​
Login / Signup
Jiguo Li
ORCID
Publication Activity (10 Years)
Years Active: 2006-2023
Publications (10 Years): 7
Top Topics
Crowd Sourcing
Keyword Search
Signature Scheme
Online Social Networking
Top Venues
CoRR
Inf.
ICCCS (1)
IEEE Trans. Ind. Informatics
</>
Publications
</>
Jiguo Li
,
Xiaobin Liu
,
Lirong Zheng
Factor Decomposed Generative Adversarial Networks for Text-to-Image Synthesis.
CoRR
(2023)
Jiguo Li
,
Tianzi Zhang
,
Xiaobin Liu
,
Lirong Zheng
Time-frequency Network for Robust Speaker Recognition.
CoRR
(2023)
Yinbin Miao
,
Ximeng Liu
,
Kim-Kwang Raymond Choo
,
Robert H. Deng
,
Jiguo Li
,
Hongwei Li
,
Jian-Feng Ma
Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting.
IEEE Trans. Dependable Secur. Comput.
18 (3) (2021)
Yinbin Miao
,
Ximeng Liu
,
Robert H. Deng
,
Hongjun Wu
,
Hongwei Li
,
Jiguo Li
,
Dapeng Wu
Hybrid Keyword-Field Search With Efficient Key Management for Industrial Internet of Things.
IEEE Trans. Ind. Informatics
15 (6) (2019)
Jian Shen
,
Tianqi Zhou
,
Chin-Feng Lai
,
Jiguo Li
,
Xiong Li
Hierarchical Trust Level Evaluation for Pervasive Social Networking.
IEEE Access
5 (2017)
Jian Shen
,
Jun Shen
,
Xiong Li
,
Fushan Wei
,
Jiguo Li
Outsourced data modification algorithm with assistance of multi-assistants in cloud computing.
Int. J. Sens. Networks
24 (1) (2017)
Jian Shen
,
Jun Shen
,
Xiong Li
,
Fushan Wei
,
Jiguo Li
Outsourced Data Modification Algorithm with Assistance of Multi-assistants in Cloud Computing.
ICCCS (1)
(2016)
Xunjun Chen
,
Yuelong Zhu
,
Jiguo Li
,
Yamin Wen
,
Zheng Gong
Efficiency and Privacy Enhancement for a Track and Trace System of RFID-Based Supply Chains.
Inf.
6 (2) (2015)
Zhong-Mei Wan
,
Jiguo Li
,
Xuan Hong
Parallel key-insulated signature scheme without random oracles.
J. Commun. Networks
15 (3) (2013)
Zhong-Mei Wan
,
Jian Weng
,
Xuejia Lai
,
Shengli Liu
,
Jiguo Li
On the Relation between Identity-Based Proxy Re-Encryption and Mediated Identity-Based Encryption.
J. Inf. Sci. Eng.
27 (1) (2011)
Zhong-Mei Wan
,
Jian Weng
,
Jiguo Li
Security Mediated Certificateless Signatures Without Pairing.
J. Comput.
5 (12) (2010)
Weijia Jiang
,
Jiguo Li
Authenticated Tree Based Group Key Agreement.
CIS (2)
(2009)
Jiguo Li
,
Shuhong Wang
New Efficient Proxy Blind Signature Scheme Using Verifiable Self-certified Public Key.
Int. J. Netw. Secur.
4 (2) (2007)
Honglie Zhang
,
Guoyin Zhang
,
Jiguo Li
Cryptanalysis on Generalization of Threshold Signature and Authenticated Encryption for Group Communications.
ICICIC (3)
(2006)