Jing Li

Orcid: 0000-0002-0288-7296

Affiliations:
  • Guangzhou University, School of Computer Science, China
  • Beijing University of Posts and Telecommunications, State Key Laboratory of Networking and Switching Technology, China (former)


According to our database1, Jing Li authored at least 30 papers between 2014 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
OR-AutoRec: An Outlier-Resilient Autoencoder-based Recommendation model.
Proceedings of the IEEE Smartworld, 2022

2021
Oblivious Transfer for Privacy-Preserving in VANET's Feature Matching.
IEEE Trans. Intell. Transp. Syst., 2021

2019
The security of machine learning in an adversarial setting: A survey.
J. Parallel Distributed Comput., 2019

Multi-level multi-secret sharing scheme for decentralized e-voting in cloud computing.
J. Parallel Distributed Comput., 2019

Cryptographic primitives in blockchains.
J. Netw. Comput. Appl., 2019

A trust-based collaborative filtering algorithm for E-commerce recommendation system.
J. Ambient Intell. Humaniz. Comput., 2019

Multilevel similarity model for high-resolution remote sensing image registration.
Inf. Sci., 2019

Compressive Sensing of Medical Images With Confidentially Homomorphic Aggregations.
IEEE Internet Things J., 2019

Improved collusion-resisting secure nearest neighbor query over encrypted data in cloud.
Concurr. Comput. Pract. Exp., 2019

Verifiable Chebyshev maps-based chaotic encryption schemes with outsourcing computations in the cloud/fog scenarios.
Concurr. Comput. Pract. Exp., 2019

2018
Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption.
Soft Comput., 2018

An Efficient Construction of Quantum Attack Resistant Proxy Re-Encryption Based on (Semi)group Factorization Problems.
Fundam. Informaticae, 2018

Star-Topological Encryption: Talking to the Sever but Hiding Identities to Others.
Fundam. Informaticae, 2018

Primitives towards verifiable computation: a survey.
Frontiers Comput. Sci., 2018

Position Paper on Recent Cybersecurity Trends: Legal Issues, AI and IoT.
Proceedings of the Network and System Security - 12th International Conference, 2018

2017
Noiseless Fully Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2017

Pre-image sample algorithm with irregular Gaussian distribution and construction of identity-based signature.
Concurr. Comput. Pract. Exp., 2017

2016
Challenges of Fully Homomorphic Encryptions for the Internet of Things.
IEICE Trans. Inf. Syst., 2016

Construction of DNA codes by using algebraic number theory.
Finite Fields Their Appl., 2016

Novel Criteria for Deterministic Remote State Preparation via the Entangled Six-Qubit State.
Entropy, 2016

Quantum network coding for multi-unicast problem based on 2D and 3D cluster states.
Sci. China Inf. Sci., 2016

An Efficient Proxy Re-Encryption Based on (Semi) Group Factorization Problems.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

A Star-Topological Privacy Encryption for Telecare Medical Information Systems.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

Novel Constructions of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Oblivious Transfer Protocols Based on Group Factoring Problem.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

2015
Network coding for quantum cooperative multicast.
Quantum Inf. Process., 2015

Perfect Quantum Network Coding Independent of Classical Network Solutions.
IEEE Commun. Lett., 2015

Noise-free Symmetric Fully Homomorphic Encryption based on noncommutative rings.
IACR Cryptol. ePrint Arch., 2015

Minimal Logarithmic Signatures for Sporadic Groups.
CoRR, 2015

2014
A (k, t, n) Verifiable Multi-secret Sharing Scheme Based on Adversary Structure.
KSII Trans. Internet Inf. Syst., 2014


  Loading...