Lin Li

Orcid: 0000-0001-5232-6502

Affiliations:
  • Beijing Jiaotong University, School of Computer and Information Technology, Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing, China


According to our database1, Lin Li authored at least 25 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Towards Secure Runtime Customizable Trusted Execution Environment on FPGA-SoC.
IEEE Trans. Computers, April, 2024

Towards Trust Proof for Secure Confidential Virtual Machines.
CoRR, 2024

Efficient and Privacy-Preserving Federated Learning based on Full Homomorphic Encryption.
CoRR, 2024

2023
Availability and Reliability of Service Function Chain: A Quantitative Evaluation View.
Int. J. Comput. Intell. Syst., December, 2023

Exploring best-matched embedding model and classifier for charging-pile fault diagnosis.
Cybersecur., December, 2023

Towards Runtime Customizable Trusted Execution Environment on FPGA-SoC.
CoRR, 2023

CRS-FL: Conditional Random Sampling for Communication-Efficient and Privacy-Preserving Federated Learning.
CoRR, 2023

DIDs-Assisted Secure Cross-Metaverse Authentication Scheme for MEC-Enabled Metaverse.
Proceedings of the IEEE International Conference on Communications, 2023

2022
Dual Privacy-Preserving Lightweight Navigation System for Vehicular Networks.
IEEE Access, 2022

Self-Training Enabled Efficient Classification Algorithm: An Application to Charging Pile Risk Assessment.
IEEE Access, 2022

Metaverse-AKA: A Lightweight and PrivacyPreserving Seamless Cross-Metaverse Authentication and Key Agreement Scheme.
Proceedings of the IEEE Smartworld, 2022

2021
BOPE: Boundary Order-Preserving Encryption Scheme in Relational Database System.
IEEE Access, 2021

2019
BLA: Blockchain-Assisted Lightweight Anonymous Authentication for Distributed Vehicular Fog Services.
IEEE Internet Things J., 2019

Comparison analysis and efficient implementation of reconciliation-based RLWE key exchange protocol.
Int. J. High Perform. Comput. Netw., 2019

2018
Practical Randomized RLWE-Based Key Exchange Against Signal Leakage Attack.
IEEE Trans. Computers, 2018

Efficient Implementation of Password-based Authenticated Key Exchange from RLWE and Post-Quantum TLS.
Int. J. Netw. Secur., 2018

Survivability Modeling and Analysis of Cloud Service in Distributed Data Centers.
Comput. J., 2018

Delay-Aware Secure Computation Offloading Mechanism in a Fog-Cloud Framework.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

2017
Towards Robust Green Virtual Cloud Data Center Provisioning.
IEEE Trans. Cloud Comput., 2017

Post-Quantum Secure Remote Password Protocol from RLWE Problem.
IACR Cryptol. ePrint Arch., 2017

Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite.
Proceedings of the Information Security Practice and Experience, 2017

Plaintext-Dependent Selective Image Encryption Scheme Based on Chaotic Maps and DNA Coding.
Proceedings of the International Conference on Dependable Systems and Their Applications, 2017

2016
Resource-Aware Virtual Network Parallel Embedding Based on Genetic Algorithm.
Proceedings of the 17th International Conference on Parallel and Distributed Computing, 2016

Energy-Efficient Elliptic Curve Cryptography for MSP430-Based Wireless Sensor Nodes.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2013
Effective and efficient AI-based approaches to cloud resource provisioning.
Proceedings of the 19th IEEE International Conference on Networks, 2013


  Loading...