Peili Li

Orcid: 0000-0002-6870-1458

According to our database1, Peili Li authored at least 19 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Convergence analysis of generalized ADMM with majorization for linearly constrained composite convex optimization.
Optim. Lett., June, 2024

2023
A global two-stage algorithm for non-convex penalized high-dimensional linear regression problems.
Comput. Stat., June, 2023

Efficient dual ADMMs for sparse compressive sensing MRI reconstruction.
Math. Methods Oper. Res., April, 2023

An efficient semismooth Newton method for adaptive sparse signal recovery problems.
Optim. Methods Softw., March, 2023

"Every Dog Has His Day": Competitive-Evolving-Committee Proactive Secret Sharing With Capability-Based Encryption.
Int. J. Inf. Secur. Priv., 2023

2022
A data-driven line search rule for support recovery in high-dimensional data analysis.
Comput. Stat. Data Anal., 2022

2021
An efficient identity tracing scheme for blockchain-based systems.
Inf. Sci., 2021

A Traceable Scheme for Consortium Blockchain.
Proceedings of the 9th IEEE International Conference on Smart City and Informatization, 2021

The Golden Snitch: A Byzantine Fault Tolerant Protocol with Activity.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

2020
A Blockchain Traceable Scheme with Oversight Function.
IACR Cryptol. ePrint Arch., 2020

SkyEye: A Traceable Scheme for Blockchain.
IACR Cryptol. ePrint Arch., 2020

Secure two-party SM9 signing.
Sci. China Inf. Sci., 2020

2018
An efficient algorithm for sparse inverse covariance matrix estimation based on dual formulation.
Comput. Stat. Data Anal., 2018

2015
Multi-input Functional Encryption and Its Application in Outsourcing Computation.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

Multi-client Outsourced Computation.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

2014
Private Outsourcing of Polynomial Functions.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Verifiable Computation of Large Polynomials.
Proceedings of the Trusted Systems - 6th International Conference, 2014

2013
Public Verification of Outsourced Computation of Polynomial Functions.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Homomorphic Signatures for Correct Computation of Group Elements.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013


  Loading...