Login / Signup
Xiehua Li
ORCID
Publication Activity (10 Years)
Years Active: 2006-2023
Publications (10 Years): 11
Top Topics
Medical Care
Deep Learning
Data Sharing
Image Retrieval
Top Venues
ICAIS (2)
CoRR
TrustCom/BigDataSE
ICMIP
</>
Publications
</>
Arthur Sandor Voundi Koe
,
Shan Ai
,
Qi Chen
,
Juan Tang
,
Kongyang Chen
,
Shiwen Zhang
,
Xiehua Li
Hieraledger: Towards malicious gateways in appendable-block blockchain constructions for IoT.
Inf. Sci.
632 (2023)
Xin Liao
,
Siliang Chen
,
Jiaxin Chen
,
Tianyi Wang
,
Xiehua Li
CTP-Net: Character Texture Perception Network for Document Image Forgery Localization.
CoRR
(2023)
Sijie Li
,
Xiehua Li
Secure Image Retrieval Based on Deep Learning in Cloud Computing.
ICMIP
(2023)
Yingzhu Wang
,
Xiehua Li
,
Wanting Lei
,
Sijie Li
Privacy-Preserving Image Classification and Retrieval Scheme over Encrypted Images.
ICONIP (11)
(2023)
Renyong Wu
,
Jieming Ma
,
Zhixiang Tang
,
Xiehua Li
,
Kim-Kwang Raymond Choo
A Generic Secure Transmission Scheme Based on Random Linear Network Coding.
IEEE/ACM Trans. Netw.
30 (2) (2022)
Xiehua Li
,
Gang Long
,
Sijie Li
Encrypted Medical Records Search with Supporting of Fuzzy Multi-keyword and Relevance Ranking.
ICAIS (2)
(2021)
Jinrun Guo
,
Xiehua Li
,
Jie Jiang
A Decentralized Multi-authority ABE Scheme in Cooperative Medical Care System.
ICAIS (2)
(2020)
Voundi Koe Arthur Sandor
,
Yaping Lin
,
Xiehua Li
,
Feng Lin
,
Shiwen Zhang
Efficient decentralized multi-authority attribute based encryption for mobile cloud data storage.
J. Netw. Comput. Appl.
129 (2019)
Xiehua Li
,
Jie Jiang
,
Yichen Chen
Fully Decentralized Authentication and Revocation Scheme in Data Sharing Systems.
TrustCom/BigDataSE
(2018)
Xiehua Li
,
Ziyu Huang
Fully Decentralized Multi-Authority ABE Scheme in Data Sharing System.
SpaCCS Workshops
(2017)
Xiehua Li
,
Maoren Zhou
,
Ting Liu
云存储中基于MA-ABE的访问控制方案 (MA-ABE Access Control Scheme in Cloud Storage).
计算机科学
44 (2) (2017)
Humphrey Waita Njogu
,
Xiehua Li
Combating TCP Based Attacks on Mobile Devices.
CSSE (3)
(2008)
Xiehua Li
,
ShuTang Yang
,
Jian-Hua Li
,
HongWen Zhu
Security Protocol Analysis with Improved Authentication Tests.
ISPEC
(2006)