Zichen Li

Orcid: 0000-0001-9690-0342

According to our database1, Zichen Li authored at least 26 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Multi-replicas integrity checking scheme with supporting probability audit for cloud-based IoT.
PeerJ Comput. Sci., 2024

Profit Maximization In Arbitrage Loops.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, ICDCS 2024, 2024

2023
Research on real-time prediction of completion time based on AE-CNN-LSTM.
Comput. Ind. Eng., November, 2023

A multi-agent double Deep-Q-network based on state machine and event stream for flexible job shop scheduling problem.
Adv. Eng. Informatics, October, 2023

Bert-CK: A study of user profile classification based on Bert and CK-means+ fusion.
J. Intell. Fuzzy Syst., 2023

Research on dual-channel user portrait construction method based on DPCNN-BiGRU and attention mechanism.
J. Intell. Fuzzy Syst., 2023

A New Scheme to Implement the Reconfigurable Optical Logic Gate in Millimeter Wave Over Fiber System.
IEEE Access, 2023

2022
Dynamic Group Signature Scheme on Lattice with Verifier-local Revocation.
IACR Cryptol. ePrint Arch., 2022

A Privacy Set Intersection Algorithm Based on Batch Blind Signatures on Lattice∗.
Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering, 2022

2021
An augmented reality-based multimedia environment for experimental education.
Multim. Tools Appl., 2021

Real-time Face Mask Detection in Video Data.
CoRR, 2021

2020
Lane Boundary Geometry Extraction from Satellite Imagery.
CoRR, 2020

2018
A Homomorphic Masking Defense Scheme Based on RSA Cryptography Algorithm.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

A high-Capacity Watermarking Algorithm Using two Bins Histogram Modification.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
ArbiText: Arbitrary-Oriented Text Detection in Unconstrained Scene.
CoRR, 2017

A Wearable Assistive Technology for the Visually Impaired with Door Knob Detection and Real-Time Feedback for Hand-to-Handle Manipulation.
Proceedings of the 2017 IEEE International Conference on Computer Vision Workshops, 2017

Lane boundary extraction from satellite imagery.
Proceedings of the 1st ACM SIGSPATIAL Workshop on High-Precision Maps and Intelligent Applications for Autonomous Vehicles, 2017

Accurate vehicle self-localization in high definition map dataset.
Proceedings of the 1st ACM SIGSPATIAL Workshop on High-Precision Maps and Intelligent Applications for Autonomous Vehicles, 2017

2016
Efficient FPGA implementation of modular multiplication based on Montgomery algorithm.
Microprocess. Microsystems, 2016

2014
A Provable Secure Mutual RFID Authentication Protocol Based on Error-Correct Code.
Proceedings of the 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2014

2013
A Homomorphic ElGamal Variant Based on BGN's Method.
Proceedings of the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2013

2011
Design of U Disk Remote Monitoring System in Trusted Computing Environment.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

2007
An Attack on Libert et al.' s ID-based Undeniable Signature Scheme.
Int. J. Netw. Secur., 2007

2005
Automated Variable Weighting in k-Means Type Clustering.
IEEE Trans. Pattern Anal. Mach. Intell., 2005

2003
The Unlinkability of Randomization-Enhanced Chaum's Blind Signature Scheme.
Proceedings of the 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), 2003

2000
Security of Tseng-Jan's group signature schemes.
Inf. Process. Lett., 2000


  Loading...