Yongli Tang
Orcid: 0000-0003-2783-7065
According to our database1,
Yongli Tang
authored at least 34 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Consumer Electron., February, 2024
An optimized LSTM network for improving arbitrage spread forecasting using ant colony cross-searching in the K-fold hyperparameter space.
PeerJ Comput. Sci., 2024
KSII Trans. Internet Inf. Syst., 2024
2023
More efficient constant-round secure multi-party computation based on optimized Tiny-OT and half-gate.
J. Inf. Secur. Appl., December, 2023
Connect. Sci., December, 2023
Dynamic forward secure searchable encryption scheme with phrase search for smart healthcare.
J. Syst. Archit., November, 2023
Efficient lattice-based traceable ring signature scheme with its application in blockchain.
Inf. Sci., November, 2023
A Novel Edge Cache-Based Private Set Intersection Protocol via Lightweight Oblivious PRF.
Entropy, September, 2023
IEEE Trans. Inf. Forensics Secur., 2023
2022
An Android Malicious Application Detection Method with Decision Mechanism in the Operating Environment of Blockchain.
Secur. Commun. Networks, 2022
Blockchain-based verifiable and dynamic multi-keyword ranked searchable encryption scheme in cloud computing.
J. Inf. Secur. Appl., 2022
Cloud-edge collaboration based peer to peer services redirection strategy for passive optical network.
IET Commun., 2022
Multi-keywords fuzzy search encryption supporting dynamic update in an intelligent edge network.
Connect. Sci., 2022
Lattice-based public-key encryption with conjunctive keyword search in multi-user setting for IIoT.
Clust. Comput., 2022
2021
Secur. Commun. Networks, 2021
Edge-Cloud-Assisted Multiuser Forward Secure Searchable Encryption (EMFSSE) Scheme in the P2P Networking Environment.
Mob. Inf. Syst., 2021
Chapter Four - Provably secure verifier-based password authenticated key exchange based on lattices.
Adv. Comput., 2021
2020
Secure and Efficient Image Compression-Encryption Scheme Using New Chaotic Structure and Compressive Sensing.
Secur. Commun. Networks, 2020
Offline/Online Outsourced Attribute-Based Encryption with Partial Policy Hidden for the Internet of Things.
J. Sensors, 2020
Int. J. Distributed Sens. Networks, 2020
IEEE Access, 2020
2019
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption in Multi-Domain Environment.
IEEE Access, 2019
A Lightweight Two-Way Authentication Scheme Between Communication Nodes for Software Defined Optical Access Network.
IEEE Access, 2019
RLWE Commitment-Based Linkable Ring Signature Scheme and Its Application in Blockchain.
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019
2018
Sensors, 2018
Efficient batch identity-based fully homomorphic encryption scheme in the standard model.
IET Inf. Secur., 2018
Attribute-Based Encryption Scheme Supporting Tree-Access Structure on Ideal Lattices.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Adaptively Chosen Ciphertext Secure Lattice IBE Based Programmable Hash Function in the Standard Model.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
A Novel Hierarchical Identity-Based Fully Homomorphic Encryption Scheme from Lattices.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
2014
Identifying top Chinese network buzzwords from social media big data set based on time-distribution features.
Proceedings of the 2014 IEEE International Conference on Big Data (IEEE BigData 2014), 2014