Keying Li

Orcid: 0009-0005-9261-736X

According to our database1, Keying Li authored at least 13 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Exploring Second Language Learners'Continuance Intention: Perceived Ease of Use as a Predictor via Serial Multiple Mediation Involving Perceived Usefulness and Flow in Language Learning Applications.
Proceedings of the 2024 10th International Conference on Education and Training Technologies, 2024

2023
Kung Fu Metaverse: A Movement Guidance Training System.
IEEE Trans. Learn. Technol., December, 2023

Resource Scheduling Strategy for Data Transmission Task of Data Relay Satellite.
Proceedings of the 23rd IEEE International Conference on Communication Technology, 2023

2022
Quantifying the Long-Term MODIS Cloud Regime Dependent Relationship between Aerosol Optical Depth and Cloud Properties over China.
Remote. Sens., 2022

Application of YOLOv5 Based on Attention Mechanism and Receptive Field in Identifying Defects of Thangka Images.
IEEE Access, 2022

2018
L1-L2 Parallel Treebank of Learner Chinese: Overused and Underused Syntactic Structures.
Proceedings of the Eleventh International Conference on Language Resources and Evaluation, 2018

2017
L1-L2 Parallel Dependency Treebank as Learner Corpus.
Proceedings of the 15th International Conference on Parsing Technologies, 2017

Automatic Difficulty Assessment for Chinese Texts.
Proceedings of the IJCNLP 2017, Tapei, Taiwan, November 27, 2017

Towards Universal Dependencies for Learner Chinese.
Proceedings of the NoDaLiDa Workshop on Universal Dependencies, 2017

2014
Key Policy Attribute-based Proxy Re-encryption and RCCA Secure Scheme.
J. Internet Serv. Inf. Secur., 2014

Outsourcing Decryption of Multi-Authority ABE Ciphertexts.
Int. J. Netw. Secur., 2014

2013
Matrix Access structure Policy used in Attribute-Based Proxy Re-encryption
CoRR, 2013

Key Policy Attribute-Based Proxy Re-encryption with Matrix Access Structure.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013


  Loading...