Li Miao

Orcid: 0000-0002-5310-8010

According to our database1, Li Miao authored at least 25 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Measurement Technologies of Light Field Camera: An Overview.
Sensors, August, 2023

New Differentially 4-Uniform Piecewise Permutations over F22k from the Inverse Function.
Symmetry, 2023

RAFIC: Retrieval-Augmented Few-shot Image Classification.
CoRR, 2023

2022
Research on application of deep neural network model in college English skill training system.
Int. J. Wirel. Mob. Comput., 2022

Multilingual Transformer Language Model for Speech Recognition in Low-resource Languages.
Proceedings of the Ninth International Conference on Social Networks Analysis, 2022

2021
Modeling and Analysis of System Error for Highly Curved Freeform Surface Measurement by Noncontact Dual-Axis Rotary Scanning.
Sensors, 2021

Overall Profile Measurements of Tiny Parts with Complicated Features with the Cradle-Type Five-Axis System.
Sensors, 2021

Stochastic Differential Game-Based Malware Propagation in Edge Computing-Based IoT.
Secur. Commun. Networks, 2021

2020
Mean Field Games Theoretic for Mobile Privacy Security Enhancement in Edge Computing.
Wirel. Pers. Commun., 2020

Constructing Chaos Based Substitution Boxes Using the Composition of Transpositions.
Wirel. Pers. Commun., 2020

Differential uniformity of the composition of two functions.
Cryptogr. Commun., 2020

Trajectory Shaping Guidance Law of Homing Missile with High Maneuver and Low Overload and Its Database Security.
Proceedings of the Cyberspace Safety and Security - 12th International Symposium, 2020

Reliability Optimization and Trust Computing of Composite Wing Based on Sparse PC Method.
Proceedings of the Cyberspace Safety and Security - 12th International Symposium, 2020

2019
Searchable Encryption Scheme for Personalized Privacy in IoT-Based Big Data.
Sensors, 2019

Optimal defense strategy based on the mean field game model for cyber security.
Int. J. Distributed Sens. Networks, 2019

A Group-Based NTRU-Like Public-Key Cryptosystem for IoT.
IEEE Access, 2019

S-Boxes Construction Based on the Cayley Graph of the Symmetric Group for UASNs.
IEEE Access, 2019

2018
Optimal Dissemination Strategy of Security Patch Based on Differential Game in Social Network.
Wirel. Pers. Commun., 2018

A Differential Game-Theoretic Approach for the Intrusion Prevention Systems and Attackers in Wireless Networks.
Wirel. Pers. Commun., 2018

A Novel Differential Game Model-Based Intrusion Response Strategy in Fog Computing.
Secur. Commun. Networks, 2018

A method to calculate differential uniformity for permutations.
Des. Codes Cryptogr., 2018

2017
Cyber security based on mean field game model of the defender: Attacker strategies.
Int. J. Distributed Sens. Networks, 2017

2013
Health Information Technology Adoption in U.S. Acute Care Hospitals.
J. Medical Syst., 2013

2011
Influence of FDI on the Total Export of Shanxi Province.
Proceedings of the Information Computing and Applications, 2011

2010
A New Proof for the Undecidability of Context-Sensitive Synchronization-Sensitive Analysis.
Proceedings of the Fifth International Conference on Frontier of Computer Science and Technology, 2010


  Loading...