Qinyi Li

Orcid: 0000-0002-1064-2600

According to our database1, Qinyi Li authored at least 26 papers between 2012 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Cyber Security Resilience in Industrial Control Systems using Defence-in-Depth and Zero Trust.
Proceedings of the 16th International Conference on Sensing Technology, 2023

A Runtime Verification Framework for Cyber-Physical Systems Based on Data Analytics and LTL Formula Learning.
Proceedings of the Formal Methods and Software Engineering, 2023

Identity-Based Matchmaking Encryption with Enhanced Privacy - A Generic Construction with Practical Instantiations.
Proceedings of the Computer Security - ESORICS 2023, 2023

Encrypted Network Traffic Classification with Higher Order Graph Neural Network.
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023

Tightly Secure Lattice Identity-Based Signature in the Quantum Random Oracle Model.
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023

2022
Wire Rope Damage Detection Signal Processing Using K-Singular Value Decomposition and Optimized Double-Tree Complex Wavelet Transform.
IEEE Trans. Instrum. Meas., 2022

A Digital Twin Runtime Verification Framework for Protecting Satellites Systems from Cyber Attacks.
Proceedings of the 26th International Conference on Engineering of Complex Computer Systems, 2022

A CNN Based Encrypted Network Traffic Classifier.
Proceedings of the ACSW 2022: Australasian Computer Science Week 2022, Brisbane, Australia, February 14, 2022

2021
CCA-security from adaptive all-but-one lossy trapdoor functions.
Theor. Comput. Sci., 2021

Efficient public-key encryption with equality test from lattices.
Theor. Comput. Sci., 2021

Secure Hybrid Encryption in the Standard Model from Hard Learning Problems.
Proceedings of the Post-Quantum Cryptography - 12th International Workshop, 2021

Anonymous Lattice Identity-Based Encryption with Traceable Identities.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
A Simple and Efficient CCA-Secure Lattice KEM in the Standard Model.
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020

2019
Direct CCA-Secure KEM and Deterministic PKE from Plain LWE.
Proceedings of the Post-Quantum Cryptography - 10th International Conference, 2019

2018
Almost Tight Multi-Instance Multi-Ciphertext Identity-Based Encryption on Lattices.
Proceedings of the Applied Cryptography and Network Security, 2018

2017
All-But-Many Lossy Trapdoor Functions from Lattices and Applications.
IACR Cryptol. ePrint Arch., 2017

2016
Non-interactive deniable ring signature without random oracles.
Secur. Commun. Networks, 2016

Towards Tightly Secure Short Signature and IBE.
IACR Cryptol. ePrint Arch., 2016

Towards Tightly Secure Lattice Short Signature and Id-Based Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

Turing Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded Functions.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
A Fully Secure Attribute Based Broadcast Encryption Scheme.
Int. J. Netw. Secur., 2015

Attribute-Based Encryption for Finite Automata from LWE.
Proceedings of the Provable Security, 2015

2013
Broadcast revocation scheme in composite-order bilinear group and its application to attribute-based encryption.
Int. J. Secur. Networks, 2013

An Expressive Decentralizing KP-ABE Scheme with Constant-Size Ciphertext.
Int. J. Netw. Secur., 2013

2012
Efficient and Random Oracle-Free Conditionally Anonymous Ring Signature.
Proceedings of the Provable Security - 6th International Conference, 2012

Efficient Revocable Key-Policy Attribute Based Encryption with Full Security.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012


  Loading...