Sujuan Li

According to our database1, Sujuan Li authored at least 21 papers between 2009 and 2026.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

On csauthors.net:

Bibliography

2026
Uplink transmission interference suppression technique for ultra-dense networks based on locally weighted regression.
Int. J. Comput. Sci. Eng., 2026

2025
Relation-Preserving Feature Embedding for Visible-Infrared Person Re-Identification.
Signal Image Video Process., December, 2025

Relation-aware non-local attention network for person re-identification.
Multim. Syst., February, 2025

2022
Remote medical video region tamper detection system based on Wireless Sensor Network.
EAI Endorsed Trans. Pervasive Health Technol., 2022

eCK-Secure Authenticated Key Exchange against Auxiliary Input Leakage.
Comput. J., 2022

2020
Forecast of Traffic Flow State During Large Competition Events.
Rev. d'Intelligence Artif., 2020

2019
A Novel Texture Generation Super Resolution Model.
Proceedings of the 7th International Conference on Information Technology and Quantitative Management, 2019

2018
Certificate-based Smooth Projective Hashing and Its Applications.
Int. J. Netw. Secur., 2018

2017
Continuous Leakage Resilient Lossy Trapdoor Functions.
Inf., 2017

2016
Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage.
Proceedings of the Provable Security, 2016

2014
Cryptanalysis and improvement on a certificateless encryption scheme in the standard model.
Int. J. Inf. Comput. Secur., 2014

2013
On security of a certificateless signcryption scheme.
Inf. Sci., 2013

Leakage-resilient identity-based encryption scheme.
Int. J. Grid Util. Comput., 2013

Efficient leakage-resilient public key encryption from DDH assumption.
Clust. Comput., 2013

2012
Simple, Fast and Selective Detection of Adenosine Triphosphate at Physiological pH Using Unmodified Gold Nanoparticles as Colorimetric Probes and Metal Ions as Cross-Linkers.
Sensors, 2012

Cryptanalysis of a Certificateless Encryption Scheme in the Standard Model.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

A New Variant of the Cramer-Shoup Leakage-Resilient Public Key Encryption.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

2011
Design of industrial robot controller based on system on programmable chip.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

Design of PS2 keyboard controller IP core based on SOPC.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

2010
Cryptanalysis on Two Certificateless Signature Schemes.
Int. J. Comput. Commun. Control, 2010

2009
A New Method of Morphological Associative Memories.
Proceedings of the Emerging Intelligent Computing Technology and Applications. With Aspects of Artificial Intelligence, 2009


  Loading...