Lishan Ke

Orcid: 0000-0002-5279-5795

According to our database1, Lishan Ke authored at least 22 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A stealthy and robust backdoor attack via frequency domain transform.
World Wide Web (WWW), September, 2023

Explanation leaks: Explanation-guided model extraction attacks.
Inf. Sci., 2023

2022
KD-GAN: An effective membership inference attacks defence framework.
Int. J. Intell. Syst., 2022

An empirical study of supervised email classification in Internet of Things: Practical performance and key influencing factors.
Int. J. Intell. Syst., 2022

2021
Quantum resistant key-exposure free chameleon hash and applications in redactable blockchain.
Inf. Sci., 2021

A discrete cosine transform-based query efficient attack on black-box object detectors.
Inf. Sci., 2021

2020
A Novel Machine Learning-Based Approach for Security Analysis of Authentication and Key Agreement Protocols.
Secur. Commun. Networks, 2020

A dynamic and hierarchical access control for IoT in multi-authority cloud storage.
J. Netw. Comput. Appl., 2020

Incentive compatible and anti-compounding of wealth in proof-of-stake.
Inf. Sci., 2020

A feature-vector generative adversarial network for evading PDF malware classifiers.
Inf. Sci., 2020

Optimal mixed block withholding attacks based on reinforcement learning.
Int. J. Intell. Syst., 2020

A Safety Collision Avoidance Algorithm Based on Comprehensive Characteristics.
Complex., 2020

A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme.
Complex., 2020

2019
New efficient identity based encryption without pairings.
J. Ambient Intell. Humaniz. Comput., 2019

An Efficient Cryptosystem for Video Surveillance in the Internet of Things Environment.
Complex., 2019

2018
Secure Storage and Retrieval of IoT Data Based on Private Information Retrieval.
Wirel. Commun. Mob. Comput., 2018

RoughDroid: Operative Scheme for Functional Android Malware Detection.
Secur. Commun. Networks, 2018

A generic method to construct zero-difference balanced functions.
Cryptogr. Commun., 2018

2017
Permutation Polynomials over Z<i><sub>p<sup>n</sup></sub></i> and Their Randomness.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

2015
Improved broadcast encryption schemes with enhanced security.
J. Ambient Intell. Humaniz. Comput., 2015

On the LFSRization of a Class of FCSR Automata.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

2014
Distribution Properties and 2-Adic Complexity of Clock-Controlled FCSR Sequences.
Proceedings of the 2014 Ninth International Conference on P2P, 2014


  Loading...