Xiangxue Li
Orcid: 0000-0002-1779-6178
According to our database1,
Xiangxue Li
authored at least 93 papers
between 2004 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Robust anomaly-based intrusion detection system for in-vehicle network by graph neural network framework.
Appl. Intell., 2023
Proceedings of the 19th International Conference on Mobility, Sensing and Networking, 2023
Constant-Round Multiparty Private Function Evaluation with (Quasi-)Linear Complexities.
Proceedings of the Applied Cryptography and Network Security, 2023
2022
PFE: Linear Active Security, Double-Shuffle Proofs, and Low-Complexity Communication.
IACR Cryptol. ePrint Arch., 2022
Generic 2-Party PFE with Constant Rounds and Linear Active Security, and Efficient Instantiation.
Proceedings of the Security and Privacy in Communication Networks, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
2021
Theor. Comput. Sci., 2021
Entropy, 2021
IEEE Access, 2021
Quantum-Resistant Lightweight Authentication and Key Agreement Protocol for Fog-Based Microgrids.
IEEE Access, 2021
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021
Proceedings of the 2021 IEEE SmartWorld, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Another Look at the Connection between CAN Signal Ringing & In-Vehicle ECU Identification.
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
2020
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020
Revisiting the Fairness and Randomness of Delegated Proof of Stake Consensus Algorithm.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020
2019
Internet of Things Meets Vehicles: Sheltering In-Vehicle Network through Lightweight Machine Learning.
Symmetry, 2019
Basing Diversified Services of Complex IIoT Applications on Scalable Block Graph Platform.
IEEE Access, 2019
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
Deep Learning vs. Traditional Probabilistic Models: Case Study on Short Inputs for Password Guessing.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
Robust and Self-Evolving IDS for In-Vehicle Network by Enabling Spatiotemporal Information.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019
2018
IEEE Netw., 2018
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Proceedings of the Information and Communications Security - 20th International Conference, 2018
2017
Scalable and Soundness Verifiable Outsourcing Computation in Marine Mobile Computing.
Wirel. Commun. Mob. Comput., 2017
1-Resilient Boolean Functions on Even Variables with Almost Perfect Algebraic Immunity.
Secur. Commun. Networks, 2017
Characterizing Linear Structures of Boolean Functions from Arithmetic Walsh Transform.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
IACR Cryptol. ePrint Arch., 2017
Comput. Stand. Interfaces, 2017
Provably Secure Dual-Mode Publicly Verifiable Computation Protocol in Marine Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
VulDigger: A Just-in-Time and Cost-Aware Tool for Digging Vulnerability-Contributing Changes.
Proceedings of the 2017 IEEE Global Communications Conference, 2017
2016
New application of partitioning methodology: identity-based dual receiver encryption.
Secur. Commun. Networks, 2016
Proceedings of the Information and Communications Security - 18th International Conference, 2016
Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable Computation.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Pseudorandom generators from regular one-way functions: New constructions with improved parameters.
Theor. Comput. Sci., 2015
IACR Cryptol. ePrint Arch., 2015
Optimal assignment schemes for general access structures based on linear programming.
Des. Codes Cryptogr., 2015
The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs from a Broader Class of One-Way Functions.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and Beyond.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
2014
Robust password changing and DoS resilience for human-centric password authentication.
Secur. Commun. Networks, 2014
Notes on a group-oriented setting's multisigncryption scheme with threshold designcryption.
Inf. Sci., 2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
(Almost) Optimal Constructions of UOWHFs from 1-to-1 and Known-Regular One-way Functions.
IACR Cryptol. ePrint Arch., 2014
The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions.
Electron. Colloquium Comput. Complex., 2014
POSTER: Using Chinese Characters for Authentication-Algorithmic Framework and Empirical Results.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model.
Math. Comput. Model., 2013
Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model.
Proceedings of the Information and Communications Security - 15th International Conference, 2013
Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles.
Proceedings of the Applied Cryptography and Network Security, 2013
2012
Informatica, 2012
On the Equivalence between the Set Covering Problem and the Problem of Finding Optimal Cumulative Assignment Schemes.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Appl. Math. Lett., 2012
Proceedings of the 2012 IEEE Information Theory Workshop, 2012
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012
2011
Inf. Sci., 2011
Proceedings of the IEEE 6th International Symposium on Service Oriented System Engineering, 2011
Non-interactive CDH-Based Multisignature Scheme in the Plain Public Key Model with Tighter Security.
Proceedings of the Information Security, 14th International Conference, 2011
2010
Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards.
IEEE Trans. Ind. Electron., 2010
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010
2009
IEEE Commun. Lett., 2009
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009
2008
J. Inf. Sci. Eng., 2008
A Generic Construction for Instrusion-Resilient Signatures from Linear Feedback Shift Register.
J. Inf. Sci. Eng., 2008
IACR Cryptol. ePrint Arch., 2008
J. Res. Pract. Inf. Technol., 2008
2007
Efficient Linkable Ring Signatures and Threshold Signatures from Linear Feedback Shift Register.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2007
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007
Proceedings of the Cooperative Design, 2007
2006
Proceedings of the Computing and Combinatorics, 12th Annual International Conference, 2006
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006
2005
ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings.
Appl. Math. Comput., 2005
Proceedings of the Parallel and Distributed Processing and Applications, 2005
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
2004
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004
Proceedings of the Parallel and Distributed Processing and Applications, 2004
Proceedings of the 2004 IEEE International Conference on Services Computing (SCC 2004), 2004