Yanli Ren

Orcid: 0000-0003-4510-7883

According to our database1, Yanli Ren authored at least 74 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Traffic sign attack via pinpoint region probability estimation network.
Pattern Recognit., February, 2024

BFDAC: A Blockchain-Based and Fog-Computing-Assisted Data Access Control Scheme in Vehicular Social Networks.
IEEE Internet Things J., January, 2024

Verifiable Privacy-Preserving Heart Rate Estimation Based on LSTM.
IEEE Internet Things J., January, 2024

2023
Verifiable Privacy-Enhanced Rotation Invariant LBP Feature Extraction in Fog Computing.
IEEE Trans. Ind. Informatics, December, 2023

An Improved NSGA-III Algorithm Based on Deep Q-Networks for Cloud Storage Optimization of Blockchain.
IEEE Trans. Parallel Distributed Syst., May, 2023

Privacy-Preserving Medical Data-Sharing System with Symmetric Encryption Based on Blockchain.
Symmetry, April, 2023

Block-Diagonal Guided Symmetric Nonnegative Matrix Factorization.
IEEE Trans. Knowl. Data Eng., March, 2023

Outsourcing LDA-Based Face Recognition to an Untrusted Cloud.
IEEE Trans. Dependable Secur. Comput., 2023

Consistency-Induced Multiview Subspace Clustering.
IEEE Trans. Cybern., 2023

EPFNet: Edge-Prototype Fusion Network Toward Few-Shot Semantic Segmentation for Aerial Remote-Sensing Images.
IEEE Geosci. Remote. Sens. Lett., 2023

Privacy-enhanced and non-interactive linear regression with dropout-resilience.
Inf. Sci., 2023

Interactive Image Style Transfer Guided by Graffiti.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

2022
Privacy-Enhanced and Verification-Traceable Aggregation for Federated Learning.
IEEE Internet Things J., 2022

2021
Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server.
IEEE Trans. Cloud Comput., 2021

Embedding Probability Guided Network for Image Steganalysis.
IEEE Signal Process. Lett., 2021

Efficient Noninteractive Outsourcing of Large-Scale QR and LU Factorizations.
Secur. Commun. Networks, 2021

Privacy-Preserving Redactable Blockchain for Internet of Things.
Secur. Commun. Networks, 2021

Low-complexity fake face detection based on forensic similarity.
Multim. Syst., 2021

Privacy-preserving batch verification signature scheme based on blockchain for Vehicular Ad-Hoc Networks.
J. Inf. Secur. Appl., 2021

Multichannel Steganography in Digital Images for Multiple Receivers.
IEEE Multim., 2021

Orientation Convolutional Networks for Image Recognition.
CoRR, 2021

Non-Interactive and secure outsourcing of PCA-Based face recognition.
Comput. Secur., 2021

Efficient outsourced extraction of histogram features over encrypted images in cloud.
Sci. China Inf. Sci., 2021

2020
Key Based Artificial Fingerprint Generation for Privacy Protection.
IEEE Trans. Dependable Secur. Comput., 2020

Diversity-Based Cascade Filters for JPEG Steganalysis.
IEEE Trans. Circuits Syst. Video Technol., 2020

How to Extract Image Features Based on Co-Occurrence Matrix Securely and Efficiently in Cloud Computing.
IEEE Trans. Cloud Comput., 2020

Feature extraction optimization of JPEG steganalysis based on residual images.
Signal Process., 2020

On Cloud Storage Optimization of Blockchain With a Clustering-Based Genetic Algorithm.
IEEE Internet Things J., 2020

Iris Segmentation Using Feature Channel Optimization for Noisy Environments.
Cogn. Comput., 2020

Privacy-Protected Deletable Blockchain.
IEEE Access, 2020

2019
Novel and Secure Outsourcing Algorithms for Multiple Bilinear Pairings with Single Untrusted Server.
Int. J. Netw. Secur., 2019

JPEG Steganalysis Based on Multi-Projection Ensemble Discriminant Clustering.
IEICE Trans. Inf. Syst., 2019

Iris Segmentation Based on Improved U-Net Network Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

2018
Efficient steganographer detection over social networks with sampling reconstruction.
Peer-to-Peer Netw. Appl., 2018

Verifiable outsourced attribute-based signature scheme.
Multim. Tools Appl., 2018

Unsupervised steganalysis over social networks based on multi-reference sub-image sets.
Multim. Tools Appl., 2018

Analysis of the <i>k</i>-Error Linear Complexity and Error Sequence for 2<i>p<sup>n</sup></i>-Periodic Binary Sequence.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Fully Verifiable Algorithm for Outsourcing Multiple Modular Exponentiations with Single Cloud Server.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Efficient and secure outsourcing of bilinear pairings with single server.
Sci. China Inf. Sci., 2018

2017
Noninteractive Verifiable Outsourcing Algorithm for Bilinear Pairing with Improved Checkability.
Secur. Commun. Networks, 2017

Fully Verifiable Algorithm for Secure Outsourcing of Bilinear Pairing in Cloud Computing.
KSII Trans. Internet Inf. Syst., 2017

Verifiable Outsourcing Computation of Modular Exponentiations with Single Server.
Int. J. Netw. Secur., 2017

Output feedback polytopic LPV Tube-RMPC control for air-breathing hypersonic vehicles.
Int. J. Model. Identif. Control., 2017

JPEG Image Steganalysis from Imbalanced Data.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Learning AC<sup>0</sup> Under k-Dependent Distributions.
Proceedings of the Theory and Applications of Models of Computation, 2017

PAC Learning Depth-3 $\textrm{AC}^0$ Circuits of Bounded Top Fanin.
Proceedings of the International Conference on Algorithmic Learning Theory, 2017

2016
Block cipher based separable reversible data hiding in encrypted images.
Multim. Tools Appl., 2016

Unbalanced JPEG image steganalysis via multiview data match.
J. Vis. Commun. Image Represent., 2016

Identity-Based Encryption with Verifiable Outsourced Revocation.
Comput. J., 2016

New algorithms for verifiable outsourcing of bilinear pairings.
Sci. China Inf. Sci., 2016

Four-Round Zero-Knowledge Arguments of Knowledge with Strict Polynomial-Time Simulation from Differing-Input Obfuscation for Circuits.
Proceedings of the Computing and Combinatorics - 22nd International Conference, 2016

Verifiable Outsourcing Algorithms for Modular Exponentiations with Improved Checkability.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
JPEG encryption for image rescaling in the encrypted domain.
J. Vis. Commun. Image Represent., 2015

An Efficient Batch Verifying Scheme for Detecting Illegal Signatures.
Int. J. Netw. Secur., 2015

Towards Efficient, Secure, and Fine-Grained Access Control System in MSNs with Flexible Revocations.
Int. J. Distributed Sens. Networks, 2015

2014
Compressing Encrypted Images With Auxiliary Information.
IEEE Trans. Multim., 2014

Efficient reversible data hiding in encrypted images.
J. Vis. Commun. Image Represent., 2014

Fully Anonymous Identity-based Broadcast Encryption without Random Oracles.
Int. J. Netw. Secur., 2014

Efficient Anonymous Identity-Based Broadcast Encryption without Random Oracles.
Int. J. Digit. Crime Forensics, 2014

2013
Practical parallel key-insulated encryption with multiple helper keys.
Comput. Math. Appl., 2013

2012
Scalable Coding of Encrypted Images.
IEEE Trans. Image Process., 2012

Efficient Ciphertext-Policy Attribute Based Encryption with Hidden Policy.
Proceedings of the Internet and Distributed Computing Systems, 2012

Non-interactive Dynamic Identity-Based Broadcast Encryption without Random Oracles.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Anonymous Hierarchical Identity-Based Encryption in Prime Order Groups.
Proceedings of the Data and Knowledge Engineering - Third International Conference, 2012

2011
Watermarking With Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction.
IEEE Trans. Inf. Forensics Secur., 2011

Compressing Encrypted Image Using Compressive Sensing.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

2010
CCA2 secure (hierarchical) identity-based parallel key-insulated encryption without random oracles.
J. Syst. Softw., 2010

New Fuzzy Identity-Based Encryption in the Standard Model.
Informatica, 2010

Colour filter array interpolation based self recovery with anti-cropping capability.
Int. J. Multim. Intell. Secur., 2010

Hierarchical Identity-Based Proxy Re-Encryption without Random Oracles.
Int. J. Found. Comput. Sci., 2010

Fragile Watermarking for Color Image Recovery Based on Color Filter Array Interpolation.
Proceedings of the Web-Age Information Management, 11th International Conference, 2010

2009
Fully CCA2 secure identity based broadcast encryption without random oracles.
Inf. Process. Lett., 2009

2008
Efficient Hierarchical Identity Based Encryption Scheme in the Standard Model.
Informatica (Slovenia), 2008

Secure Hierarchical Identity Based Encryption Scheme in the Standard Model.
Proceedings of the Progress in Cryptology, 2008


  Loading...