Yanli Ren
Orcid: 0000-0003-4510-7883
According to our database1,
Yanli Ren
authored at least 79 papers
between 2008 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Joint utilization of positive and negative pseudo-labels in semi-supervised facial expression recognition.
Pattern Recognit., 2025
2024
Privacy-Preserving Location-Based Advertising via Longitudinal Geo-Indistinguishability.
IEEE Trans. Mob. Comput., August, 2024
Pattern Recognit., February, 2024
BFDAC: A Blockchain-Based and Fog-Computing-Assisted Data Access Control Scheme in Vehicular Social Networks.
IEEE Internet Things J., January, 2024
IEEE Internet Things J., January, 2024
BPFL: Blockchain-based privacy-preserving federated learning against poisoning attack.
Inf. Sci., 2024
Inf. Sci., 2024
Balanced Off-Chain Payment Channel Network Routing Strategy Based On Weight Calculation.
Comput. J., 2024
2023
Verifiable Privacy-Enhanced Rotation Invariant LBP Feature Extraction in Fog Computing.
IEEE Trans. Ind. Informatics, December, 2023
An Improved NSGA-III Algorithm Based on Deep Q-Networks for Cloud Storage Optimization of Blockchain.
IEEE Trans. Parallel Distributed Syst., May, 2023
Privacy-Preserving Medical Data-Sharing System with Symmetric Encryption Based on Blockchain.
Symmetry, April, 2023
IEEE Trans. Knowl. Data Eng., March, 2023
IEEE Trans. Dependable Secur. Comput., 2023
EPFNet: Edge-Prototype Fusion Network Toward Few-Shot Semantic Segmentation for Aerial Remote-Sensing Images.
IEEE Geosci. Remote. Sens. Lett., 2023
Inf. Sci., 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
2022
IEEE Internet Things J., 2022
2021
Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server.
IEEE Trans. Cloud Comput., 2021
IEEE Signal Process. Lett., 2021
Secur. Commun. Networks, 2021
Secur. Commun. Networks, 2021
Privacy-preserving batch verification signature scheme based on blockchain for Vehicular Ad-Hoc Networks.
J. Inf. Secur. Appl., 2021
IEEE Multim., 2021
Comput. Secur., 2021
Efficient outsourced extraction of histogram features over encrypted images in cloud.
Sci. China Inf. Sci., 2021
2020
IEEE Trans. Dependable Secur. Comput., 2020
IEEE Trans. Circuits Syst. Video Technol., 2020
How to Extract Image Features Based on Co-Occurrence Matrix Securely and Efficiently in Cloud Computing.
IEEE Trans. Cloud Comput., 2020
Signal Process., 2020
On Cloud Storage Optimization of Blockchain With a Clustering-Based Genetic Algorithm.
IEEE Internet Things J., 2020
Cogn. Comput., 2020
2019
Novel and Secure Outsourcing Algorithms for Multiple Bilinear Pairings with Single Untrusted Server.
Int. J. Netw. Secur., 2019
IEICE Trans. Inf. Syst., 2019
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
2018
Efficient steganographer detection over social networks with sampling reconstruction.
Peer-to-Peer Netw. Appl., 2018
Unsupervised steganalysis over social networks based on multi-reference sub-image sets.
Multim. Tools Appl., 2018
Analysis of the <i>k</i>-Error Linear Complexity and Error Sequence for 2<i>p<sup>n</sup></i>-Periodic Binary Sequence.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
Fully Verifiable Algorithm for Outsourcing Multiple Modular Exponentiations with Single Cloud Server.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
Sci. China Inf. Sci., 2018
2017
Noninteractive Verifiable Outsourcing Algorithm for Bilinear Pairing with Improved Checkability.
Secur. Commun. Networks, 2017
Fully Verifiable Algorithm for Secure Outsourcing of Bilinear Pairing in Cloud Computing.
KSII Trans. Internet Inf. Syst., 2017
Int. J. Netw. Secur., 2017
Output feedback polytopic LPV Tube-RMPC control for air-breathing hypersonic vehicles.
Int. J. Model. Identif. Control., 2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Proceedings of the Theory and Applications of Models of Computation, 2017
Proceedings of the International Conference on Algorithmic Learning Theory, 2017
2016
Multim. Tools Appl., 2016
J. Vis. Commun. Image Represent., 2016
Sci. China Inf. Sci., 2016
Four-Round Zero-Knowledge Arguments of Knowledge with Strict Polynomial-Time Simulation from Differing-Input Obfuscation for Circuits.
Proceedings of the Computing and Combinatorics - 22nd International Conference, 2016
Verifiable Outsourcing Algorithms for Modular Exponentiations with Improved Checkability.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
J. Vis. Commun. Image Represent., 2015
Int. J. Netw. Secur., 2015
Towards Efficient, Secure, and Fine-Grained Access Control System in MSNs with Flexible Revocations.
Int. J. Distributed Sens. Networks, 2015
2014
J. Vis. Commun. Image Represent., 2014
Int. J. Netw. Secur., 2014
Int. J. Digit. Crime Forensics, 2014
2013
Comput. Math. Appl., 2013
2012
Proceedings of the Internet and Distributed Computing Systems, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the Data and Knowledge Engineering - Third International Conference, 2012
2011
Watermarking With Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction.
IEEE Trans. Inf. Forensics Secur., 2011
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
2010
CCA2 secure (hierarchical) identity-based parallel key-insulated encryption without random oracles.
J. Syst. Softw., 2010
Int. J. Multim. Intell. Secur., 2010
Int. J. Found. Comput. Sci., 2010
Fragile Watermarking for Color Image Recovery Based on Color Filter Array Interpolation.
Proceedings of the Web-Age Information Management, 11th International Conference, 2010
2009
Inf. Process. Lett., 2009
2008
Informatica (Slovenia), 2008
Proceedings of the Progress in Cryptology, 2008