Bingyu Li
Orcid: 0009-0006-6444-0453
According to our database1,
Bingyu Li
authored at least 46 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
J. Supercomput., October, 2024
RAR: Recombination and augmented replacement method for insertion-based lexically constrained text generation.
Neurocomputing, 2024
Comput. Stand. Interfaces, 2024
Quantum-inspired Interpretable Deep Learning Architecture for Text Sentiment Analysis.
CoRR, 2024
StitchFusion: Weaving Any Visual Modalities to Enhance Multimodal Semantic Segmentation.
CoRR, 2024
CoRR, 2024
Research on two-stage V2G optimal scheduling strategy for electric vehicles considering scheduling priority.
Proceedings of the 2024 International Conference on Power Electronics and Artificial Intelligence, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
CREST: Cross-modal Resonance through Evidential Deep Learning for Enhanced Zero-Shot Learning.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
2023
Covert channels in blockchain and blockchain based covert communication: Overview, state-of-the-art, and future directions.
Comput. Commun., May, 2023
An Improved Approach to Monitoring Wheat Stripe Rust with Sun-Induced Chlorophyll Fluorescence.
Remote. Sens., February, 2023
The Broken Verifying: Inspections at Verification Tools for Windows Code-Signing Signatures.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
TGCN-DA: A Temporal Graph Convolutional Network with Data Augmentation for High Accuracy Insider Threat Detection.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023
Proceedings of the Asia Conference on Artificial Intelligence, 2023
2022
The Invisible Side of Certificate Transparency: Exploring the Reliability of Monitors in the Wild.
IEEE/ACM Trans. Netw., 2022
Distributed Random Beacon for Blockchain Based on Share Recovery Threshold Signature.
Sensors, 2022
Remote Sensing Monitoring of Winter Wheat Stripe Rust Based on mRMR-XGBoost Algorithm.
Remote. Sens., 2022
Integrate the Canopy SIF and Its Derived Structural and Physiological Components for Wheat Stripe Rust Stress Monitoring.
Remote. Sens., 2022
PEPEC: Precomputed ECC Points Embedded in Certificates and Verified by CT Log Servers.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022
2021
Locally-Centralized Certificate Validation and its Application in Desktop Virtualization Systems.
IEEE Trans. Inf. Forensics Secur., 2021
Use of multidimensional item response theory methods for dementia prevalence prediction: an example using the Health and Retirement Survey and the Aging, Demographics, and Memory Study.
BMC Medical Informatics Decis. Mak., 2021
Proceedings of the VRST '21: 27th ACM Symposium on Virtual Reality Software and Technology, Virtual Event / Osaka, Japan, December 8, 2021
PoliCT: Flexible Policy in Certificate Transparency Enabling Lightweight Self-monitor.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021
2020
Proceedings of the Applied Cryptography and Network Security Workshops, 2020
Proceedings of the Applied Cryptography and Network Security Workshops, 2020
2019
The Weakest Link of Certificate Transparency: Exploring the TLS/HTTPS Configurations of Third-Party Monitors.
Proceedings of the 18th IEEE International Conference On Trust, 2019
An assistive low-vision platform that augments spatial cognition through proprioceptive guidance: Point-to-Tell-and-Touch.
Proceedings of the 2019 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
J. Syst. Sci. Complex., 2018
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the Rough Sets - International Joint Conference, 2018
PoS: Constructing Practical and Efficient Public Key Cryptosystems Based on Symmetric Cryptography with SGX.
Proceedings of the Information and Communications Security - 20th International Conference, 2018
2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
2013
Numerische Mathematik, 2013
2012
SPAD: Software Protection Through Anti-Debugging Using Hardware-Assisted Virtualization.
J. Inf. Sci. Eng., 2012
Digit. Investig., 2012
Proceedings of the ACM Symposium on Applied Computing, 2012
2011
Proceedings of the SNC 2011, 2011
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011
Proceedings of the APSys '11 Asia Pacific Workshop on Systems, 2011
2007
Signal Process., 2007