![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Ximing Li 0001
Person information
- affiliation: South China Agricultural University, Guangzhou, China
Other persons with the same name
- Ximing Li — disambiguation page
- Ximing Li 0002
— Jilin University, Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education, Jilin, China
- Ximing Li 0003
— Sun Yat-sen University, Guangzhou, China
- Ximing Li 0004
— Ohio University, Athens, OH, USA
- Ximing Li 0005
— Beijing University of Posts and Telecommunications, Key Laboratory of Trustworthy Distributed Computing and Service, Beijing, China
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Junyan Yu, Ximing Li
, Yubin Guo:
A Secure and Verifiable Blockchain-Based Framework for Personal Data Validation. Comput. 13(9): 240 (2024) - [j9]Ximing Li, Hao Wang, Sha Ma, Meiyan Xiao, Qiong Huang:
Revocable and verifiable weighted attribute-based encryption with collaborative access for electronic health record in cloud. Cybersecur. 7(1): 18 (2024) - [j8]Ximing Li
, Yitao Zhuang
, Baihao You
, Zhe Wang
, Jiangsan Zhao, Yuefang Gao
, Deqin Xiao:
LDNet: High Accuracy Fish Counting Framework using Limited training samples with Density map generation Network. J. King Saud Univ. Comput. Inf. Sci. 36(7): 102143 (2024) - [c12]Zhe Wang
, Min Wang, Yitao Zhuang
, Yubin Guo
, Ximing Li
:
Enhancing Dense Object Counting in Occlusion with a Dual-Branch Network. ICIC (11) 2024: 121-132 - 2021
- [j7]Yunhao Ling, Sha Ma, Qiong Huang, Ximing Li
, Yijian Zhong, Yunzhi Ling:
Efficient Group ID-Based Encryption With Equality Test Against Insider Attack. Comput. J. 64(4): 661-674 (2021) - [j6]Yubin Guo, Yuhang Wu, Xiaopeng Zhang, Aofeng Bo, Ximing Li
:
The FRCK clustering algorithm for determining cluster number and removing outliers automatically. Int. J. Comput. Sci. Eng. 24(5): 485-494 (2021) - [c11]Ru Xiang, Sha Ma, Qiong Huang, Ximing Li
:
A CCA-Full-Anonymous Group Signature with Verifiable Controllable Linkability in the Standard Model. ProvSec 2021: 279-295 - 2020
- [j5]Yunhao Ling, Sha Ma
, Qiong Huang
, Ximing Li
, Yunzhi Ling:
Group public key encryption with equality test against offline message recovery attack. Inf. Sci. 510: 16-32 (2020)
2010 – 2019
- 2019
- [j4]Shlomi Dolev, Niv Gilboa, Ximing Li
:
Accumulating automata and cascaded equations automata for communicationless information theoretically secure multi-party computation. Theor. Comput. Sci. 795: 81-99 (2019) - [c10]Yunhao Ling, Sha Ma, Qiong Huang, Ru Xiang, Ximing Li
:
Group ID-Based Encryption with Equality Test. ACISP 2019: 39-57 - [c9]Ximing Li
, Weizhao Chen, Yubin Guo, Sha Ma, Qiong Huang:
Secure, Efficient and Searchable File System on Distributed Clouds. ICPCSEE (2) 2019: 246-266 - [c8]Sha Ma, Qiong Huang, Ximing Li
, Meiyan Xiao:
Plaintext-Verifiably-Checkable Encryption. ProvSec 2019: 149-166 - 2018
- [c7]Ximing Li, Weizhao Chen, Yubin Guo, Senyang Zhang, Qiong Huang:
Secure File Storage System Among Distributed Public Clouds. ICCCS (3) 2018: 277-289 - [c6]Yunhao Ling, Sha Ma, Qiong Huang, Ximing Li
:
A General Two-Server Framework for Ciphertext-Checkable Encryption Against Offline Message Recovery Attack. ICCCS (3) 2018: 370-382 - 2016
- [j3]Shlomi Dolev
, Ephraim Korach, Ximing Li
, Yin Li, Galit Uzan:
Magnifying computing gaps: Establishing encrypted communication over unidirectional channels. Theor. Comput. Sci. 636: 17-26 (2016) - 2015
- [c5]Hillel Avni, Shlomi Dolev, Niv Gilboa
, Ximing Li
:
SSSDB: Database with Private Information Search. ALGOCLOUD 2015: 49-61 - [c4]Shlomi Dolev
, Niv Gilboa
, Ximing Li
:
Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation: Extended Abstract. SCC@ASIACCS 2015: 21-29 - 2014
- [i1]Shlomi Dolev, Niv Gilboa, Ximing Li:
Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation. IACR Cryptol. ePrint Arch. 2014: 611 (2014) - 2013
- [j2]Yubin Guo, Liankuan Zhang, Fengren Lin, Ximing Li
:
A Solution for Privacy-Preserving Data Manipulation and Query on NoSQL Database. J. Comput. 8(6): 1427-1432 (2013) - [j1]Yubin Guo, Zeye Cai, Zewei Lin, Ximing Li
:
Design and Implementation of a Flexible Workflow Management System. J. Softw. 8(12): 3060-3065 (2013) - 2012
- [c3]Shlomi Dolev, Nova Fandina, Ximing Li
:
Nested Merkle's Puzzles against Sampling Attacks. Inscrypt 2012: 157-174 - [c2]Weiwei Sun, Bo Yang, Qiong Huang, Sha Ma, Ximing Li
:
Multi-Committer Threshold Commitment Scheme from Lattice. PAISI 2012: 162-175
2000 – 2009
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-22 21:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint