Hongtu Li
Orcid: 0000-0002-7771-0057
According to our database1,
Hongtu Li
authored at least 30 papers
between 2010 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
2023
HAT-GAE: Self-supervised graph autoencoders with hierarchical adaptive masking and trainable corruption.
Knowl. Based Syst., November, 2023
Knowl. Based Syst., 2023
2022
Efficient reversible data hiding scheme based on prediction-error expansion and optimal parameters dynamic selection.
J. Electronic Imaging, 2022
2021
Multim. Tools Appl., 2021
Biomed. Signal Process. Control., 2021
2020
A Review of Unsupervised Keyphrase Extraction Methods Using Within-Collection Resources.
Symmetry, 2020
A Reversible Steganography Method With Statistical Features Maintained Based on the Difference Value.
IEEE Access, 2020
A Reversible Data Hiding Algorithm Based on Prediction Error With Large Amounts of Data Hiding in Spatial Domain.
IEEE Access, 2020
2019
Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor Internet of Things.
Int. J. Distributed Sens. Networks, 2019
IEEE Access, 2019
2018
The maximum matching degree sifting algorithm for steganography pretreatment applied to IoT.
Multim. Tools Appl., 2018
2017
A secure and effective scheme providing comprehensive forward security to LTE/SAE X2 handover key management.
KSII Trans. Internet Inf. Syst., 2017
2016
Multim. Tools Appl., 2016
The efficiency improved scheme for secure access control of digital video distribution.
Multim. Tools Appl., 2016
2015
The Research and Prospect of Secure Data Access Control in Cloud Storage Environment.
J. Commun., 2015
J. Commun., 2015
2014
Analysis and Improvement of a Robust User Authentication Framework for Ubiquitous Sensor Networks.
Int. J. Distributed Sens. Networks, 2014
2013
Secure event signature protocol for peer-to-peer massive multiplayer online games using bilinear pairing.
Secur. Commun. Networks, 2013
J. Commun., 2013
2012
J. Softw., 2012
Cryptanalysis of Three Event Signature Protocols for Peer-to-peer Massively Multiplayer Online Games.
J. Networks, 2012
J. Comput., 2012
J. Comput., 2012
The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment.
KSII Trans. Internet Inf. Syst., 2012
2011
J. Networks, 2011
Cryptanalysis and Improvement of Selvi et al.'s Identity-Based Threshold Signcryption Scheme.
J. Networks, 2011
2010
Proceedings of the Fifth International Conference on Frontier of Computer Science and Technology, 2010