Lingling Xu

According to our database1, Lingling Xu authored at least 55 papers between 2007 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




Tc-PEDCKS: Towards time controlled public key encryption with delegatable conjunctive keyword search for Internet of Things.
J. Network and Computer Applications, 2019

Multi-feature local sparse representation for infrared pedestrian tracking.
TIIS, 2019

Re-curation and rational enrichment of knowledge graphs in Biological Expression Language.
Database, 2019

High-Capacity Reversible Data Hiding in Encrypted Images by Bit Plane Partition and MSB Prediction.
IEEE Access, 2019

Understanding Content Voting Based on Social Foraging Theory.
IEEE Trans. Engineering Management, 2017

Design and theoretical analysis of virtual machine placement algorithm based on peak workload characteristics.
Soft Comput., 2017

A novel hybrid method for robust infrared target detection.
TIIS, 2017

Two-Factor Data Access Control With Efficient Revocation for Multi-Authority Cloud Storage Systems.
IEEE Access, 2017

Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing.
IEEE Trans. Computers, 2016

Solutions to the anti-piracy problem in oblivious transfer.
J. Comput. Syst. Sci., 2016

Anonymous authentication for circuits from correlation-relaxed two-to-one recoding.
J. Ambient Intelligence and Humanized Computing, 2016

A fine-grained attribute-based authentication for sensitive data stored in cloud computing.
IJGUC, 2016

Coarser-Grained Multi-user Searchable Encryption in Hybrid Cloud.
Trans. Computational Collective Intelligence, 2015

Bidirectional Analysis Method of Static XSS Defect Detection Technique Based On Database Query Language.
Trans. Computational Collective Intelligence, 2015

Analyses of several recently proposed group key management schemes.
Security and Communication Networks, 2015

Quantum private comparison with a malicious third party.
Quantum Information Processing, 2015

Server-Aided Verification Signature with Privacy for Mobile Computing.
Mobile Information Systems, 2015

An Improved Cloud Data Sharing Scheme with Hierarchical Attribute Structure.
J. UCS, 2015

A Backward Unlinkable Secret Handshake Scheme with Revocation Support in the Standard Model.
Information, 2015

Modeling and optimization control of a demand-driven, conveyor-serviced production station.
European Journal of Operational Research, 2015

Understanding the continuance use of social network sites: a computer self-efficacy perspective.
Behaviour & IT, 2015

Secure Image Deduplication in Cloud Storage.
Proceedings of the Information and Communication Technology, 2015

Provably Secure Group Key Management Approach Based upon Hyper-Sphere.
IEEE Trans. Parallel Distrib. Syst., 2014

Verifiable computation with access control in cloud computing.
The Journal of Supercomputing, 2014

Timed-release oblivious transfer.
Security and Communication Networks, 2014

Yet another attack on the chinese remainder theorem-based hierarchical access control scheme.
Security and Communication Networks, 2014

A proximal parallel splitting method for minimizing sum of convex functions with linear constraints.
J. Computational Applied Mathematics, 2014

Towards provably secure proxy signature scheme based on Isomorphisms of Polynomials.
Future Generation Comp. Syst., 2014

A Parallel Splitting Method for Separable Convex Programs.
J. Optimization Theory and Applications, 2013

An improved first-order primal-dual algorithm with a new correction step.
J. Global Optimization, 2013

MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature.
IACR Cryptology ePrint Archive, 2013

Yet Another Attack On the Chinese Remainder Theorem Based Hierarchical Access Control Scheme.
IACR Cryptology ePrint Archive, 2013

Attacks and Comments on Several Recently Proposed Key Management Schemes.
IACR Cryptology ePrint Archive, 2013

A new partial splitting augmented Lagrangian method for minimizing the sum of three convex functions.
Applied Mathematics and Computation, 2013

A joint energy-saving mechanism for M2M communications in LTE-based system.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

An Optimized Random Access Algorithm for MTC Users over Wireless Networks.
Proceedings of the 77th IEEE Vehicular Technology Conference, 2013

Authentication and Key Agreement Based on Hyper-sphere Using Smart Cards.
Proceedings of the Network and System Security - 7th International Conference, 2013

Server-Aided Verification Signatures with Privacy.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

IBUOV, A Provably Secure Identity-Based UOV Signature Scheme.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

An efficient downlink packet scheduling algorithm for real time traffics in LTE systems.
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013

A Tale of Four Functions in a Multifunctional Device: Extending Implementation Intention Theory.
IEEE Trans. Prof. Communication, 2012

The Moderating Effects of Utilitarian and Hedonic Values on Information Technology Continuance.
ACM Trans. Comput.-Hum. Interact., 2012

An improved two-step method for solving generalized Nash equilibrium problems.
European Journal of Operational Research, 2012

Secret handshakes from ID-based message recovery signatures: A new generic approach.
Computers & Electrical Engineering, 2012

A Novel Power Ramping Scheme of M2M for WCDMA Random Access Channel.
Proceedings of the 76th IEEE Vehicular Technology Conference, 2012

Proxy Signature Scheme Based on Isomorphisms of Polynomials.
Proceedings of the Network and System Security - 6th International Conference, 2012

Oblivious transfer with timed-release receiver's privacy.
Journal of Systems and Software, 2011

Oblivious Transfer with Complex Attribute-Based Access Control.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010

A geometric non-linear interpolatory subdivision scheme via approximation scheme.
Proceedings of the 11th International Conference on Computer-Aided Design and Computer Graphics, 2009

New ID-Based Signatures without Trusted PKG.
Proceedings of the International Workshop on Knowledge Discovery and Data Mining, 2008

Toward Understanding the Capability Cycle of Software Process Improvement: A Case Study of a Software Service Company.
Proceedings of the Information Technology in the Service Economy: Challenges and Possibilities for the 21st Century, 2008

Understanding Users' Continuance of Facebook: The Role of General and Specific Computer Self-Efficacy.
Proceedings of the International Conference on Information Systems, 2008

The Improvement of C-V Level Set Method for Image Segmentation.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

The Effect of Background Music-Induced Arousal on Online Consumer Search Behavior: Evaluating Search Performance and Experience.
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008

Emotional Expression Online: the Impact of Task, Relationship and Personality Perception on Emoticon Usage in Instant Messenger.
Proceedings of the Pacific Asia Conference on Information Systems, 2007