Lixiang Li

Orcid: 0000-0001-9949-8731

Affiliations:
  • Beijing University of Posts and Telecommunications, State Key Laboratory of Networking and Switching Technology, China


According to our database1, Lixiang Li authored at least 174 papers between 2006 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
An optimal bound for factoring unbalanced RSA moduli by solving Generalized Implicit Factorization Problem.
J. Supercomput., January, 2025

2024
MVC-RSN: A Malware Classification Method With Variant Identification Ability.
IEEE Internet Things J., November, 2024

An Efficient Image Privacy Preservation Scheme for Smart City Applications Using Compressive Sensing and Multi-Level Encryption.
IEEE Trans. Intell. Transp. Syst., October, 2024

A novel efficient S-box design algorithm based on a new chaotic map and permutation.
Multim. Tools Appl., July, 2024

A Novel Memristors Based Echo State Network Model Inspired by the Brain's Uni-hemispheric Slow-Wave Sleep Characteristics.
Cogn. Comput., July, 2024

A Survey of Security Protection Methods for Deep Learning Model.
IEEE Trans. Artif. Intell., April, 2024

Flexible Visually Meaningful Image Transmission Scheme in WSNs Using Fourier Optical Speckle-Based Compressive Sensing.
IEEE Internet Things J., April, 2024

A Key Escrow-Free KP-ABE Scheme and Its Application in Standalone Authentication in IoT.
IEEE Internet Things J., April, 2024

Graph Attention Network and Informer for Multivariate Time Series Anomaly Detection.
Sensors, March, 2024

Controlled node dialogue in IoT networks based on nonlocal orthogonal product states.
J. Opt. Commun. Netw., March, 2024

Multilevel Privacy Protection for Social Media Based on 2-D Compressive Sensing.
IEEE Internet Things J., February, 2024

Lightweight Voice Spoofing Detection Using Improved One-Class Learning and Knowledge Distillation.
IEEE Trans. Multim., 2024

Sequence prediction with different dimensions based on two novel deep echo state network models.
Trans. Inst. Meas. Control, 2024

A multi-level privacy-preserving scheme for extracting traffic images.
Signal Process., 2024

High-capacity medical information hiding scheme with P-tensor product secret image sharing for wireless body area networks.
Digit. Signal Process., 2024

Fishers Harvest Parallel Unlearning in Inherited Model Networks.
CoRR, 2024

Decentralized Federated Unlearning on Blockchain.
CoRR, 2024

Designing incoherent unit norm tight frames via block coordinate descent-based alternating projection.
Appl. Math. Comput., 2024

Unsupervised Microservice Log Anomaly Detection Method Based on Graph Neural Network.
Proceedings of the Advances in Swarm Intelligence, 2024

2023
An Improved Fixed-Time Stability Theorem and its Application to the Synchronization of Stochastic Impulsive Neural Networks.
Neural Process. Lett., December, 2023

A voice spoofing detection framework for IoT systems with feature pyramid and online knowledge distillation.
J. Syst. Archit., October, 2023

A controllable delegation scheme for the subscription to multimedia platforms.
Inf. Sci., September, 2023

A novel time series prediction method based on pooling compressed sensing echo state network and its application in stock market.
Neural Networks, July, 2023

A secure and effective image encryption scheme by combining parallel compressed sensing with secret sharing scheme.
J. Inf. Secur. Appl., June, 2023

Incorporating retrieval-based method for feature enhanced image captioning.
Appl. Intell., April, 2023

An enhanced traceable CP-ABE scheme against various types of privilege leakage in cloud storage.
J. Syst. Archit., March, 2023

Novel Secure Data Transmission Methods for IoT Based on STP-CS With Multilevel Critical Information Concealment Function.
IEEE Internet Things J., March, 2023

A Chaotic Compressed Sensing-Based Multigroup Secret Image Sharing Method for IoT With Critical Information Concealment Function.
IEEE Internet Things J., January, 2023

Honeywords Generation Mechanism Based on Zero-Divisor Graph Sequences.
IEEE Trans. Serv. Comput., 2023

One-Class Adversarial Fraud Detection Nets With Class Specific Representations.
IEEE Trans. Netw. Sci. Eng., 2023

Generalized Voice Spoofing Detection via Integral Knowledge Amalgamation.
IEEE ACM Trans. Audio Speech Lang. Process., 2023

Coherence-penalty minimization method for incoherent unit-norm tight frame design.
Signal Process., 2023

Intrusion Detection Method Based on Complementary Adversarial Generation Network.
Proceedings of the Advances in Swarm Intelligence - 14th International Conference, 2023

Improved One-class Learning for Voice Spoofing Detection.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023

2022
Fixed/Predefined-time synchronization of memristor-based complex-valued BAM neural networks for image protection.
Frontiers Neurorobotics, September, 2022

Privacy-Preserving Subgraph Matching Scheme With Authentication in Social Networks.
IEEE Trans. Cloud Comput., 2022

Predefined-Time Synchronization of Stochastic Memristor-Based Bidirectional Associative Memory Neural Networks With Time-Varying Delays.
IEEE Trans. Cogn. Dev. Syst., 2022

Progressive coherence and spectral norm minimization scheme for measurement matrices in compressed sensing.
Signal Process., 2022

A Chaotic Compressive Sensing Based Data Transmission Method for Sensors within BBNs.
Sensors, 2022

Construction of Structured Random Measurement Matrices in Semi-Tensor Product Compressed Sensing Based on Combinatorial Designs.
Sensors, 2022

A new predefined-time stability theorem and its application in the synchronization of memristive complex-valued BAM neural networks.
Neural Networks, 2022

An efficient secure data transmission and node authentication scheme for wireless sensing networks.
J. Syst. Archit., 2022

Security Analysis of DBTRU Cryptosystem.
Entropy, 2022

Aligned visual semantic scene graph for image captioning.
Displays, 2022

Lattice-based public-key encryption with conjunctive keyword search in multi-user setting for IIoT.
Clust. Comput., 2022

Flexible construction of measurement matrices in compressed sensing based on extensions of incidence matrices of combinatorial designs.
Appl. Math. Comput., 2022

A Novel Intelligent Ant Colony System Based on Blockchain.
Proceedings of the Advances in Swarm Intelligence - 13th International Conference, 2022

CSHEM - A Compressed Sensing Based Secure Data Processing Method for Electrical Data.
Proceedings of the Data Mining and Big Data - 7th International Conference, 2022

2021
Deterministic Constructions of Compressed Sensing Matrices From Unitary Geometry.
IEEE Trans. Inf. Theory, 2021

Privacy-Preserving Multidimensional Data Aggregation Scheme Without Trusted Authority in Smart Grid.
IEEE Syst. J., 2021

Flexible construction of compressed sensing matrices with low storage space and low coherence.
Signal Process., 2021

How does rumor spreading affect people inside and outside an institution.
Inf. Sci., 2021

Privacy-Preserving Verifiable Graph Intersection Scheme With Cryptographic Accumulators in Social Networks.
IEEE Internet Things J., 2021

Chaotic Deep Network for Mobile D2D Communication.
IEEE Internet Things J., 2021

Impact of Sudden Global Events on Cross-Field Research Cooperation.
Inf., 2021

Predefined-Time Stability/Synchronization of Coupled Memristive Neural Networks With Multi-Links and Application in Secure Communication.
Frontiers Neurorobotics, 2021

Achieving flatness: Graph labeling can generate graphical honeywords.
Comput. Secur., 2021

ResNet Approach for Coding Unit Fast Splitting Decision of HEVC Intra Coding.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

High Efficient and Secure Chaos-Based Compressed Spectrum Sensing in Cognitive Radio IoT Network.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

2020
Efficient and Secure Image Communication System Based on Compressed Sensing for IoT Monitoring Applications.
IEEE Trans. Multim., 2020

Low Energy Consumption Compressed Spectrum Sensing Based on Channel Energy Reconstruction in Cognitive Radio Network.
Sensors, 2020

Secure and Efficient Image Compression-Encryption Scheme Using New Chaotic Structure and Compressive Sensing.
Secur. Commun. Networks, 2020

Space-Efficient Key-Policy Attribute-Based Encryption from Lattices and Two-Dimensional Attributes.
Secur. Commun. Networks, 2020

A new fixed-time stability theorem and its application to the fixed-time synchronization of neural networks.
Neural Networks, 2020

Secure and Traceable Image Transmission Scheme Based on Semitensor Product Compressed Sensing in Telemedicine System.
IEEE Internet Things J., 2020

Fixed-time synchronization of fractional order memristive MAM neural networks by sliding mode control.
Neurocomputing, 2020

New Constructions of Identity-Based Dual Receiver Encryption from Lattices.
Entropy, 2020

Propagation analysis and prediction of the COVID-19.
CoRR, 2020

An effective algorithm for the spark of sparse binary measurement matrices.
Appl. Math. Comput., 2020

Finite-Time Synchronization of Multi-Linked Memristor-Based Neural Networks With Mixed Time-Varying Delays.
IEEE Access, 2020

Intermittent Pinning Synchronization of Memristor-Based Switching Networks With Multi-Links and Mixed Delays.
IEEE Access, 2020

Finite-Time Lag Synchronization of Memristive Neural Networks With Multi-Links via Adaptive Control.
IEEE Access, 2020

A Review of Face Recognition Technology.
IEEE Access, 2020

An Improved Consensus Mechanism for the Blockchain Based on Credit Rewards and Punishments.
Proceedings of the ICBCT'20: The 2nd International Conference on Blockchain Technology, 2020

2019
Anonymous three-factor authenticated key agreement for wireless sensor networks.
Wirel. Networks, 2019

Robust Privacy-Preserving Mutual Authenticated Key Agreement Scheme in Roaming Service for Global Mobility Networks.
IEEE Syst. J., 2019

Pinning Synchronization of Coupled Memristive Recurrent Neural Networks with Mixed Time-Varying Delays and Perturbations.
Neural Process. Lett., 2019

Fixed-time synchronization of inertial memristor-based neural networks with discrete delay.
Neural Networks, 2019

Asymptotic and finite-time synchronization of memristor-based switching networks with multi-links and impulsive perturbation.
Neural Comput. Appl., 2019

Simplified hybrid fireworks algorithm.
Knowl. Based Syst., 2019

Optimal tolerance design of hierarchical products based on quality loss function.
J. Intell. Manuf., 2019

A fully dynamic secret sharing scheme.
Inf. Sci., 2019

Compressive Sensing of Medical Images With Confidentially Homomorphic Aggregations.
IEEE Internet Things J., 2019

P-Tensor Product in Compressed Sensing.
IEEE Internet Things J., 2019

Flexible and Secure Data Transmission System Based on Semitensor Compressive Sensing in Wireless Body Area Networks.
IEEE Internet Things J., 2019

A new fixed-time stability theorem and its application to the synchronization control of memristive neural networks.
Neurocomputing, 2019

One-to-many image encryption with privacy-preserving homomorphic outsourced decryption based on compressed sensing.
Digit. Signal Process., 2019

General decay synchronization of complex multi-links time-varying dynamic network.
Commun. Nonlinear Sci. Numer. Simul., 2019

DDmap: a MATLAB package for the double digest problem using multiple genetic operators.
BMC Bioinform., 2019

Secure Remote Sensing Image Registration Based on Compressed Sensing in Cloud Setting.
IEEE Access, 2019

Secure and Efficient Multi-Authority Attribute-Based Encryption Scheme From Lattices.
IEEE Access, 2019

Sparse General Non-Negative Matrix Factorization Based on Left Semi-Tensor Product.
IEEE Access, 2019

A blockchain-based loan over-prevention mechanism.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

RZcash: A Privacy Protection Scheme for the Account-based Blockchain.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

2018
A Novel Digital Watermarking Based on General Non-Negative Matrix Factorization.
IEEE Trans. Multim., 2018

Dynamic multi-swarm differential learning particle swarm optimizer.
Swarm Evol. Comput., 2018

A Randomness Detection Method of ZigBee Protocol in a Wireless Sensor Network.
Sensors, 2018

General Theory of security and a study of hacker's behavior in big data era.
Peer-to-Peer Netw. Appl., 2018

Finite-Time Robust Synchronization of Memrisive Neural Network with Perturbation.
Neural Process. Lett., 2018

Synchronization of Multi-links Memristor-Based Switching Networks Under Uniform Random Attacks.
Neural Process. Lett., 2018

Synchronization Control of Coupled Memristor-Based Neural Networks with Mixed Delays and Stochastic Perturbations.
Neural Process. Lett., 2018

A Secure and Efficient Transmission Method in Connected Vehicular Cloud Computing.
IEEE Netw., 2018

