default search action
Bingyu Li
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Tao Zhang, Qianhong Wu, Qin Wang, Tianxu Han, Bingyu Li, Yan Zhu:
Covert communication via blockchain: Hiding patterns and communication patterns. Comput. Stand. Interfaces 90: 103851 (2024) - [j15]Fengrui Kang, Xianying Huang, Bingyu Li:
RAR: Recombination and augmented replacement method for insertion-based lexically constrained text generation. Neurocomputing 597: 127985 (2024) - [j14]Lifan Sun, Bingyu Li, Dan Gao, Bo Fan:
Adaptive multi-object tracking algorithm based on split trajectory. J. Supercomput. 80(15): 22287-22314 (2024) - [c27]Haojian Huang, Xiaozhen Qiao, Zhuo Chen, Haodong Chen, Bingyu Li, Zhe Sun, Mulin Chen, Xuelong Li:
CREST: Cross-modal Resonance through Evidential Deep Learning for Enhanced Zero-Shot Learning. ACM Multimedia 2024: 5181-5190 - [c26]Aozhuo Sun, Jingqiang Lin, Wei Wang, Zeyan Liu, Bingyu Li, Shushang Wen, Qiongxiao Wang, Fengjun Li:
Certificate Transparency Revisited: The Public Inspections on Third-party Monitors. NDSS 2024 - [c25]Jie Liu, Bingyu Li, Xuhao Du, Ziwen Cai:
Research on two-stage V2G optimal scheduling strategy for electric vehicles considering scheduling priority. PEAI 2024: 895-901 - [i4]Haojian Huang, Xiaozhen Qiao, Zhuo Chen, Haodong Chen, Bingyu Li, Zhe Sun, Mulin Chen, Xuelong Li:
CREST: Cross-modal Resonance through Evidential Deep Learning for Enhanced Zero-Shot Learning. CoRR abs/2404.09640 (2024) - [i3]Bingyu Li, Da Zhang, Zhiyuan Zhao, Junyu Gao, Xuelong Li:
U3M: Unbiased Multiscale Modal Fusion Model for Multimodal Semantic Segmentation. CoRR abs/2405.15365 (2024) - [i2]Bingyu Li, Da Zhang, Zhiyuan Zhao, Junyu Gao, Xuelong Li:
StitchFusion: Weaving Any Visual Modalities to Enhance Multimodal Semantic Segmentation. CoRR abs/2408.01343 (2024) - [i1]Bingyu Li, Da Zhang, Zhiyuan Zhao, Junyu Gao, Yuan Yuan:
Quantum-inspired Interpretable Deep Learning Architecture for Text Sentiment Analysis. CoRR abs/2408.07891 (2024) - 2023
- [j13]Tao Zhang, Bingyu Li, Yan Zhu, Tianxu Han, Qianhong Wu:
Covert channels in blockchain and blockchain based covert communication: Overview, state-of-the-art, and future directions. Comput. Commun. 205: 136-146 (2023) - [j12]Kaiqi Du, Xia Jing, Yelu Zeng, Qixing Ye, Bingyu Li, Jianxi Huang:
An Improved Approach to Monitoring Wheat Stripe Rust with Sun-Induced Chlorophyll Fluorescence. Remote. Sens. 15(3): 693 (2023) - [c24]Bingyu Li, Xin Wang, Shengjie Zhang, Lihua Fu:
An Enhanced Moth-Flame Optimization Algorithm for UAVs 3D Path Planning. AIMLR 2023: 14:1-14:9 - [c23]Yang Yang, Bingyu Li, Shihong Xiong, Bo Qin, Yan Zhu, Haibin Zheng, Qianhong Wu:
IKE: Threshold Key Escrow Service with Intermediary Encryption. ICA3PP (3) 2023: 463-475 - [c22]Aozhuo Sun, Bingyu Li, Qiongxiao Wang, Huiqing Wan, Jingqiang Lin, Wei Wang:
Semi-CT: Certificates Transparent to Identity Owners but Opaque to Snoopers. ISCC 2023: 1207-1213 - [c21]Guangqi Liu, Qiongxiao Wang, Cunqing Ma, Jingqiang Lin, Yanduo Fu, Bingyu Li, Dingfeng Ye:
The Broken Verifying: Inspections at Verification Tools for Windows Code-Signing Signatures. TrustCom 2023: 804-813 - [c20]Ximing Li, Linghui Li, Xiaoyong Li, Binsi Cai, Bingyu Li:
TGCN-DA: A Temporal Graph Convolutional Network with Data Augmentation for High Accuracy Insider Threat Detection. TrustCom 2023: 1249-1257 - 2022
- [j11]Xia Jing, Qin Zou, Jumei Yan, Yingying Dong, Bingyu Li:
Remote Sensing Monitoring of Winter Wheat Stripe Rust Based on mRMR-XGBoost Algorithm. Remote. Sens. 14(3): 756 (2022) - [j10]Xia Jing, Bingyu Li, Qixing Ye, Qin Zou, Jumei Yan, Kaiqi Du:
Integrate the Canopy SIF and Its Derived Structural and Physiological Components for Wheat Stripe Rust Stress Monitoring. Remote. Sens. 14(14): 3427 (2022) - [j9]Yan Zhu, Bingyu Li, Yang Yang, Zhenyang Ding, Haibing Zheng, Guangyu He, Shengjie Hou:
Distributed Random Beacon for Blockchain Based on Share Recovery Threshold Signature. Sensors 22(16): 6004 (2022) - [j8]Bingyu Li, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Wei Wang, Qi Li, Guangshen Cheng, Jiwu Jing, Congli Wang:
The Invisible Side of Certificate Transparency: Exploring the Reliability of Monitors in the Wild. IEEE/ACM Trans. Netw. 30(2): 749-765 (2022) - [c19]Guangshen Cheng, Jiankuo Dong, Xinyi Ji, Bingyu Li, Haoling Fan, Pinchang Zhang:
PEPEC: Precomputed ECC Points Embedded in Certificates and Verified by CT Log Servers. ACNS Workshops 2022: 447-460 - 2021
- [j7]Emma Nichols, Foad Abd-Allah, Amir Abdoli, Ahmed Abualhasan, Eman Abu-Gharbieh, Ashkan Afshin, Rufus Akinyemi, Fahad Mashhour Alanezi, Vahid Alipour, Amir Almasi-Hashiani, Jalal Arabloo, Amir Ashraf-Ganjouei, Getinet Ayano, José Luis Ayuso-Mateos, Atif Amin Baig, Maciej Banach, Miguel A. Barboza, Suzanne Lyn Barker-Collo, Bernhard T. Baune, Akshaya Srikanth Bhagavathula, Krittika Bhattacharyya, Ali Bijani, Atanu Biswas, Archith Boloor, Carol Brayne, Hermann Brenner, Katrin Burkart, Sharath Burugina Nagaraja, Felix Carvalho, Luis F. S. Castro-de-Araujo, Ferrán Catalá-López, Ester Cerin, Nicolas Cherbuin, Dinh-Toi Chu, Xiaochen Dai, Antonio Reis de Sá-Junior, Shirin Djalalinia, Abdel Douiri, David Edvardsson, Shaimaa I. El-Jaafary, Sharareh Eskandarieh, Andre Faro, Farshad Farzadfar, Valery Feigin, Seyed-Mohammad Fereshtehnejad, Eduarda Fernandes, Pietro Ferrara, Irina Filip, Florian Fischer, Shilpa Gaidhane, Lucia Galluzzo, Gebreamlak Gebremedhn Gebremeskel, Ahmad Ghashghaee, Alessandro Gialluisi, Elena V. Gnedovskaya, Mahaveer Golechha, Rajeev Gupta, Vladimir Hachinski, Mohammad R. Haider, Teklehaimanot Gereziher Haile, Mohammad Hamiduzzaman, Graeme J. Hankey, Simon I. Hay, Golnaz Heidari, Reza Heidari-Soureshjani, Hung Chak Ho, Mowafa S. Househ, Bing-Fang Hwang, Licia Iacoviello, Olayinka Stephen Ilesanmi, Irena M. Ilic, Milena D. Ilic, Seyed Sina Naghibi Irvani, Masao Iwagami, Ihoghosa Osamuyi Iyamu, Ravi Prakash Jha, Rizwan Kalani, André Karch, Ayele Semachew Kasa, Yousef S. Khader, Ejaz Ahmad Khan, Mahalaqua Nazli Khatib, Yun Jin Kim, Sezer Kisa, Adnan Kisa, Mika Kivimäki, Ai Koyanagi, Manasi Kumar, Iván Landires, Savita Lasrado, Bingyu Li, Stephen S. Lim, Xuefeng Liu, Shilpashree Madhava Kunjathur, Azeem Majeed, Preeti Malik, Man Mohan Mehndiratta, Ritesh G. Menezes, Yousef Mohammad, Salahuddin Mohammed, Ali H. Mokdad, Mohammad Ali Moni, Gabriele Nagel, Muhammad Naveed, Vinod C. Nayak, Cuong Tat Nguyen, Thi Lan Huong Nguyen, Virginia Nunez-Samudio, Andrew T. Olagunju, Samuel M. Ostroff, Nikita Otstavnov, Mayowa Owolabi, Fatemeh Pashazadeh Kan, Urvish K. Patel, Michael R. Phillips, Michael A. Piradov, Constance Dimity Pond, Faheem Hyder Pottoo, Sergio I. Prada, Amir Radfar, Fakher Rahim, Juwel Rana, Vahid Rashedi, Salman Rawaf, David Laith Rawaf, Nickolas Reinig, Andre M. N. Renzaho, Nima Rezaei, Aziz Rezapour, Michele Romoli, Gholamreza Roshandel, Perminder S. Sachdev, Amirhossein Sahebkar, Mohammad Ali Sahraian, Mehrnoosh Samaei, Mete Saylan, Feng Sha, Masood Ali Shaikh, Kenji Shibuya, Mika Shigematsu, Jae Il Shin, Rahman Shiri, Diego Augusto Santos Silva, Jasvinder A. Singh, Deepika Singhal, Valentin Yurievich Skryabin, Anna Aleksandrovna Skryabina, Amin Soheili, Houman Sotoudeh, Emma Elizabeth Spurlock, Cassandra E. I. Szoeke, Rafael Tabarés-Seisdedos, Biruk Wogayehu Taddele, Marcos Roberto Tovani-Palone, Gebiyaw Wudie Tsegaye, Marco Vacante, Narayanaswamy Venketasubramanian, Simone Vidale, Vasily Vlassov, Giang Thu Vu, Yuan-Pang Wang, Jordan Weiss, Abrha Hailay Weldemariam, Ronny Westerman, Anders Wimo, Andrea Sylvia Winkler, Chenkai Wu, Ali Yadollahpour, Metin Yesiltepe, Naohiro Yonemoto, Chuanhua Yu, Mikhail Sergeevich Zastrozhin, Anasthasia Zastrozhina, Zhi-Jiang Zhang, Christopher J. L. Murray, Theo Vos:
Use of multidimensional item response theory methods for dementia prevalence prediction: an example using the Health and Retirement Survey and the Aging, Demographics, and Memory Study. BMC Medical Informatics Decis. Mak. 21(1): 241 (2021) - [j6]Bingyu Li, Jingqiang Lin, Qiongxiao Wang, Ze Wang, Jiwu Jing:
Locally-Centralized Certificate Validation and its Application in Desktop Virtualization Systems. IEEE Trans. Inf. Forensics Secur. 16: 1380-1395 (2021) - [c18]Aozhuo Sun, Bingyu Li, Huiqing Wan, Qiongxiao Wang:
PoliCT: Flexible Policy in Certificate Transparency Enabling Lightweight Self-monitor. ACNS Workshops 2021: 358-377 - [c17]Bingyu Li, Ines Said, Linda Kirova, Maria Blokhina, Hyo Jeong Kang:
SpArc: A VR Animating Tool at Your Fingertips. VRST 2021: 95:1-95:3 - 2020
- [c16]Ziqiang Ma, Bingyu Li, Quanwei Cai, Jun Yang:
Applications and Developments of the Lattice Attack in Side Channel Attacks. ACNS Workshops 2020: 435-452 - [c15]Bingyu Li, Fengjun Li, Ziqiang Ma, Qianhong Wu:
Exploring the Security of Certificate Transparency in the Wild. ACNS Workshops 2020: 453-470
2010 – 2019
- 2019
- [c14]Bingyu Li, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Qi Li, Jiwu Jing, Congli Wang:
Certificate Transparency in the Wild: Exploring the Reliability of Monitors. CCS 2019: 2505-2520 - [c13]Bingyu Li, Wei Wang, Lingjia Meng, Jingqiang Lin, Xuezhong Liu, Congli Wang:
Elaphurus: Ensemble Defense Against Fraudulent Certificates in TLS. Inscrypt 2019: 246-259 - [c12]Congli Wang, Jingqiang Lin, Bingyu Li, Qi Li, Qiongxiao Wang, Xiaokun Zhang:
Analyzing the Browser Security Warnings on HTTPS Errors. ICC 2019: 1-6 - [c11]Wenjun Gui, Bingyu Li, Shuaihang Yuan, John-Ross Rizzo, Lakshay Sharma, Chen Feng, Anthony Tzes, Yi Fang:
An assistive low-vision platform that augments spatial cognition through proprioceptive guidance: Point-to-Tell-and-Touch. IROS 2019: 3817-3822 - [c10]Bingyu Li, Dawei Chu, Jingqiang Lin, Quanwei Cai, Congli Wang, Lingjia Meng:
The Weakest Link of Certificate Transparency: Exploring the TLS/HTTPS Configurations of Third-Party Monitors. TrustCom/BigDataSE 2019: 216-223 - 2018
- [j5]Min Tang, Bingyu Li, Zhenbing Zeng:
Computing Sparse GCD of Multivariate Polynomials via Polynomial Interpolation. J. Syst. Sci. Complex. 31(2): 552-568 (2018) - [c9]Huorong Li, Jingqiang Lin, Bingyu Li, Wangzhao Cheng:
PoS: Constructing Practical and Efficient Public Key Cryptosystems Based on Symmetric Cryptography with SGX. ICICS 2018: 767-777 - [c8]Bingyu Li, JingTao Yao:
Exploring GTRS Based Recommender Systems with Users of Different Rating Patterns. IJCSR 2018: 405-417 - [c7]Wangzhao Cheng, Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Huorong Li, Bingyu Li:
Building Your Private Cloud Storage on Public Cloud Service Using Embedded GPUs. SecureComm (1) 2018: 512-528 - 2017
- [c6]Huorong Li, Wuqiong Pan, Jingqiang Lin, Wangzhao Cheng, Bingyu Li:
SSUKey: A CPU-Based Solution Protecting Private Keys on Untrusted OS. ICICS 2017: 51-62 - [c5]Wangzhao Cheng, Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Huorong Li, Bingyu Li:
High-Performance Symmetric Cryptography Server with GPU Acceleration. ICICS 2017: 529-540 - 2013
- [j4]Zhongxiao Jia, Bingyu Li:
On the condition number of the total least squares problem. Numerische Mathematik 125(1): 61-87 (2013) - 2012
- [j3]Miao Yu, Zhengwei Qi, Qian Lin, Xianming Zhong, Bingyu Li, Haibing Guan:
Vis: Virtualization enhanced live forensics acquisition for native system. Digit. Investig. 9(1): 22-33 (2012) - [j2]Zhengwei Qi, Bingyu Li, Qian Lin, Miao Yu, Mingyuan Xia, Haibing Guan:
SPAD: Software Protection Through Anti-Debugging Using Hardware-Assisted Virtualization. J. Inf. Sci. Eng. 28(5): 813-827 (2012) - [c4]Junqing Wang, Miao Yu, Bingyu Li, Zhengwei Qi, Haibing Guan:
Hypervisor-based protection of sensitive files in a compromised system. SAC 2012: 1765-1770 - 2011
- [c3]Miao Yu, Qian Lin, Bingyu Li, Zhengwei Qi, Haibing Guan:
Vis: virtualization enhanced live acquisition for native system. APSys 2011: 13 - [c2]Min Zhu, Miao Yu, Mingyuan Xia, Bingyu Li, Peijie Yu, Shang Gao, Zhengwei Qi, Liang Liu, Ying Chen, Haibing Guan:
VASP: virtualization assisted security monitor for cross-platform protection. SAC 2011: 554-559 - [c1]Bingyu Li, Xiaoli Wu:
A subresultant based subspace method for the computation of polynomial GCDs. SNC 2011: 100-101
2000 – 2009
- 2007
- [j1]Bingyu Li, Zhuojun Liu, Lihong Zhi:
A fast algorithm for solving the Sylvester structured total least squares problem. Signal Process. 87(10): 2313-2319 (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 21:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint