


default search action
Jing Li 0045
- > Home > Persons > Jing Li 0045
Publications
- 2025
- [j22]Di Wu
, Yuanpeng Hu, Kechen Liu, Jing Li, Xianmin Wang
, Song Deng, Nenggan Zheng
, Xin Luo
:
An Outlier-Resilient Autoencoder for Representing High-Dimensional and Incomplete Data. IEEE Trans. Emerg. Top. Comput. Intell. 9(2): 1379-1391 (2025) - 2022
- [c6]Yuanpeng Hu, Xianmin Wang, Cheng Liang, Jing Li, Di Wu, Yi He:
OR-AutoRec: An Outlier-Resilient Autoencoder-based Recommendation model. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 1918-1923 - 2021
- [j21]Xianmin Wang
, Xiaohui Kuang, Jin Li
, Jing Li
, Xiaofeng Chen
, Zheli Liu
:
Oblivious Transfer for Privacy-Preserving in VANET's Feature Matching. IEEE Trans. Intell. Transp. Syst. 22(7): 4359-4366 (2021) - 2019
- [j20]Youwen Zhu
, Yue Zhang, Xingxin Li, Hongyang Yan, Jing Li
:
Improved collusion-resisting secure nearest neighbor query over encrypted data in cloud. Concurr. Comput. Pract. Exp. 31(21) (2019) - [j19]Jing Li
, Licheng Wang, Lihua Wang, Xianmin Wang
, Zhengan Huang, Jin Li:
Verifiable Chebyshev maps-based chaotic encryption schemes with outsourcing computations in the cloud/fog scenarios. Concurr. Comput. Pract. Exp. 31(22) (2019) - [j18]Licheng Wang
, Lixiang Li
, Jin Li
, Jing Li
, Brij B. Gupta
, Xia Liu:
Compressive Sensing of Medical Images With Confidentially Homomorphic Aggregations. IEEE Internet Things J. 6(2): 1402-1409 (2019) - [j17]Xianmin Wang
, Jing Li, Jin Li
, Hongyang Yan:
Multilevel similarity model for high-resolution remote sensing image registration. Inf. Sci. 505: 294-305 (2019) - [j16]Liaoliang Jiang, Yuting Cheng, Li Yang, Jing Li, Hongyang Yan, Xiaoqin Wang:
A trust-based collaborative filtering algorithm for E-commerce recommendation system. J. Ambient Intell. Humaniz. Comput. 10(8): 3023-3034 (2019) - [j15]Licheng Wang, Xiaoying Shen, Jing Li, Jun Shao, Yixian Yang:
Cryptographic primitives in blockchains. J. Netw. Comput. Appl. 127: 43-58 (2019) - [j14]Xianmin Wang
, Jing Li, Xiaohui Kuang, Yu-an Tan, Jin Li:
The security of machine learning in an adversarial setting: A survey. J. Parallel Distributed Comput. 130: 12-23 (2019) - [j13]Jing Li
, Xianmin Wang
, Zhengan Huang, Licheng Wang, Yang Xiang:
Multi-level multi-secret sharing scheme for decentralized e-voting in cloud computing. J. Parallel Distributed Comput. 130: 91-97 (2019) - 2018
- [j12]Haseeb Ahmad, Licheng Wang, Haibo Hong, Jing Li, Hassan Dawood, Manzoor Ahmed, Yixian Yang:
Primitives towards verifiable computation: a survey. Frontiers Comput. Sci. 12(3): 451-478 (2018) - [j11]Jing Li, Licheng Wang, Xinxin Niu, Lize Gu, Zhiguo Qu:
Star-Topological Encryption: Talking to the Sever but Hiding Identities to Others. Fundam. Informaticae 157(1-2): 29-46 (2018) - [j10]Licheng Wang, Jing Li, Lize Gu, Jianhua Yan, Zhiguo Qu:
An Efficient Construction of Quantum Attack Resistant Proxy Re-Encryption Based on (Semi)group Factorization Problems. Fundam. Informaticae 157(1-2): 47-62 (2018) - [j9]Jing Li, Xiong Li
