Jiangtao Li

Orcid: 0000-0002-9754-0008

Affiliations:
  • Purple Mountain Laboratories, Nanjing, China
  • Shanghai University, School of Computer Engineering and Science, China
  • Nanyang Technological University, School of Computer Science and Engineering, Singapore
  • East China Normal University, School of Computer Science and Software Engineering, Shanghai Key Laboratory of Trustworthy Computing, China (PhD 2018)


According to our database1, Jiangtao Li authored at least 29 papers between 2014 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Quantitative risk assessment for connected automated Vehicles: Integrating improved STPA-SafeSec and Bayesian network.
Reliab. Eng. Syst. Saf., 2025

2024
Metadata-Private Resource Allocation in Edge Computing Withstands Semi-Malicious Edge Nodes.
Sensors, May, 2024

In-Vehicle Digital Forensics for Connected and Automated Vehicles With Public Auditing.
IEEE Internet Things J., February, 2024

Hardware Secure Module Based Lightweight Conditional Privacy-Preserving Authentication for VANETs.
IEEE Trans. Inf. Forensics Secur., 2024

Message Linkable Group Signature With Information Binding and Efficient Revocation for Privacy- Preserving Announcement in VANETs.
IEEE Trans. Dependable Secur. Comput., 2024

Registered Functional Encryptions from Pairings.
IACR Cryptol. ePrint Arch., 2024

A hybrid approach for Android malware detection using improved multi-scale convolutional neural networks and residual networks.
Expert Syst. Appl., 2024

2023
Bit scanner: Anomaly detection for in-vehicle CAN bus using binary sequence whitelisting.
Comput. Secur., November, 2023

Light can be Dangerous: Stealthy and Effective Physical-world Adversarial Attack by Spot Light.
Comput. Secur., September, 2023

Communication-Traffic-Assisted Mining and Exploitation of Buffer Overflow Vulnerabilities in ADASs.
Future Internet, May, 2023

Fooling Object Detectors in the Physical World with Natural Adversarial Camouflage.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

EAVA: Adaptive and Fast Edge-assisted Video Analytics On Mobile Device.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

WiDual: User Identified Gesture Recognition Using Commercial WiFi.
Proceedings of the 23rd IEEE/ACM International Symposium on Cluster, 2023

2022
Cryptographic Solutions for Cloud Storage: Challenges and Research Opportunities.
IEEE Trans. Serv. Comput., 2022

QoS-Aware Joint Task Scheduling and Resource Allocation in Vehicular Edge Computing.
Sensors, 2022

Conditional Anonymous Authentication With Abuse-Resistant Tracing and Distributed Trust for Internet of Vehicles.
IEEE Internet Things J., 2022

A Reusable Convolutional Accelerator for CNN on Resource-limited FPGA.
Proceedings of the IEEE Smartworld, 2022

Towards Fast and Energy-Efficient Offloading for Vehicular Edge Computing.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022

2021
Privacy protection scheme for edge computing based on function encryption.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

Neural Adaptive IoT Streaming Analytics with RL-Adapt.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

2019
Blockchain based secure data sharing system for Internet of vehicles: A position paper.
Veh. Commun., 2019

Group Signatures with Decentralized Tracing.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

2018
Secure intelligent traffic light control using fog computing.
Future Gener. Comput. Syst., 2018

Enabling Robust and Privacy-Preserving Resource Allocation in Fog Computing.
IEEE Access, 2018

Improved Anonymous Broadcast Encryptions - Tight Security and Shorter Ciphertext.
Proceedings of the Applied Cryptography and Network Security, 2018

2017
Sender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocol.
Inf. Sci., 2017

Certificateless and identity-based authenticated asymmetric group key agreement.
Int. J. Inf. Sec., 2017

2016
Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud.
IEEE Trans. Inf. Forensics Secur., 2016

2014
Security Enhanced Anonymous Remote User Authentication and Key Agreement for Cloud Computing.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014


  Loading...