Wenmin Li
Orcid: 0000-0002-1278-1735Affiliations:
- State Key Laboratory of Cryptology, Beijing, China
- Beijing University of Posts and Telecommunications, State Key Laboratory of Networking and Switching Technology, Beijing, China
According to our database1,
Wenmin Li
authored at least 62 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
NUAT-GAN: Generating Black-Box Natural Universal Adversarial Triggers for Text Classifiers Using Generative Adversarial Networks.
IEEE Trans. Inf. Forensics Secur., 2024
Comments on "VERSA: Verifiable Secure Aggregation for Cross-Device Federated Learning".
IEEE Trans. Dependable Secur. Comput., 2024
2023
Neural Networks, August, 2023
Inf. Sci., July, 2023
Privacy Protection Data Retrieval Scheme With Inverted Index for IoT Based on Blockchain.
IEEE Internet Things J., July, 2023
IEEE Trans. Cloud Comput., 2023
2022
Dynamic Proof of Data Possession and Replication With Tree Sharing and Batch Verification in the Cloud.
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Serv. Comput., 2022
Public Key Encryption With Equality Test Supporting Flexible Designated Authorization in Cloud Storage.
IEEE Syst. J., 2022
KRProtector: Detection and Files Protection for IoT Devices on Android Without ROOT Against Ransomware Based on Decoys.
IEEE Internet Things J., 2022
Generating natural adversarial examples with universal perturbations for text classification.
Neurocomputing, 2022
Int. J. Intell. Syst., 2022
Int. J. Intell. Syst., 2022
Comput. J., 2022
2021
IEEE Trans. Serv. Comput., 2021
Cost-Sensitive Approach to Improve the HTTP Traffic Detection Performance on Imbalanced Data.
Secur. Commun. Networks, 2021
2020
A Flexible KP-ABE Suit for Mobile User Realizing Decryption Outsourcing and Attribute Revocation.
Wirel. Pers. Commun., 2020
IEEE Trans. Inf. Forensics Secur., 2020
KNN search-based trajectory cloaking against the Cell-ID tracking in cellular network.
Soft Comput., 2020
A Multi-User Public Key Encryption with Multi-Keyword Search out of Bilinear Pairings.
Sensors, 2020
Cache-Based Privacy Preserving Solution for Location and Content Protection in Location-Based Services.
Sensors, 2020
Multim. Tools Appl., 2020
New Blind Filter Protocol: An Improved Privacy-Preserving Scheme for Location-Based Services.
Comput. J., 2020
2019
Decentralized, Revocable and Verifiable Attribute-Based Encryption in Hybrid Cloud System.
Wirel. Pers. Commun., 2019
Multim. Tools Appl., 2019
IACR Cryptol. ePrint Arch., 2019
An efficient blind filter: Location privacy protection and the access control in FinTech.
Future Gener. Comput. Syst., 2019
Outsourced dynamic provable data possession with batch update for secure cloud storage.
Future Gener. Comput. Syst., 2019
Comput. J., 2019
IEEE Access, 2019
2018
Wirel. Commun. Mob. Comput., 2018
Soft Comput., 2018
Secure multi-keyword ranked search over encrypted cloud data for multiple data owners.
J. Syst. Softw., 2018
IEEE Access, 2018
A Lattice-Based Unordered Aggregate Signature Scheme Based on the Intersection Method.
IEEE Access, 2018
IEEE Access, 2018
Proceedings of the Information Security Practice and Experience, 2018
2017
Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing.
Soft Comput., 2017
Flexible CP-ABE Based Access Control on Encrypted Data for Mobile Users in Hybrid Cloud System.
J. Comput. Sci. Technol., 2017
KSII Trans. Internet Inf. Syst., 2017
2016
A Three-Factor Based Remote User Authentication Scheme: Strengthening Systematic Security and Personal Privacy for Wireless Communications.
Wirel. Pers. Commun., 2016
Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing.
IEEE Trans. Parallel Distributed Syst., 2016
IEEE Trans. Broadcast., 2016
A strongly secure pairing-free certificateless authenticated key agreement protocol under the CDH assumption.
Sci. China Inf. Sci., 2016
2015
Analysis and Improvement of 'Chaotic Map Based Mobile Dynamic ID Authenticated Key Agreement Scheme'.
Wirel. Pers. Commun., 2015
A Novel Authentication Scheme Using Self-certified Public Keys for Telecare Medical Information Systems.
J. Medical Syst., 2015
An Improved Biometrics-Based Authentication Scheme for Telecare Medical Information Systems.
J. Medical Syst., 2015
An anonymous and efficient remote biometrics user authentication scheme in a multi server environment.
Frontiers Comput. Sci., 2015
2014
Quantum Inf. Process., 2014
Cryptanalysis of enhancement on "quantum blind signature based on two-state vector formalism".
Quantum Inf. Process., 2014
Secure Privacy-Preserving Biometric Authentication Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2014
KSII Trans. Internet Inf. Syst., 2014
Privacy-Preserving Self-Helped Medical Diagnosis Scheme Based on Secure Two-Party Computation in Wireless Sensor Networks.
Comput. Math. Methods Medicine, 2014
2013
Cryptanalysis and improvement of two certificateless three-party authenticated key agreement protocols
CoRR, 2013
2012
An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network.
Comput. Commun., 2012
An Anonymous Password-Authenticated and Key Exchange Protocol for Roaming Services in Wireless Networks.
Ad Hoc Sens. Wirel. Networks, 2012
2009
Int. J. Netw. Manag., 2009
2008
Efficient Verifier-Based Password-Authentication Key Exchange Protocol via Elliptic Curves.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008