (2022) - [j166]Weixuan Tang, Bin Li, Mauro Barni, Jin Li, Jiwu Huang:
Improving Cost Learning for JPEG Steganography by Exploiting JPEG Domain Knowledge. IEEE Trans. Circuits Syst. Video Technol. 32(6): 4081-4095 (2022) - [j165]Jin Li, Heng Ye, Tong Li, Wei Wang, Wenjing Lou, Y. Thomas Hou, Jiqiang Liu, Rongxing Lu:
Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators. IEEE Trans. Dependable Secur. Comput. 19(1): 67-76 (2022) - [j164]Zheli Liu, Siyi Lv, Jin Li, Yanyu Huang, Liang Guo, Yali Yuan, Changyu Dong:
EncodeORE: Reducing Leakage and Preserving Practicality in Order-Revealing Encryption. IEEE Trans. Dependable Secur. Comput. 19(3): 1579-1591 (2022) - [j163]Zheli Liu, Yanyu Huang, Xiangfu Song, Bo Li, Jin Li, Yali Yuan, Changyu Dong:
Eurus: Towards an Efficient Searchable Symmetric Encryption With Size Pattern Protection. IEEE Trans. Dependable Secur. Comput. 19(3): 2023-2037 (2022) - [j162]Chong-zhi Gao, Jin Li, Shi-bing Xia, Kim-Kwang Raymond Choo, Wenjing Lou, Changyu Dong:
MAS-Encryption and its Applications in Privacy-Preserving Classifiers. IEEE Trans. Knowl. Data Eng. 34(5): 2306-2323 (2022) - [j161]Tianqing Zhu, Jin Li, Xiangyu Hu, Ping Xiong, Wanlei Zhou:
The Dynamic Privacy-Preserving Mechanisms for Online Dynamic Social Networks. IEEE Trans. Knowl. Data Eng. 34(6): 2962-2974 (2022) - [j160]Fu-Zhao Ou, Yuan-Gen Wang, Jin Li, Guopu Zhu, Sam Kwong:
A Novel Rank Learning Based No-Reference Image Quality Assessment Method. IEEE Trans. Multim. 24: 4197-4211 (2022) - [j159]Haoran Yuan, Xiaofeng Chen, Jin Li, Tao Jiang, Jianfeng Wang, Robert H. Deng:
Secure Cloud Data Deduplication with Efficient Re-Encryption. IEEE Trans. Serv. Comput. 15(1): 442-456 (2022) - [j158]Jian Shen, Tiantian Miao, Jin-Feng Lai, Xiaofeng Chen, Jin Li, Shui Yu:
IMS: An Identity-Based Many-to-Many Subscription Scheme With Efficient Key Management for Wireless Broadcast Systems. IEEE Trans. Serv. Comput. 15(3): 1707-1719 (2022) - [c94]Yunjie Deng, Chenxu Wang, Shunchang Yu, Shiqing Liu, Zhenyu Ning, Kevin Leach, Jin Li, Shoumeng Yan, Zhengyu He, Jiannong Cao, Fengwei Zhang:
StrongBox: A GPU TEE on Arm Endpoints. CCS 2022: 769-783 - [c93]Xiaojie Guo, Ye Han, Zheli Liu, Ding Wang, Yan Jia, Jin Li:
Birds of a Feather Flock Together: How Set Bias Helps to Deanonymize You via Revealed Intersection Sizes. USENIX Security Symposium 2022: 1487-1504 - [i16]Shaowei Wang, Yuntong Li, Yingying Wang, Jin Li, Yuqiu Qian, Bangzhou Xin, Wei Yang:
Fine-grained Private Knowledge Distillation. CoRR abs/2207.13253 (2022) - 2021
- [j157]Yanyu Huang, Siyi Lv, Zheli Liu, Xiangfu Song, Jin Li, Yali Yuan, Changyu Dong:
Cetus: an efficient symmetric searchable encryption against file-injection attack with SGX. Sci. China Inf. Sci. 64(8) (2021) - [j156]Wenjuan Li, Yu Wang, Zhiping Jin, Keping Yu, Jin Li, Yang Xiang:
Challenge-based collaborative intrusion detection in software-defined networking: an evaluation. Digit. Commun. Networks 7(2): 257-263 (2021) - [j155]Wenjuan Li, Yu Wang, Jin Li, Man Ho Au:
Toward a blockchain-based framework for challenge-based collaborative intrusion detection. Int. J. Inf. Sec. 20(2): 127-139 (2021) - [j154]Zijie Pan, Jiajin Zeng, Riqiang Cheng, Hongyang Yan, Jin Li:
PNAS: A privacy preserving framework for neural architecture search services. Inf. Sci. 573: 370-381 (2021) - [j153]Wenbin Chen, Jin Li, Zhengan Huang, Chongzhi Gao, Siu-Ming Yiu, Zoe Lin Jiang:
Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key. J. Comput. Syst. Sci. 120: 137-148 (2021) - [j152]Zheli Liu, Jin Li, Ilsun You, Siu-Ming Yiu:
Editorial: Security and Privacy in Computing and Communications. Mob. Networks Appl. 26(4): 1407-1411 (2021) - [j151]Jin Li, Xiaofeng Liao:
Security and Privacy in New Computing Environments (SPNCE 2016). Mob. Networks Appl. 26(6): 2488-2489 (2021) - [j150]Yuan-Gen Wang, Guopu Zhu, Jin Li, Mauro Conti, Jiwu Huang:
Defeating Lattice-Based Data Hiding Code Via Decoding Security Hole. IEEE Trans. Circuits Syst. Video Technol. 31(1): 76-87 (2021) - [j149]Xiaoli Liu, Jianqin Yin, Jin Li, Pengxiang Ding, Jun Liu, Huaping Liu:
TrajectoryCNN: A New Spatio-Temporal Feature Learning Network for Human Motion Prediction. IEEE Trans. Circuits Syst. Video Technol. 31(6): 2133-2146 (2021) - [j148]Jin Li, Yanyu Huang, Yu Wei, Siyi Lv, Zheli Liu, Changyu Dong, Wenjing Lou:
Searchable Symmetric Encryption with Forward Search Privacy. IEEE Trans. Dependable Secur. Comput. 18(1): 460-474 (2021) - [j147]Tong Li, Jin Li, Xiaofeng Chen, Zheli Liu, Wenjing Lou, Y. Thomas Hou:
NPMML: A Framework for Non-Interactive Privacy-Preserving Multi-Party Machine Learning. IEEE Trans. Dependable Secur. Comput. 18(6): 2969-2982 (2021) - [j146]Yan Meng, Haojin Zhu, Jinlei Li, Jin Li, Yao Liu:
Liveness Detection for Voice User Interface via Wireless Signals in IoT Environment. IEEE Trans. Dependable Secur. Comput. 18(6): 2996-3011 (2021) - [j145]Weixuan Tang, Bin Li, Mauro Barni, Jin Li, Jiwu Huang:
An Automatic Cost Learning Framework for Image Steganography Using Deep Reinforcement Learning. IEEE Trans. Inf. Forensics Secur. 16: 952-967 (2021) - [j144]Xiaojie Guo, Zheli Liu, Jin Li, Jiqiang Gao, Boyu Hou, Changyu Dong, Thar Baker:
VeriFL: Communication-Efficient and Fast Verifiable Aggregation for Federated Learning. IEEE Trans. Inf. Forensics Secur. 16: 1736-1751 (2021) - [j143]Xianmin Wang, Xiaohui Kuang, Jin Li, Jing Li, Xiaofeng Chen, Zheli Liu:
Oblivious Transfer for Privacy-Preserving in VANET's Feature Matching. IEEE Trans. Intell. Transp. Syst. 22(7): 4359-4366 (2021) - [j142]Xiaofeng Chen, Hui Li, Jin Li, Qian Wang, Xinyi Huang, Willy Susilo, Yang Xiang:
Publicly Verifiable Databases With All Efficient Updating Operations. IEEE Trans. Knowl. Data Eng. 33(12): 3729-3740 (2021) - [c92]Nikolay Ivanov, Jianzhi Lou, Ting Chen, Jin Li, Qiben Yan:
Targeting the Weakest Link: Social Engineering Attacks in Ethereum Smart Contracts. AsiaCCS 2021: 787-801 - [c91]Yihe Zhang, Xu Yuan, Jin Li, Jiadong Lou, Li Chen, Nian-Feng Tzeng:
Reverse Attack: Black-box Attacks on Collaborative Recommendation. CCS 2021: 51-68 - [c90]Biwen Chen, Zhongming Wang, Tao Xiang, Lei Yang, Hongyang Yan, Jin Li:
ABAC: Anonymous Bilateral Access Control Protocol with Traceability for Fog-Assisted Mobile Crowdsensing. DMBD (2) 2021: 430-444 - [c89]Shaowei Wang, Jin Li, Yuqiu Qian, Jiachun Du, Wenqing Lin, Wei Yang:
Hiding Numerical Vectors in Local Private and Shuffled Messages. IJCAI 2021: 3706-3712 - [c88]Zhongming Wang, Biwen Chen, Tao Xiang, Lu Zhou, Yan-Hong Liu, Jin Li:
