​
Login / Signup
Jin Li
ORCID
Publication Activity (10 Years)
Years Active: 2006-2024
Publications (10 Years): 159
Top Topics
Intrusion Detection
Data Sharing
Access Control
Cloud Computing
Top Venues
Inf. Sci.
Future Gener. Comput. Syst.
IEEE Trans. Dependable Secur. Comput.
IEEE Trans. Inf. Forensics Secur.
</>
Publications
</>
Wanqing Jie
,
Wangjie Qiu
,
Arthur Sandor Voundi Koe
,
Jianhong Li
,
Yin Wang
,
Yaqi Wu
,
Jin Li
A Secure and Flexible Blockchain-Based Offline Payment Protocol.
IEEE Trans. Computers
73 (2) (2024)
Kanghua Mo
,
Peigen Ye
,
Xiaojun Ren
,
Shaowei Wang
,
Wenjun Li
,
Jin Li
Security and Privacy Issues in Deep Reinforcement Learning: Threats and Countermeasures.
ACM Comput. Surv.
56 (6) (2024)
Yu Ran
,
Weijia Wang
,
Mingjie Li
,
Lin-Cheng Li
,
Yuan-Gen Wang
,
Jin Li
Cross-Shaped Adversarial Patch Attack.
IEEE Trans. Circuits Syst. Video Technol.
34 (4) (2024)
Fei Peng
,
Le Qin
,
Min Long
,
Jin Li
Detection of Adversarial Facial Accessory Presentation Attacks Using Local Face Differential.
ACM Trans. Multim. Comput. Commun. Appl.
20 (7) (2024)
Yilong Zhao
,
Mingyu Gao
,
Fangxin Liu
,
Yiwei Hu
,
Zongwu Wang
,
Han Lin
,
Jin Li
,
He Xian
,
Hanlin Dong
,
Tao Yang
,
Naifeng Jing
,
Xiaoyao Liang
,
Li Jiang
UM-PIM: DRAM-based PIM with Uniform & Shared Memory Space.
ISCA
(2024)
Shaowei Wang
,
Yun Peng
,
Jin Li
,
Zikai Wen
,
Zhipeng Li
,
Shiyu Yu
,
Di Wang
,
Wei Yang
Privacy Amplification via Shuffling: Unified, Simplified, and Tightened.
Proc. VLDB Endow.
17 (8) (2024)
Guoyu Yang
,
Chang Chen
,
Qi Chen
,
Jianan Jiang
,
Jin Li
,
Debiao He
Sweeper: Breaking the Validity-Latency Tradeoff in Asynchronous Common Subset.
IEEE Trans. Inf. Forensics Secur.
19 (2024)
Li Tang
,
Qingqing Ye
,
Haibo Hu
,
Qiao Xue
,
Yaxin Xiao
,
Jin Li
DeepMark: A Scalable and Robust Framework for DeepFake Video Detection.
ACM Trans. Priv. Secur.
27 (1) (2024)
Huali Ren
,
Anli Yan
,
Chong-zhi Gao
,
Hongyang Yan
,
Zhenxin Zhang
,
Jin Li
Are You Copying My Prompt? Protecting the Copyright of Vision Prompt for VPaaS via Watermark.
CoRR
(2024)
Feng Lin
,
Hao Yan
,
Jin Li
,
Ziwei Liu
,
Li Lu
,
Zhongjie Ba
,
Kui Ren
PhaDe: Practical Phantom Spoofing Attack Detection for Autonomous Vehicles.
IEEE Trans. Inf. Forensics Secur.
19 (2024)
Qirong Zhang
,
Jin Li
,
Qingqing Ye
,
Yuxi Lin
,
Xinlong Chen
,
Yang-Geng Fu
DWSSA: Alleviating over-smoothness for deep Graph Neural Networks.
Neural Networks
174 (2024)
Rong Du
,
Qingqing Ye
,
Yue Fu
,
Haibo Hu
,
Jin Li
,
Chengfang Fang
,
Jie Shi
Differential Aggregation against General Colluding Attackers.
