Lin Li

Orcid: 0000-0001-7310-4626

Affiliations:
  • Coordination Center of China, National Computer Network Emergency Response Technical Team, Beijing, China
  • Beihang University, School of Electronic and Information Engineering, Beijing, China (PhD 2018)


According to our database1, Lin Li authored at least 14 papers between 2015 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Detecting Multivariate Time Series Anomalies With Cascade Decomposition Consistency.
IEEE Trans. Instrum. Meas., 2025

2024
An Identity Alignment Method based on Online Tracking.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024

Deanonymizing Transactions Originating from Monero Tor Hidden Service Nodes.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024

Research on clustering of non-uniformly distributed point clouds in road scenes.
Proceedings of the 2024 16th International Conference on Machine Learning and Computing, 2024

Research on PoW Mining Flow Monitoring Based on Multidimensional Feature Analysis.
Proceedings of the 2024 5th International Conference on Computing, 2024

2023
Eclipse Attack Defense Method Based on Distributed Storage and Reference Value System.
Proceedings of the 23rd IEEE International Conference on Communication Technology, 2023

2020
Knowledge Graph Embedding Preserving Soft Logical Regularity.
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020

2018
A Fine-Grained Hardware Security Approach for Runtime Code Integrity in Embedded Systems.
J. Univers. Comput. Sci., 2018

Online learning based on a novel cost function for system power management.
IET Comput. Digit. Tech., 2018

Hardware-assisted integrity monitor based on lightweight hash function.
IEICE Electron. Express, 2018

2015
Polarity Searching for MPRM Logic Circuit Based on Improved Adaptive Genetic Algorithm.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Hardware-Assisted Monitoring for Code Security in Embedded System.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

An Improved S-Box of Lightweight Hash Function SPOGENT.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

A multi-level collaboration low-power design based on embedded system.
Proceedings of the 28th IEEE International System-on-Chip Conference, 2015


  Loading...