Qinyi Li
Orcid: 0000-0002-1064-2600
According to our database1,
Qinyi Li
authored at least 29 papers
between 2012 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
1
1
1
2
1
2
1
2
1
5
2
2
1
1
1
2
1
2
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Comput. Secur., 2025
2024
IACR Commun. Cryptol., 2024
Proceedings of the International Conference on Computers, 2024
2023
Cyber Security Resilience in Industrial Control Systems using Defence-in-Depth and Zero Trust.
Proceedings of the 16th International Conference on Sensing Technology, 2023
A Runtime Verification Framework for Cyber-Physical Systems Based on Data Analytics and LTL Formula Learning.
Proceedings of the Formal Methods and Software Engineering, 2023
Identity-Based Matchmaking Encryption with Enhanced Privacy - A Generic Construction with Practical Instantiations.
Proceedings of the Computer Security - ESORICS 2023, 2023
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023
2022
Wire Rope Damage Detection Signal Processing Using K-Singular Value Decomposition and Optimized Double-Tree Complex Wavelet Transform.
IEEE Trans. Instrum. Meas., 2022
A Digital Twin Runtime Verification Framework for Protecting Satellites Systems from Cyber Attacks.
Proceedings of the 26th International Conference on Engineering of Complex Computer Systems, 2022
Proceedings of the ACSW 2022: Australasian Computer Science Week 2022, Brisbane, Australia, February 14, 2022
2021
Theor. Comput. Sci., 2021
Theor. Comput. Sci., 2021
Proceedings of the Post-Quantum Cryptography - 12th International Workshop, 2021
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
2020
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020
2019
Proceedings of the Post-Quantum Cryptography - 10th International Conference, 2019
2018
Proceedings of the Applied Cryptography and Network Security, 2018
2017
IACR Cryptol. ePrint Arch., 2017
2016
Secur. Commun. Networks, 2016
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
Turing Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded Functions.
Proceedings of the Applied Cryptography and Network Security, 2016
2015
Int. J. Netw. Secur., 2015
Proceedings of the Provable Security, 2015
2013
Broadcast revocation scheme in composite-order bilinear group and its application to attribute-based encryption.
Int. J. Secur. Networks, 2013
Int. J. Netw. Secur., 2013
2012
Proceedings of the Provable Security - 6th International Conference, 2012
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012