, Licheng Wang, Debiao He, Haseeb Ahmad, Xinxin Niu:
Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption. Soft Comput. 22(3): 707-714 (2018) - [c5]Junbin Fang, Yun-Ju Huang, Frankie Li, Jing Li, Xuan Wang, Yang Xiang
:
Position Paper on Recent Cybersecurity Trends: Legal Issues, AI and IoT. NSS 2018: 484-490 - 2017
- [j8]Jianhua Yan, Licheng Wang, Jing Li, Muzi Li, Yixan Yang, Wenbin Yao:
Pre-image sample algorithm with irregular Gaussian distribution and construction of identity-based signature. Concurr. Comput. Pract. Exp. 29(20) (2017) - [i3]Jing Li, Licheng Wang:
Noiseless Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2017: 839 (2017) - 2016
- [j7]Jing Li, Xiubo Chen, Xingming Sun, Zongpeng Li, Yixian Yang:
Quantum network coding for multi-unicast problem based on 2D and 3D cluster states. Sci. China Inf. Sci. 59(4): 042301:1-042301:15 (2016) - [j6]Gang Xu, Xiu-Bo Chen, Zhao Dou, Jing Li, Xin Liu, Zongpeng Li:
Novel Criteria for Deterministic Remote State Preparation via the Entangled Six-Qubit State. Entropy 18(7): 267 (2016) - [j5]Haibo Hong
, Licheng Wang, Haseeb Ahmad, Jing Li, Yixian Yang, Changzhong Wu:
Construction of DNA codes by using algebraic number theory. Finite Fields Their Appl. 37: 328-343 (2016) - [j4]Licheng Wang, Jing Li, Haseeb Ahmad:
Challenges of Fully Homomorphic Encryptions for the Internet of Things. IEICE Trans. Inf. Syst. 99-D(8): 1982-1990 (2016) - [c4]Jing Li, Xiong Li
, Licheng Wang, Debiao He, Xinxin Niu:
Oblivious Transfer Protocols Based on Group Factoring Problem. BWCCA 2016: 885-892 - [c3]Jing Li, Licheng Wang, Zonghua Zhang, Xinxin Niu:
Novel Constructions of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family. AsiaCCS 2016: 895-900 - [c2]Licheng Wang, Jing Li, Jianhua Yan, Zhiguo Qu:
An Efficient Proxy Re-Encryption Based on (Semi) Group Factorization Problems. INCoS 2016: 199-202 - [c1]Jing Li, Licheng Wang, Xinxin Niu:
A Star-Topological Privacy Encryption for Telecare Medical Information Systems. INCoS 2016: 311-317 - 2015
- [j3]Jing Li, Xiu-Bo Chen, Gang Xu, Yixian Yang, Zongpeng Li:
Perfect Quantum Network Coding Independent of Classical Network Solutions. IEEE Commun. Lett. 19(2): 115-118 (2015) - [j2]Gang Xu, Xiu-Bo Chen, Jing Li, Cong Wang, Yi-Xian Yang, Zongpeng Li:
Network coding for quantum cooperative multicast. Quantum Inf. Process. 14(11): 4297-4322 (2015) - [i2]Haibo Hong, Licheng Wang, Haseeb Ahmad, Jing Li, Yixian Yang:
Minimal Logarithmic Signatures for Sporadic Groups. CoRR abs/1507.01162 (2015) - [i1]Jing Li, Licheng Wang:
Noise-free Symmetric Fully Homomorphic Encryption based on noncommutative rings. IACR Cryptol. ePrint Arch. 2015: 641 (2015) - 2014
- [j1]Jing Li, Licheng Wang, Jianhua Yan, Xinxin Niu, Yixian Yang:
A (k, t, n) Verifiable Multi-secret Sharing Scheme Based on Adversary Structure. KSII Trans. Internet Inf. Syst. 8(12): 4552-4567 (2014)

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-09 20:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint
