Tao Li

Orcid: 0000-0002-1448-3619

Affiliations:
  • Guizhou University, State Key Laboratory of Public Big Data, College of Computer Science and Technology, China (PhD 2023)
  • Qufu Normal University, School of Computer Science, Rizhao, China


According to our database1, Tao Li authored at least 31 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Cloud-SMPC: two-round multilinear maps secure multiparty computation based on LWE assumption.
J. Cloud Comput., December, 2024

2023
ROMSS: a rational optional multi-secret sharing scheme based on reputation mechanism.
J. Cloud Comput., December, 2023

Beyond model splitting: Preventing label inference attacks in vertical federated learning with dispersed training.
World Wide Web (WWW), September, 2023

Transfer learning based cascaded deep learning network and mask recognition for COVID-19.
World Wide Web (WWW), September, 2023

Research on Quantum-Attack-Resistant Strong Forward-Secure Signature Schemes.
Entropy, August, 2023

Achieving optimal rewards in cryptocurrency stubborn mining with state transition analysis.
Inf. Sci., May, 2023

Collaborative Energy Price Computing Based on Sarima-Ann and Asymmetric Stackelberg Games.
Symmetry, February, 2023

Multifactor Incentive Mechanism for Federated Learning in IoT: A Stackelberg Game Approach.
IEEE Internet Things J., 2023

Energy trading scheme based on consortium blockchain and game theory.
Comput. Stand. Interfaces, 2023

2022
STSIIML: Study on token shuffling under incomplete information based on machine learning.
Int. J. Intell. Syst., December, 2022

Is semi-selfish mining available without being detected?
Int. J. Intell. Syst., December, 2022

Privacy-aware PKI model with strong forward security.
Int. J. Intell. Syst., December, 2022

An Entropy-View Secure Multiparty Computation Protocol Based on Semi-Honest Model.
J. Organ. End User Comput., 2022

A trusted de-swinging k-anonymity scheme for location privacy protection.
J. Cloud Comput., 2022

A designated verifier multi-signature scheme in multi-clouds.
J. Cloud Comput., 2022

Trust-based secure directed diffusion routing protocol in WSN.
J. Ambient Intell. Humaniz. Comput., 2022

PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNs.
Int. J. Intell. Syst., 2022

A Secure Multiparty Computation Round Optimization Scheme Based on Standard Assumption.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022

2021
Dynamic Multi-Key FHE in Asymmetric Key Setting From LWE.
IEEE Trans. Inf. Forensics Secur., 2021

Corrigendum to "Rational Protocols and Attacks in Blockchain System".
Secur. Commun. Networks, 2021

A blockchain index structure based on subchain query.
J. Cloud Comput., 2021

ImpSuic: A quality updating rule in mixing coins with maximum utilities.
Int. J. Intell. Syst., 2021

Semi-selfish mining based on hidden Markov decision process.
Int. J. Intell. Syst., 2021

Research on direct anonymous attestation mechanism in enterprise information management.
Enterp. Inf. Syst., 2021

A De-swinging Scheme in Location Privacy Protection via Smart Contract.
Proceedings of the IEEE Intl Conf on Dependable, 2021

PSSPR: A Source Location Privacy Protection Scheme Based on Sector Phantom Routing in WSNs.
Proceedings of the IEEE Intl Conf on Dependable, 2021

Using information entropy to analyze secure multi-party computation protocol.
Proceedings of the IEEE Intl Conf on Dependable, 2021

A location data protection protocol based on differential privacy.
Proceedings of the IEEE Intl Conf on Dependable, 2021

2020
Rational Protocols and Attacks in Blockchain System.
Secur. Commun. Networks, 2020

Belief and fairness: A secure two-party protocol toward the view of entropy for IoT devices.
J. Netw. Comput. Appl., 2020

2019
Randomness invalidates criminal smart contracts.
Inf. Sci., 2019


  Loading...