Bingyu Li

Orcid: 0009-0006-6444-0453

According to our database1, Bingyu Li authored at least 35 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Covert channels in blockchain and blockchain based covert communication: Overview, state-of-the-art, and future directions.
Comput. Commun., May, 2023

An Improved Approach to Monitoring Wheat Stripe Rust with Sun-Induced Chlorophyll Fluorescence.
Remote. Sens., February, 2023

Semi-CT: Certificates Transparent to Identity Owners but Opaque to Snoopers.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

IKE: Threshold Key Escrow Service with Intermediary Encryption.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

An Enhanced Moth-Flame Optimization Algorithm for UAVs 3D Path Planning.
Proceedings of the Asia Conference on Artificial Intelligence, 2023

2022
The Invisible Side of Certificate Transparency: Exploring the Reliability of Monitors in the Wild.
IEEE/ACM Trans. Netw., 2022

Distributed Random Beacon for Blockchain Based on Share Recovery Threshold Signature.
Sensors, 2022

Remote Sensing Monitoring of Winter Wheat Stripe Rust Based on mRMR-XGBoost Algorithm.
Remote. Sens., 2022

Integrate the Canopy SIF and Its Derived Structural and Physiological Components for Wheat Stripe Rust Stress Monitoring.
Remote. Sens., 2022

PEPEC: Precomputed ECC Points Embedded in Certificates and Verified by CT Log Servers.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022

2021
Locally-Centralized Certificate Validation and its Application in Desktop Virtualization Systems.
IEEE Trans. Inf. Forensics Secur., 2021

Use of multidimensional item response theory methods for dementia prevalence prediction: an example using the Health and Retirement Survey and the Aging, Demographics, and Memory Study.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
BMC Medical Informatics Decis. Mak., 2021

SpArc: A VR Animating Tool at Your Fingertips.
Proceedings of the VRST '21: 27th ACM Symposium on Virtual Reality Software and Technology, Virtual Event / Osaka, Japan, December 8, 2021

PoliCT: Flexible Policy in Certificate Transparency Enabling Lightweight Self-monitor.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021

2020
Applications and Developments of the Lattice Attack in Side Channel Attacks.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020

Exploring the Security of Certificate Transparency in the Wild.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020

2019
The Weakest Link of Certificate Transparency: Exploring the TLS/HTTPS Configurations of Third-Party Monitors.
Proceedings of the 18th IEEE International Conference On Trust, 2019

An assistive low-vision platform that augments spatial cognition through proprioceptive guidance: Point-to-Tell-and-Touch.
Proceedings of the 2019 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2019

Analyzing the Browser Security Warnings on HTTPS Errors.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Elaphurus: Ensemble Defense Against Fraudulent Certificates in TLS.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

Certificate Transparency in the Wild: Exploring the Reliability of Monitors.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Computing Sparse GCD of Multivariate Polynomials via Polynomial Interpolation.
J. Syst. Sci. Complex., 2018

Building Your Private Cloud Storage on Public Cloud Service Using Embedded GPUs.
Proceedings of the Security and Privacy in Communication Networks, 2018

Exploring GTRS Based Recommender Systems with Users of Different Rating Patterns.
Proceedings of the Rough Sets - International Joint Conference, 2018

PoS: Constructing Practical and Efficient Public Key Cryptosystems Based on Symmetric Cryptography with SGX.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

2017
SSUKey: A CPU-Based Solution Protecting Private Keys on Untrusted OS.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

High-Performance Symmetric Cryptography Server with GPU Acceleration.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2013
On the condition number of the total least squares problem.
Numerische Mathematik, 2013

2012
SPAD: Software Protection Through Anti-Debugging Using Hardware-Assisted Virtualization.
J. Inf. Sci. Eng., 2012

Vis: Virtualization enhanced live forensics acquisition for native system.
Digit. Investig., 2012

Hypervisor-based protection of sensitive files in a compromised system.
Proceedings of the ACM Symposium on Applied Computing, 2012

2011
A subresultant based subspace method for the computation of polynomial GCDs.
Proceedings of the SNC 2011, 2011

VASP: virtualization assisted security monitor for cross-platform protection.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Vis: virtualization enhanced live acquisition for native system.
Proceedings of the APSys '11 Asia Pacific Workshop on Systems, 2011

2007
A fast algorithm for solving the Sylvester structured total least squares problem.
Signal Process., 2007


  Loading...