Xuelian Li

Orcid: 0000-0003-4301-4747

According to our database1, Xuelian Li authored at least 51 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Optimized byzantine fault tolerant algorithm for improving performance and security with trust values.
IET Blockchain, March, 2024

Ciphertext face recognition system based on secure inner product protocol.
J. Inf. Secur. Appl., February, 2024

Continuous Control With Swarm Intelligence Based Value Function Approximation.
IEEE Trans Autom. Sci. Eng., January, 2024

A High-Quality Data Set of Protein-Ligand Binding Interactions Via Comparative Complex Structure Modeling.
J. Chem. Inf. Model., 2024

2023
A polynomial system for bit-based division property solving by quantum algorithm.
Quantum Inf. Process., December, 2023

Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing.
J. Cloud Comput., December, 2023

Privacy preserving via multi-key homomorphic encryption in cloud computing.
J. Inf. Secur. Appl., May, 2023

Quantum rotational cryptanalysis for preimage recovery of round-reduced Keccak.
Quantum Inf. Comput., 2023

Research on the Digitization of Yunnan Pu'er Tea Processing Technology.
Libr. Trends, 2023

Disease Diagnosis with Cost-Sensitive Grouped Features Based on Deep Reinforcement Learning.
Proceedings of the International Joint Conference on Neural Networks, 2023

2022
SPP-CPI: Predicting Compound-Protein Interactions Based On Neural Networks.
IEEE ACM Trans. Comput. Biol. Bioinform., 2022

Leakage-Suppressed Range Query Scheme for Structured Data in IoT.
IEEE Syst. J., 2022

AES-128 under HHL algorithm.
Quantum Inf. Comput., 2022

Uncertainty quantification for operators in online reinforcement learning.
Knowl. Based Syst., 2022

Picture-word order compound protein interaction: Predicting compound-protein interaction using structural images of compounds.
J. Comput. Chem., 2022

Cover Image.
J. Comput. Chem., 2022

Allocating Rotational Cryptanalysis based Preimage Attack on 4-round Keccak-224 for Quantum Setting.
IACR Cryptol. ePrint Arch., 2022

AdaCoach: A Virtual Coach for Training Customer Service Agents.
CoRR, 2022

A secure and efficient certificateless signature scheme for Internet of Things.
Ad Hoc Networks, 2022

Multi-hop Multi-key Homomorphic Encryption with Less Noise Under CRS Model.
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022

2021
Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments.
IEEE Trans. Dependable Secur. Comput., 2021

Blockchain-Based Digital Rights Management Scheme via Multiauthority Ciphertext-Policy Attribute-Based Encryption and Proxy Re-Encryption.
IEEE Syst. J., 2021

Lifelong Classification in Open World With Limited Storage Requirements.
Neural Comput., 2021

Gradient compensation traces based temporal difference learning.
Neurocomputing, 2021

An Efficient Data Auditing Protocol With a Novel Sampling Verification Algorithm.
IEEE Access, 2021

2020
Recurrent Neural Networks With External Addressable Long-Term and Working Memory for Learning Long-Term Dependences.
IEEE Trans. Neural Networks Learn. Syst., 2020

Secure, fair and instant data trading scheme based on bitcoin.
J. Inf. Secur. Appl., 2020

Blockchain-Based Anti-Key-Leakage Key Aggregation Searchable Encryption for IoT.
IEEE Internet Things J., 2020

Secure hierarchical authentication protocol in VANET.
IET Inf. Secur., 2020

Risk Aversion Operator for Addressing Maximization Bias in Q-Learning.
IEEE Access, 2020

Deep2s: Improving Aspect Extraction in Opinion Mining With Deep Semantic Representation.
IEEE Access, 2020

2019
Secure Electronic Ticketing System based on Consortium Blockchain.
KSII Trans. Internet Inf. Syst., 2019

Design of compressed sensing fault-tolerant encryption scheme for key sharing in IoT Multi-cloudy environment(s).
J. Inf. Secur. Appl., 2019

Efficient Bitcoin Password-protected Wallet Scheme with Key-dependent Message Security.
Int. J. Netw. Secur., 2019

Multi-party Fair Exchange Protocol with Smart Contract on Bitcoin.
Int. J. Netw. Secur., 2019

MOBT: A kleptographically-secure hierarchical-deterministic wallet for multiple offline Bitcoin transactions.
Future Gener. Comput. Syst., 2019

A Hybrid Framework for Problem Solving of Comparative Questions.
IEEE Access, 2019

Embedded Representation of Relation Words with Visual Supervision.
Proceedings of the 3rd IEEE International Conference on Robotic Computing, 2019

A Novel Fair and Verifiable Data Trading Scheme.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019

2018
On the Duration, Addressability, and Capacity of Memory-Augmented Recurrent Neural Networks.
IEEE Access, 2018

Compressive Sensing Encryption Scheme with Anonymous Traitor Tracing for Cloud Storage Security.
Proceedings of the Frontiers in Cyber Security - First International Conference, 2018

A Novel Digital Rights Management in P2P Networks Based on Bitcoin System.
Proceedings of the Frontiers in Cyber Security - First International Conference, 2018

2017
Geography Gaokao-Oriented Knowledge Acquisition for Comparative Sentences Based on Logic Programming.
Proceedings of the Natural Language Processing and Chinese Computing, 2017

Named entity recognition in the domain of geographical subject.
Proceedings of the 13th International Conference on Natural Computation, 2017

Anonymous Fair Exchange Protocol with a Semitrusted Third Party.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

2012
Linear spans of optimal sets of frequency hopping sequences.
RAIRO Theor. Informatics Appl., 2012

2011
Lower Bounds on the Second Order nonlinearity of Boolean Functions.
Int. J. Found. Comput. Sci., 2011

On the value distributions of Walsh spectrums of quadratic Plateaued functions.
Comput. Electr. Eng., 2011

Linear Complexities of the Frequency Hopping Sequences in Two Optimal Sets.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

2010
The Lower Bounds on the Second Order Nonlinearity of Cubic Boolean Functions.
IACR Cryptol. ePrint Arch., 2010

2009
Study of the GM(1, 1) Model and Improved Model of the Trend Term of Micromechanical Gyroscope Drift.
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009


  Loading...