default search action
Fengyin Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j33]Yuhong Sun, Jiatao Wang, Fengyin Li:
Efficient integer division computation protocols based on partial homomorphic encryption. Clust. Comput. 27(9): 12091-12102 (2024) - [j32]Yuhong Sun, Jiatao Wang, Fengyin Li:
Correction: Efficient integer division computation protocols based on partial homomorphic encryption. Clust. Comput. 27(9): 12103 (2024) - [j31]Siqi Yu, Mengxue Shang, Fengyin Li:
A lattice-based efficient heterogeneous signcryption scheme for secure network communications. J. High Speed Networks 30(1): 19-27 (2024) - [j30]Fengyin Li, Junrong Ge, Xiaojiao Wang, Gang Zhao, Xilong Yu, Xinru Li:
Privacy-preserving vertical federated broad learning system for artificial intelligence generated image content. J. Real Time Image Process. 21(1): 14 (2024) - 2023
- [j29]Fengyin Li, Mengjiao Yang, Zhihao Song, Ping Wang, Guoping Li:
Post-Quantum Secure Identity-Based Proxy Blind Signature Scheme on a Lattice. Entropy 25(8): 1157 (2023) - [j28]Fengyin Li, Junhui Wang, Mengxue Shang, Dandan Zhang, Tao Li:
Research on Quantum-Attack-Resistant Strong Forward-Secure Signature Schemes. Entropy 25(8): 1159 (2023) - [j27]Fengyin Li, Junhui Wang, Zhihao Song:
Privacy Protection of Cloud Computing Based on Strong Forward Security. Int. J. Cloud Appl. Comput. 13(1): 1-9 (2023) - [j26]Mengjiao Yang, Dongmei Ke, Fengyin Li:
Identity-based proxy blind signature scheme on lattice in high-speed network environment. J. High Speed Networks 29(4): 337-341 (2023) - [j25]Fengyin Li, Xiaojiao Wang, Yuhong Sun, Tao Li, Junrong Ge:
Transfer learning based cascaded deep learning network and mask recognition for COVID-19. World Wide Web (WWW) 26(5): 2931-2946 (2023) - [c27]Fengyin Li, Junhui Wang, Dandan Zhang, Guoping Li, Xilong Yu:
Application of Lattice-Based Unique Ring Signature in Blockchain Transactions. AIS&P (2) 2023: 1-9 - [c26]Junrong Ge, Fengyin Li, Xiaojiao Wang, Zhihao Song, Liangna Sun:
A Graph-Based Vertical Federation Broad Learning System. AIS&P (2) 2023: 53-62 - [c25]Hongzhe Liu, Fengyin Li, Huayu Cheng:
Secure Position-Aware Graph Neural Networks for Session-Based Recommendation. AIS&P (2) 2023: 134-146 - [i1]Fengyin Li, Yuqiang Li, Xianyi Wu:
Minimax Weight Learning for Absorbing MDPs. CoRR abs/2301.03183 (2023) - 2022
- [j24]Fengyin Li, Xinying Yu, Rui Ge, Yanli Wang, Yang Cui, Huiyu Zhou:
BCSE: Blockchain-based trusted service evaluation model over big data. Big Data Min. Anal. 5(1): 1-14 (2022) - [j23]Fengyin Li, Xinying Yu, Yang Cui, Siqi Yu, Yuhong Sun, Yilei Wang, Huiyu Zhou:
An anonymous authentication and key agreement protocol in smart living. Comput. Commun. 186: 110-120 (2022) - [j22]Fengyin Li, Rui Ge, Huiyu Zhou, Yilei Wang, Zhongxing Liu, Xiaomei Yu:
Tesia: A trusted efficient service evaluation model in Internet of things based on improved aggregation signature. Concurr. Comput. Pract. Exp. 34(16) (2022) - [j21]Ying Wang, Fengyin Li, Pei Ren, Siqi Yu, Yuhong Sun:
A secure aggregation routing protocol with authentication and energy conservation. Trans. Emerg. Telecommun. Technol. 33(1) (2022) - [j20]Fengyin Li, Xueqing Sun, Peiyu Liu, Xiao Li, Yang Cui, Xiaojiao Wang:
A traceable privacy-aware data publishing platform on permissioned blockchain. Trans. Emerg. Telecommun. Technol. 33(5) (2022) - [j19]Pei Ren, Fengyin Li, Ying Wang, Huiyu Zhou, Peiyu Liu:
IPSadas: Identity-privacy-aware secure and anonymous data aggregation scheme. Int. J. Intell. Syst. 37(8): 5290-5324 (2022) - [j18]Fengyin Li, Yang Cui, Junhui Wang, Huiyu Zhou, Xiaoying Wang, Qintai Yang:
Lattice-based batch authentication scheme with dynamic identity revocation in VANET. Int. J. Intell. Syst. 37(11): 9442-9460 (2022) - [j17]Fengyin Li, Siqi Yu, Guangshun Li, Mengjiao Yang, Huiyu Zhou:
Intelligent federated learning on lattice-based efficient heterogeneous signcryption. Int. J. Intell. Syst. 37(11): 9480-9507 (2022) - [j16]Fengyin Li, Zhongxing Liu, Tao Li, Hongwei Ju, Hua Wang, Huiyu Zhou:
Privacy-aware PKI model with strong forward security. Int. J. Intell. Syst. 37(12): 10049-10065 (2022) - [j15]Fengyin Li, Zhongxing Liu, Yilei Wang, Nan Wu, Jiguo Yu, Chongzhi Gao, Huiyu Zhou:
Aitac: an identity-based traceable anonymous communication model. J. Ambient Intell. Humaniz. Comput. 13(3): 1353-1362 (2022) - [j14]Xinying Yu, Fengyin Li, Tao Li, Nan Wu, Hua Wang, Huiyu Zhou:
Trust-based secure directed diffusion routing protocol in WSN. J. Ambient Intell. Humaniz. Comput. 13(3): 1405-1417 (2022) - [c24]Yang Cui, Huayu Cheng, Fengyin Li, Domenico Santaniello:
A Lattice-Based Aggregate Signature Based on Revocable Identity. ML4CS (2) 2022: 266-274 - [c23]Xiao Li, Mengwen Wang, Fengyin Li:
A Certificateless-Based Blind Signature Scheme with Message Recovery. ML4CS (2) 2022: 382-389 - [c22]Xueqing Sun, Xiao Li, Fengyin Li:
A Vehicle Data Publishing System with Privacy-Awares in VANETs Based on Blockchain. ML4CS (2) 2022: 447-454 - [c21]Junrong Ge, Xiaojiao Wang, Fengyin Li, Akshat Gaurav:
A Broad Learning System Based on the Idea of Vertical Federated Learning. ML4CS (2) 2022: 565-574 - [c20]Yuhong Sun, Shiyu Wang, Fengyin Li, Hua Wang:
A Privacy Preserving and Format-Checkable E-voting Scheme. WASA (2) 2022: 475-488 - 2021
- [j13]Can Cui, Fengyin Li, Tao Li, Jiguo Yu, Rui Ge, Hui Liu:
Research on direct anonymous attestation mechanism in enterprise information management. Enterp. Inf. Syst. 15(4): 513-529 (2021) - [j12]Fengyin Li, Yanli Wang, Hongwei Ju, Xinying Yu, Zhaojie Wang, Huiyu Zhou:
LacminCC: lightweight anonymous communication model in cloud computing. EURASIP J. Wirel. Commun. Netw. 2021(1): 120 (2021) - [j11]Baogui Huang, Jiguo Yu, Chunmei Ma, Fengyin Li, Guangshun Li:
Shortest link scheduling in wireless networks under the Rayleigh fading model. EURASIP J. Wirel. Commun. Netw. 2021(1): 135 (2021) - [j10]Xinying Yu, Zhaojie Wang, Yilei Wang, Fengyin Li, Tao Li, Yuling Chen, Youliang Tian, Xiaomei Yu:
ImpSuic: A quality updating rule in mixing coins with maximum utilities. Int. J. Intell. Syst. 36(3): 1182-1198 (2021) - [j9]Fengyin Li, Pei Ren, Guoyu Yang, Yuhong Sun, Yilei Wang, Yanli Wang, Siyuan Li, Huiyu Zhou:
An Efficient Anonymous Communication Scheme to Protect the Privacy of the Source Node Location in the Internet of Things. Secur. Commun. Networks 2021: 6670847:1-6670847:16 (2021) - [c19]Yanli Wang, Bo Liu, Xueqing Sun, Xiao Li, Fengyin Li:
Key Agreement Protocol Under Multi-service Architecture. BlockSys 2021: 617-623 - [c18]Xiao Li, Xueqing Sun, Fengyin Li:
A Group Blind Signature Scheme for Privacy Protection of Power Big Data in Smart Grid. DMBD (1) 2021: 23-34 - [c17]Pei Ren, Bo Liu, Fengyin Li:
An Anonymous Communication Scheme Between Nodes Based on Pseudonym and Bilinear Pairing in Big Data Environments. DMBD (1) 2021: 169-182 - [c16]Siqi Yu, Yang Cui, Fengyin Li:
Certificateless Proxy Authentication Scheme on Lattices Under the Background of Big Data. DMBD (2) 2021: 185-193 - [c15]Ying Wang, Bo Liu, Fengyin Li:
A Secure Aggregation Routing Protocol with Authentication and Energy-Saving on Data Mining and Big Data. DMBD (1) 2021: 192-204 - [c14]Xueqing Sun, Xiao Li, Fengyin Li:
An Agricultural Traceability Permissioned Blockchain with Privacy-Aware. DMBD (1) 2021: 218-229 - [c13]Yang Cui, Siqi Yu, Fengyin Li:
A Lattice-Based Anonymous Authentication for Privacy Protection of Medical Data. DMBD (2) 2021: 228-238 - 2020
- [j8]Fengyin Li, Can Cui, Dongfeng Wang, Zhongxing Liu, Nebrase Elmrabit, Ying Wang, Huiyu Zhou:
Privacy-Aware Secure Anonymous Communication Protocol in CPSS Cloud Computing. IEEE Access 8: 62660-62669 (2020) - [j7]Yilei Wang, Guoyu Yang, Tao Li, Fengyin Li, Youliang Tian, Xiaomei Yu:
Belief and fairness: A secure two-party protocol toward the view of entropy for IoT devices. J. Netw. Comput. Appl. 161: 102641 (2020) - [j6]Fengyin Li, Ying Wang, Hongwei Ju, Yanli Wang, Zhaojie Wang, Huiyu Zhou:
FarpScusn: Fully Anonymous Routing Protocol with Self-Healing Capability in Unstable Sensor Networks. Sensors 20(22): 6683 (2020) - [j5]Fengyin Li, Dongfeng Wang, Yilei Wang, Xiaomei Yu, Nan Wu, Jiguo Yu, Huiyu Zhou:
Wireless Communications and Mobile Computing Blockchain-Based Trust Management in Distributed Internet of Things. Wirel. Commun. Mob. Comput. 2020: 8864533:1-8864533:12 (2020) - [c12]Nebrase Elmrabit, Feixiang Zhou, Fengyin Li, Huiyu Zhou:
Evaluation of Machine Learning Algorithms for Anomaly Detection. Cyber Security 2020: 1-8 - [c11]Pei Ren, Hui Liu, Fengyin Li:
Research on Friendvertising-Counter Technology in Big Data. ML4CS (2) 2020: 283-289 - [c10]Ying Wang, Haojia Zhu, Fengyin Li:
Research on Blind Signature Based Anonymous Electronic Cash Scheme. ML4CS (1) 2020: 386-392 - [c9]Yanli Wang, Ying Zheng, Fengyin Li:
Research and Application of Digital Signature Technology. ML4CS (1) 2020: 540-546 - [c8]Xinying Yu, Rui Ge, Fengyin Li:
Research on Blockchain-Based Identity Authentication Scheme in Social Networks. ML4CS (1) 2020: 558-565 - [c7]Lu Zhang, Saide Zhu, Fengyin Li, Ruinian Li, Jing Meng, Wei Li:
A Trajectory-Privacy Protection Method Based on Location Similarity of Query Destinations in Continuous LBS Queries. WASA (1) 2020: 704-715
2010 – 2019
- 2019
- [j4]Yilei Wang, Andrea Bracciali, Tao Li, Fengyin Li, Xinchun Cui, Minghao Zhao:
Randomness invalidates criminal smart contracts. Inf. Sci. 477: 291-301 (2019) - [j3]Lifeng Zhang, Yilei Wang, Fengyin Li, Yuemei Hu, Man Ho Au:
A game-theoretic method based on Q-learning to invalidate criminal smart contracts. Inf. Sci. 498: 144-153 (2019) - [c6]Haojia Zhu, Can Cui, Fengyin Li, Zhongxing Liu, Quanxin Zhang:
Design of Anonymous Communication Protocol Based on Group Signature. CSS (2) 2019: 175-181 - [c5]Dongfeng Wang, Qinghua Li, Fengyin Li, Quanxin Zhang, Banghai Xu:
Privacy-Awareness Fair Contract Signing Protocol Based on Blockchain. CSS (1) 2019: 274-278 - [c4]Rui Ge, Ying Zheng, Fengyin Li, Dongfeng Wang, Yuanzhang Li:
Research and Application of Trusted Service Evaluation Model in Social Network. CSS (2) 2019: 313-317 - 2017
- [c3]Xiaohuan Liu, Fengyin Li, Jiguo Yu, Can Cui:
TSQM: Trust-based Secure Query Method in Anonymous Communication System. IIKI 2017: 394-399 - [c2]Fengyin Li, Xiaohuan Liu, Jiguo Yu, Can Cui:
ACS-DFP: Anonymous Communication Scheme Based on Decreased Forwarding Probability. IIKI 2017: 400-406 - 2016
- [j2]Fengyin Li, Shuang Zhao, Jian Zhou:
Research on dynamic trust model based on recommendation trust iteration. Int. J. Comput. Sci. Math. 7(1): 20-28 (2016) - 2015
- [j1]Xinchun Cui, Gang Sheng, Fengyin Li, Xiaowu Liu:
An Efficient and Impartial Buyer-Seller Watermarking Protocol. J. Commun. 10(5): 339-344 (2015)
2000 – 2009
- 2007
- [c1]Fengyin Li, Jiguo Yu, Hongwei Ju:
A New Threshold Group Signature Scheme Based on Discrete Logarithm Problem . SNPD (3) 2007: 1176-1182
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-10 22:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint