Fengying Li

Orcid: 0000-0002-8531-0125

According to our database1, Fengying Li authored at least 30 papers between 2007 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
An IoT-Based COVID-19 Prevention and Control System for Enclosed Spaces.
Future Internet, 2022

Multi-hop Question Answering with Knowledge Graph Embedding in a Similar Semantic Space.
Proceedings of the International Joint Conference on Neural Networks, 2022

A Few-Shot Relation Extraction Method for Enhancing Entity Attention.
Proceedings of the 5th International Conference on Computer Science and Software Engineering, 2022

2021
Development and application of digital assistive teaching system for anatomy.
Virtual Real. Intell. Hardw., 2021

Degradation State Partition and Compound Fault Diagnosis of Rolling Bearing Based on Personalized Multilabel Learning.
IEEE Trans. Instrum. Meas., 2021

Effects of a concept mapping-based two-tier test strategy on students' digital game-based learning performances and behavioral patterns.
Comput. Educ., 2021

2020
Solutions for fourth-order Kirchhoff type elliptic equations involving concave-convex nonlinearities in RN.
Comput. Math. Appl., 2020

2019
On the Symmetric Central Configurations for the Planar 1 + 4-Body Problem.
Complex., 2019

Optimal Representation for Web and Social Network Graphs Based on K² -Tree.
IEEE Access, 2019

DenseU-Net-Based Semantic Segmentation of Small Objects in Urban Remote Sensing Images.
IEEE Access, 2019

Network Reliability Analysis Based on ADD under Capacity and Delay Constraints.
Proceedings of the Eleventh International Conference on Advanced Computational Intelligence, 2019

Privacy-Preserving Authentication Based on Pseudonyms and Secret Sharing for VANET.
Proceedings of the Computing, Communications and IoT Applications, ComComAp 2019, Shenzhen, 2019

A Security Detection Model for Selfish Mining Attack.
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019

2016
Multi-proxy multi-signature binding positioning protocol.
Secur. Commun. Networks, 2016

基于符号零压缩二叉决策图的装配可行性判定方法 (Symbolic ZBDD-based Judgment Method for Assembly Feasibility).
计算机科学, 2016

2015
Chinese Gini Coefficient from 2005 to 2012, Based on 20 Grouped Income Data Sets of Urban and Rural Residents.
J. Appl. Math., 2015

Multi-proxy Multi-signature Binding Positioning Protocol.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Position-based proxy signcryption.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

2014
Positioning-Protocol-Based Digital Signature.
Proceedings of the Wireless Internet - 8th International Conference, 2014

Verification of Branch-Time Property Based on Dynamic Description Logic.
Proceedings of the Intelligent Information Processing VII, 2014

Proxy multi-signature binding positioning protocol.
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014

2013
A Novel Multi-agent Evolutionary Algorithm for Assembly Sequence Planning.
J. Softw., 2013

2012
The Representation of Indiscernibility Relation Using ZBDDs.
Proceedings of the Intelligent Information Processing VI, 2012

Symbolic ZBDD Representations for Mechanical Assembly Sequences.
Proceedings of the Intelligent Information Processing VI, 2012

2010
Some basic principles for proxy signature schemes based on ECDLP.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

2009
An Ordered Binary Decision Diagram Model for Production Knowledge Representation and its Reasoning.
Proceedings of the 2009 Third International Conference on Genetic and Evolutionary Computing, 2009

An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009

Bilinear-pairings Based Designated-verifier Threshold Proxy Signature Scheme.
Proceedings of the 2009 International Conference on Security & Management, 2009

2008
A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme.
Proceedings of the Collaborative Computing: Networking, 2008

2007
Crypanalysis of Kuo and Chen's Threshold Proxy Signature Scheme Based on the RSA.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007


  Loading...