default search action
Zengpeng Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j37]Menghan Guo, Zengpeng Li, Xuejin Deng, Ding Luo, Jingyi Yang, Yingjun Chen, Weiwei Xue:
ConoDL: a deep learning framework for rapid generation and prediction of conotoxins. J. Comput. Aided Mol. Des. 39(1): 4 (2025) - 2024
- [j36]Zengpeng Li, Huiqun Yu, Guisheng Fan, Jiayin Zhang, Jin Xu:
Energy-efficient reliability-aware offloading for delay-sensitive tasks in collaborative edge computing. Concurr. Comput. Pract. Exp. 36(13) (2024) - [j35]Jiayin Zhang, Huiqun Yu, Guisheng Fan, Zengpeng Li, Jin Xu, Jun Li:
Handling hierarchy in cloud data centers: A Hyper-Heuristic approach for resource contention and energy-aware Virtual Machine management. Expert Syst. Appl. 249: 123528 (2024) - [j34]Guiyun Qin, Pengtao Liu, Chengyu Hu, Zengpeng Li, Shanqing Guo:
Controlled Search: Building Inverted-Index PEKS With Less Leakage in Multiuser Setting. IEEE Internet Things J. 11(1): 403-417 (2024) - [j33]Zengpeng Li, Mei Wang, Teik Guan Tan, Jianying Zhou:
Funder: Future-Proof Unbiased Decentralized Randomness. IEEE Internet Things J. 11(6): 10352-10367 (2024) - [j32]Jiayin Zhang, Huiqun Yu, Guisheng Fan, Qifeng Tang, Zengpeng Li, Jin Xu:
Cold-Start-Aware Cloud-Native Parallel Service Function Chain Caching in Edge-Cloud Network. IEEE Internet Things J. 11(11): 20340-20356 (2024) - [j31]Zengpeng Li, Huiqun Yu, Guisheng Fan, Jiayin Zhang, Jin Xu:
Energy-efficient offloading for DNN-based applications in edge-cloud computing: A hybrid chaotic evolutionary approach. J. Parallel Distributed Comput. 187: 104850 (2024) - [j30]Yuhang Song, Ruijin Wang, Zengpeng Li, Sahil Garg, Georges Kaddoum, Mubarak Alrashoud:
Lightweight Infrared and Visible Image Fusion Technique: Guided Gradient Optimization Driven. IEEE Trans. Consumer Electron. 70(4): 7233-7243 (2024) - [j29]Jin Xu, Huiqun Yu, Guisheng Fan, Jiayin Zhang, Zengpeng Li, Qifeng Tang:
Adaptive edge service deployment in burst load scenarios using deep reinforcement learning. J. Supercomput. 80(4): 5446-5471 (2024) - [j28]Jiayin Zhang, Huiqun Yu, Guisheng Fan, Zengpeng Li:
Elastic Task Offloading and Resource Allocation Over Hybrid Cloud: A Reinforcement Learning Approach. IEEE Trans. Netw. Serv. Manag. 21(2): 1983-1997 (2024) - [i9]Hanze Guo, Yebo Feng, Cong Wu, Zengpeng Li, Jiahua Xu:
Benchmarking ZK-Friendly Hash Functions and SNARK Proving Systems for EVM-compatible Blockchains. CoRR abs/2409.01976 (2024) - 2023
- [j27]Bithin Alangot, Pawel Szalachowski, Tien Tuan Anh Dinh, Souhail Meftah, Jeff Ivanos Gana, Khin Mi Mi Aung, Zengpeng Li:
Decentralized Identity Authentication with Auditability and Privacy. Algorithms 16(1): 4 (2023) - [j26]Zengpeng Li, Huiqun Yu, Guisheng Fan, Qifeng Tang, Jiayin Zhang, Liqiong Chen:
Cost-efficient security-aware scheduling for dependent tasks with endpoint contention in edge computing. Comput. Commun. 211: 119-133 (2023) - [j25]Guiyun Qin, Pengtao Liu, Chengyu Hu, Zengpeng Li, Shanqing Guo:
