Bingyu Li
Orcid: 0009-0006-6444-0453
According to our database1,
Bingyu Li
authored at least 35 papers
between 2007 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Covert channels in blockchain and blockchain based covert communication: Overview, state-of-the-art, and future directions.
Comput. Commun., May, 2023
An Improved Approach to Monitoring Wheat Stripe Rust with Sun-Induced Chlorophyll Fluorescence.
Remote. Sens., February, 2023
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023
Proceedings of the Asia Conference on Artificial Intelligence, 2023
2022
The Invisible Side of Certificate Transparency: Exploring the Reliability of Monitors in the Wild.
IEEE/ACM Trans. Netw., 2022
Distributed Random Beacon for Blockchain Based on Share Recovery Threshold Signature.
Sensors, 2022
Remote Sensing Monitoring of Winter Wheat Stripe Rust Based on mRMR-XGBoost Algorithm.
Remote. Sens., 2022
Integrate the Canopy SIF and Its Derived Structural and Physiological Components for Wheat Stripe Rust Stress Monitoring.
Remote. Sens., 2022
PEPEC: Precomputed ECC Points Embedded in Certificates and Verified by CT Log Servers.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022
2021
Locally-Centralized Certificate Validation and its Application in Desktop Virtualization Systems.
IEEE Trans. Inf. Forensics Secur., 2021
Use of multidimensional item response theory methods for dementia prevalence prediction: an example using the Health and Retirement Survey and the Aging, Demographics, and Memory Study.
BMC Medical Informatics Decis. Mak., 2021
Proceedings of the VRST '21: 27th ACM Symposium on Virtual Reality Software and Technology, Virtual Event / Osaka, Japan, December 8, 2021
PoliCT: Flexible Policy in Certificate Transparency Enabling Lightweight Self-monitor.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021
2020
Proceedings of the Applied Cryptography and Network Security Workshops, 2020
Proceedings of the Applied Cryptography and Network Security Workshops, 2020
2019
The Weakest Link of Certificate Transparency: Exploring the TLS/HTTPS Configurations of Third-Party Monitors.
Proceedings of the 18th IEEE International Conference On Trust, 2019
An assistive low-vision platform that augments spatial cognition through proprioceptive guidance: Point-to-Tell-and-Touch.
Proceedings of the 2019 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
J. Syst. Sci. Complex., 2018
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the Rough Sets - International Joint Conference, 2018
PoS: Constructing Practical and Efficient Public Key Cryptosystems Based on Symmetric Cryptography with SGX.
Proceedings of the Information and Communications Security - 20th International Conference, 2018
2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
2013
Numerische Mathematik, 2013
2012
SPAD: Software Protection Through Anti-Debugging Using Hardware-Assisted Virtualization.
J. Inf. Sci. Eng., 2012
Digit. Investig., 2012
Proceedings of the ACM Symposium on Applied Computing, 2012
2011
Proceedings of the SNC 2011, 2011
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011
Proceedings of the APSys '11 Asia Pacific Workshop on Systems, 2011
2007
Signal Process., 2007