ICDE
(2023)
Zhili Zhou
,
Yuecheng Su
,
Jin Li
,
Keping Yu
,
Q. M. Jonathan Wu
,
Zhangjie Fu
,
Yunqing Shi
Secret-to-Image Reversible Transformation for Generative Steganography.
IEEE Trans. Dependable Secur. Comput.
20 (5) (2023)
Fei Peng
,
Tongxin Liao
,
Min Long
,
Jin Li
,
Wensheng Zhang
,
Yicong Zhou
Semi-Fragile Reversible Watermarking for 3D Models Using Spherical Crown Volume Division.
IEEE Trans. Circuits Syst. Video Technol.
33 (11) (2023)
Chun Ding
,
Meimin Wang
,
Zhili Zhou
,
Teng Huang
,
Xiaoliang Wang
,
Jin Li
Siamese transformer network-based similarity metric learning for cross-source remote sensing image retrieval.
Neural Comput. Appl.
35 (11) (2023)
Mengdie Huang
,
Yi Xie
,
Xiaofeng Chen
,
Jin Li
,
Changyu Dong
,
Zheli Liu
,
Willy Susilo
Boost Off/On-Manifold Adversarial Robustness for Deep Learning with Latent Representation Mixup.
AsiaCCS
(2023)
Nan Jiang
,
Jie Wen
,
Jin Li
,
Ximeng Liu
,
Di Jin
GATrust: A Multi-Aspect Graph Attention Network Model for Trust Assessment in OSNs.
IEEE Trans. Knowl. Data Eng.
35 (6) (2023)
Yuling Chen
,
Hui Zhou
,
Tao Li
,
Jin Li
,
Huiyu Zhou
Multifactor Incentive Mechanism for Federated Learning in IoT: A Stackelberg Game Approach.
IEEE Internet Things J.
10 (24) (2023)
Zhili Zhou
,
Yujiang Li
,
Jin Li
,
Keping Yu
,
Guang Kou
,
Meimin Wang
,
Brij Bhooshan Gupta
GAN-Siamese Network for Cross-Domain Vehicle Re-Identification in Intelligent Transport Systems.
IEEE Trans. Netw. Sci. Eng.
10 (5) (2023)
Pei Liu
,
Qingxin Xia
,
Kui Liu
,
Juncai Guo
,
Xin Wang
,
Jin Li
,
John C. Grundy
,
Li Li
Towards automated Android app internationalisation: An exploratory study.
J. Syst. Softw.
197 (2023)
Zhili Zhou
,
Chun Ding
,
Jin Li
,
Eman Mohammadi
,
Guangcan Liu
,
Yimin Yang
,
Q. M. Jonathan Wu
Sequential Order-Aware Coding-Based Robust Subspace Clustering for Human Action Recognition in Untrimmed Videos.
IEEE Trans. Image Process.
32 (2023)
Haoyang Li
,
Qingqing Ye
,
Haibo Hu
,
Jin Li
,
Leixia Wang
,
Chengfang Fang
,
Jie Shi
3DFed: Adaptive and Extensible Framework for Covert Backdoor Attack in Federated Learning.
SP
(2023)
Jiaxing Li
,
Jigang Wu
,
Long Chen
,
Jin Li
,
Siew-Kei Lam
Blockchain-Based Secure Key Management for Mobile Edge Computing.
IEEE Trans. Mob. Comput.
22 (1) (2023)
Hao Yan
,
Feng Lin
,
Jin Li
,
Meng Zhang
,
Zhisheng Yan
,
Jian Xiao
,
Kui Ren
Ghost-Probe: NLOS Pedestrian Rushing Detection with Monocular Camera for Automated Driving.
SenSys
(2023)
Li Hu
,
Jin Li
,
Guanbiao Lin
,
Shiyu Peng
,
Zhenxin Zhang
,
Yingying Zhang
,
Changyu Dong
Defending Against Membership Inference Attacks With High Utility by GAN.
IEEE Trans. Dependable Secur. Comput.
20 (3) (2023)
Kanghua Mo
,
Weixuan Tang
,
Jin Li
,
Xu Yuan
Attacking Deep Reinforcement Learning With Decoupled Adversarial Policy.