Public Key Based Searchable Encryption with Fine-Grained Sender Permission Control. ProvSec 2021: 3-18 - [c87]Changhui Hu, Jin Li, Zheli Liu, Xiaojie Guo, Yu Wei, Xuan Guang, Grigorios Loukides, Changyu Dong:
How to Make Private Distributed Cardinality Estimation Practical, and Get Differential Privacy for Free. USENIX Security Symposium 2021: 965-982 - [c86]Wenjuan Li, Weizhi Meng, Yu Wang, Jin Li:
Enhancing Blackslist-Based Packet Filtration Using Blockchain in Wireless Sensor Networks. WASA (2) 2021: 624-635 - [i15]Nikolay Ivanov, Jianzhi Lou, Ting Chen, Jin Li, Qiben Yan:
Targeting the Weakest Link: Social Engineering Attacks in Ethereum Smart Contracts. CoRR abs/2105.00132 (2021) - [i14]Weixuan Tang, Bin Li, Mauro Barni, Jin Li, Jiwu Huang:
Improving Cost Learning for JPEG Steganography by Exploiting JPEG Domain Knowledge. CoRR abs/2105.03867 (2021) - 2020
- [j141]Yunxia Tang, Yu Wang, Jiaqian Wang, Miao Li, Linmin Peng, Guochao Wei, Yixing Zhang, Jin Li, Zhibo Gao:
TruNeo: an integrated pipeline improves personalized true tumor neoantigen identification. BMC Bioinform. 21(1): 532 (2020) - [j140]Akash Suresh Patil, Rafik Hamza, Alzubair Hassan, Nan Jiang, Hongyang Yan, Jin Li:
Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts. Comput. Secur. 97: 101958 (2020) - [j139]Xiaoqiong Xu, Jin Li, Hongfang Yu, Long Luo, Xuetao Wei, Gang Sun:
Towards Yo-Yo attack mitigation in cloud auto-scaling mechanism. Digit. Commun. Networks 6(3): 369-376 (2020) - [j138]Heng Ye, Jiqiang Liu, Wei Wang, Ping Li, Tong Li, Jin Li:
Secure and efficient outsourcing differential privacy data release scheme in Cyber-physical system. Future Gener. Comput. Syst. 108: 1314-1323 (2020) - [j137]Nan Jiang, Fang Tian, Jin Li, Xu Yuan, Jiaqi Zheng:
MAN: Mutual Attention Neural Networks Model for Aspect-Level Sentiment Classification in SIoT. IEEE Internet Things J. 7(4): 2901-2913 (2020) - [j136]Yu Chen, Fang Luo, Tong Li, Tao Xiang, Zheli Liu, Jin Li:
A training-integrity privacy-preserving federated learning scheme with trusted execution environment. Inf. Sci. 522: 69-79 (2020) - [j135]Wenjuan Li, Yu Wang, Jin Li, Yang Xiang:
Toward supervised shape-based behavioral authentication on smartphones. J. Inf. Secur. Appl. 55: 102591 (2020) - [j134]Jin Li, Changyu Dong, Francesco Palmieri:
Special issue on advanced techniques for security and privacy of internet-of-things with machine learning. J. Netw. Comput. Appl. 167: 102697 (2020) - [j133]Xu Ma, Cunmei Ji, Xiaoyu Zhang, Jianfeng Wang, Jin Li, Kuan-Ching Li, Xiaofeng Chen:
Secure multiparty learning from the aggregation of locally trained models. J. Netw. Comput. Appl. 167: 102754 (2020) - [j132]Zheli Liu, Bo Li, Yanyu Huang, Jin Li, Yang Xiang, Witold Pedrycz:
NewMCOS: Towards a Practical Multi-Cloud Oblivious Storage Scheme. IEEE Trans. Knowl. Data Eng. 32(4): 714-727 (2020) - [j131]Yanyu Huang, Bo Li, Zheli Liu, Jin Li, Siu-Ming Yiu, Thar Baker, Brij B. Gupta:
ThinORAM: Towards Practical Oblivious Data Access in Fog Computing Environment. IEEE Trans. Serv. Comput. 13(4): 602-612 (2020) - [j130]Jian Shen, Dengzhi Liu, Xiaofeng Chen, Jin Li, Neeraj Kumar, Pandi Vijayakumar:
Secure Real-Time Traffic Data Aggregation With Batch Verification for Vehicular Cloud in VANETs. IEEE Trans. Veh. Technol. 69(1): 807-817 (2020) - [c85]Yihe Zhang, Jiadong Lou, Li Chen, Xu Yuan, Jin Li, Tom Johnsten, Nian-Feng Tzeng:
Towards Poisoning the Neural Collaborative Filtering-Based Recommender Systems. ESORICS (1) 2020: 461-479 - [c84]Yang Xiao, Ning Zhang, Jin Li, Wenjing Lou, Y. Thomas Hou:
PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Attested Off-Chain Contract Execution. ESORICS (2) 2020: 610-629 - [c83]Pei-Gen Ye, Yuan-Gen Wang, Jin Li, Liang Xiao, Guopu Zhu:
(τ, ϵ)-Greedy Reinforcement Learning For Anti-Jamming Wireless Communications. GLOBECOM 2020: 1-6 - [c82]Yutong Wang, Yufei Han, Hongyan Bao, Yun Shen, Fenglong Ma, Jin Li, Xiangliang Zhang:
Attackability Characterization of Adversarial Evasion Attack on Discrete Data. KDD 2020: 1415-1425 - [e10]Yang Xiang, Zheli Liu, Jin Li:
Security and Privacy in Social Networks and Big Data - 6th International Symposium, SocialSec 2020, Tianjin, China, September 26-27, 2020, Proceedings. Communications in Computer and Information Science 1298, Springer 2020, ISBN 978-981-15-9030-6 [contents] - [i13]Changhui Hu, Jin Li, Zheli Liu, Xiaojie Guo, Yu Wei, Xuan Guang, Grigorios Loukides, Changyu Dong:
How to Make Private Distributed Cardinality Estimation Practical, and Get Differential Privacy for Free. IACR Cryptol. ePrint Arch. 2020: 1576 (2020)
2010 – 2019
- 2019
- [j129]Zhijun Wei, Jin Li, Xianmin Wang, Chong-Zhi Gao:
A Lightweight Privacy-Preserving Protocol for VANETs Based on Secure Outsourcing Computing. IEEE Access 7: 62785-62793 (2019) - [j128]Jin Li, Xiaofeng Liao, Nicolas Puech:
Security and privacy in IoT communication. Ann. des Télécommunications 74(7-8): 373-374 (2019) - [j127]Jing Li, Licheng Wang, Lihua Wang, Xianmin Wang, Zhengan Huang, Jin Li:
Verifiable Chebyshev maps-based chaotic encryption schemes with outsourcing computations in the cloud/fog scenarios. Concurr. Comput. Pract. Exp. 31(22) (2019) - [j126]Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li:
Simulation-based selective opening security for receivers under chosen-ciphertext attacks. Des. Codes Cryptogr. 87(6): 1345-1371 (2019) - [j125]Xuan Li, Jin Li, Siu-Ming Yiu, Chongzhi Gao, Jinbo Xiong:
Privacy-preserving edge-assisted image retrieval and classification in IoT. Frontiers Comput. Sci. 13(5): 1136-1147 (2019) - [j124]Lin Zhong, Qianhong Wu, Jan Xie, Jin Li, Bo Qin:
A secure versatile light payment system based on blockchain. Future Gener. Comput. Syst. 93: 327-337 (2019) - [j123]Hongyang Yan, Yu Wang, Chunfu Jia, Jin Li, Yang Xiang, Witold Pedrycz:
IoT-FBAC: Function-based access control scheme using identity-based encryption in IoT. Future Gener. Comput. Syst. 95: 344-353 (2019) - [j122]Yinghui Zhang, Jiangang Shu, Ximeng Liu, Jin Li, Dong Zheng:
Comments on "A Large-Scale Concurrent Data Anonymous Batch Verification Scheme for Mobile Healthcare Crowd Sensing". IEEE Internet Things J. 6(1): 1287-1290 (2019) - [j121]Licheng Wang, Lixiang Li, Jin Li, Jing Li, Brij B. Gupta, Xia Liu:
Compressive Sensing of Medical Images With Confidentially Homomorphic Aggregations. IEEE Internet Things J. 6(2): 1402-1409 (2019) - [j120]Bo Li, Yanyu Huang, Zheli Liu, Jin Li, Zhihong Tian, Siu-Ming Yiu:
HybridORAM: Practical oblivious cloud storage with constant bandwidth. Inf. Sci. 479: 651-663 (2019) - [j119]Jin Li, Francesco Palmieri, Yang Xiang:
Special Issue on Security and Privacy in Machine Learning. Inf. Sci. 487: 208-209 (2019) - [j118]Xianmin Wang, Jing Li, Jin Li, Hongyang Yan:
Multilevel similarity model for high-resolution remote sensing image registration. Inf. Sci. 505: 294-305 (2019) - [j117]Zhiwei Zhang, Xiaofeng Chen, Jin Li, Xiaoling Tao, Jianfeng Ma:
HVDB: a hierarchical verifiable database scheme with scalable updates. J. Ambient Intell. Humaniz. Comput. 10(8): 3045-3057 (2019) - [j116]Lingling Xu, Jin Li, Xiaofeng Chen, Wanhua Li, Shaohua Tang, Hao-Tian Wu:
Tc-PEDCKS: Towards time controlled public key encryption with delegatable conjunctive keyword search for Internet of Things. J. Netw. Comput. Appl. 128: 11-20 (2019) - [j115]Jin Li, Francesco Palmieri, Qiben Yan:
Special issue on advances in security and privacy in IoT. J. Netw. Comput. Appl. 137: 91-92 (2019) - [j114]Xianmin Wang, Jing Li, Xiaohui Kuang, Yu-an Tan, Jin Li:
The security of machine learning in an adversarial setting: A survey. J. Parallel Distributed Comput. 130: 12-23 (2019) - [j113]Xiazhi Lai, Lisheng Fan, Xianfu Lei, Jin Li, Nan Yang, George K. Karagiannidis:
Distributed Secure Switch-and-Stay Combining Over Correlated Fading Channels. IEEE Trans. Inf. Forensics Secur. 14(8): 2088-2101 (2019) - [j112]Yinghui Zhang, Robert H. Deng, Dong Zheng, Jin Li, Pengfei Wu, Jin Cao:
Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-Assisted Industrial IoT. IEEE Trans. Ind. Informatics 15(9): 5099-5108 (2019) - [j111]Jin Li, Tong Li, Zheli Liu, Xiaofeng Chen:
Secure Deduplication System with Active Key Update and Its Application in IoT. ACM Trans. Intell. Syst. Technol. 10(6): 69:1-69:21 (2019) - [c81]Wenjuan Li, Yu Wang, Jin Li, Man Ho Au:
Towards Blockchained Challenge-Based Collaborative Intrusion Detection. ACNS Workshops 2019: 122-139 - [c80]Ping Li, Jin Li, Alzubair Hassan:
Group Identification via Non-threshold Leakage-Resilient Secret Sharing Scheme. CSS (2) 2019: 234-241 - [c79]Ping Li, Jin Li:
Secure and Dynamic Outsourcing Computation of Machine Learning in Cloud Computing. CSS (2) 2019: 285-292 - [c78]Akash Suresh Patil, Rafik Hamza, Hongyang Yan, Alzubair Hassan, Jin Li:
Blockchain-PUF-Based Secure Authentication Protocol for Internet of Things. ICA3PP (2) 2019: 331-338 - [c77]Xu Ma, Cunmei Ji, Xiaoyu Zhang, Jianfeng Wang, Jin Li, Kuan-Ching Li:
Secure Multiparty Learning from Aggregation of Locally Trained Models. ML4CS 2019: 173-182 - [c76]Xiangyu Wei, Jin Li, Zhen Han, Wei Wang:
Predicting Users' Emotional Intelligence with Social Networking Data. SocialSec 2019: 191-202 - [e9]Jaideep Vaidya, Xiao Zhang, Jin Li:
Cyberspace Safety and Security - 11th International Symposium, CSS 2019, Guangzhou, China, December 1-3, 2019, Proceedings, Part I. Lecture Notes in Computer Science 11982, Springer 2019, ISBN 978-3-030-37336-8 [contents] - [e8]Jaideep Vaidya, Xiao Zhang, Jin Li:
Cyberspace Safety and Security - 11th International Symposium, CSS 2019, Guangzhou, China, December 1-3, 2019, Proceedings, Part II. Lecture Notes in Computer Science 11983, Springer 2019, ISBN 978-3-030-37351-1 [contents] - [i12]Fu-Zhao Ou, Yuan-Gen Wang, Jin Li, Guopu Zhu, Sam Kwong:
Controllable List-wise Ranking for Universal No-reference Image Quality Assessment. CoRR abs/1911.10566 (2019) - 2018
- [j110]Xiaosong Zhang, Yu-an Tan, Chen Liang, Yuanzhang Li, Jin Li:
A Covert Channel Over VoLTE via Adjusting Silence Periods. IEEE Access 6: 9292-9302 (2018) - [j109]Qun Lin, Jin Li, Zhengan Huang, Wenbin Chen, Jian Shen:
A Short Linearly Homomorphic Proxy Signature Scheme. IEEE Access 6: 12966-12972 (2018) - [j108]Ping Li, Jin Li, Zhengan Huang, Chong-Zhi Gao, Wenbin Chen, Kai Chen:
Privacy-preserving outsourced classification in cloud computing. Clust. Comput. 21(1): 277-286 (2018) - [j107]Jin Li, Yinghui Zhang, Xiaofeng Chen, Yang Xiang:
Secure attribute-based data sharing for resource-limited users in cloud computing. Comput. Secur. 72: 1-12 (2018) - [j106]Weizhi Meng, Lijun Jiang, Yu Wang, Jin Li, Jun Zhang, Yang Xiang:
JFCGuard: Detecting juice filming charging attack via processor usage analysis on smartphones. Comput. Secur. 76: 252-264 (2018) - [j105]Zheli Liu, Tong Li, Ping Li, Chunfu Jia, Jin Li:
Verifiable searchable encryption with aggregate keys for data sharing system. Future Gener. Comput. Syst. 78: 778-788 (2018) - [j104]Jin Li, Qiben Yan, Victor I. Chang:
Internet of Things: Security and privacy in a connected world. Future Gener. Comput. Syst. 78: 931-932 (2018) - [j103]Gang Sun, Victor I. Chang, Steven Guan, Muthu Ramachandran, Jin Li, Dan Liao:
Big Data and Internet of Things - Fusion for different services and its impacts. Future Gener. Comput. Syst. 86: 1368-1370 (2018) - [j102]Ping Li, Tong Li, Heng Ye, Jin Li, Xiaofeng Chen, Yang Xiang:
Privacy-preserving machine learning with multiple data providers. Future Gener. Comput. Syst. 87: 341-350 (2018) - [j101]Tong Li, Zheli Liu, Chunfu Jia, Zhangjie Fu, Jin Li:
Key-aggregate searchable encryption under multi-owner setting for group data sharing in the cloud. Int. J. Web Grid Serv. 14(1): 21-43 (2018) - [j100]Shenmin Zhang, Hongwei Li, Yuanshun Dai, Jin Li, Miao He, Rongxing Lu:
Verifiable Outsourcing Computation for Matrix Multiplication With Improved Efficiency and Applicability. IEEE Internet Things J. 5(6): 5076-5088 (2018) - [j99]Jin Li, Aniello Castiglione:
Computational Intelligence and its Applications in New Computing Models. Inf. Sci. 433-434: 313-314 (2018) - [j98]Chong-zhi Gao, Qiong Cheng, Pei He, Willy Susilo, Jin Li:
Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack. Inf. Sci. 444: 72-88 (2018) - [j97]Tong Li, Jin Li, Zheli Liu, Ping Li, Chunfu Jia:
Differentially private Naive Bayes learning over multiple data sources. Inf. Sci. 444: 89-104 (2018) - [j96]Zheli Liu, Yanyu Huang, Jin Li, Xiaochun Cheng, Chao Shen:
DivORAM: Towards a practical oblivious RAM with variable block size. Inf. Sci. 447: 1-11 (2018) - [j95]Jin Li, Aniello Castiglione, Changyu Dong:
Special issue on security in cloud computing. J. Netw. Comput. Appl. 110: 97-98 (2018) - [j94]Jin Li, Xiaofeng Chen, Sherman S. M. Chow, Qiong Huang, Duncan S. Wong, Zheli Liu:
Multi-authority fine-grained access control with accountability and its application in cloud. J. Netw. Comput. Appl. 112: 89-96 (2018) - [j93]Yinghui Zhang, Jin Li, Dong Zheng, Ping Li, Yangguang Tian:
Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice. J. Netw. Comput. Appl. 122: 50-60 (2018) - [j92]Yu Wang, Weizhi Meng, Wenjuan Li, Jin Li, Waixi Liu, Yang Xiang:
A fog-based privacy-preserving approach for distributed signature-based intrusion detection. J. Parallel Distributed Comput. 122: 26-35 (2018) - [j91]Victor I. Chang, Gang Sun, Jin Li:
Guest Editorial: Security and Privacy for Multimedia in the Internet of Things (IoT). Multim. Tools Appl. 77(14): 18201-18202 (2018) - [j90]Xiaoyu Zhang, Xiaofeng Chen, Jianfeng Wang, Zhihui Zhan, Jin Li:
Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing. Soft Comput. 22(23): 7719-7732 (2018) - [j89]Waixi Liu, Jin Li, Jun Cai, Yu Wang, Xiao-Chu Liu, Shun-Zheng Yu:
COD: caching on demand in information-centric networking. Telecommun. Syst. 69(3): 303-319 (2018) - [j88]Jian Shen, Tianqi Zhou, Xiaofeng Chen, Jin Li, Willy Susilo:
Anonymous and Traceable Group Data Sharing in Cloud Computing. IEEE Trans. Inf. Forensics Secur. 13(4): 912-925 (2018) - [j87]Jin Li, Lichao Sun, Qiben Yan, Zhiqiang Li, Witawas Srisa-an, Heng Ye:
Significant Permission Identification for Machine-Learning-Based Android Malware Detection. IEEE Trans. Ind. Informatics 14(7): 3216-3225 (2018) - [j86]Zheli Liu, Zhendong Wu, Tong Li, Jin Li, Chao Shen:
GMM and CNN Hybrid Method for Short Utterance Speaker Recognition. IEEE Trans. Ind. Informatics 14(7): 3244-3252 (2018) - [c75]Weizhi Meng, Yu Wang, Wenjuan Li, Zhe Liu, Jin Li, Christian W. Probst:
Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing. ACISP 2018: 759-767 - [c74]Jin Li, Heng Ye, Wei Wang, Wenjing Lou, Y. Thomas Hou, Jiqiang Liu, Rongxing Lu:
Efficient and Secure Outsourcing of Differentially Private Data Publication. ESORICS (2) 2018: 187-206 - [c73]Ning Zhang, Jin Li, Wenjing Lou, Y. Thomas Hou:
PrivacyGuard: Enforcing Private Data Usage with Blockchain and Attested Execution. DPM/CBT@ESORICS 2018: 345-353 - [c72]Yulin Wu, Xuan Wang, Zoe Lin Jiang, Xuan Li, Jin Li, Siu-Ming Yiu, Zechao Liu, Hainan Zhao, Chunkai Zhang:
Towards Secure Cloud Data Similarity Retrieval: Privacy Preserving Near-Duplicate Image Data Detection. ICA3PP (4) 2018: 374-388 - [c71]Wenjuan Li, Weizhi Meng, Yu Wang, Jinguang Han, Jin Li:
Towards Securing Challenge-Based Collaborative Intrusion Detection Networks via Message Verification. ISPEC 2018: 313-328 - [c70]Weizhi Meng, Jianfeng Wang, Xianmin Wang, Joseph K. Liu, Zuoxia Yu, Jin Li, Yongjun Zhao, Sherman S. M. Chow:
Position Paper on Blockchain Technology: Smart Contract and Applications. NSS 2018: 474-483 - [c69]Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li:
Hedged Nonce-Based Public-Key Encryption: Adaptive Security Under Randomness Failures. Public Key Cryptography (1) 2018: 253-279 - [c68]Sohail Jabbar, Muhammad Farhan, Jin Li, Haseeb Ahmad, Awais Ahmad:
IoT based smart interaction framework for elearning. SAC 2018: 664-669 - [e7]Jiafu Wan, Kai Lin, Delu Zeng, Jin Li, Yang Xiang, Xiaofeng Liao, Jiwu Huang, Zheli Liu:
Cloud Computing, Security, Privacy in New Computing Environments - 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25-26, and December 15-16, 2016, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 197, Springer 2018, ISBN 978-3-319-69604-1 [contents] - [e6]Jaideep Vaidya, Jin Li:
Algorithms and Architectures for Parallel Processing - 18th International Conference, ICA3PP 2018, Guangzhou, China, November 15-17, 2018, Proceedings, Part I. Lecture Notes in Computer Science 11334, Springer 2018, ISBN 978-3-030-05050-4 [contents] - [e5]Jaideep Vaidya, Jin Li:
Algorithms and Architectures for Parallel Processing - 18th International Conference, ICA3PP 2018, Guangzhou, China, November 15-17, 2018, Proceedings, Part II. Lecture Notes in Computer Science 11335, Springer 2018, ISBN 978-3-030-05053-5 [contents] - [e4]Jaideep Vaidya, Jin Li:
Algorithms and Architectures for Parallel Processing - 18th International Conference, ICA3PP 2018, Guangzhou, China, November 15-17, 2018, Proceedings, Part III. Lecture Notes in Computer Science 11336, Springer 2018, ISBN 978-3-030-05056-6 [contents] - [e3]Jaideep Vaidya, Jin Li:
Algorithms and Architectures for Parallel Processing - 18th International Conference, ICA3PP 2018, Guangzhou, China, November 15-17, 2018, Proceedings, Part IV. Lecture Notes in Computer Science 11337, Springer 2018, ISBN 978-3-030-05062-7 [contents] - [e2]Man Ho Au, Siu-Ming Yiu, Jin Li, Xiapu Luo, Cong Wang, Aniello Castiglione, Kamil Kluczniak:
Network and System Security - 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings. Lecture Notes in Computer Science 11058, Springer 2018, ISBN 978-3-030-02743-8 [contents] - [i11]Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li:
Hedged Nonce-Based Public-Key Encryption: Adaptive Security under Randomness Failures. IACR Cryptol. ePrint Arch. 2018: 25 (2018) - [i10]Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li:
Simulation-Based Selective Opening Security for Receivers under Chosen-Ciphertext Attacks. IACR Cryptol. ePrint Arch. 2018: 755 (2018) - 2017
- [j85]Weiwei Lin, Ziming Wu, Longxin Lin, Angzhan Wen, Jin Li:
An Ensemble Random Forest Algorithm for Insurance Big Data Analysis. IEEE Access 5: 16568-16575 (2017) - [j84]Man Ho Au, Joseph K. Liu, Zhenfei Zhang, Willy Susilo, Jin Li:
Anonymous Announcement System (AAS) for Electric Vehicle in VANETs. Comput. J. 60(4): 588-599 (2017) - [j83]Li Yang, Yaping Tian, Jin Li, Jianfeng Ma, Junwei Zhang:
Identifying opinion leaders in social networks with topic limitation. Clust. Comput. 20(3): 2403-2413 (2017) - [j82]Jianfeng Wang, Xiaofeng Chen, Jin Li, Jiaolian Zhao, Jian Shen:
Towards achieving flexible and verifiable search for outsourced database in cloud computing. Future Gener. Comput. Syst. 67: 266-275 (2017) - [j81]Ping Li, Jin Li, Zhengan Huang, Tong Li, Chong-Zhi Gao, Siu-Ming Yiu, Kai Chen:
Multi-key privacy-preserving deep learning in cloud computing. Future Gener. Comput. Syst. 74: 76-85 (2017) - [j80]Jianfeng Wang, Xiaofeng Chen, Jin Li, Kamil Kluczniak, Miroslaw Kutylowski:
TrDup: enhancing secure data deduplication with user traceability in cloud computing. Int. J. Web Grid Serv. 13(3): 270-289 (2017) - [j79]Yinghui Zhang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Hui Li, Ilsun You:
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inf. Sci. 379: 42-61 (2017) - [j78]Weiwei Lin, Siyao Xu, Ligang He, Jin Li:
Multi-resource scheduling and power simulation for cloud computing. Inf. Sci. 397: 168-186 (2017) - [j77]Zhengan Huang, Shengli Liu, Xianping Mao, Kefei Chen, Jin Li:
