Xiehua Li

Orcid: 0000-0002-3958-9866

According to our database1, Xiehua Li authored at least 13 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Hieraledger: Towards malicious gateways in appendable-block blockchain constructions for IoT.
Inf. Sci., 2023

CTP-Net: Character Texture Perception Network for Document Image Forgery Localization.
CoRR, 2023

Privacy-Preserving Image Classification and Retrieval Scheme over Encrypted Images.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

Secure Image Retrieval Based on Deep Learning in Cloud Computing.
Proceedings of the 2023 8th International Conference on Multimedia and Image Processing, 2023

2022
A Generic Secure Transmission Scheme Based on Random Linear Network Coding.
IEEE/ACM Trans. Netw., 2022

2021
Encrypted Medical Records Search with Supporting of Fuzzy Multi-keyword and Relevance Ranking.
Proceedings of the Artificial Intelligence and Security - 7th International Conference, 2021

2020
A Decentralized Multi-authority ABE Scheme in Cooperative Medical Care System.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

2019
Efficient decentralized multi-authority attribute based encryption for mobile cloud data storage.
J. Netw. Comput. Appl., 2019

2018
Fully Decentralized Authentication and Revocation Scheme in Data Sharing Systems.
Proceedings of the 17th IEEE International Conference On Trust, 2018

2017
云存储中基于MA-ABE的访问控制方案 (MA-ABE Access Control Scheme in Cloud Storage).
计算机科学, 2017

Fully Decentralized Multi-Authority ABE Scheme in Data Sharing System.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

2008
Combating TCP Based Attacks on Mobile Devices.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2006
Security Protocol Analysis with Improved Authentication Tests.
Proceedings of the Information Security Practice and Experience, 2006


  Loading...