Hongtu Li

Orcid: 0000-0002-7771-0057

According to our database1, Hongtu Li authored at least 30 papers between 2010 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Federated edge learning for medical image augmentation.
Appl. Intell., January, 2025

2023
HAT-GAE: Self-supervised graph autoencoders with hierarchical adaptive masking and trainable corruption.
Knowl. Based Syst., November, 2023

Towards unsupervised keyphrase extraction via an autoregressive approach.
Knowl. Based Syst., 2023

2022
Efficient reversible data hiding scheme based on prediction-error expansion and optimal parameters dynamic selection.
J. Electronic Imaging, 2022

2021
Comparative assessment of PEE methods and new performance measurement for RDH.
Multim. Tools Appl., 2021

TripleRank: An unsupervised keyphrase extraction algorithm.
Knowl. Based Syst., 2021

A classification system of day 3 human embryos using deep learning.
Biomed. Signal Process. Control., 2021

2020
A Review of Unsupervised Keyphrase Extraction Methods Using Within-Collection Resources.
Symmetry, 2020

A Reversible Steganography Method With Statistical Features Maintained Based on the Difference Value.
IEEE Access, 2020

A Reversible Data Hiding Algorithm Based on Prediction Error With Large Amounts of Data Hiding in Spatial Domain.
IEEE Access, 2020

2019
Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor Internet of Things.
Int. J. Distributed Sens. Networks, 2019

An Unsupervised Approach for Keyphrase Extraction Using Within-Collection Resources.
IEEE Access, 2019

2018
The maximum matching degree sifting algorithm for steganography pretreatment applied to IoT.
Multim. Tools Appl., 2018

Q-FDBA: improving QoE fairness for video streaming.
Multim. Tools Appl., 2018

2017
A secure and effective scheme providing comprehensive forward security to LTE/SAE X2 handover key management.
KSII Trans. Internet Inf. Syst., 2017

2016
Boosting scene understanding by hierarchical pachinko allocation.
Multim. Tools Appl., 2016

The efficiency improved scheme for secure access control of digital video distribution.
Multim. Tools Appl., 2016

2015
The Research and Prospect of Secure Data Access Control in Cloud Storage Environment.
J. Commun., 2015

The Research and Outlook for Keyword-Based Searchable Encryption in Cloud Storage.
J. Commun., 2015

2014
Analysis and Improvement of a Robust User Authentication Framework for Ubiquitous Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

2013
Secure event signature protocol for peer-to-peer massive multiplayer online games using bilinear pairing.
Secur. Commun. Networks, 2013

A Survey on Key Management of Identity-based Schemes in Mobile Ad Hoc Networks.
J. Commun., 2013

2012
An Improved Dynamic Password based Group Key Agreement against Dictionary Attack.
J. Softw., 2012

Cryptanalysis of Three Event Signature Protocols for Peer-to-peer Massively Multiplayer Online Games.
J. Networks, 2012

Cryptanalysis and Improvement of an ID-Based Threshold Signcryption Scheme.
J. Comput., 2012

Analysis and Enhancement of Three Identity-based Signcryption Protocols.
J. Comput., 2012

The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment.
KSII Trans. Internet Inf. Syst., 2012

2011
Enhancement of an Authenticated 3-round Identity-Based Group Key Agreement Protocol.
J. Networks, 2011

Cryptanalysis and Improvement of Selvi et al.'s Identity-Based Threshold Signcryption Scheme.
J. Networks, 2011

2010
Registration and Private Key Distribution Protocol Based on IBE.
Proceedings of the Fifth International Conference on Frontier of Computer Science and Technology, 2010


  Loading...