Zengpeng Li
Orcid: 0000-0003-0758-7230
According to our database1,
Zengpeng Li
authored at least 53 papers
between 2016 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Cold-Start-Aware Cloud-Native Parallel Service Function Chain Caching in Edge-Cloud Network.
IEEE Internet Things J., June, 2024
Energy-efficient reliability-aware offloading for delay-sensitive tasks in collaborative edge computing.
Concurr. Comput. Pract. Exp., June, 2024
Energy-efficient offloading for DNN-based applications in edge-cloud computing: A hybrid chaotic evolutionary approach.
J. Parallel Distributed Comput., May, 2024
Elastic Task Offloading and Resource Allocation Over Hybrid Cloud: A Reinforcement Learning Approach.
IEEE Trans. Netw. Serv. Manag., April, 2024
Adaptive edge service deployment in burst load scenarios using deep reinforcement learning.
J. Supercomput., March, 2024
IEEE Internet Things J., March, 2024
Controlled Search: Building Inverted-Index PEKS With Less Leakage in Multiuser Setting.
IEEE Internet Things J., January, 2024
Handling hierarchy in cloud data centers: A Hyper-Heuristic approach for resource contention and energy-aware Virtual Machine management.
Expert Syst. Appl., 2024
2023
Sustainable and Round-Optimized Group Authenticated Key Exchange in Vehicle Communication.
IEEE Trans. Intell. Transp. Syst., December, 2023
Retrieval Transformation: Dynamic Searchable Symmetric Encryption With Strong Security.
IEEE Syst. J., December, 2023
Cost-efficient security-aware scheduling for dependent tasks with endpoint contention in edge computing.
Comput. Commun., November, 2023
Cost-Efficient Fault-Tolerant Workflow Scheduling for Deadline-Constrained Microservice-Based Applications in Clouds.
IEEE Trans. Netw. Serv. Manag., September, 2023
An Energy-Efficient Dynamic Scheduling Method of Deadline-Constrained Workflows in a Cloud Environment.
IEEE Trans. Netw. Serv. Manag., September, 2023
J. Supercomput., May, 2023
Algorithms, January, 2023
QR-PUF: Design and Implementation of a RFID-Based Secure Inpatient Management System Using XOR-Arbiter-PUF and QR-Code.
IEEE Trans. Netw. Sci. Eng., 2023
BBB-Voting: Self-Tallying End-to-End Verifiable 1-out-of-k Blockchain-Based Boardroom Voting.
Proceedings of the IEEE International Conference on Blockchain, 2023
2022
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
PANDA: Lightweight non-interactive privacy-preserving data aggregation for constrained devices.
Future Gener. Comput. Syst., 2022
Distributed Ledger Technol. Res. Pract., 2022
Concurr. Comput. Pract. Exp., 2022
Cold-start aware cloud-native service function chain caching in resource-constrained edge: A reinforcement learning approach.
Comput. Commun., 2022
2021
IEEE Trans. Veh. Technol., 2021
Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification.
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Big Data, 2021
Building Low-Interactivity Multifactor Authenticated Key Exchange for Industrial Internet of Things.
IEEE Internet Things J., 2021
CoRR, 2021
Sci. China Inf. Sci., 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
Revisiting post-quantum hash proof systems over lattices for Internet of Thing authentications.
J. Ambient Intell. Humaniz. Comput., 2020
IEEE Consumer Electron. Mag., 2020
IEEE Access, 2020
2018
Wirel. Commun. Mob. Comput., 2018
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
2017
Toward single-server private information retrieval protocol via learning with errors.
J. Inf. Secur. Appl., 2017
Towards Multi-Hop Homomorphic Identity-Based Proxy Re-Encryption via Branching Program.
IEEE Access, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
An Uncertain Continuous Collaborative Users Finding Algorithm for Location Privacy Protection.
Proceedings of the 20th ACM International Conference on Modelling, 2017
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
2016
Preventing Adaptive Key Recovery Attacks on the Gentry-Sahai-Waters Leveled Homomorphic Encryption Scheme.
IACR Cryptol. ePrint Arch., 2016
Preventing Adaptive Key Recovery Attacks on the GSW Levelled Homomorphic Encryption Scheme.
Proceedings of the Provable Security, 2016
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016