Insight of the protection for data security under selective opening attacks. Inf. Sci. 412: 223-241 (2017) - [j76]Tong Li, Zheli Liu, Jin Li, Chunfu Jia, Kuan-Ching Li:
CDPS: A cryptographic data publishing system. J. Comput. Syst. Sci. 89: 80-91 (2017) - [j75]Yinghui Zhang, Jin Li, Dong Zheng, Xiaofeng Chen, Hui Li:
Towards privacy protection and malicious behavior traceability in smart health. Pers. Ubiquitous Comput. 21(5): 815-830 (2017) - [j74]Jin Li, Hongyang Yan, Zheli Liu, Xiaofeng Chen, Xinyi Huang, Duncan S. Wong:
Location-Sharing Systems With Enhanced Privacy in Mobile Online Social Networks. IEEE Syst. J. 11(2): 439-448 (2017) - [j73]Weiwei Lin, Siyao Xu, Jin Li, Lingling Xu, Zhiping Peng:
Design and theoretical analysis of virtual machine placement algorithm based on peak workload characteristics. Soft Comput. 21(5): 1301-1314 (2017) - [j72]Zhenxiang Chen, Lizhi Peng, Chongzhi Gao, Bo Yang, Yuehui Chen, Jin Li:
Flexible neural trees based early stage identification for IP traffic. Soft Comput. 21(8): 2035-2046 (2017) - [j71]Ping Li, Tong Li, Zheng-an Yao, Chun-Ming Tang, Jin Li:
Privacy-preserving outsourcing of image feature extraction in cloud computing. Soft Comput. 21(15): 4349-4359 (2017) - [j70]Pei He, Zelin Deng, Chongzhi Gao, Xiuni Wang, Jin Li:
Model approach to grammatical evolution: deep-structured analyzing of model and representation. Soft Comput. 21(18): 5413-5423 (2017) - [j69]Jingwei Li, Dan Lin, Anna Cinzia Squicciarini, Jin Li, Chunfu Jia:
Towards Privacy-Preserving Storage and Retrieval in Multiple Clouds. IEEE Trans. Cloud Comput. 5(3): 499-509 (2017) - [c67]Jun Zhang, Xin Wang, Siu-Ming Yiu, Zoe Lin Jiang, Jin Li:
Secure Dot Product of Outsourced Encrypted Vectors and its Application to SVM. SCC@AsiaCCS 2017: 75-82 - [c66]Yu Wang, Lin Xie, Wenjuan Li, Weizhi Meng, Jin Li:
A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks Through Fog Computing. CSS 2017: 267-279 - [c65]Wenbin Chen, Hao Lei, Jin Li, Chongzhi Gao, Fufang Li, Ke Qi:
A Multi-source Homomorphic Network Coding Signature in the Standard Model. GPC 2017: 66-74 - [c64]Yanyu Huang, Chuan Fu, Xuan Chen, Hao Guo, Xiaoyu He, Jin Li, Zheli Liu:
A Mutation Approach of Detecting SQL Injection Vulnerabilities. ICCCS (2) 2017: 175-188 - [c63]Zhiwei Zhang, Xiaofeng Chen, Jin Li, Jianfeng Ma, Yang Xiang:
A Hierarchical VDB Scheme with Scalable Verification and Tampered Record Localization. ISPA/IUCC 2017: 1212-1216 - [c62]Bo Liu, Wanlei Zhou, Shui Yu, Kun Wang, Yu Wang, Yong Xiang, Jin Li:
Home Location Protection in Mobile Social Networks: A Community Based Method (Short Paper). ISPEC 2017: 694-704 - [c61]Lijun Jiang, Weizhi Meng, Yu Wang, Chunhua Su, Jin Li:
Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study. NSS 2017: 199-213 - [c60]Ping Li, Heng Ye, Jin Li:
Multi-party Security Computation with Differential Privacy over Outsourced Data. SpaCCS 2017: 487-500 - [i9]Zheli Liu, Siyi Lv, Yu Wei, Jin Li, Joseph K. Liu, Yang Xiang:
FFSSE: Flexible Forward Secure Searchable Encryption with Efficient Performance. IACR Cryptol. ePrint Arch. 2017: 1105 (2017) - 2016
- [j68]Joonsang Baek, Duncan S. Wong, Jin Li, Man Ho Au:
Efficient Generic Construction of CCA-Secure Identity-Based Encryption from Randomness Extraction. Comput. J. 59(4): 508-521 (2016) - [j67]Yijun Mao, Jin Li, Min-Rong Chen, Jia-Nan Liu, Congge Xie, Yiju Zhan:
Fully secure fuzzy identity-based encryption for secure IoT communications. Comput. Stand. Interfaces 44: 117-121 (2016) - [j66]Hongyang Yan, Jin Li, Xuan Li, Gansen Zhao, Sun-Young Lee, Jian Shen:
Secure Access Control of E-Health System with Attribute-Based Encryption. Intell. Autom. Soft Comput. 22(3): 345-352 (2016) - [j65]Zheli Liu, Dejiang Luo, Jin Li, Xiaofeng Chen, Chunfu Jia:
N-Mobishare: new privacy-preserving location-sharing system for mobile online social networks. Int. J. Comput. Math. 93(2): 384-400 (2016) - [j64]Ilsun You, Jin Li:
Special issue on security and privacy techniques in mobile cloud computing. J. Ambient Intell. Humaniz. Comput. 7(5): 607-609 (2016) - [j63]Yinghui Zhang, Dong Zheng, Xiaofeng Chen, Jin Li, Hui Li:
Efficient attribute-based data sharing in mobile clouds. Pervasive Mob. Comput. 28: 135-149 (2016) - [j62]Yinghui Zhang, Jin Li, Xiaofeng Chen, Hui Li:
Anonymous attribute-based proxy re-encryption for access control in cloud computing. Secur. Commun. Networks 9(14): 2397-2411 (2016) - [j61]Yinghui Zhang, Dong Zheng, Qi Li, Jin Li, Hui Li:
Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing. Secur. Commun. Networks 9(16): 3688-3702 (2016) - [j60]Xuan Li, Jin Li, Faliang Huang:
A secure cloud storage system supporting privacy-preserving fuzzy deduplication. Soft Comput. 20(4): 1437-1448 (2016) - [j59]Zheli Liu, Jian Weng, Jin Li, Jun Yang, Chuan Fu, Chunfu Jia:
Cloud-based electronic health record system supporting fuzzy keyword search. Soft Comput. 20(8): 3243-3255 (2016) - [j58]Zhendong Wu, Bin Liang, Lin You, Zhihua Jian, Jin Li:
High-dimension space projection-based biometric encryption for fingerprint with fuzzy minutia. Soft Comput. 20(12): 4907-4918 (2016) - [j57]Jingwei Li, Jin Li, Dongqing Xie, Zhang Cai:
Secure Auditing and Deduplicating Data in Cloud. IEEE Trans. Computers 65(8): 2386-2396 (2016) - [j56]Xiaofeng Chen, Jin Li, Jian Weng, Jianfeng Ma, Wenjing Lou:
Verifiable Computation over Large Database with Incremental Updates. IEEE Trans. Computers 65(10): 3184-3195 (2016) - [j55]Joseph K. Liu, Man Ho Au, Xinyi Huang, Rongxing Lu, Jin Li:
Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services. IEEE Trans. Inf. Forensics Secur. 11(3): 484-497 (2016) - [j54]Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci, Francesco Palmieri, Aniello Castiglione, Jin Li, Xinyi Huang:
Hierarchical and Shared Access Control. IEEE Trans. Inf. Forensics Secur. 11(4): 850-865 (2016) - [c59]Tong Li, Zheli Liu, Ping Li, Chunfu Jia, Zoe Lin Jiang, Jin Li:
Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage. ACISP (2) 2016: 153-169 - [c58]Yinghui Zhang, Jin Li, Dong Zheng, Xiaofeng Chen, Hui Li:
Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures. ACISP (1) 2016: 509-524 - [c57]Chuting Tan, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Jun-bin Fang, Jin Li, Yabin Jin, Jiajun Huang:
Generic Construction of Publicly Verifiable Predicate Encryption. AsiaCCS 2016: 889-894 - [c56]Jingwei Li, Chuan Qin, Patrick P. C. Lee, Jin Li:
Rekeying for Encrypted Deduplication Storage. DSN 2016: 618-629 - [c55]Zhusong Liu, Jin Li, Christian Esposito, Aniello Castiglione, Francesco Palmieri:
