Guowen Li

Orcid: 0000-0003-0238-6747

According to our database1, Guowen Li authored at least 23 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An adaptive-size vector tile pyramid construction method considering spatial data distribution density characteristics.
Comput. Geosci., February, 2024

2023
A critical review of cyber-physical security for building automation systems.
Annu. Rev. Control., January, 2023

CYDRES: CYber Defense and REsilient System for securing grid-interactive efficient buildings.
Proceedings of the 10th ACM International Conference on Systems for Energy-Efficient Buildings, 2023

2022
Development of a hardware-In-the-Loop (HIL) testbed for cyber-physical security in smart buildings.
CoRR, 2022

Detecting Financial Fraud using Two Types of Benford Factors: Evidence from China.
Proceedings of the 9th International Conference on Information Technology and Quantitative Management, 2022

Oil Price, Economic Policy Uncertainty and Tourism Development: Evidence from China.
Proceedings of the 9th International Conference on Information Technology and Quantitative Management, 2022

2021
A Deep Learning Framework for Baltic Dry Index Forecasting.
Proceedings of the 8th International Conference on Information Technology and Quantitative Management, 2021

2019
Risk factors identification and evolution analysis from textual risk disclosures for insurance industry.
Proceedings of the 7th International Conference on Information Technology and Quantitative Management, 2019

Forecasting the number of inbound tourists with Google Trends.
Proceedings of the 7th International Conference on Information Technology and Quantitative Management, 2019

Evolutionary Mechanism of Risk Factor Disclosure in American Financial Corporation Annual Report.
Proceedings of the Data Science - 6th International Conference, 2019

2018
Comprehensive identification of operational risk factors based on textual risk disclosures.
Proceedings of the 6th International Conference on Information Technology and Quantitative Management, 2018

2017
Using LDA Model to Quantify and Visualize Textual Financial Stability Report.
Proceedings of the 5th International Conference on Information Technology and Quantitative Management, 2017

2014
One forward-secure signature scheme using bilinear maps and its applications.
Inf. Sci., 2014

2010
Forward-Secure Multisignature, Threshold Signature and Blind Signature Schemes.
J. Networks, 2010

2008
How to Construct Forward Secure Single-Server, Multi-Server and Threshold-Server Assisted Signature Schemes Using Bellare-Miner Scheme.
J. Commun., 2008

Publicly Verifiable Secret Sharing Member-join Protocol For Threshold Signatures.
J. Commun., 2008

Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005.
Proceedings of the Provable Security, Second International Conference, 2008

Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps.
Proceedings of the Provable Security, Second International Conference, 2008

2007
Key-Insulated Group Signature Scheme with Verifier-Local Revocation.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

An Approach to Convert Any Threshold Signature into a Threshold Group Signature.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

A New Identity-Based Blind Signature Scheme with Batch Verifications.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Two Threshold Multisignature Schemes from Bilinear Pairings.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Key-Insulated Group Signature Scheme with Selective Revocation.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007


  Loading...