Fan Li

Orcid: 0000-0001-9391-997X

Affiliations:
  • Louisiana Tech University, Department of Electrical Engineering, Ruston, LA, USA


According to our database1, Fan Li authored at least 18 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Blockchain application to the processes in material design, production, distribution, and disposal: A survey.
J. Ind. Inf. Integr., 2024

A survey of blockchain, artificial intelligence, and edge computing for Web 3.0.
Comput. Sci. Rev., 2024

2023
Communication-Efficient and Error-Free Gradecast with Optimal Resilience.
Proceedings of the IEEE International Symposium on Information Theory, 2023

2021
Adding Common Randomness Can Remove the Secrecy Penalty in GDoF.
IEEE Trans. Inf. Theory, 2021

Communication-Efficient Signature-Free Asynchronous Byzantine Agreement.
Proceedings of the IEEE International Symposium on Information Theory, 2021

2020
Secure Communications with Limited Common Randomness at Transmitters.
Proceedings of the IEEE International Symposium on Information Theory, 2020

2019
Adding a Helper Can Totally Remove the Secrecy Constraints in a Two-User Interference Channel.
IEEE Trans. Inf. Forensics Secur., 2019

Adding Common Randomness Can Remove the Secrecy Constraints in Communication Networks.
CoRR, 2019

How to Break the Limits of Secrecy Constraints in Communication Networks?
Proceedings of the IEEE International Symposium on Information Theory, 2019

2018
Reversible data hiding scheme based on the Haar discrete wavelet transform and interleaving prediction method.
Multim. Tools Appl., 2018

Adding a Helper Can Totally Remove the Secrecy Constraints in Interference Channel.
CoRR, 2018

Distributed Computing with Heterogeneous Communication Constraints: The Worst-Case Computation Load and Proof by Contradiction.
CoRR, 2018

Wireless MapReduce Distributed Computing.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

On Distributed Computing with Heterogeneous Communication Constraints.
Proceedings of the 52nd Asilomar Conference on Signals, Systems, and Computers, 2018

2016
Bi-stretch reversible data hiding algorithm for absolute moment block truncation coding compressed images.
Multim. Tools Appl., 2016

A Reversible Data Hiding Scheme Based on IWT and the Sudoku Method.
Int. J. Netw. Secur., 2016

2015
Reversible data hiding with oriented and minimized distortions using cascading trellis coding.
Inf. Sci., 2015

A Meaningful Scheme for Sharing Secret Images Using Mosaic Images.
Int. J. Netw. Secur., 2015


  Loading...