Fengyin Li

Orcid: 0000-0002-5730-3315

According to our database1, Fengyin Li authored at least 59 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Privacy-preserving vertical federated broad learning system for artificial intelligence generated image content.
J. Real Time Image Process., February, 2024

A lattice-based efficient heterogeneous signcryption scheme for secure network communications.
J. High Speed Networks, 2024

2023
Transfer learning based cascaded deep learning network and mask recognition for COVID-19.
World Wide Web (WWW), September, 2023

Post-Quantum Secure Identity-Based Proxy Blind Signature Scheme on a Lattice.
Entropy, August, 2023

Research on Quantum-Attack-Resistant Strong Forward-Secure Signature Schemes.
Entropy, August, 2023

Identity-based proxy blind signature scheme on lattice in high-speed network environment.
J. High Speed Networks, 2023

Privacy Protection of Cloud Computing Based on Strong Forward Security.
Int. J. Cloud Appl. Comput., 2023

Minimax Weight Learning for Absorbing MDPs.
CoRR, 2023

Secure Position-Aware Graph Neural Networks for Session-Based Recommendation.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

Application of Lattice-Based Unique Ring Signature in Blockchain Transactions.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

A Graph-Based Vertical Federation Broad Learning System.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

2022
Privacy-aware PKI model with strong forward security.
Int. J. Intell. Syst., December, 2022

Trust-based secure directed diffusion routing protocol in WSN.
J. Ambient Intell. Humaniz. Comput., 2022

Aitac: an identity-based traceable anonymous communication model.
J. Ambient Intell. Humaniz. Comput., 2022

IPSadas: Identity-privacy-aware secure and anonymous data aggregation scheme.
Int. J. Intell. Syst., 2022

Intelligent federated learning on lattice-based efficient heterogeneous signcryption.
Int. J. Intell. Syst., 2022

Lattice-based batch authentication scheme with dynamic identity revocation in VANET.
Int. J. Intell. Syst., 2022

A secure aggregation routing protocol with authentication and energy conservation.
Trans. Emerg. Telecommun. Technol., 2022

A traceable privacy-aware data publishing platform on permissioned blockchain.
Trans. Emerg. Telecommun. Technol., 2022

Tesia: A trusted efficient service evaluation model in Internet of things based on improved aggregation signature.
Concurr. Comput. Pract. Exp., 2022

An anonymous authentication and key agreement protocol in smart living.
Comput. Commun., 2022

BCSE: Blockchain-based trusted service evaluation model over big data.
Big Data Min. Anal., 2022

A Privacy Preserving and Format-Checkable E-voting Scheme.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

A Vehicle Data Publishing System with Privacy-Awares in VANETs Based on Blockchain.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

A Certificateless-Based Blind Signature Scheme with Message Recovery.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

A Broad Learning System Based on the Idea of Vertical Federated Learning.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

A Lattice-Based Aggregate Signature Based on Revocable Identity.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

2021
An Efficient Anonymous Communication Scheme to Protect the Privacy of the Source Node Location in the Internet of Things.
Secur. Commun. Networks, 2021

ImpSuic: A quality updating rule in mixing coins with maximum utilities.
Int. J. Intell. Syst., 2021

LacminCC: lightweight anonymous communication model in cloud computing.
EURASIP J. Wirel. Commun. Netw., 2021

Shortest link scheduling in wireless networks under the Rayleigh fading model.
EURASIP J. Wirel. Commun. Netw., 2021

Research on direct anonymous attestation mechanism in enterprise information management.
Enterp. Inf. Syst., 2021

Certificateless Proxy Authentication Scheme on Lattices Under the Background of Big Data.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021

A Secure Aggregation Routing Protocol with Authentication and Energy-Saving on Data Mining and Big Data.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021

An Agricultural Traceability Permissioned Blockchain with Privacy-Aware.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021

An Anonymous Communication Scheme Between Nodes Based on Pseudonym and Bilinear Pairing in Big Data Environments.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021

A Group Blind Signature Scheme for Privacy Protection of Power Big Data in Smart Grid.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021

A Lattice-Based Anonymous Authentication for Privacy Protection of Medical Data.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021

Key Agreement Protocol Under Multi-service Architecture.
Proceedings of the Blockchain and Trustworthy Systems - Third International Conference, 2021

2020
Wireless Communications and Mobile Computing Blockchain-Based Trust Management in Distributed Internet of Things.
Wirel. Commun. Mob. Comput., 2020

FarpScusn: Fully Anonymous Routing Protocol with Self-Healing Capability in Unstable Sensor Networks.
Sensors, 2020

Belief and fairness: A secure two-party protocol toward the view of entropy for IoT devices.
J. Netw. Comput. Appl., 2020

Privacy-Aware Secure Anonymous Communication Protocol in CPSS Cloud Computing.
IEEE Access, 2020

A Trajectory-Privacy Protection Method Based on Location Similarity of Query Destinations in Continuous LBS Queries.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

Research on Blockchain-Based Identity Authentication Scheme in Social Networks.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

Research and Application of Digital Signature Technology.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

Research on Blind Signature Based Anonymous Electronic Cash Scheme.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

Research on Friendvertising-Counter Technology in Big Data.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

Evaluation of Machine Learning Algorithms for Anomaly Detection.
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020

2019
A game-theoretic method based on Q-learning to invalidate criminal smart contracts.
Inf. Sci., 2019

Randomness invalidates criminal smart contracts.
Inf. Sci., 2019

Design of Anonymous Communication Protocol Based on Group Signature.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

Privacy-Awareness Fair Contract Signing Protocol Based on Blockchain.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

Research and Application of Trusted Service Evaluation Model in Social Network.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2017
TSQM: Trust-based Secure Query Method in Anonymous Communication System.
Proceedings of the 2017 International Conference on Identification, 2017

ACS-DFP: Anonymous Communication Scheme Based on Decreased Forwarding Probability.
Proceedings of the 2017 International Conference on Identification, 2017

2016
Research on dynamic trust model based on recommendation trust iteration.
Int. J. Comput. Sci. Math., 2016

2015
An Efficient and Impartial Buyer-Seller Watermarking Protocol.
J. Commun., 2015

2007
A New Threshold Group Signature Scheme Based on Discrete Logarithm Problem .
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007


  Loading...