IEEE Trans. Dependable Secur. Comput.
20 (1) (2023)
Qiuyu Qian
,
Qingqing Ye
,
Haibo Hu
,
Kai Huang
,
Tom Tak-Lam Chan
,
Jin Li
Collaborative Sampling for Partial Multi-Dimensional Value Collection Under Local Differential Privacy.
IEEE Trans. Inf. Forensics Secur.
18 (2023)
Jiqiang Gao
,
Boyu Hou
,
Xiaojie Guo
,
Zheli Liu
,
Ying Zhang
,
Kai Chen
,
Jin Li
Secure Aggregation is Insecure: Category Inference Attack on Federated Learning.
IEEE Trans. Dependable Secur. Comput.
20 (1) (2023)
Zijie Pan
,
Li Hu
,
Weixuan Tang
,
Jin Li
,
Yi He
,
Zheli Liu
Privacy-Preserving Multi-Granular Federated Neural Architecture Search - A General Framework.
IEEE Trans. Knowl. Data Eng.
35 (3) (2023)
Tianqing Zhu
,
Jin Li
,
Xiangyu Hu
,
Ping Xiong
,
Wanlei Zhou
The Dynamic Privacy-Preserving Mechanisms for Online Dynamic Social Networks.
IEEE Trans. Knowl. Data Eng.
34 (6) (2022)
Weixuan Tang
,
Bin Li
,
Mauro Barni
,
Jin Li
,
Jiwu Huang
Improving Cost Learning for JPEG Steganography by Exploiting JPEG Domain Knowledge.
IEEE Trans. Circuits Syst. Video Technol.
32 (6) (2022)
Mohammed Atiquzzaman
,
Jin Li
,
Witold Pedrycz
Special issue on new advanced techniques in security of artificial intelligence.
J. Ambient Intell. Humaniz. Comput.
13 (3) (2022)
Xuekai Wei
,
Jin Li
,
Mingliang Zhou
,
Xianmin Wang
Contrastive distortion-level learning-based no-reference image-quality assessment.
Int. J. Intell. Syst.
37 (11) (2022)
Xiaojie Guo
,
Ye Han
,
Zheli Liu
,
Ding Wang
,
Yan Jia
,
Jin Li
Birds of a Feather Flock Together: How Set Bias Helps to Deanonymize You via Revealed Intersection Sizes.
USENIX Security Symposium
(2022)
Jin Li
,
Heng Ye
,
Tong Li
,
Wei Wang
,
Wenjing Lou
,
Y. Thomas Hou
,
Jiqiang Liu
,
Rongxing Lu
Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators.
IEEE Trans. Dependable Secur. Comput.
19 (1) (2022)
Wenjuan Li
,
Fei Tian
,
Jin Li
,
Yang Xiang
Evaluating intrusion sensitivity allocation with supervised learning in collaborative intrusion detection.
Concurr. Comput. Pract. Exp.
34 (16) (2022)
Haoran Yuan
,
Xiaofeng Chen
,
Jin Li
,
Tao Jiang
,
Jianfeng Wang
,
Robert H. Deng
Secure Cloud Data Deduplication with Efficient Re-Encryption.
IEEE Trans. Serv. Comput.
15 (1) (2022)
Chong-zhi Gao
,
Jin Li
,
Shi-bing Xia
,
Kim-Kwang Raymond Choo
,
Wenjing Lou
,
Changyu Dong
MAS-Encryption and its Applications in Privacy-Preserving Classifiers.
IEEE Trans. Knowl. Data Eng.
34 (5) (2022)
Wenjuan Li
,
Yu Wang
,
Weizhi Meng
,
Jin Li
,
Chunhua Su
BlockCSDN: Towards Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking.
IEICE Trans. Inf. Syst.
(2) (2022)
Zheli Liu
,
Siyi Lv
,
Jin Li
,
Yanyu Huang
,
Liang Guo
,
Yali Yuan
,
Changyu Dong
EncodeORE: Reducing Leakage and Preserving Practicality in Order-Revealing Encryption.
IEEE Trans. Dependable Secur. Comput.
19 (3) (2022)
Tianqing Zhu
,
Wei Zhou
,
Dayong Ye
,
Zishuo Cheng
,
Jin Li
Resource Allocation in IoT Edge Computing via Concurrent Federated Reinforcement Learning.
IEEE Internet Things J.
9 (2) (2022)
Zheli Liu
,
Yanyu Huang
,
Xiangfu Song
,
Bo Li
,
Jin Li
,
Yali Yuan
,
Changyu Dong
Eurus: Towards an Efficient Searchable Symmetric Encryption With Size Pattern Protection.
IEEE Trans. Dependable Secur. Comput.
19 (3) (2022)
Jian Shen
,
Tiantian Miao
,
Jin-Feng Lai
,
Xiaofeng Chen
,
Jin Li
,
Shui Yu
IMS: An Identity-Based Many-to-Many Subscription Scheme With Efficient Key Management for Wireless Broadcast Systems.
IEEE Trans. Serv. Comput.
15 (3) (2022)
Xiaojie Guo
,
Jin Li
,
Zheli Liu
,
Yu Wei
,
Xiao Zhang
,
Changyu Dong
Labrador: towards fair and auditable data sharing in cloud computing with long-term privacy.
Sci. China Inf. Sci.
65 (5) (2022)
Wenjuan Li
,
Yu Wang
,
Jin Li
Enhancing blockchain-based filtration mechanism via IPFS for collaborative intrusion detection in IoT networks.
J. Syst. Archit.
127 (2022)
Fu-Zhao Ou
,
Yuan-Gen Wang
,
Jin Li
,
Guopu Zhu
,
Sam Kwong
A Novel Rank Learning Based No-Reference Image Quality Assessment Method.
IEEE Trans. Multim.
24 (2022)
Wenjuan Li
,
Yu Wang
,
Zhiping Jin
,
Keping Yu
,
Jin Li
,
Yang Xiang
Challenge-based collaborative intrusion detection in software-defined networking: an evaluation.
Digit. Commun. Networks
7 (2) (2021)
Nikolay Ivanov
,
Jianzhi Lou
,
Ting Chen
,
Jin Li
,
Qiben Yan
Targeting the Weakest Link: Social Engineering Attacks in Ethereum Smart Contracts.
CoRR
(2021)
Biwen Chen
,
Zhongming Wang
,
Tao Xiang
,
Lei Yang
,
Hongyang Yan
,
Jin Li
ABAC: Anonymous Bilateral Access Control Protocol with Traceability for Fog-Assisted Mobile Crowdsensing.
DMBD (2)
(2021)
Zhongming Wang
,
Biwen Chen
,
Tao Xiang
,
Lu Zhou
,
Yan-Hong Liu
,
Jin Li
Public Key Based Searchable Encryption with Fine-Grained Sender Permission Control.
ProvSec
(2021)
Yuan-Gen Wang
,
Guopu Zhu
,
Jin Li
,
Mauro Conti
,
Jiwu Huang
Defeating Lattice-Based Data Hiding Code Via Decoding Security Hole.
IEEE Trans. Circuits Syst. Video Technol.
31 (1) (2021)
Yanyu Huang
,
Siyi Lv
,
Zheli Liu
,
Xiangfu Song
,
Jin Li
,
Yali Yuan
,
Changyu Dong
Cetus: an efficient symmetric searchable encryption against file-injection attack with SGX.
Sci. China Inf. Sci.
64 (8) (2021)
Weixuan Tang
,
Bin Li
,
Mauro Barni
,
Jin Li
,
Jiwu Huang
Improving Cost Learning for JPEG Steganography by Exploiting JPEG Domain Knowledge.
CoRR
(2021)
Wenjuan Li
,
Yu Wang
,
Jin Li
,
Man Ho Au
Toward a blockchain-based framework for challenge-based collaborative intrusion detection.
Int. J. Inf. Sec.
20 (2) (2021)
Xiaoli Liu
,
Jianqin Yin
,
Jin Li
,
Pengxiang Ding
,
Jun Liu
,
Huaping Liu
TrajectoryCNN: A New Spatio-Temporal Feature Learning Network for Human Motion Prediction.
IEEE Trans. Circuits Syst. Video Technol.
31 (6) (2021)
Jin Li
,
Yanyu Huang
,
Yu Wei
,
Siyi Lv
,
Zheli Liu
,
Changyu Dong
,
Wenjing Lou
Searchable Symmetric Encryption with Forward Search Privacy.
IEEE Trans. Dependable Secur. Comput.
18 (1) (2021)
Wenbin Chen
,
Jin Li
,
Zhengan Huang
,
Chongzhi Gao
,
Siu-Ming Yiu
,
Zoe Lin Jiang
Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key.
J. Comput. Syst. Sci.
120 (2021)
Tong Li
,
Jin Li
,
Xiaofeng Chen
,
Zheli Liu
,
Wenjing Lou
,
Y. Thomas Hou
NPMML: A Framework for Non-Interactive Privacy-Preserving Multi-Party Machine Learning.
IEEE Trans. Dependable Secur. Comput.
18 (6) (2021)
Nikolay Ivanov
,
Jianzhi Lou
,
Ting Chen
,
Jin Li
,
Qiben Yan
Targeting the Weakest Link: Social Engineering Attacks in Ethereum Smart Contracts.
AsiaCCS
(2021)
Yan Meng
,
Haojin Zhu
,
Jinlei Li
,
Jin Li
,
Yao Liu
Liveness Detection for Voice User Interface via Wireless Signals in IoT Environment.
IEEE Trans. Dependable Secur. Comput.
18 (6) (2021)
Changhui Hu
,
Jin Li
,
Zheli Liu
,
Xiaojie Guo
,
Yu Wei
,
Xuan Guang
,
Grigorios Loukides
,
Changyu Dong
How to Make Private Distributed Cardinality Estimation Practical, and Get Differential Privacy for Free.
USENIX Security Symposium
(2021)
Zheli Liu
,
Jin Li
,
Ilsun You
,
Siu-Ming Yiu
Editorial: Security and Privacy in Computing and Communications.
Mob. Networks Appl.
26 (4) (2021)
Xiaofeng Chen
,
Hui Li
,
Jin Li
,
Qian Wang
,
Xinyi Huang
,
Willy Susilo
,
Yang Xiang
Publicly Verifiable Databases With All Efficient Updating Operations.
IEEE Trans. Knowl. Data Eng.
33 (12) (2021)
Weixuan Tang
,
Bin Li
,
Mauro Barni
,
Jin Li
,
Jiwu Huang
An Automatic Cost Learning Framework for Image Steganography Using Deep Reinforcement Learning.
IEEE Trans. Inf. Forensics Secur.
16 (2021)
Xiaojie Guo
,
Zheli Liu
,
Jin Li
,
Jiqiang Gao
,
Boyu Hou
,
Changyu Dong
,
Thar Baker
VeriFL: Communication-Efficient and Fast Verifiable Aggregation for Federated Learning.
IEEE Trans. Inf. Forensics Secur.
16 (2021)
Xianmin Wang
,
Xiaohui Kuang
,
Jin Li
,
Jing Li
,
Xiaofeng Chen
,
Zheli Liu
Oblivious Transfer for Privacy-Preserving in VANET's Feature Matching.
IEEE Trans. Intell. Transp. Syst.
22 (7) (2021)
Changhui Hu
,
Jin Li
,
Zheli Liu
,
Xiaojie Guo
,
Yu Wei
,
Xuan Guang
,
Grigorios Loukides
,
Changyu Dong
How to Make Private Distributed Cardinality Estimation Practical, and Get Differential Privacy for Free.
IACR Cryptol. ePrint Arch.
2020 (2020)
Jin Li
,
Changyu Dong
,
Francesco Palmieri
Special issue on advanced techniques for security and privacy of internet-of-things with machine learning.
J. Netw. Comput. Appl.
167 (2020)
Yanyu Huang
,
Bo Li
,
Zheli Liu
,
Jin Li
,
Siu-Ming Yiu
,
Thar Baker
,
Brij B. Gupta
ThinORAM: Towards Practical Oblivious Data Access in Fog Computing Environment.
