Li Duan

Orcid: 0000-0002-0388-752X

According to our database1, Li Duan authored at least 87 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




FLOW: A Robust Federated Learning Framework to Defend Against Model Poisoning Attacks in IoT.
IEEE Internet Things J., May, 2024

DeFiScanner: Spotting DeFi Attacks Exploiting Logic Vulnerabilities on Blockchain.
IEEE Trans. Comput. Soc. Syst., April, 2024

Simple knowledge graph completion model based on PU learning and prompt learning.
Knowl. Inf. Syst., April, 2024

Temporal and Spatial Variation Analysis of Groundwater Stocks in Xinjiang Based on GRACE Data.
Remote. Sens., March, 2024

Exploiting Internal Randomness for Privacy in Vertical Federated Learning.
IACR Cryptol. ePrint Arch., 2024

A New Smart Contract Anomaly Detection Method by Fusing Opcode and Source Code Features for Blockchain Services.
IEEE Trans. Netw. Serv. Manag., December, 2023

Anonymous Authentication Protocol Based on Physical Unclonable Function and Elliptic Curve Cryptography for Smart Grid.
IEEE Syst. J., December, 2023

The Mechanism of Droplet Thermocapillary Migration Coupled with Multi-Physical Fields.
Symmetry, November, 2023

Practical Certificate-Less Infrastructure with Application in TLS.
Cryptogr., September, 2023

Robotic perception and manipulation of garments.
PhD thesis, 2023

A Hybrid Scheme for Disaster-Monitoring Applications in Wireless Sensor Networks.
Sensors, 2023

BSAF: A blockchain-based secure access framework with privacy protection for cloud-device service collaborations.
J. Syst. Archit., 2023

Simple Knowledge Graph Completion Model Based on Differential Negative Sampling and Prompt Learning.
Inf., 2023

Attacks Against Cross-Chain Systems and Defense Approaches: A Contemporary Survey.
IEEE CAA J. Autom. Sinica, 2023

Force: Making 4PC > 4 × PC in Privacy Preserving Machine Learning on GPU.
IACR Cryptol. ePrint Arch., 2023

Force: Highly Efficient Four-Party Privacy-Preserving Machine Learning on GPU.
Proceedings of the Secure IT Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, 2023

Efficient Forward Secrecy for TLS-PSK from Pure Symmetric Cryptography.
Proceedings of the Information Security - 26th International Conference, 2023

On the Privacy-Preserving Infrastructure for Authenticated Key Exchange.
Proceedings of the Information Security - 26th International Conference, 2023

Characterizing Coin-Based Voting Governance in DPoS Blockchains.
Proceedings of the Seventeenth International AAAI Conference on Web and Social Media, 2023

Secure Cross-domain Medical Data Sharing based on Distributed Cloud and Blockchain Services.
Proceedings of the IEEE International Conference on Web Services, 2023

How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Liquid Democracy in DPoS Blockchains.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023

Cross-Consensus Measurement of Individual-level Decentralization in Blockchains.
Proceedings of the 9th Intl Conference on Big Data Security on Cloud, 2023

CCUBI: A cross-chain based premium competition scheme with privacy preservation for usage-based insurance.
Int. J. Intell. Syst., December, 2022

Multiple-Layer Security Threats on the Ethereum Blockchain and Their Countermeasures.
Secur. Commun. Networks, 2022

A Continuous Robot Vision Approach for Predicting Shapes and Visually Perceived Weights of Garments.
IEEE Robotics Autom. Lett., 2022

Attack and protection schemes on fabric isomorphic crosschain systems.
Int. J. Distributed Sens. Networks, 2022

A novel and highly efficient botnet detection algorithm based on network traffic analysis of smart systems.
Int. J. Distributed Sens. Networks, 2022

Security Against Honorific Adversaries: Efficient MPC with Server-aided Public Verifiability.
IACR Cryptol. ePrint Arch., 2022

A Data-Centric Approach For Dual-Arm Robotic Garment Flattening.
CoRR, 2022

Recognising Known Configurations of Garments For Dual-Arm Robotic Flattening.
CoRR, 2022

An ontology-based deep belief network model.
Computing, 2022

Learning Physics Property Parameters of Fabrics and Garments With a Physics Similarity Neural Network.
IEEE Access, 2022

Continuous Perception for Classifying Shapes and Weights of Garments for Robotic Vision Applications.
Proceedings of the 17th International Joint Conference on Computer Vision, 2022

High-Speed Anonymous Device Authentication Without Asymmetric Cryptography in the Internet-of-Things.
Proceedings of the Ubiquitous Security - Second International Conference, 2022

A Fine-Grained Access Control Framework for Data Sharing in IoT Based on IPFS and Cross-Blockchain Technology.
Proceedings of the Smart Computing and Communication - 7th International Conference, 2022

Research on the Construction of Maritime Legal Knowledge Graph.
Proceedings of the 7th International Conference on Computer and Communication Systems, 2022

A Decentralized Cross-Chain Service Protocol based on Notary Schemes and Hash-Locking.
Proceedings of the IEEE International Conference on Services Computing, 2022

Privacy Threats of Acoustic Covert Communication among Smart Mobile Devices.
Wirel. Commun. Mob. Comput., 2021

Data-Driven Iterative Learning Control for Nonlinear Discrete-Time MIMO Systems.
IEEE Trans. Neural Networks Learn. Syst., 2021

Exploring the clinical diagnostic value of pelvic floor ultrasound images for pelvic organ prolapses through deep learning.
J. Supercomput., 2021

Metaknowledge Enhanced Open Domain Question Answering with Wiki Documents.
Sensors, 2021

A Hybrid Recommendation System based on Fuzzy C-Means Clustering and Supervised Learning.
KSII Trans. Internet Inf. Syst., 2021

A hybrid intelligent service recommendation by latent semantics and explicit ratings.
Int. J. Intell. Syst., 2021

Learning Physics Properties of Fabrics and Garments with a Physics Similarity Neural Network.
CoRR, 2021

Garment Similarity Network (GarNet): A Continuous Perception Robotic Approach for Predicting Shapes and Visually Perceived Weights of Unseen Garments.
CoRR, 2021

Financial Risk Information Spreading on Metapopulation Networks.
Complex., 2021

Metaknowledge Extraction Based on Multi-Modal Documents.
IEEE Access, 2021

Flexible Group Non-interactive Key Exchange in the Standard Model.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2021

Perfect Anonymous Authentication and Secure Communication in Internet-of-Things.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2021

Electrically Transduced Gas Sensors Based on Semiconducting Metal Oxide Nanowires.
Sensors, 2020

Land Subsidence Response to Different Land Use Types and Water Resource Utilization in Beijing-Tianjin-Hebei, China.
Remote. Sens., 2020

An Improved Multi-Sensor MTI Time-Series Fusion Method to Monitor the Subsidence of Beijing Subway Network during the Past 15 Years.
Remote. Sens., 2020

Integrating RFID technology to protect privacy in library.
Int. J. RF Technol. Res. Appl., 2020

A Fast and Precise Spatial Verification Strategy for Duplicate Image Retrieval.
Int. J. Perform. Eng., 2020

An Automatic Centroid Image Selection Method Based on Fuzzy Logic Reasoning in Image Deduplication.
Int. J. Grid High Perform. Comput., 2020

Non-interactive certificate update protocol for efficient authentication in IoT.
Future Gener. Comput. Syst., 2020

Continuous Perception for Classifying Shapes and Weights of Garmentsfor Robotic Vision Applications.
CoRR, 2020

Lightweight key management system for inter-node communication in IoT.
Proceedings of the IoT '20: 10th International Conference on the Internet of Things, 2020

Keywords Extraction in Vertical Domain Based on Global Knowledge and Local Semantic Relations.
Proceedings of the EITCE 2020: 4th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, 6 November, 2020, 2020

Deep Unsupervised Workload Sequence Anomaly Detection with Fusion of Spatial and Temporal Features in the Cloud.
Proceedings of the 13th IEEE International Conference on Cloud Computing, 2020

Study on the mechanical properties of beam-column structure made of larch plywood.
J. Comput. Methods Sci. Eng., 2019

A Comprehensive Security Framework for Publish/Subscribe-Based IoT Services Communication.
IEEE Access, 2019

Data-Driven Model-Free Adaptive Attitude Control Approach for Launch Vehicle With Virtual Reference Feedback Parameters Tuning Method.
IEEE Access, 2019

A Reconfigurable Microservice-Based Migration Technique for IoT Systems.
Proceedings of the Service-Oriented Computing - ICSOC 2019 Workshops, 2019

Enforcing compliance of hierarchical business process with visual security constraints.
Int. J. Syst. Assur. Eng. Manag., 2018

Interest-Aware Service Association Rule Creation for Service Recommendation and Linking Mode Recommendation in User-Generated Service.
IEEE Access, 2018

Flexible certificate revocation list for efficient authentication in IoT.
Proceedings of the 8th International Conference on the Internet of Things, 2018

Secure Deduplication of Encrypted Data: Refined Model and New Constructions.
IACR Cryptol. ePrint Arch., 2017

Predicting Crash Rate Using Logistic Quantile Regression With Bounded Outcomes.
IEEE Access, 2017

A Cross-Layer Security Solution for Publish/Subscribe-Based IoT Services Communication Infrastructure.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

Proactive Personalized Services in Large-Scale IoT-Based Healthcare Application.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

Secure Data-Centric Access Control for Smart Grid Services Based on Publish/Subscribe Systems.
ACM Trans. Internet Techn., 2016

Automated Policy Combination for Secure Data Sharing in Cross-Organizational Collaborations.
IEEE Access, 2016

Space-division multiplexed multicore fiber Mach-Zehnder interferometer for joint temperature and strain sensing.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2016

Model-Based Minimum Privacy Disclosure Recommendation for Authorization Policies.
Proceedings of the IEEE International Conference on Services Computing, 2016

Optimizing Workload Category for Adaptive Workload Prediction in Service Clouds.
Proceedings of the Service-Oriented Computing - 13th International Conference, 2015

Automated Policy Combination for Data Sharing across Multiple Organizations.
Proceedings of the 2015 IEEE International Conference on Services Computing, 2015

Clustering-based Routing Algorithm in Wireless Sensor Networks with Mobile Sink.
J. Networks, 2014

Event-Driven SOA for IoT Services.
Proceedings of the IEEE International Conference on Services Computing, SCC 2014, Anchorage, AK, USA, June 27, 2014

Research of Decentralized Collaborative Target Tracking Architecture in the Sea Battlefield for the Complex Sensor Networks.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2012

A portfolio selection model using fuzzy returns.
Fuzzy Optim. Decis. Mak., 2011

The Research of the Command and Control Model for the Naval Battle Groups with Multi-agent Theory.
Proceedings of the Applied Informatics and Communication - International Conference, 2011

Pattern Synthesis of Antennas Based on Particle Swarm Optimization Algorithm.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011

An adaptive information dissemination of decentralized warship cooperative engagement with constrained bandwidth based on a geodetic coordinate system.
Simul. Model. Pract. Theory, 2010

A Decentralized Fusion Algorithm Established in Geodetic Coordinate System for Naval Ships Cooperative Engagement.
Proceedings of the International Symposium on Information Processing, 2008

Target tracking with interactive multiple model in geodetic coordinate system for naval ships cooperative engagement.
Proceedings of the 11th International Conference on Information Fusion, 2008