Tao Li

Orcid: 0000-0002-1448-3619

Affiliations:
  • Guizhou University, State Key Laboratory of Public Big Data, College of Computer Science and Technology, China (PhD 2023)
  • Qufu Normal University, School of Computer Science, Rizhao, China


According to our database1, Tao Li authored at least 42 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Cloud-SMPC: two-round multilinear maps secure multiparty computation based on LWE assumption.
J. Cloud Comput., December, 2024

AKA-SafeMed: A safe medication recommendation based on attention mechanism and knowledge augmentation.
Inf. Sci., 2024

A blockchain-empowered authentication scheme for worm detection in wireless sensor network.
Digit. Commun. Networks, 2024

HT2REP: A fair cross-chain atomic exchange protocol under UC framework based on HTLCs and TRE.
Comput. Stand. Interfaces, 2024

2023
ROMSS: a rational optional multi-secret sharing scheme based on reputation mechanism.
J. Cloud Comput., December, 2023

Beyond model splitting: Preventing label inference attacks in vertical federated learning with dispersed training.
World Wide Web (WWW), September, 2023

Transfer learning based cascaded deep learning network and mask recognition for COVID-19.
World Wide Web (WWW), September, 2023

Research on Quantum-Attack-Resistant Strong Forward-Secure Signature Schemes.
Entropy, August, 2023

Achieving optimal rewards in cryptocurrency stubborn mining with state transition analysis.
Inf. Sci., May, 2023

Collaborative Energy Price Computing Based on Sarima-Ann and Asymmetric Stackelberg Games.
Symmetry, February, 2023

Multifactor Incentive Mechanism for Federated Learning in IoT: A Stackelberg Game Approach.
IEEE Internet Things J., 2023

Energy trading scheme based on consortium blockchain and game theory.
Comput. Stand. Interfaces, 2023

2022
STSIIML: Study on token shuffling under incomplete information based on machine learning.
Int. J. Intell. Syst., December, 2022

Is semi-selfish mining available without being detected?
Int. J. Intell. Syst., December, 2022

Privacy-aware PKI model with strong forward security.
Int. J. Intell. Syst., December, 2022

An Entropy-View Secure Multiparty Computation Protocol Based on Semi-Honest Model.
J. Organ. End User Comput., 2022

A trusted de-swinging k-anonymity scheme for location privacy protection.
J. Cloud Comput., 2022

A designated verifier multi-signature scheme in multi-clouds.
J. Cloud Comput., 2022

Trust-based secure directed diffusion routing protocol in WSN.
J. Ambient Intell. Humaniz. Comput., 2022

PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNs.
Int. J. Intell. Syst., 2022

A Secure Multiparty Computation Round Optimization Scheme Based on Standard Assumption.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022

2021
Dynamic Multi-Key FHE in Asymmetric Key Setting From LWE.
IEEE Trans. Inf. Forensics Secur., 2021

Corrigendum to "Rational Protocols and Attacks in Blockchain System".
Secur. Commun. Networks, 2021

A blockchain index structure based on subchain query.
J. Cloud Comput., 2021

ImpSuic: A quality updating rule in mixing coins with maximum utilities.
Int. J. Intell. Syst., 2021

Semi-selfish mining based on hidden Markov decision process.
Int. J. Intell. Syst., 2021

Research on direct anonymous attestation mechanism in enterprise information management.
Enterp. Inf. Syst., 2021

A De-swinging Scheme in Location Privacy Protection via Smart Contract.
Proceedings of the IEEE Intl Conf on Dependable, 2021

PSSPR: A Source Location Privacy Protection Scheme Based on Sector Phantom Routing in WSNs.
Proceedings of the IEEE Intl Conf on Dependable, 2021

Using information entropy to analyze secure multi-party computation protocol.
Proceedings of the IEEE Intl Conf on Dependable, 2021

A location data protection protocol based on differential privacy.
Proceedings of the IEEE Intl Conf on Dependable, 2021

2020
Rational Protocols and Attacks in Blockchain System.
Secur. Commun. Networks, 2020

Belief and fairness: A secure two-party protocol toward the view of entropy for IoT devices.
J. Netw. Comput. Appl., 2020

Adversarial behaviours in mixing coins under incomplete information.
Appl. Soft Comput., 2020

2019
Randomness invalidates criminal smart contracts.
Inf. Sci., 2019

2018
Incentive-driven attacker for corrupting two-party protocols.
Soft Comput., 2018

基于免疫的区块链eclipse攻击的异常检测 (Abnormal Detection of Eclipse Attacks on Blockchain Based on Immunity).
计算机科学, 2018

2016
Rational computing protocol based on fuzzy theory.
Soft Comput., 2016

2015
The impact of social cloud reputation and structure on rational computation.
J. High Speed Networks, 2015

A brief survey on secure multi-party computing in the presence of rational parties.
J. Ambient Intell. Humaniz. Comput., 2015

File sharing in cloud computing using win stay lose shift strategy.
Int. J. High Perform. Comput. Netw., 2015

2014
Rational Secure Two-party Computation in Social Cloud.
Proceedings of the Network and System Security - 8th International Conference, 2014


  Loading...