Bingyu Li

Orcid: 0009-0006-6444-0453

According to our database1, Bingyu Li authored at least 46 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Adaptive multi-object tracking algorithm based on split trajectory.
J. Supercomput., October, 2024

RAR: Recombination and augmented replacement method for insertion-based lexically constrained text generation.
Neurocomputing, 2024

Covert communication via blockchain: Hiding patterns and communication patterns.
Comput. Stand. Interfaces, 2024

Quantum-inspired Interpretable Deep Learning Architecture for Text Sentiment Analysis.
CoRR, 2024

StitchFusion: Weaving Any Visual Modalities to Enhance Multimodal Semantic Segmentation.
CoRR, 2024

U3M: Unbiased Multiscale Modal Fusion Model for Multimodal Semantic Segmentation.
CoRR, 2024

Research on two-stage V2G optimal scheduling strategy for electric vehicles considering scheduling priority.
Proceedings of the 2024 International Conference on Power Electronics and Artificial Intelligence, 2024

Certificate Transparency Revisited: The Public Inspections on Third-party Monitors.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

CREST: Cross-modal Resonance through Evidential Deep Learning for Enhanced Zero-Shot Learning.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

2023
Covert channels in blockchain and blockchain based covert communication: Overview, state-of-the-art, and future directions.
Comput. Commun., May, 2023

An Improved Approach to Monitoring Wheat Stripe Rust with Sun-Induced Chlorophyll Fluorescence.
Remote. Sens., February, 2023

The Broken Verifying: Inspections at Verification Tools for Windows Code-Signing Signatures.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

TGCN-DA: A Temporal Graph Convolutional Network with Data Augmentation for High Accuracy Insider Threat Detection.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Semi-CT: Certificates Transparent to Identity Owners but Opaque to Snoopers.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

IKE: Threshold Key Escrow Service with Intermediary Encryption.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

An Enhanced Moth-Flame Optimization Algorithm for UAVs 3D Path Planning.
Proceedings of the Asia Conference on Artificial Intelligence, 2023

2022
The Invisible Side of Certificate Transparency: Exploring the Reliability of Monitors in the Wild.
IEEE/ACM Trans. Netw., 2022

Distributed Random Beacon for Blockchain Based on Share Recovery Threshold Signature.
Sensors, 2022

Remote Sensing Monitoring of Winter Wheat Stripe Rust Based on mRMR-XGBoost Algorithm.
Remote. Sens., 2022

Integrate the Canopy SIF and Its Derived Structural and Physiological Components for Wheat Stripe Rust Stress Monitoring.
Remote. Sens., 2022

PEPEC: Precomputed ECC Points Embedded in Certificates and Verified by CT Log Servers.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022

2021
Locally-Centralized Certificate Validation and its Application in Desktop Virtualization Systems.
IEEE Trans. Inf. Forensics Secur., 2021

Use of multidimensional item response theory methods for dementia prevalence prediction: an example using the Health and Retirement Survey and the Aging, Demographics, and Memory Study.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
BMC Medical Informatics Decis. Mak., 2021

SpArc: A VR Animating Tool at Your Fingertips.
Proceedings of the VRST '21: 27th ACM Symposium on Virtual Reality Software and Technology, Virtual Event / Osaka, Japan, December 8, 2021

PoliCT: Flexible Policy in Certificate Transparency Enabling Lightweight Self-monitor.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021

2020
Applications and Developments of the Lattice Attack in Side Channel Attacks.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020

Exploring the Security of Certificate Transparency in the Wild.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020

2019
The Weakest Link of Certificate Transparency: Exploring the TLS/HTTPS Configurations of Third-Party Monitors.
Proceedings of the 18th IEEE International Conference On Trust, 2019

An assistive low-vision platform that augments spatial cognition through proprioceptive guidance: Point-to-Tell-and-Touch.
Proceedings of the 2019 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2019

Analyzing the Browser Security Warnings on HTTPS Errors.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Elaphurus: Ensemble Defense Against Fraudulent Certificates in TLS.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

Certificate Transparency in the Wild: Exploring the Reliability of Monitors.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Computing Sparse GCD of Multivariate Polynomials via Polynomial Interpolation.
J. Syst. Sci. Complex., 2018

Building Your Private Cloud Storage on Public Cloud Service Using Embedded GPUs.
Proceedings of the Security and Privacy in Communication Networks, 2018

Exploring GTRS Based Recommender Systems with Users of Different Rating Patterns.
Proceedings of the Rough Sets - International Joint Conference, 2018

PoS: Constructing Practical and Efficient Public Key Cryptosystems Based on Symmetric Cryptography with SGX.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

2017
SSUKey: A CPU-Based Solution Protecting Private Keys on Untrusted OS.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

High-Performance Symmetric Cryptography Server with GPU Acceleration.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2013
On the condition number of the total least squares problem.
Numerische Mathematik, 2013

2012
SPAD: Software Protection Through Anti-Debugging Using Hardware-Assisted Virtualization.
J. Inf. Sci. Eng., 2012

Vis: Virtualization enhanced live forensics acquisition for native system.
Digit. Investig., 2012

Hypervisor-based protection of sensitive files in a compromised system.
Proceedings of the ACM Symposium on Applied Computing, 2012

2011
A subresultant based subspace method for the computation of polynomial GCDs.
Proceedings of the SNC 2011, 2011

VASP: virtualization assisted security monitor for cross-platform protection.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Vis: virtualization enhanced live acquisition for native system.
Proceedings of the APSys '11 Asia Pacific Workshop on Systems, 2011

2007
A fast algorithm for solving the Sylvester structured total least squares problem.
Signal Process., 2007


  Loading...