IEEE Trans. Serv. Comput.
13 (4) (2020)
Zheli Liu
,
Bo Li
,
Yanyu Huang
,
Jin Li
,
Yang Xiang
,
Witold Pedrycz
NewMCOS: Towards a Practical Multi-Cloud Oblivious Storage Scheme.
IEEE Trans. Knowl. Data Eng.
32 (4) (2020)
Yu Chen
,
Fang Luo
,
Tong Li
,
Tao Xiang
,
Zheli Liu
,
Jin Li
A training-integrity privacy-preserving federated learning scheme with trusted execution environment.
Inf. Sci.
522 (2020)
Nan Jiang
,
Fang Tian
,
Jin Li
,
Xu Yuan
,
Jiaqi Zheng
MAN: Mutual Attention Neural Networks Model for Aspect-Level Sentiment Classification in SIoT.
IEEE Internet Things J.
7 (4) (2020)
Jian Shen
,
Dengzhi Liu
,
Xiaofeng Chen
,
Jin Li
,
Neeraj Kumar
,
Pandi Vijayakumar
Secure Real-Time Traffic Data Aggregation With Batch Verification for Vehicular Cloud in VANETs.
IEEE Trans. Veh. Technol.
69 (1) (2020)
Xianmin Wang
,
Jing Li
,
Xiaohui Kuang
,
Yu-an Tan
,
Jin Li
The security of machine learning in an adversarial setting: A survey.
J. Parallel Distributed Comput.
130 (2019)
Xuan Li
,
Jin Li
,
Siu-Ming Yiu
,
Chongzhi Gao
,
Jinbo Xiong
Privacy-preserving edge-assisted image retrieval and classification in IoT.
Frontiers Comput. Sci.
13 (5) (2019)
Wenjuan Li
,
Yu Wang
,
Jin Li
,
Man Ho Au
Towards Blockchained Challenge-Based Collaborative Intrusion Detection.
ACNS Workshops
(2019)
Jin Li
,
Tong Li
,
Zheli Liu
,
Xiaofeng Chen
Secure Deduplication System with Active Key Update and Its Application in IoT.
ACM Trans. Intell. Syst. Technol.
10 (6) (2019)
Jin Li
,
Xiaofeng Liao
,
Nicolas Puech
Security and privacy in IoT communication.
Ann. des Télécommunications
74 (7-8) (2019)
Fu-Zhao Ou
,
Yuan-Gen Wang
,
Jin Li
,
Guopu Zhu
,
Sam Kwong
Controllable List-wise Ranking for Universal No-reference Image Quality Assessment.
CoRR
(2019)
Zhiwei Zhang
,
Xiaofeng Chen
,
Jin Li
,
Xiaoling Tao
,
Jianfeng Ma
HVDB: a hierarchical verifiable database scheme with scalable updates.
J. Ambient Intell. Humaniz. Comput.
10 (8) (2019)
Jing Li
,
Licheng Wang
,
Lihua Wang
,
Xianmin Wang
,
Zhengan Huang
,
Jin Li
Verifiable Chebyshev maps-based chaotic encryption schemes with outsourcing computations in the cloud/fog scenarios.
Concurr. Comput. Pract. Exp.
31 (22) (2019)
Hongyang Yan
,
Yu Wang
,
Chunfu Jia
,
Jin Li
,
Yang Xiang
,
Witold Pedrycz
IoT-FBAC: Function-based access control scheme using identity-based encryption in IoT.
Future Gener. Comput. Syst.
95 (2019)
Bo Li
,
Yanyu Huang
,
Zheli Liu
,
Jin Li
,
Zhihong Tian
,
Siu-Ming Yiu
HybridORAM: Practical oblivious cloud storage with constant bandwidth.
Inf. Sci.
479 (2019)
Xianmin Wang
,
Jing Li
,
Jin Li
,
Hongyang Yan
Multilevel similarity model for high-resolution remote sensing image registration.
Inf. Sci.
505 (2019)
Jin Li
,
Francesco Palmieri
,
Yang Xiang
Special Issue on Security and Privacy in Machine Learning.
Inf. Sci.
487 (2019)
Lingling Xu
,
Jin Li
,
Xiaofeng Chen
,
Wanhua Li
,
Shaohua Tang
,
Hao-Tian Wu
Tc-PEDCKS: Towards time controlled public key encryption with delegatable conjunctive keyword search for Internet of Things.
J. Netw. Comput. Appl.
128 (2019)
Jin Li
,
Francesco Palmieri
,
Qiben Yan
Special issue on advances in security and privacy in IoT.
J. Netw. Comput. Appl.
137 (2019)
Zhijun Wei
,
Jin Li
,
Xianmin Wang
,
Chong-Zhi Gao
A Lightweight Privacy-Preserving Protocol for VANETs Based on Secure Outsourcing Computing.
IEEE Access
7 (2019)
Zhengan Huang
,
Junzuo Lai
,
Wenbin Chen
,
Man Ho Au
,
Zhen Peng
,
Jin Li
Simulation-based selective opening security for receivers under chosen-ciphertext attacks.
Des. Codes Cryptogr.
87 (6) (2019)
Yinghui Zhang
,
Jiangang Shu
,
Ximeng Liu
,
Jin Li
,
Dong Zheng
Comments on "A Large-Scale Concurrent Data Anonymous Batch Verification Scheme for Mobile Healthcare Crowd Sensing".
IEEE Internet Things J.
6 (1) (2019)
Licheng Wang
,
Lixiang Li
,
Jin Li
,
Jing Li
,
Brij B. Gupta
,
Xia Liu
Compressive Sensing of Medical Images With Confidentially Homomorphic Aggregations.
IEEE Internet Things J.
6 (2) (2019)
Yinghui Zhang
,
Robert H. Deng
,
Dong Zheng
,
Jin Li
,
Pengfei Wu
,
Jin Cao
Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-Assisted Industrial IoT.
IEEE Trans. Ind. Informatics
15 (9) (2019)
Yulin Wu
,
Xuan Wang
,
Zoe Lin Jiang
,
Xuan Li
,
Jin Li
,
Siu-Ming Yiu
,
Zechao Liu
,
Hainan Zhao
,
Chunkai Zhang
Towards Secure Cloud Data Similarity Retrieval: Privacy Preserving Near-Duplicate Image Data Detection.
ICA3PP (4)
(2018)
Waixi Liu
,
Jin Li
,
Jun Cai
,
Yu Wang
,
Xiao-Chu Liu
,
Shun-Zheng Yu
COD: caching on demand in information-centric networking.
Telecommun. Syst.
69 (3) (2018)
Zhengan Huang
,
Junzuo Lai
,
Wenbin Chen
,
Man Ho Au
,
Zhen Peng
,
Jin Li
Simulation-Based Selective Opening Security for Receivers under Chosen-Ciphertext Attacks.
IACR Cryptol. ePrint Arch.
2018 (2018)
Zhengan Huang
,
Junzuo Lai
,
Wenbin Chen
,
Man Ho Au
,
Zhen Peng
,
Jin Li
Hedged Nonce-Based Public-Key Encryption: Adaptive Security under Randomness Failures.
IACR Cryptol. ePrint Arch.
2018 (2018)
Wenjuan Li
,
Weizhi Meng
,
Yu Wang
,
Jinguang Han
,
Jin Li
Towards Securing Challenge-Based Collaborative Intrusion Detection Networks via Message Verification.
ISPEC
(2018)
Zheli Liu
,
Zhendong Wu
,
Tong Li
,
Jin Li
,
Chao Shen
GMM and CNN Hybrid Method for Short Utterance Speaker Recognition.
IEEE Trans. Ind. Informatics
14 (7) (2018)
Zheli Liu
,
Tong Li
,
Ping Li
,
Chunfu Jia
,
Jin Li
Verifiable searchable encryption with aggregate keys for data sharing system.
Future Gener. Comput. Syst.
78 (2018)
Jin Li
,
Qiben Yan
,
Victor I. Chang
Internet of Things: Security and privacy in a connected world.
Future Gener. Comput. Syst.
78 (2018)