Fengyin Li
Orcid: 0000-0002-5730-3315
According to our database1,
Fengyin Li
authored at least 61 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Correction: Efficient integer division computation protocols based on partial homomorphic encryption.
Clust. Comput., December, 2024
Efficient integer division computation protocols based on partial homomorphic encryption.
Clust. Comput., December, 2024
Privacy-preserving vertical federated broad learning system for artificial intelligence generated image content.
J. Real Time Image Process., February, 2024
A lattice-based efficient heterogeneous signcryption scheme for secure network communications.
J. High Speed Networks, 2024
2023
Transfer learning based cascaded deep learning network and mask recognition for COVID-19.
World Wide Web (WWW), September, 2023
Entropy, August, 2023
Entropy, August, 2023
Identity-based proxy blind signature scheme on lattice in high-speed network environment.
J. High Speed Networks, 2023
Int. J. Cloud Appl. Comput., 2023
Proceedings of the Artificial Intelligence Security and Privacy, 2023
Proceedings of the Artificial Intelligence Security and Privacy, 2023
Proceedings of the Artificial Intelligence Security and Privacy, 2023
2022
Int. J. Intell. Syst., December, 2022
J. Ambient Intell. Humaniz. Comput., 2022
J. Ambient Intell. Humaniz. Comput., 2022
Int. J. Intell. Syst., 2022
Intelligent federated learning on lattice-based efficient heterogeneous signcryption.
Int. J. Intell. Syst., 2022
Int. J. Intell. Syst., 2022
Trans. Emerg. Telecommun. Technol., 2022
Trans. Emerg. Telecommun. Technol., 2022
Tesia: A trusted efficient service evaluation model in Internet of things based on improved aggregation signature.
Concurr. Comput. Pract. Exp., 2022
Comput. Commun., 2022
Big Data Min. Anal., 2022
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022
2021
An Efficient Anonymous Communication Scheme to Protect the Privacy of the Source Node Location in the Internet of Things.
Secur. Commun. Networks, 2021
Int. J. Intell. Syst., 2021
EURASIP J. Wirel. Commun. Netw., 2021
EURASIP J. Wirel. Commun. Netw., 2021
Research on direct anonymous attestation mechanism in enterprise information management.
Enterp. Inf. Syst., 2021
Certificateless Proxy Authentication Scheme on Lattices Under the Background of Big Data.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021
A Secure Aggregation Routing Protocol with Authentication and Energy-Saving on Data Mining and Big Data.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021
An Anonymous Communication Scheme Between Nodes Based on Pseudonym and Bilinear Pairing in Big Data Environments.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021
A Group Blind Signature Scheme for Privacy Protection of Power Big Data in Smart Grid.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021
Proceedings of the Blockchain and Trustworthy Systems - Third International Conference, 2021
2020
Wireless Communications and Mobile Computing Blockchain-Based Trust Management in Distributed Internet of Things.
Wirel. Commun. Mob. Comput., 2020
FarpScusn: Fully Anonymous Routing Protocol with Self-Healing Capability in Unstable Sensor Networks.
Sensors, 2020
Belief and fairness: A secure two-party protocol toward the view of entropy for IoT devices.
J. Netw. Comput. Appl., 2020
IEEE Access, 2020
A Trajectory-Privacy Protection Method Based on Location Similarity of Query Destinations in Continuous LBS Queries.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020
2019
Inf. Sci., 2019
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
2017
Proceedings of the 2017 International Conference on Identification, 2017
Proceedings of the 2017 International Conference on Identification, 2017
2016
Int. J. Comput. Sci. Math., 2016
2015
2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007