Xiangxue Li

Orcid: 0000-0002-1779-6178

According to our database1, Xiangxue Li authored at least 92 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Robust anomaly-based intrusion detection system for in-vehicle network by graph neural network framework.
Appl. Intell., 2023

Constant-Round Multiparty Private Function Evaluation with (Quasi-)Linear Complexities.
Proceedings of the Applied Cryptography and Network Security, 2023

2022
PFE: Linear Active Security, Double-Shuffle Proofs, and Low-Complexity Communication.
IACR Cryptol. ePrint Arch., 2022

Generic 2-Party PFE with Constant Rounds and Linear Active Security, and Efficient Instantiation.
Proceedings of the Security and Privacy in Communication Networks, 2022

SecureBiNN: 3-Party Secure Computation for Binarized Neural Network Inference.
Proceedings of the Computer Security - ESORICS 2022, 2022

Privacy Leakage in Privacy-Preserving Neural Network Inference.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
CPA/CCA2-secure PKE with squared-exponential DFR from low-noise LPN.
Theor. Comput. Sci., 2021

(Semi-)Automatically Parsing Private Protocols for In-Vehicle ECU Communications.
Entropy, 2021

Chosen-Ciphertext Secure Key Encapsulation Mechanism in the Standard Model.
IEEE Access, 2021

Quantum-Resistant Lightweight Authentication and Key Agreement Protocol for Fog-Based Microgrids.
IEEE Access, 2021

WSG-InV: Weighted State Graph Model for Intrusion Detection on In-Vehicle Network.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021

Lightweight Grouping-Proof for Post-Quantum RFID Security.
Proceedings of the 2021 IEEE SmartWorld, 2021

LVRT: Low Variances of Solo Mining Reward & Inter-block Time in Collaborative PoW.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Another Look at the Connection between CAN Signal Ringing & In-Vehicle ECU Identification.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Source Identification from In-Vehicle CAN-FD Signaling: What Can We Expect?
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

2020
Weighted Local Outlier Factor for Detecting Anomaly on In-Vehicle Network.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

Revisiting the Fairness and Randomness of Delegated Proof of Stake Consensus Algorithm.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

Linear Scalability from Sharding and PoS.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

2019
Internet of Things Meets Vehicles: Sheltering In-Vehicle Network through Lightweight Machine Learning.
Symmetry, 2019

Basing Diversified Services of Complex IIoT Applications on Scalable Block Graph Platform.
IEEE Access, 2019

Practical IDS on In-vehicle Network Against Diversified Attack Models.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

Deep Learning vs. Traditional Probabilistic Models: Case Study on Short Inputs for Password Guessing.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

Robust and Self-Evolving IDS for In-Vehicle Network by Enabling Spatiotemporal Information.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

Collision Resistant Hashing from Sub-exponential Learning Parity with Noise.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Connected Vehicles' Security from the Perspective of the In-Vehicle Network.
IEEE Netw., 2018

Anonymity for Bitcoin From Secure Escrow Address.
IEEE Access, 2018

Simpler CCA Secure PKE from LPN Problem Without Double-Trapdoor.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

CCA Secure Multi-recipient KEM from LPN.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

2017
Scalable and Soundness Verifiable Outsourcing Computation in Marine Mobile Computing.
Wirel. Commun. Mob. Comput., 2017

1-Resilient Boolean Functions on Even Variables with Almost Perfect Algebraic Immunity.
Secur. Commun. Networks, 2017

Characterizing Linear Structures of Boolean Functions from Arithmetic Walsh Transform.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Collision Resistant Hashing from Learning Parity with Noise.
IACR Cryptol. ePrint Arch., 2017

Characterizing the semantics of passwords: The role of Pinyin for Chinese Netizens.
Comput. Stand. Interfaces, 2017

Provably Secure Dual-Mode Publicly Verifiable Computation Protocol in Marine Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

VulDigger: A Just-in-Time and Cost-Aware Tool for Digging Vulnerability-Contributing Changes.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
New application of partitioning methodology: identity-based dual receiver encryption.
Secur. Commun. Networks, 2016

Building a new secure variant of Rainbow signature scheme.
IET Inf. Secur., 2016

On the Robustness of Learning Parity with Noise.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable Computation.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Pseudorandom generators from regular one-way functions: New constructions with improved parameters.
Theor. Comput. Sci., 2015

Signcryption KEM/tag-KEM, revisited.
Secur. Commun. Networks, 2015

CLKS: Certificateless Keyword Search on Encrypted Data.
IACR Cryptol. ePrint Arch., 2015

Optimal assignment schemes for general access structures based on linear programming.
Des. Codes Cryptogr., 2015

The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs from a Broader Class of One-Way Functions.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and Beyond.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

2014
Robust password changing and DoS resilience for human-centric password authentication.
Secur. Commun. Networks, 2014

Notes on a group-oriented setting's multisigncryption scheme with threshold designcryption.
Inf. Sci., 2014

PWG: Progressive Weight-Growth Algorithm for LDPC Codes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

(Almost) Optimal Constructions of UOWHFs from 1-to-1 and Known-Regular One-way Functions.
IACR Cryptol. ePrint Arch., 2014

The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions.
Electron. Colloquium Comput. Complex., 2014

POSTER: Using Chinese Characters for Authentication-Algorithmic Framework and Empirical Results.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

POSTER: Arranging the Layout of Alphanumeric Buttons-the Role of Passwords.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model.
Math. Comput. Model., 2013

Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
Tightly Secure Non-Interactive Multisignatures in the Plain Public Key Model.
Informatica, 2012

Identity-Based Key-Insulated Signcryption.
Informatica, 2012

On the Equivalence between the Set Covering Problem and the Problem of Finding Optimal Cumulative Assignment Schemes.
IACR Cryptol. ePrint Arch., 2012

Optimal Multiple Assignments with (m, m)-Scheme for General Access Structures.
IACR Cryptol. ePrint Arch., 2012

Pitfalls in identity based encryption using an elliptic curve combined public key.
Appl. Math. Lett., 2012

Two-source extractors for leaky sources.
Proceedings of the 2012 IEEE Information Theory Workshop, 2012

An anonymous remote attestation for trusted cloud computing.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

Attack Based on Direct Sum Decomposition against the Nonlinear Filter Generator.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

2011
Cryptanalysis of a certificateless signcryption scheme in the standard model.
Inf. Sci., 2011

YI Cloud: Improving user privacy with secret key recovery in cloud storage.
Proceedings of the IEEE 6th International Symposium on Service Oriented System Engineering, 2011

Non-interactive CDH-Based Multisignature Scheme in the Plain Public Key Model with Tighter Security.
Proceedings of the Information Security, 14th International Conference, 2011

2010
Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards.
IEEE Trans. Ind. Electron., 2010

Regular Quasi-cyclic LDPC Codes with Girth 6 from Prime Fields.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

2009
Toward optimizing cauchy matrix for cauchy reed-solomon code.
IEEE Commun. Lett., 2009

Democratic group signatures with collective traceability.
Comput. Electr. Eng., 2009

AE-BP: Adaptive Erasure Belief Propagation Decoding Algorithm of LDPC Codes.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Extended PEG Algorithm for High Rate LDPC Codes.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

2008
Identity-Based Parallel Key-Insulated Signature Without Random Oracles.
J. Inf. Sci. Eng., 2008

A Generic Construction for Instrusion-Resilient Signatures from Linear Feedback Shift Register.
J. Inf. Sci. Eng., 2008

Democratic Group Signatures with Threshold Traceability.
IACR Cryptol. ePrint Arch., 2008

Identity-Based Parallel Key-Insulated Signature: Framework and Construction.
J. Res. Pract. Inf. Technol., 2008

2007
Simulatability and security of certificateless threshold signatures.
Inf. Sci., 2007

Code-based Ring Signature Scheme.
Int. J. Netw. Secur., 2007

LFSR-based Signatures with Message Recovery.
Int. J. Netw. Secur., 2007

Efficient Linkable Ring Signatures and Threshold Signatures from Linear Feedback Shift Register.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2007

Linkable Ring Signatures from Linear Feedback Shift Register.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

Efficient Blind Signatures from Linear Feedback Shift Register.
Proceedings of the Cooperative Design, 2007

2006
Efficient Partially Blind Signature Scheme with Provable Security.
Proceedings of the Computing and Combinatorics, 12th Annual International Conference, 2006

Identity-Based Key-Insulated Signature with Secure Key-Updates.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006

2005
ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings.
Appl. Math. Comput., 2005

An Authentication Protocol for Pervasive Computing.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

Identity Based Conference Key Distribution Scheme from Parings.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

Certificateless Threshold Signature Schemes.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
Multi-proxy Signature and Proxy Multi-signature Schemes from Bilinear Pairings.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004

Proxy Structured Multisignature Scheme from Bilinear Pairings.
Proceedings of the Parallel and Distributed Processing and Applications, 2004

Identity Based Proxy-Signcryption Scheme from Pairings.
Proceedings of the 2004 IEEE International Conference on Services Computing (SCC 2004), 2004


  Loading...