Retrieval Transformation: Dynamic Searchable Symmetric Encryption With Strong Security. IEEE Syst. J. 17(4): 5519-5530 (2023) - [j24]Zengpeng Li, Mei Wang, Vishal Sharma, Prosanta Gope:
Sustainable and Round-Optimized Group Authenticated Key Exchange in Vehicle Communication. IEEE Trans. Intell. Transp. Syst. 24(12): 15400-15413 (2023) - [j23]Zengpeng Li, Huiqun Yu, Guisheng Fan:
Cost-effective approaches for deadline-constrained workflow scheduling in clouds. J. Supercomput. 79(7): 7484-7512 (2023) - [j22]Prosanta Gope, Yuening Wang, Zengpeng Li, Biplab Sikdar:
QR-PUF: Design and Implementation of a RFID-Based Secure Inpatient Management System Using XOR-Arbiter-PUF and QR-Code. IEEE Trans. Netw. Sci. Eng. 10(5): 2637-2650 (2023) - [j21]Guisheng Fan, Xingpeng Chen, Zengpeng Li, Huiqun Yu, Yingxue Zhang:
An Energy-Efficient Dynamic Scheduling Method of Deadline-Constrained Workflows in a Cloud Environment. IEEE Trans. Netw. Serv. Manag. 20(3): 3089-3103 (2023) - [j20]Zengpeng Li, Huiqun Yu, Guisheng Fan, Jiayin Zhang:
Cost-Efficient Fault-Tolerant Workflow Scheduling for Deadline-Constrained Microservice-Based Applications in Clouds. IEEE Trans. Netw. Serv. Manag. 20(3): 3220-3232 (2023) - [c12]Teik Guan Tan, Vishal Sharma, Zengpeng Li, Pawel Szalachowski, Jianying Zhou:
ZKBdf: A ZKBoo-Based Quantum-Secure Verifiable Delay Function with Prover-Secret. ACNS Workshops 2023: 530-550 - [c11]Ivan Homoliak, Zengpeng Li, Pawel Szalachowski:
BBB-Voting: Self-Tallying End-to-End Verifiable 1-out-of-k Blockchain-Based Boardroom Voting. Blockchain 2023: 297-306 - [e1]Jianying Zhou, Lejla Batina, Zengpeng Li, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Mohammad Ashiqur Rahman, Jun Shao, Masaki Shimaoka, Ezekiel O. Soremekun, Chunhua Su, Je Sen Teh, Aleksei Udovenko, Cong Wang, Leo Yu Zhang, Yury Zhauniarovich:
Applied Cryptography and Network Security Workshops - ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings. Lecture Notes in Computer Science 13907, Springer 2023, ISBN 978-3-031-41180-9 [contents] - 2022
- [j19]Jiayin Zhang, Huiqun Yu, Guisheng Fan, Zengpeng Li:
Cold-start aware cloud-native service function chain caching in resource-constrained edge: A reinforcement learning approach. Comput. Commun. 195: 334-345 (2022) - [j18]Zengpeng Li, Huiqun Yu, Guisheng Fan:
Time-cost efficient memory configuration for serverless workflow applications. Concurr. Comput. Pract. Exp. 34(27) (2022) - [j17]Vishal Sharma, Zengpeng Li, Pawel Szalachowski, Teik Guan Tan, Jianying Zhou:
Reinshard: An Optimally Sharded Dual-Blockchain for Concurrency Resolution. Distributed Ledger Technol. Res. Pract. 1(1): 1-23 (2022) - [j16]Mei Wang, Kun He, Jing Chen, Ruiying Du, Bingsheng Zhang, Zengpeng Li:
PANDA: Lightweight non-interactive privacy-preserving data aggregation for constrained devices. Future Gener. Comput. Syst. 131: 28-42 (2022) - [j15]Zengpeng Li, Ding Wang, Eduardo Morais:
Quantum-Safe Round-Optimal Password Authentication for Mobile Devices. IEEE Trans. Dependable Secur. Comput. 19(3): 1885-1899 (2022) - [j14]Zengpeng Li, Ding Wang:
Achieving One-Round Password-Based Authenticated Key Exchange over Lattices. IEEE Trans. Serv. Comput. 15(1): 308-321 (2022) - [i8]Zheng Yang, Chenglu Jin, Jianting Ning, Zengpeng Li, Tien Tuan Anh Dinh, Jianying Zhou:
Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location. IACR Cryptol. ePrint Arch. 2022: 1280 (2022) - [i7]Teik Guan Tan, Vishal Sharma, Zengpeng Li, Pawel Szalachowski, Jianying Zhou:
ZKBdf: A ZKBoo-based Quantum-Secure Verifiable Delay Function with Prover-secret. IACR Cryptol. ePrint Arch. 2022: 1373 (2022) - 2021
- [j13]Zengpeng Li, Vishal Sharma, Chunguang Ma, Chunpeng Ge, Willy Susilo:
Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs. Sci. China Inf. Sci. 64(6) (2021) - [j12]Zengpeng Li, Zheng Yang, Pawel Szalachowski, Jianying Zhou:
Building Low-Interactivity Multifactor Authenticated Key Exchange for Industrial Internet of Things. IEEE Internet Things J. 8(2): 844-859 (2021) - [j11]Zengpeng Li, Chunguang Ma, Ding Wang:
Leakage Resilient Leveled FHE on Multiple Bits Message. IEEE Trans. Big Data 7(5): 845-858 (2021) - [j10]Xinrui Ge, Jia Yu, Hanlin Zhang, Chengyu Hu, Zengpeng Li, Zhan Qin, Rong Hao:
Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification. IEEE Trans. Dependable Secur. Comput. 18(1): 490-504 (2021) - [j9]Zengpeng Li, Mamoun Alazab, Sahil Garg, M. Shamim Hossain:
PriParkRec: Privacy-Preserving Decentralized Parking Recommendation Service. IEEE Trans. Veh. Technol. 70(5): 4037-4050 (2021) - [c10]Zheng Yang, Chenglu Jin, Jianting Ning, Zengpeng Li, Tien Tuan Anh Dinh, Jianying Zhou:
Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location. ACSAC 2021: 497-512 - [c9]Mei Wang, Kun He, Jing Chen, Zengpeng Li, Wei Zhao, Ruiying Du:
Biometrics-Authenticated Key Exchange for Secure Messaging. CCS 2021: 2618-2631 - [c8]Daniël Reijsbergen, Pawel Szalachowski, Junming Ke, Zengpeng Li, Jianying Zhou:
LaKSA: A Probabilistic Proof-of-Stake Protocol. NDSS 2021 - [i6]Bingsheng Zhang, Zengpeng Li, Jan Willemson:
UC Modelling and Security Analysis of the Estonian IVXV Internet Voting System. CoRR abs/2109.01994 (2021) - [i5]Zengpeng Li, Teik Guan Tan, Pawel Szalachowski, Vishal Sharma, Jianying Zhou:
Post-Quantum VRF and its Applications in Future-Proof Blockchain System. CoRR abs/2109.02012 (2021) - [i4]Vishal Sharma, Zengpeng Li, Pawel Szalachowski, Teik Guan Tan, Jianying Zhou:
Reinshard: An optimally sharded dual-blockchain for concurrency resolution. CoRR abs/2109.07316 (2021) - 2020
- [j8]Shuguang Zhang, Hequn Xian, Zengpeng Li, Liming Wang:
SecDedup: Secure Encrypted Data Deduplication With Dynamic Ownership Updating. IEEE Access 8: 186323-186334 (2020) - [j7]Zengpeng Li, Vishal Sharma, Saraju P. Mohanty:
Preserving Data Privacy via Federated Learning: Challenges and Solutions. IEEE Consumer Electron. Mag. 9(3): 8-16 (2020) - [j6]Zengpeng Li, Jiuru Wang, Wenyin Zhang:
Revisiting post-quantum hash proof systems over lattices for Internet of Thing authentications. J. Ambient Intell. Humaniz. Comput. 11(8): 3337-3347 (2020) - [j5]Zengpeng Li, Chunguang Ma, Ding Wang:
Achieving Multi-Hop PRE via Branching Program. IEEE Trans. Cloud Comput. 8(1): 45-58 (2020) - [i3]Daniël Reijsbergen, Pawel Szalachowski, Junming Ke, Zengpeng Li, Jianying Zhou:
ProPoS: A Probabilistic Proof-of-Stake Protocol. CoRR abs/2006.01427 (2020) - [i2]Sarad Venugopalan, Ivan Homoliak, Zengpeng Li, Pawel Szalachowski:
BBB-Voting: 1-out-of-k Blockchain-Based Boardroom Voting. CoRR abs/2010.09112 (2020)
2010 – 2019
- 2018
- [j4]Zengpeng Li, Chunguang Ma, Hong-Sheng Zhou:
Multi-key FHE for multi-bit messages. Sci. China Inf. Sci. 61(2): 029101:1-029101:3 (2018) - [j3]Zengpeng Li, Can Xiang, Chengyu Wang:
Oblivious Transfer via Lossy Encryption from Lattice-Based Cryptography. Wirel. Commun. Mob. Comput. 2018: 5973285:1-5973285:11 (2018) - [c7]Zengpeng Li, Ding Wang:
Two-Round PAKE Protocol over Lattices Without NIZK. Inscrypt 2018: 138-159 - 2017
- [j2]Zengpeng Li, Chunguang Ma, Ding Wang:
Towards Multi-Hop Homomorphic Identity-Based Proxy Re-Encryption via Branching Program. IEEE Access 5: 16214-16228 (2017) - [j1]Zengpeng Li, Chunguang Ma, Ding Wang, Gang Du:
Toward single-server private information retrieval protocol via learning with errors. J. Inf. Secur. Appl. 34: 280-284 (2017) - [c6]Gang Du, Chunguang Ma, Zengpeng Li, Ding Wang:
Towards Fully Homomorphic Encryption From Gentry-Peikert-Vaikuntanathan Scheme. ICCCS (2) 2017: 256-267 - [c5]Lei Zhang, Chunguang Ma, Songtao Yang, Zengpeng Li:
An Uncertain Continuous Collaborative Users Finding Algorithm for Location Privacy Protection. MSWiM 2017: 215-218 - [c4]Zengpeng Li, Chunguang Ma, Ding Wang, Minghao Zhao, Qian Zhao, Lu Zhou:
Toward Proxy Re-encryption From Learning with Errors in the Exponent. TrustCom/BigDataSE/ICESS 2017: 683-690 - 2016
- [c3]Zengpeng Li, Chunguang Ma, Eduardo Morais, Gang Du:
Multi-bit Leveled Homomorphic Encryption via \mathsf Dual.LWE -Based. Inscrypt 2016: 221-242 - [c2]Zengpeng Li, Chunguang Ma, Gang Du, Weiping Ouyang:
Dual LWE-Based Fully Homomorphic Encryption with Errorless Key Switching. ICPADS 2016: 1169-1174 - [c1]Zengpeng Li, Steven D. Galbraith, Chunguang Ma:
Preventing Adaptive Key Recovery Attacks on the GSW Levelled Homomorphic Encryption Scheme. ProvSec 2016: 373-383 - [i1]Zengpeng Li, Steven D. Galbraith, Chunguang Ma:
Preventing Adaptive Key Recovery Attacks on the Gentry-Sahai-Waters Leveled Homomorphic Encryption Scheme. IACR Cryptol. ePrint Arch. 2016: 1146 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-27 00:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint