Yannan Li

Orcid: 0000-0002-4407-9027

According to our database1, Yannan Li authored at least 57 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Quantum-Safe Puncturable Signatures With Their Application in Blockchain.
IEEE Trans. Inf. Forensics Secur., 2024

2023
Visualization and Cybersecurity in the Metaverse: A Survey.
J. Imaging, January, 2023

Blockchain Oracles: Implications for Smart Contracts in Legal Reasoning and Addressing the Oracle Problem.
Proceedings of the 12th International Symposium on Information and Communication Technology, 2023

Threshold Ring Signature Scheme from Cryptographic Group Action.
Proceedings of the Provable and Practical Security, 2023

Systematic Testing of the Data-Poisoning Robustness of KNN.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Constraint Based Compiler Optimization for Energy Harvesting Applications.
Proceedings of the 37th European Conference on Object-Oriented Programming, 2023

Certifying the Fairness of KNN in the Presence of Dataset Bias.
Proceedings of the Computer Aided Verification - 35th International Conference, 2023

2022
Outsourced Data Integrity Checking with Practical Key Update in Edge-Cloud Resilient Networks.
IEEE Wirel. Commun., 2022

A Blockchain-Based Self-Tallying Voting Protocol in Decentralized IoT.
IEEE Trans. Dependable Secur. Comput., 2022

Blockchain-based continuous data integrity checking protocol with zero-knowledge privacy protection.
Digit. Commun. Networks, 2022

Proving Robustness of KNN Against Adversarial Data Poisoning.
Proceedings of the 22nd Formal Methods in Computer-Aided Design, 2022

Public Cloud Data Auditing Revisited: Removing the Tradeoff Between Proof Size and Storage Cost.
Proceedings of the Computer Security - ESORICS 2022, 2022

Synthesizing Fair Decision Trees via Iterative Constraint Solving.
Proceedings of the Computer Aided Verification - 34th International Conference, 2022

2021
Security and Privacy for Edge Intelligence in 5G and Beyond Networks: Challenges and Solutions.
IEEE Wirel. Commun., 2021

A Blockchain-Based Traceable Self-Tallying E-Voting Protocol in AI Era.
IEEE Trans. Netw. Sci. Eng., 2021

Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability.
IEEE Trans. Dependable Secur. Comput., 2021

Toward Transparent and Accountable Privacy-Preserving Data Classification.
IEEE Netw., 2021

Non-Equivocation in Blockchain: Double-Authentication-Preventing Signatures Gone Contractual.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

Concise Mercurial Subvector Commitments: Definitions and Constructions.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
Cloud-Assisted Attribute-Based Data Sharing with Efficient User Revocation in the Internet of Things.
IEEE Wirel. Commun., 2020

Blockchain-Based Anonymous Authentication With Selective Revocation for Smart Industrial Applications.
IEEE Trans. Ind. Informatics, 2020

Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage.
IEEE Trans. Emerg. Top. Comput., 2020

Toward Assured Data Deletion in Cloud Storage.
IEEE Netw., 2020

Decentralized Public Key Infrastructures atop Blockchain.
IEEE Netw., 2020

Blockchain-Based Self-Tallying Voting System with Software Updates in Decentralized IoT.
IEEE Netw., 2020

Key-Policy Attribute-Based Encryption With Keyword Search in Virtualized Environments.
IEEE J. Sel. Areas Commun., 2020

IntegrityChain: Provable Data Possession for Decentralized Storage.
IEEE J. Sel. Areas Commun., 2020

Blockchain-Based Dynamic Provable Data Possession for Smart Cities.
IEEE Internet Things J., 2020

2019
Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems.
IEEE Trans. Dependable Secur. Comput., 2019

Toward Data Security in Edge Intelligent IIoT.
IEEE Netw., 2019

Toward Privacy and Regulation in Blockchain-Based Cryptocurrencies.
IEEE Netw., 2019

Natural sd-RCCA Secure Public-key Encryptions from Hybrid Paradigms.
J. Univers. Comput. Sci., 2019

Machine learning based privacy-preserving fair data trading in big data market.
Inf. Sci., 2019

Efficient attribute-based encryption with attribute revocation for assured data deletion.
Inf. Sci., 2019

LRCoin: Leakage-Resilient Cryptocurrency Based on Bitcoin for Data Trading in IoT.
IEEE Internet Things J., 2019

Secure Your Voice: An Oral Airflow-Based Continuous Liveness Detection for Voice Assistants.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019

Novel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard Model.
Int. J. Found. Comput. Sci., 2019

An efficient linkable group signature for payer tracing in anonymous cryptocurrencies.
Future Gener. Comput. Syst., 2019

Blockchain based Privacy-Preserving Software Updates with Proof-of-Delivery for Internet of Things.
CoRR, 2019

A Blockchain-based Self-tallying Voting Scheme in Decentralized IoT.
CoRR, 2019

An Efficient Linkable Group Signature for Payer Tracing in Anonymous Cryptocurrencies.
CoRR, 2019

2018
Blockchain-Based Solutions to Security and Privacy Issues in the Internet of Things.
IEEE Wirel. Commun., 2018

Assured Data Deletion With Fine-Grained Access Control for Fog-Based Industrial Applications.
IEEE Trans. Ind. Informatics, 2018

Privacy preserving cloud data auditing with efficient key update.
Future Gener. Comput. Syst., 2018

LRCoin: Leakage-resilient Cryptocurrency Based on Bitcoin for Data Trading in IoT.
CoRR, 2018

Content Protection in Named Data Networking: Challenges and Potential Solutions.
IEEE Commun. Mag., 2018

Secure Pub-Sub: Blockchain-Based Fair Payment With Reputation for Reliable Cyber Physical Systems.
IEEE Access, 2018

CrowdBuy: Privacy-friendly Image Dataset Purchasing via Crowdsourcing.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

An Efficient Anonymous Authentication Scheme Based on Double Authentication Preventing Signature for Mobile Healthcare Crowd Sensing.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
Improved dynamic remote data auditing protocol for smart city security.
Pers. Ubiquitous Comput., 2017

Provable data transfer from provable data possession and deletion in cloud storage.
Comput. Stand. Interfaces, 2017

Single Reference Image based Scene Relighting via Material Guided Filtering.
CoRR, 2017

2016
Comments on "Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification".
IEEE Trans. Inf. Forensics Secur., 2016

Delegation of signing rights for emerging 5G networks.
Concurr. Comput. Pract. Exp., 2016

Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2013
A New Construction of Proxy Signature Using Chameleon Hash Function.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
The intersection numbers of KTSs with a common parallel class.
Discret. Math., 2012


  Loading...