Parameters estimation and synchronization of uncertain coupling recurrent dynamical neural networks with time-varying delays based on adaptive control.
Neural Comput. Appl., 2018

An Accelerated Three-Term Conjugate Gradient Method with Sufficient Descent Condition and Conjugacy Condition.
J. Optim. Theory Appl., 2018

Fixed-time synchronization of memristor-based fuzzy cellular neural network with time-varying delay.
J. Frankl. Inst., 2018

Image captioning with triple-attention and stack parallel LSTM.
Neurocomputing, 2018

Incremental general non-negative matrix factorization without dimension matching constraints.
Neurocomputing, 2018

Particle swarm optimizer with crossover operation.
Eng. Appl. Artif. Intell., 2018

Finite-time stability and synchronization of memristor-based fractional-order fuzzy cellular neural networks.
Commun. Nonlinear Sci. Numer. Simul., 2018

Adaptive synchronization of memristor-based BAM neural networks with mixed delays.
Appl. Math. Comput., 2018

Fixed-Time Synchronization of Memristive Fuzzy BAM Cellular Neural Networks With Time-Varying Delays Based on Feedback Controllers.
IEEE Access, 2018

Adaptive Lag Synchronization of Memristive Neural Networks With Mixed Delays.
IEEE Access, 2018

An Efficient and Secure Transmission Model Based on Compressive Sensing.
Proceedings of the 2018 International Symposium on Security and Privacy in Social Networks and Big Data, 2018

An evaluation method of image scrambling degree based on pixel distribution.
Proceedings of the 2018 International Symposium on Security and Privacy in Social Networks and Big Data, 2018

2017
A Novel Smart Card Based User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks.
Wirel. Pers. Commun., 2017

Secure and Energy-Efficient Data Transmission System Based on Chaotic Compressive Sensing in Body-to-Body Networks.
IEEE Trans. Biomed. Circuits Syst., 2017

Fixed-time synchronization of memristor-based BAM neural networks with time-varying discrete delay.
Neural Networks, 2017

An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography.
Multim. Tools Appl., 2017

Homomorphic Signatures from Chameleon Hash Functions.
Inf. Technol. Control., 2017

General Theory of Security and a Study Case in Internet of Things.
IEEE Internet Things J., 2017

Finite-time stability analysis for neutral-type neural networks with hybrid time-varying delays without using Lyapunov method.
Neurocomputing, 2017

Finite-time topology identification and stochastic synchronization of complex network with multiple time delays.
Neurocomputing, 2017

Finite-time synchronization of memristor-based neural networks with mixed delays.
Neurocomputing, 2017

Particle swarm optimizer with two differential mutation.
Appl. Soft Comput., 2017

Integration of complex Modelica-based physics models and discrete-time control systems: Approaches and observations of numerical performance.
Proceedings of the 12th International Modelica Conference, Prague, Czech Republic, 2017

MPLB: A Load Balance Scheme of Joint Resource Scheduling in Heterogeneous Wireless Network.
Proceedings of the 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2017

2016
An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks.
Sensors, 2016

Short lattice signatures with constant-size public keys.
Secur. Commun. Networks, 2016

Robust anonymous two-factor authenticated key exchange scheme for mobile client-server environment.
Secur. Commun. Networks, 2016

Cryptanalysis and improvement of a chaotic maps-based anonymous authenticated key agreement protocol for multiserver architecture.
Secur. Commun. Networks, 2016

A secure and efficient mutual authentication scheme for session initiation protocol.
Peer-to-Peer Netw. Appl., 2016

Finite-Time Boundedness Analysis of Memristive Neural Network with Time-Varying Delay.
Neural Process. Lett., 2016

Anti-synchronization Control of Memristive Neural Networks with Multiple Proportional Delays.
Neural Process. Lett., 2016

Finite-Time Anti-synchronization Control of Memristive Neural Networks With Stochastic Perturbations.
Neural Process. Lett., 2016

Efficient Post-Quantum Secure Network Coding Signatures in the Standard Model.
KSII Trans. Internet Inf. Syst., 2016

Robust ID based mutual authentication and key agreement scheme preserving user anonymity in mobile networks.
KSII Trans. Internet Inf. Syst., 2016

An advanced elliptic curve cryptography based mutual authentication scheme for session initiation protocol.
Inf. Technol. Control., 2016

