Ping Li

Orcid: 0000-0002-0686-741X

Affiliations:
  • South China Normal University, School of Computer Science, Guangzhou, China
  • Guangzhou University, School of Computer Science, Guangzhou, China (2016 - 2018)
  • Sun Yat-sen University, School of Mathematics and Computational Science, Guangzhou, China (PhD 2016)


According to our database1, Ping Li authored at least 32 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Reconciling privacy and utility: an unscented Kalman filter-based framework for differentially private machine learning.
Mach. Learn., January, 2023

A Deep-Learning Approach for Predicting Round Obfuscation in White-Box Block Ciphers.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

2022
EOSIOAnalyzer: An Effective Static Analysis Vulnerability Detection Framework for EOSIO Smart Contracts.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

Privacy-Preserving Machine Learning
Springer, ISBN: 978-981-16-9138-6, 2022

2021
Privacy-preserving multikey computing framework for encrypted data in the cloud.
Inf. Sci., 2021

2020
Secure and efficient outsourcing differential privacy data release scheme in Cyber-physical system.
Future Gener. Comput. Syst., 2020

A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme.
Complex., 2020

Privacy-Preserving Computing Framework for Encrypted Data Under Multiple Keys.
Proceedings of the Smart Computing and Communication - 5th International Conference, 2020

2019
An Efficient Outsourced Privacy Preserving Machine Learning Scheme With Public Verifiability.
IEEE Access, 2019

Group Identification via Non-threshold Leakage-Resilient Secret Sharing Scheme.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

Secure and Dynamic Outsourcing Computation of Machine Learning in Cloud Computing.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2018
A QDCT- and SVD-based color image watermarking scheme using an optimized encrypted binary computer-generated hologram.
Soft Comput., 2018

Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice.
J. Netw. Comput. Appl., 2018

Outsourced privacy-preserving classification service over encrypted data.
J. Netw. Comput. Appl., 2018

Generating stable biometric keys for flexible cloud computing authentication using finger vein.
Inf. Sci., 2018

Differentially private Naive Bayes learning over multiple data sources.
Inf. Sci., 2018

Attribute-based handshake protocol for mobile healthcare social networks.
Future Gener. Comput. Syst., 2018

Verifiable searchable encryption with aggregate keys for data sharing system.
Future Gener. Comput. Syst., 2018

Privacy-preserving machine learning with multiple data providers.
Future Gener. Comput. Syst., 2018

Privacy-preserving outsourced classification in cloud computing.
Clust. Comput., 2018

2017
Privacy-preserving outsourcing of image feature extraction in cloud computing.
Soft Comput., 2017

Face recognition based on the fusion of wavelet packet sub-images and fisher linear discriminant.
Multim. Tools Appl., 2017

Prosodic features-based speaker verification using speaker-specific-text for short utterances.
Int. J. Embed. Syst., 2017

A finger vein recognition algorithm based on deep learning.
Int. J. Embed. Syst., 2017

Multi-key privacy-preserving deep learning in cloud computing.
Future Gener. Comput. Syst., 2017

New directly revocable attribute-based encryption scheme and its application in cloud storage environment.
Clust. Comput., 2017

Towards secure and flexible EHR sharing in mobile health cloud under static assumptions.
Clust. Comput., 2017

Multi-party Security Computation with Differential Privacy over Outsourced Data.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

2016
Rational computing protocol based on fuzzy theory.
Soft Comput., 2016

Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Prosodic Features Based Text-dependent Speaker Recognition with Short Utterance.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

A Finger Vein Recognition Algorithm Using Feature Block Fusion and Depth Neural Network.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015


  Loading...