Yong Li
Orcid: 0000-0002-1419-6257Affiliations:
- Beijing Jiaotong University, School of Electronic and Information Engineering, China
- Chinese Academy of Sciences, State Key Laboratory of Information Security, Beijing, China (PhD 2007)
According to our database1,
Yong Li
authored at least 24 papers
between 2005 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on publons.com
-
on orcid.org
On csauthors.net:
Bibliography
2023
Blockchain-based fairness-enhanced federated learning scheme against label flipping attack.
J. Inf. Secur. Appl., September, 2023
Proceedings of the Information and Communications Security - 25th International Conference, 2023
2022
Blockchain-Based Fairness-Enhanced Federated Learning Scheme Against Data Poisoning Attack.
Proceedings of the Smart Computing and Communication - 7th International Conference, 2022
2020
Ciphertext-Policy Hierarchical Attribute-Based Encryption Against Key-Delegation Abuse for IoT-Connected Healthcare System.
IEEE Access, 2020
2019
Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, 2019
2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
2017
J. Inf. Sci. Eng., 2017
2016
Proceedings of the Green, Pervasive, and Cloud Computing - 11th International Conference, 2016
2015
2013
Privacy-Preserving Password-Based Authenticated Key Exchange in the Three-Party Setting.
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
2012
Proceedings of the 8th International Conference on Mobile Ad-hoc and Sensor Networks, 2012
2011
Identity-Based Strong Designated Verifier Signature Scheme with Full Non-Delegatability.
Proceedings of the IEEE 10th International Conference on Trust, 2011
2010
IEEE Commun. Lett., 2010
How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange Protocols.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
2008
Anonymous Identity Based Encryption with Plaintext Awareness in the Two Identities Setting.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
2007
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the Third International Workshop on Security, 2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005