A Built-in Single Event Upsets Detector for Sequential Cells.
J. Electron. Test., 2016

A 10-Transistor 65 nm SRAM Cell Tolerant to Single-Event Upsets.
J. Electron. Test., 2016

An SEU-Resilient SRAM Bitcell in 65-nm CMOS Technology.
J. Electron. Test., 2016

Semi-tensor compressed sensing.
Digit. Signal Process., 2016

2015
A biometrics and smart cards-based authentication scheme for multi-server environments.
Secur. Commun. Networks, 2015

Finite-Time Function Projective Synchronization in Complex Multi-links Networks with Time-Varying Delay.
Neural Process. Lett., 2015

An Enhanced Biometric-Based Authentication Scheme for Telecare Medicine Information Systems Using Elliptic Curve Cryptosystem.
J. Medical Syst., 2015

Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps.
J. Medical Syst., 2015

A Three-Party Password-based Authenticated Key Exchange Protocol for Wireless Communications.
Inf. Technol. Control., 2015

A Lightweight ID Based Authentication and Key Agreement Protocol for Multiserver Architecture.
Int. J. Distributed Sens. Networks, 2015

Simulation and Experimental Evaluation of a Soft Error Tolerant Layout for SRAM 6T Bitcell in 65nm Technology.
J. Electron. Test., 2015

The effect of randomness for dependency map on the robustness of interdependent lattices.
CoRR, 2015

A novel asymmetrical SRAM cell tolerant to soft errors.
Proceedings of the IEEE 28th Canadian Conference on Electrical and Computer Engineering, 2015

2014
A Secure and Effective Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2014

Synchronization control of memristor-based recurrent neural networks with perturbations.
Neural Networks, 2014

Novel way to research nonlinear feedback shift register.
Sci. China Inf. Sci., 2014

2013
Multiple routes transmitted epidemics on multiplex networks.
CoRR, 2013

Multiple Vectors Propagation of Epidemics in Complex Networks.
CoRR, 2013

Improving Chaotic Ant Swarm Performance with Three Strategies.
Proceedings of the Advances in Swarm Intelligence, 4th International Conference, 2013

2012
CSP-DHIES: a new public-key encryption scheme from matrix conjugation.
Secur. Commun. Networks, 2012

Public key distribution scheme for delay tolerant networks based on two-channel cryptography.
J. Netw. Comput. Appl., 2012

Data clustering using bacterial foraging optimization.
J. Intell. Inf. Syst., 2012

A Secure Message Transaction Protocol for Delay Tolerant Networks.
J. Commun., 2012

Recursive hiding of biometrics-based secret sharing scheme using adversary structure.
Inf. Process. Lett., 2012

Synchronization of Time-Delay Chaotic System in Presence of Noise.
Int. J. Comput. Intell. Syst., 2012

Optimum design of fractional order PI<sup>λ</sup>D<sup>μ</sup> controller for AVR system using chaotic ant swarm.
Expert Syst. Appl., 2012

Chaotic ant swarm approach for data clustering.
Appl. Soft Comput., 2012

A secure message delivery scheme with path tracking for delay tolerant networks.
Proceedings of the 2012 1st IEEE International Conference on Communications in China (ICCC), 2012

2011
Web user clustering and Web prefetching using Random Indexing with weight functions.
Knowl. Inf. Syst., 2011

Disturbance Chaotic Ant Swarm.
Int. J. Bifurc. Chaos, 2011

A Random Indexing Approach for Web User Clustering and Web Prefetching.
Proceedings of the New Frontiers in Applied Data Mining, 2011

2010
Secure Network Coding against Wiretapping and Byzantine Attacks.
EURASIP J. Wirel. Commun. Netw., 2010

An Extensible Hash Function Construction Based on Embedded Chaos Maps.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2007
Chaotic Ant Swarm.
Proceedings of the Third International Conference on Natural Computation, 2007

Integer Programming via Chaotic Ant Swarm.
Proceedings of the Third International Conference on Natural Computation, 2007

2006
An Optimization Method Inspired by "chaotic" Ant Behavior.
Int. J. Bifurc. Chaos, 2006

Data Fitting Via Chaotic Ant Swarm.
Proceedings of the Advances in Natural Computation, Second International Conference, 2006


  Loading...