Optimal Data Replica Placement in Large-Scale Federated Architectures. SpaCCS Workshops 2016: 257-267 - [e1]Kangshun Li, Jin Li, Yong Liu, Aniello Castiglione:
Computational Intelligence and Intelligent Systems - 7th International Symposium, ISICA 2015, Guangzhou, China, November 21-22, 2015, Revised Selected Papers. Communications in Computer and Information Science 575, Springer 2016, ISBN 978-981-10-0355-4 [contents] - 2015
- [j53]Yang Xiang, Beniamino Di Martino, Guilin Wang, Jin Li:
Cloud Computing: Security, Privacy and Practice. Future Gener. Comput. Syst. 52: 59-60 (2015) - [j52]Tao Jiang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Jianfeng Ma, Joseph K. Liu:
Towards secure and reliable cloud storage against data re-outsourcing. Future Gener. Comput. Syst. 52: 86-94 (2015) - [j51]Xu Ma, Jin Li, Fangguo Zhang:
Refereed Computation Delegation of Private Sequence Comparison in Cloud Computing. Int. J. Netw. Secur. 17(6): 743-753 (2015) - [j50]Jin Li, Xiaofeng Chen, Xinyi Huang:
New attribute-based authentication and its application in anonymous cloud access service. Int. J. Web Grid Serv. 11(1): 125-141 (2015) - [j49]Weiwei Lin, Chaoyue Zhu, Jin Li, Bo Liu, Huiqiong Lian:
Novel algorithms and equivalence optimisation for resource allocation in cloud computing. Int. J. Web Grid Serv. 11(2): 193-210 (2015) - [j48]Fatos Xhafa, Jin Li, Vladi Kolici:
Special Issue: Advances in Secure Data Streaming Systems. Informatica (Slovenia) 39(4) (2015) - [j47]Shuquan Hou, Xinyi Huang, Joseph K. Liu, Jin Li, Li Xu:
Universal designated verifier transitive signatures for graph-based big data. Inf. Sci. 318: 144-156 (2015) - [j46]Yilei Wang, Tao Li, Hairong Qin, Jin Li, Wei Gao, Zhe Liu, Qiuliang Xu:
A brief survey on secure multi-party computing in the presence of rational parties. J. Ambient Intell. Humaniz. Comput. 6(6): 807-824 (2015) - [j45]Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Jianfeng Ma, Wenjing Lou:
New access control systems based on outsourced attribute-based encryption. J. Comput. Secur. 23(6): 659-683 (2015) - [j44]Jin Li, Xiaofeng Chen, Fatos Xhafa, Leonard Barolli:
Secure deduplication storage systems supporting keyword search. J. Comput. Syst. Sci. 81(8): 1532-1541 (2015) - [j43]Jin Li, Fatos Xhafa, Jian Weng:
Emerging services and technologies in wireless networks. J. High Speed Networks 21(2): 81-82 (2015) - [j42]Jin Li, Zheli Liu, Xiaofeng Chen, Fatos Xhafa, Xiao Tan, Duncan S. Wong:
L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing. Knowl. Based Syst. 79: 18-26 (2015) - [j41]Lingling Xu, Jin Li, Shaohua Tang, Joonsang Baek:
Server-Aided Verification Signature with Privacy for Mobile Computing. Mob. Inf. Syst. 2015: 626415:1-626415:11 (2015) - [j40]Fatos Xhafa, Jingwei Li, Gansen Zhao, Jin Li, Xiaofeng Chen, Duncan S. Wong:
Designing cloud-based electronic health record system with attribute-based encryption. Multim. Tools Appl. 74(10): 3441-3458 (2015) - [j39]Jin Li, Jingwei Li, Xiaofeng Chen, Chunfu Jia, Wenjing Lou:
Identity-Based Encryption with Outsourced Revocation in Cloud Computing. IEEE Trans. Computers 64(2): 425-437 (2015) - [j38]Jin Li, Xiaofeng Chen, Xinyi Huang, Shaohua Tang, Yang Xiang, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi:
Secure Distributed Deduplication Systems with Improved Reliability. IEEE Trans. Computers 64(12): 3569-3579 (2015) - [j37]Jin Li, Xiao Tan, Xiaofeng Chen, Duncan S. Wong, Fatos Xhafa:
OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices. IEEE Trans. Cloud Comput. 3(2): 195-205 (2015) - [j36]Xiaofeng Chen, Willy Susilo, Jin Li, Duncan S. Wong, Jianfeng Ma, Shaohua Tang, Qiang Tang:
Efficient algorithms for secure outsourcing of bilinear pairings. Theor. Comput. Sci. 562: 112-121 (2015) - [j35]Xiaofeng Chen, Jin Li, Xinyi Huang, Jianfeng Ma, Wenjing Lou:
New Publicly Verifiable Databases with Efficient Updates. IEEE Trans. Dependable Secur. Comput. 12(5): 546-556 (2015) - [j34]Xiaofeng Chen, Xinyi Huang, Jin Li, Jianfeng Ma, Wenjing Lou, Duncan S. Wong:
New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations. IEEE Trans. Inf. Forensics Secur. 10(1): 69-78 (2015) - [j33]Fatos Xhafa, Jianglang Feng, Yinghui Zhang, Xiaofeng Chen, Jin Li:
Privacy-aware attribute-based PHR sharing with user accountability in cloud computing. J. Supercomput. 71(5): 1607-1619 (2015) - [j32]Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P. C. Lee, Wenjing Lou:
A Hybrid Cloud Approach for Secure Authorized Deduplication. IEEE Trans. Parallel Distributed Syst. 26(5): 1206-1216 (2015) - [c54]Jun Yang, Chuan Fu, Nan Shen, Zheli Liu, Chunfu Jia, Jin Li:
General Multi-key Searchable Encryption. AINA Workshops 2015: 89-95 - [c53]Nan Jiang, Tao Wan, Lingfeng Liu, Jin Li:
Strength-Constrained Weighted Evolution Model for Wireless Sensor Networks. AINA 2015: 605-610 - [c52]Jianfeng Wang, Xiaofeng Chen, Jin Li, Kamil Kluczniak, Miroslaw Kutylowski:
A New Secure Data Deduplication Approach Supporting User Traceability. BWCCA 2015: 120-124 - [c51]Jianfeng Wang, Xiaofeng Chen, Jin Li:
Verifiable Search for Dynamic Outsourced Database in Cloud Computing. BWCCA 2015: 568-571 - [c50]Xuan Li, Jie Lin, Jin Li, Biao Jin:
A Video Deduplication Scheme with Privacy Preservation in IoT. ISICA 2015: 409-417 - [c49]Zhenxiang Chen, Hongbo Han, Qiben Yan, Bo Yang, Lizhi Peng, Lei Zhang, Jin Li:
A First Look at Android Malware Traffic in First Few Minutes. TrustCom/BigDataSE/ISPA (1) 2015: 206-213 - 2014
- [j31]Yinghui Zhang, Xiaofeng Chen, Jin Li, Hui Li:
Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks. Comput. Networks 75: 192-211 (2014) - [j30]Jingwei Li, Jin Li, Zheli Liu, Chunfu Jia:
Enabling efficient and secure data sharing in cloud computing. Concurr. Comput. Pract. Exp. 26(5): 1052-1066 (2014) - [j29]Haibo Tian, Jin Li:
A short non-delegatable strong designated verifier signature. Frontiers Comput. Sci. 8(3): 490-502 (2014) - [j28]Jingwei Li, Jin Li, Xiaofeng Chen, Zheli Liu, Chunfu Jia:
Privacy-preserving data utilization in hybrid clouds. Future Gener. Comput. Syst. 30: 98-106 (2014) - [j27]Xiaofeng Chen, Jin Li, Jianfeng Ma, Wenjing Lou, Duncan S. Wong:
New and efficient conditional e-payment systems with transferability. Future Gener. Comput. Syst. 37: 252-258 (2014) - [j26]Jin Li, Xiaofeng Chen, Qiong Huang, Duncan S. Wong:
Digital provenance: Enabling secure data forensics in cloud computing. Future Gener. Comput. Syst. 37: 259-266 (2014) - [j25]Fatos Xhafa, Jin Li, Duncan S. Wong, Francesco Palmieri:
Advances in Security and Privacy in Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [j24]Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Haibo Tian, Jin Li, Kwangjo Kim:
Identity-based chameleon hashing and signatures without key exposure. Inf. Sci. 265: 198-210 (2014) - [j23]Yinghui Zhang, Xiaofeng Chen, Jin Li, Hui Li, Fenghua Li:
Attribute-Based Data Sharing with Flexible and Direct Revocation in Cloud Computing. KSII Trans. Internet Inf. Syst. 8(11): 4028-4049 (2014) - [j22]Zheli Liu, Jingwei Li, Jin Li, Chunfu Jia, Jun Yang, Ke Yuan:
SQL-Based Fuzzy Query Mechanism Over Encrypted Database. Int. J. Data Warehous. Min. 10(4): 71-87 (2014) - [j21]Jingwei Li, Jin Li, Xiaofeng Chen, Zheli Liu, Chunfu Jia:
MobiShare+: Security Improved System for Location Sharing in Mobile Online Social Networks. J. Internet Serv. Inf. Secur. 4(1): 25-36 (2014) - [j20]Fatos Xhafa, Jianfeng Wang, Xiaofeng Chen, Joseph K. Liu, Jin Li, Paul Krause:
An efficient PHR service system supporting fuzzy keyword search and fine-grained access control. Soft Comput. 18(9): 1795-1802 (2014) - [j19]Jin Li, Xiaofeng Chen, Mingqiang Li, Jingwei Li, Patrick P. C. Lee, Wenjing Lou:
Secure Deduplication with Efficient and Reliable Convergent Key Management. IEEE Trans. Parallel Distributed Syst. 25(6): 1615-1625 (2014) - [j18]Xinyi Huang, Xiaofeng Chen, Jin Li, Yang Xiang, Li Xu:
Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems. IEEE Trans. Parallel Distributed Syst. 25(7): 1767-1775 (2014) - [j17]Jin Li, Xinyi Huang, Jingwei Li, Xiaofeng Chen, Yang Xiang:
Securely Outsourcing Attribute-Based Encryption with Checkability. IEEE Trans. Parallel Distributed Syst. 25(8): 2201-2210 (2014) - [j16]Xiaofeng Chen, Jin Li, Jianfeng Ma, Qiang Tang, Wenjing Lou:
New Algorithms for Secure Outsourcing of Modular Exponentiations. IEEE Trans. Parallel Distributed Syst. 25(9): 2386-2396 (2014) - [j15]Xiaofeng Chen, Jin Li, Xinyi Huang, Jingwei Li, Yang Xiang, Duncan S. Wong:
Secure Outsourced Attribute-Based Signatures. IEEE Trans. Parallel Distributed Syst. 25(12): 3285-3294 (2014) - [c48]Hongyang Yan, Xuan Li, Jin Li:
Secure Personal Health Record System with Attribute-Based Encryption in Cloud Computing. 3PGCIC 2014: 329-332 - [c47]Zheli Liu, Jin Li, Xiaofeng Chen, Jun Yang, Chunfu Jia:
TMDS: Thin-Model Data Sharing Scheme Supporting Keyword Search in Cloud Storage. ACISP 2014: 115-130 - [c46]Haixin Nie, Xiaofeng Chen, Jin Li, Josolph Liu, Wenjing Lou:
Efficient and Verifiable Algorithm for Secure Outsourcing of Large-scale Linear Programming. AINA 2014: 591-596 - [c45]Jin Li, Xiaofeng Chen, Fatos Xhafa, Leonard Barolli:
Secure Deduplication Storage Systems with Keyword Search. AINA 2014: 971-977 - [c44]Xiaofeng Chen, Jin Li, Jian Weng, Jianfeng Ma, Wenjing Lou:
Verifiable Computation over Large Database with Incremental Updates. ESORICS (1) 2014: 148-162 - [c43]Mingqiang Li, Chuan Qin, Patrick P. C. Lee, Jin Li:
Convergent Dispersal: Toward Storage-Efficient Security in a Cloud-of-Clouds. HotCloud 2014 - [c42]Tao Jiang, Xiaofeng Chen, Jin Li, Jianfeng Ma:
M-SRS: Secure and Trustworthy Mobile Service Review System Based on Mobile Cloudlet. ICT-EurAsia 2014: 612-621 - [c41]Jun Yang, Zheli Liu, Jin Li, Chunfu Jia, Baojiang Cui:
Multi-key Searchable Encryption without Random Oracle. INCoS 2014: 79-84 - [c40]Zhaocong Wen, Jinman Luo, Huajun Chen, Jiaxiao Meng, Xuan Li, Jin Li:
A Verifiable Data Deduplication Scheme in Cloud Computing. INCoS 2014: 85-90 - [c39]Tao Jiang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Jianfeng Ma, Joseph K. Liu:
TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing. ISPEC 2014: 346-358 - [c38]Yinghui Zhang, Dong Zheng, Xiaofeng Chen, Jin Li, Hui Li:
Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts. ProvSec 2014: 259-273 - 2013
- [j14]Jin Li, Xiaofeng Chen:
Efficient Multi-User Keyword Search over Encrypted Data in Cloud Computing. Comput. Informatics 32(4): 723-738 (2013) - [j13]Xu Ma, Jin Li, Fangguo Zhang:
Outsourcing computation of modular exponentiations in cloud computing. Clust. Comput. 16(4): 787-796 (2013) - [j12]Jianfeng Wang, Hua Ma, Qiang Tang, Jin Li, Hui Zhu, Siqi Ma, Xiaofeng Chen:
Efficient verifiable fuzzy keyword search over encrypted data in cloud computing. Comput. Sci. Inf. Syst. 10(2): 667-684 (2013) - [j11]Xingxing Xie, Hua Ma, Jin Li, Xiaofeng Chen:
An Efficient Ciphertext-Policy Attribute-Based Access Control towards Revocation in Cloud Computing. J. Univers. Comput. Sci. 19(16): 2349-2367 (2013) - [c37]Zheli Liu, Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia:
New Privacy-Preserving Location Sharing System for Mobile Online Social Networks. 3PGCIC 2013: 214-218 - [c36]Yinghui Zhang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Hui Li:
Anonymous attribute-based encryption supporting efficient decryption test. AsiaCCS 2013: 511-516 - [c35]Xu Ma, Fangguo Zhang, Jin Li:
Verifiable Evaluation of Private Polynomials. EIDWT 2013: 451-458 - [c34]Jin Li, Dongqing Xie, Xiaofeng Chen:
Server-Aided Hierarchical Identity-Based Encryption. EIDWT 2013: 643-647 - [c33]Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Jianfeng Ma, Wenjing Lou:
Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption. ESORICS 2013: 592-609 - [c32]Xingxing Xie, Hua Ma, Jin Li, Xiaofeng Chen:
New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation. ICT-EurAsia 2013: 373-382 - [c31]Yinghui Zhang, Xiaofeng Chen, Jin Li, Hui Li, Fenghua Li:
FDR-ABE: Attribute-Based Encryption with Flexible and Direct Revocation. INCoS 2013: 38-45 - [c30]Jin Li, Xiao Tan, Xiaofeng Chen, Duncan S. Wong:
An Efficient Proof of Retrievability with Public Auditing in Cloud Computing. INCoS 2013: 93-98 - [c29]Zheli Liu, Haoyu Ma, Jin Li, Chunfu Jia, Jingwei Li, Ke Yuan:
Secure Storage and Fuzzy Query over Encrypted Databases. NSS 2013: 439-450 - 2012
- [j10]Jin Li, Fangguo Zhang, Xiaofeng Chen, Kwangjo Kim, Duncan S. Wong:
Generic security-amplifying methods of ordinary digital signatures. Inf. Sci. 201: 128-139 (2012) - [j9]Jianfeng Wang, Xiaofeng Chen, Hua Ma, Qiang Tang, Jin Li, Hui Zhu:
A Verifiable Fuzzy Keyword Search Scheme Over Encrypted Data. J. Internet Serv. Inf. Secur. 2(1/2): 49-58 (2012) - [j8]Jianfeng Wang, Hua Ma, Qiang Tang, Jin Li, Hui Zhu, Siqi Ma, Xiaofeng Chen:
A New Efficient Verifiable Fuzzy Keyword Search Scheme. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(4): 61-71 (2012) - [j7]Xiaofeng Chen, Jin Li, Willy Susilo:
Efficient Fair Conditional Payments for Outsourcing Computations. IEEE Trans. Inf. Forensics Secur. 7(6): 1687-1694 (2012) - [c28]Haibo Tian, Xiaofeng Chen, Jin Li:
A Short Non-delegatable Strong Designated Verifier Signature. ACISP 2012: 261-279 - [c27]Xiaofeng Chen, Jin Li, Jianfeng Ma, Qiang Tang, Wenjing Lou:
New Algorithms for Secure Outsourcing of Modular Exponentiations. ESORICS 2012: 541-556 - [c26]Jingwei Li, Chunfu Jia, Jin Li, Xiaofeng Chen:
Outsourcing Encryption of Attribute-Based Encryption with MapReduce. ICICS 2012: 191-201 - [c25]Jingwei Li, Chunfu Jia, Jin Li, Zheli Liu:
A Novel Framework for Outsourcing and Sharing Searchable Encrypted Data on Hybrid Cloud. INCoS 2012: 1-7 - [c24]Chong-zhi Gao, Dongqing Xie, Jin Li, Baodian Wei, Haibo Tian:
Deniably Information-Hiding Encryptions Secure against Adaptive Chosen Ciphertext Attack. INCoS 2012: 377-384 - [c23]Xu Ma, Jin Li, Fangguo Zhang:
Efficient and Secure Batch Exponentiations Outsourcing in Cloud Computing. INCoS 2012: 600-605 - [c22]Jingwei Li, Jin Li, Xiaofeng Chen, Chunfu Jia, Zheli Liu:
Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud. NSS 2012: 490-502 - [i8]Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Duncan S. Wong, Willy Susilo:
Secure Outsourced Attribute-Based Signatures. IACR Cryptol. ePrint Arch. 2012: 605 (2012) - 2011
- [j6]Jin Li, Qian Wang, Cong Wang, Kui Ren:
Enhancing Attribute-Based Encryption with Attribute Hierarchy. Mob. Networks Appl. 16(5): 553-561 (2011) - [j5]Xiaofeng Chen, Willy Susilo, Fangguo Zhang, Haibo Tian, Jin Li:
Identity-based trapdoor mercurial commitments and applications. Theor. Comput. Sci. 412(39): 5498-5512 (2011) - [j4]Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, Jin Li:
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing. IEEE Trans. Parallel Distributed Syst. 22(5): 847-859 (2011) - [c21]Jin Li, Qiong Huang, Xiaofeng Chen, Sherman S. M. Chow, Duncan S. Wong, Dongqing Xie:
Multi-authority ciphertext-policy attribute-based encryption with accountability. AsiaCCS 2011: 386-390 - 2010
- [j3]Jin Li, Kwangjo Kim:
Hidden attribute-based signatures without anonymity revocation. Inf. Sci. 180(9): 1681-1689 (2010) - [j2]Cong Wang, Kui Ren, Wenjing Lou, Jin Li:
Toward publicly auditable secure cloud data storage services. IEEE Netw. 24(4): 19-24 (2010) - [c20]Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Haibo Tian, Jin Li, Kwangjo Kim:
Identity-Based Chameleon Hash Scheme without Key Exposure. ACISP 2010: 200-215 - [c19]Jin Li, Man Ho Au, Willy Susilo, Dongqing Xie, Kui Ren:
Attribute-based signature and its applications. AsiaCCS 2010: 60-69 - [c18]Jin Li, Gansen Zhao, Xiaofeng Chen, Dongqing Xie, Chunming Rong, Wenjun Li, Lianzhang Tang, Yong Tang:
Fine-Grained Data Access Control Systems with User Accountability in Cloud Computing. CloudCom 2010: 89-96 - [c17]Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, Yong Tang:
Trusted Data Sharing over Untrusted Cloud Storage Providers. CloudCom 2010: 97-103 - [c16]Cong Wang, Ning Cao, Jin Li, Kui Ren, Wenjing Lou:
Secure Ranked Keyword Search over Encrypted Cloud Data. ICDCS 2010: 253-262 - [c15]Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, Wenjing Lou:
Fuzzy Keyword Search over Encrypted Data in Cloud Computing. INFOCOM 2010: 441-445
2000 – 2009
- 2009
- [c14]Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou:
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. ESORICS 2009: 355-370 - [c13]Jin Li, Kui Ren, Bo Zhu, Zhiguo Wan:
Privacy-Aware Attribute-Based Encryption with User Accountability. ISC 2009: 347-362 - [c12]Shucheng Yu, Kui Ren, Wenjing Lou, Jin Li:
Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems. SecureComm 2009: 311-329 - [i7]Jin Li, Kui Ren, Kwangjo Kim:
A2BE: Accountable Attribute-Based Encryption for Abuse Free Access Control. IACR Cryptol. ePrint Arch. 2009: 118 (2009) - [i6]Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou:
Enabling Public Verifiability and Data Dynamics for Storage Security. IACR Cryptol. ePrint Arch. 2009: 281 (2009) - [i5]Jin Li, Kui Ren, Bo Zhu, Zhiguo Wan:
Privacy-aware Attribute-based Encryption with User Accountability. IACR Cryptol. ePrint Arch. 2009: 284 (2009) - [i4]Jin Li, Qian Wang, Cong Wang, Kui Ren:
Enhancing Attribute-based Encryption with Attribute Hierarchy. IACR Cryptol. ePrint Arch. 2009: 293 (2009) - [i3]Shucheng Yu, Kui Ren, Wenjing Lou, Jin Li:
Defending Against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems. IACR Cryptol. ePrint Arch. 2009: 295 (2009) - [i2]Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, Wenjing Lou:
Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing. IACR Cryptol. ePrint Arch. 2009: 593 (2009) - 2008
- [j1]Qiong Huang, Duncan S. Wong, Jin Li, Yiming Zhao:
Generic Transformation from Weakly to Strongly Unforgeable Signatures. J. Comput. Sci. Technol. 23(2): 240-252 (2008) - [c11]Jin Li, Kwangjo Kim, Fangguo Zhang, Duncan S. Wong:
Generic Security-Amplifying Methods of Ordinary Digital Signatures. ACNS 2008: 224-241 - [i1]Jin Li, Kwangjo Kim:
Attribute-Based Ring Signatures. IACR Cryptol. ePrint Arch. 2008: 394 (2008) - 2007
- [c10]Jin Li, Tsz Hon Yuen, Kwangjo Kim:
Practical Threshold Signatures Without Random Oracles. ProvSec 2007: 198-207 - [c9]Jin Li, Kwangjo Kim, Fangguo Zhang, Xiaofeng Chen:
Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature. ProvSec 2007: 208-217 - 2006
- [c8]Jin Li, Xiaofeng Chen, Tsz Hon Yuen, Yanming Wang:
Proxy Ring Signature: Formal Definitions, Efficient Construction and New Variant. CIS 2006: 545-555 - [c7]Jin Li, Xiaofeng Chen, Fangguo Zhang, Yanming Wang:
Generalization of the Selective-ID Security Model for HIBS Protocols. CIS 2006: 894-902 - [c6]Jin Li, Yanming Wang:
Universal Designated Verifier Ring Signature (Proof) Without Random Oracles. EUC Workshops 2006: 332-341 - [c5]Jin Li, Fangguo Zhang, Yanming Wang:
A Strong Identity Based Key-Insulated Cryptosystem. EUC Workshops 2006: 352-361 - [c4]Jin Li, Fangguo Zhang, Yanming Wang:
A New Hierarchical ID-Based Cryptosystem and CCA-Secure PKE. EUC Workshops 2006: 362-371 - [c3]Jin Li, Yuen-Yan Chan, Yanming Wang:
A Generic Construction of Secure Signatures Without Random Oracles. ICCSA (3) 2006: 309-317 - [c2]Yuen-Yan Chan, Jin Li:
BGN Authentication and Its Extension to Convey Message Commitments. ICCSA (3) 2006: 365-374 - [c1]Yuen-Yan Chan, Sebastian Fleissner, Joseph K. Liu, Jin Li:
Single Sign-On and Key Establishment for Ubiquitous Smart Environments. ICCSA (4) 2006: 406-415
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-18 21:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint