Wenmin Li

Orcid: 0000-0002-1278-1735

Affiliations:
  • State Key Laboratory of Cryptology, Beijing, China
  • Beijing University of Posts and Telecommunications, State Key Laboratory of Networking and Switching Technology, Beijing, China


According to our database1, Wenmin Li authored at least 62 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
NUAT-GAN: Generating Black-Box Natural Universal Adversarial Triggers for Text Classifiers Using Generative Adversarial Networks.
IEEE Trans. Inf. Forensics Secur., 2024

Comments on "VERSA: Verifiable Secure Aggregation for Cross-Device Federated Learning".
IEEE Trans. Dependable Secur. Comput., 2024

2023
Enhanced covertness class discriminative universal adversarial perturbations.
Neural Networks, August, 2023

Publishing locally private high-dimensional synthetic data efficiently.
Inf. Sci., July, 2023

Privacy Protection Data Retrieval Scheme With Inverted Index for IoT Based on Blockchain.
IEEE Internet Things J., July, 2023

Scalable Fuzzy Keyword Ranked Search Over Encrypted Data on Hybrid Clouds.
IEEE Trans. Cloud Comput., 2023

2022
Dynamic Proof of Data Possession and Replication With Tree Sharing and Batch Verification in the Cloud.
IEEE Trans. Serv. Comput., 2022

Practical Attribute-Based Multi-Keyword Ranked Search Scheme in Cloud Computing.
IEEE Trans. Serv. Comput., 2022

Public Key Encryption With Equality Test Supporting Flexible Designated Authorization in Cloud Storage.
IEEE Syst. J., 2022

KRProtector: Detection and Files Protection for IoT Devices on Android Without ROOT Against Ransomware Based on Decoys.
IEEE Internet Things J., 2022

Generating natural adversarial examples with universal perturbations for text classification.
Neurocomputing, 2022

Forward privacy multikeyword ranked search over encrypted database.
Int. J. Intell. Syst., 2022

A rORAM scheme with logarithmic bandwidth and logarithmic locality.
Int. J. Intell. Syst., 2022

KRTunnel: DNS channel detector for mobile devices.
Comput. Secur., 2022

Secure and Differentiated Fog-Assisted Data Access for Internet of Things.
Comput. J., 2022

2021
PPFilter: Provider Privacy-Aware Encrypted Filtering System.
IEEE Trans. Serv. Comput., 2021

Cost-Sensitive Approach to Improve the HTTP Traffic Detection Performance on Imbalanced Data.
Secur. Commun. Networks, 2021

2020
A Flexible KP-ABE Suit for Mobile User Realizing Decryption Outsourcing and Attribute Revocation.
Wirel. Pers. Commun., 2020

Comments on "Provable Multicopy Dynamic Data Possession in Cloud Computing Systems".
IEEE Trans. Inf. Forensics Secur., 2020

KNN search-based trajectory cloaking against the Cell-ID tracking in cellular network.
Soft Comput., 2020

A Multi-User Public Key Encryption with Multi-Keyword Search out of Bilinear Pairings.
Sensors, 2020

Cache-Based Privacy Preserving Solution for Location and Content Protection in Location-Based Services.
Sensors, 2020

Adaptively secure broadcast encryption with authenticated content distributors.
Multim. Tools Appl., 2020

New Blind Filter Protocol: An Improved Privacy-Preserving Scheme for Location-Based Services.
Comput. J., 2020

Practical Attribute-Based Conjunctive Keyword Search Scheme.
Comput. J., 2020

2019
Decentralized, Revocable and Verifiable Attribute-Based Encryption in Hybrid Cloud System.
Wirel. Pers. Commun., 2019

Authenticated public key broadcast encryption with short ciphertexts.
Multim. Tools Appl., 2019

Towards Privacy-Preserving and Efficient Attribute-Based Multi-Keyword Search.
IACR Cryptol. ePrint Arch., 2019

An efficient blind filter: Location privacy protection and the access control in FinTech.
Future Gener. Comput. Syst., 2019

Outsourced dynamic provable data possession with batch update for secure cloud storage.
Future Gener. Comput. Syst., 2019

Efficient Attribute-Based Data Sharing Scheme with Hidden Access Structures.
Comput. J., 2019

An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption.
IEEE Access, 2019

2018
An Anonymous Authentication Protocol Based on Cloud for Telemedical Systems.
Wirel. Commun. Mob. Comput., 2018

Attribute-based fuzzy identity access control in multicloud computing environments.
Soft Comput., 2018

Secure multi-keyword ranked search over encrypted cloud data for multiple data owners.
J. Syst. Softw., 2018

Webshell Traffic Detection With Character-Level Features Based on Deep Learning.
IEEE Access, 2018

An Anti-Quantum Transaction Authentication Approach in Blockchain.
IEEE Access, 2018

A Lattice-Based Unordered Aggregate Signature Scheme Based on the Intersection Method.
IEEE Access, 2018

Generic Construction of Outsourced Attribute-Based Encryption Without Key Escrow.
IEEE Access, 2018

A New Insight - Proxy Re-encryption Under LWE with Strong Anti-collusion.
Proceedings of the Information Security Practice and Experience, 2018

2017
Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing.
Soft Comput., 2017

Flexible CP-ABE Based Access Control on Encrypted Data for Mobile Users in Hybrid Cloud System.
J. Comput. Sci. Technol., 2017

Identity Based Proxy Re-encryption Scheme under LWE.
KSII Trans. Internet Inf. Syst., 2017

2016
A Three-Factor Based Remote User Authentication Scheme: Strengthening Systematic Security and Personal Privacy for Wireless Communications.
Wirel. Pers. Commun., 2016

Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing.
IEEE Trans. Parallel Distributed Syst., 2016

Adaptively Secure Broadcast Encryption With Constant Ciphertexts.
IEEE Trans. Broadcast., 2016

Transparent Discovery of Hidden Service.
IEICE Trans. Inf. Syst., 2016

A strongly secure pairing-free certificateless authenticated key agreement protocol under the CDH assumption.
Sci. China Inf. Sci., 2016

2015
Analysis and Improvement of 'Chaotic Map Based Mobile Dynamic ID Authenticated Key Agreement Scheme'.
Wirel. Pers. Commun., 2015

A Novel Authentication Scheme Using Self-certified Public Keys for Telecare Medical Information Systems.
J. Medical Syst., 2015

An Improved Biometrics-Based Authentication Scheme for Telecare Medical Information Systems.
J. Medical Syst., 2015

An anonymous and efficient remote biometrics user authentication scheme in a multi server environment.
Frontiers Comput. Sci., 2015

2014
Cryptanalysis of a sessional blind signature based on quantum cryptography.
Quantum Inf. Process., 2014

Cryptanalysis of enhancement on "quantum blind signature based on two-state vector formalism".
Quantum Inf. Process., 2014

Secure Privacy-Preserving Biometric Authentication Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2014

A Fuzzy Identity-Based Signcryption Scheme from Lattices.
KSII Trans. Internet Inf. Syst., 2014

Privacy-Preserving Self-Helped Medical Diagnosis Scheme Based on Secure Two-Party Computation in Wireless Sensor Networks.
Comput. Math. Methods Medicine, 2014

2013
Cryptanalysis and improvement of two certificateless three-party authenticated key agreement protocols
CoRR, 2013

2012
An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network.
Comput. Commun., 2012

An Anonymous Password-Authenticated and Key Exchange Protocol for Roaming Services in Wireless Networks.
Ad Hoc Sens. Wirel. Networks, 2012

2009
A constant rounds group key agreement protocol without using hash functions.
Int. J. Netw. Manag., 2009

2008
Efficient Verifier-Based Password-Authentication Key Exchange Protocol via Elliptic Curves.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008


  Loading...