Baiyu Li

Orcid: 0009-0006-3120-7380

According to our database1, Baiyu Li authored at least 41 papers between 2010 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Vεrity: Verifiable Local Differential Privacy.
IACR Cryptol. ePrint Arch., 2025

Willow: Secure Aggregation with One-Shot Clients.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
Fully Homomorphic Encryption with Efficient Public Verification.
IACR Cryptol. ePrint Arch., 2024

Hintless Single-Server Private Information Retrieval.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Computationally Secure Aggregation and Private Information Retrieval in the Shuffle Model.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Double-Deck Multi-Agent Pickup and Delivery: Multi-Robot Rearrangement in Large-Scale Warehouses.
IEEE Robotics Autom. Lett., June, 2023

Double-Deck Multi-Agent Pickup and Delivery: Multi-Robot Rearrangement in Large-Scale Warehouses.
CoRR, 2023

ACORN: Input Validation for Secure Aggregation.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
Optimal Order of Time-Domain Adaptive Filter for Anti-Jamming Navigation Receiver.
Remote. Sens., 2022

Distortionless 1/2 Overlap Windowing in Frequency Domain Anti-Jamming of Satellite Navigation Receivers.
Remote. Sens., 2022

Sidelobes Suppression for Time Domain Anti-Jamming of Satellite Navigation Receivers.
Remote. Sens., 2022

Suppression of Jammer Multipath in GNSS Antenna Array Receiver.
Remote. Sens., 2022

Research on Detection Technology of Spoofing under the Mixed Narrowband and Spoofing Interference.
Remote. Sens., 2022

Impact of Antenna Polarization Mismatch on High-precision GNSS Application.
Proceedings of the icWCSN 2022: 9th international Conference on Wireless Communication and Sensor Networks, Dalian, China, January 11, 2022

Securing Approximate Homomorphic Encryption Using Differential Privacy.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

2021
On the Security of Homomorphic Encryption on Approximate Numbers.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

2020
Computational and Symbolic Models for Secure Computation.
PhD thesis, 2020

Unbiased Interference Suppression Method Based on Spectrum Compensation.
IEICE Trans. Commun., 2020

Gadget-Based iNTRU Lattice Trapdoors.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020

TinyGarble2: Smart, Efficient, and Scalable Yao's Garble Circuit.
Proceedings of the PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, 2020

2019
Semi-parallel Logistic Regression for GWAS on Encrypted Data.
IACR Cryptol. ePrint Arch., 2019

Acceleration Method for Software Signal Simulators of BDS Navigation Signals and RDSS Signals Based on GPGPU.
IEEE Access, 2019

Homomorphic Encryption for Finite Automata.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Equational Security Proofs of Oblivious Transfer Protocols.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

High-Efficiency Broadband Remote RF Signal Down-Conversion Based on Sideband Optical Phase-Locked Loop.
Proceedings of the European Conference on Optical Communication, 2018

Symbolic Security of Garbled Circuits.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018

2016
Compactness vs Collusion Resistance in Functional Encryption.
Proceedings of the Theory of Cryptography - 14th International Conference, 2016

2015
Unambiguous s-curve shaping for multipath mitigation for MBOC modulated signals in GNSS.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015

2014
Syntactic Complexity of ℛ- and 풥-Trivial Regular Languages.
Int. J. Found. Comput. Sci., 2014

2013
Syntactic Complexity of - and -Trivial Regular Languages.
Proceedings of the Descriptional Complexity of Formal Systems, 2013

2012
Syntactic complexity of prefix-, suffix-, bifix-, and factor-free regular languages.
Theor. Comput. Sci., 2012

Syntactic Complexities of Six Classes of Star-Free Languages.
J. Autom. Lang. Comb., 2012

On the Complexity of the Evaluation of Transient Extensions of Boolean Functions.
Int. J. Found. Comput. Sci., 2012

Syntactic Complexity of R- and J-Trivial Regular Languages
CoRR, 2012

Syntactic Complexities of Some Classes of Star-Free Languages.
Proceedings of the Descriptional Complexity of Formal Systems, 2012

SkypeMorph: protocol obfuscation for Tor bridges.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Syntactic Complexity of Star-Free Languages
CoRR, 2011

Syntactic Complexity of Prefix-, Suffix-, and Bifix-Free Languages
CoRR, 2011

Syntactic Complexity of Prefix-, Suffix-, and Bifix-Free Regular Languages.
Proceedings of the Descriptional Complexity of Formal Systems, 2011

Quotient Complexity of Bifix-, Factor-, and Subword-Free Regular Languages.
Proceedings of the Automata and Formal Languages, 13th International Conference, 2011

2010
Quotient Complexity of Ideal Languages.
Proceedings of the LATIN 2010: Theoretical Informatics, 2010


  Loading...