Yilei Wang

Orcid: 0000-0003-4054-0549

According to our database1, Yilei Wang authored at least 140 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
M-Sim: Multi-level Semantic Inference Model for Chinese short answer scoring in low-resource scenarios.
Comput. Speech Lang., March, 2024

CogNLG: Cognitive graph for KG-to-text generation.
Expert Syst. J. Knowl. Eng., January, 2024

Secure Query Processing with Linear Complexity.
CoRR, 2024

Feature Selection Based on Orthogonal Constraints and Polygon Area.
CoRR, 2024

2023
On-chain is not enough: Ensuring pre-data on the chain credibility for blockchain-based source-tracing systems.
Digit. Commun. Networks, October, 2023

Beyond model splitting: Preventing label inference attacks in vertical federated learning with dispersed training.
World Wide Web (WWW), September, 2023

Secure Sampling for Approximate Multi-party Query Processing.
Proc. ACM Manag. Data, September, 2023

Privacy-Aware Traffic Flow Prediction Based on Multi-Party Sensor Data with Zero Trust in Smart City.
ACM Trans. Internet Techn., August, 2023

Enabling scalable and unlinkable payment channel hubs with oblivious puzzle transfer.
Inf. Sci., June, 2023

Achieving optimal rewards in cryptocurrency stubborn mining with state transition analysis.
Inf. Sci., May, 2023

Airborne Internet: An Ultradense LEO Networks Empowered Satellite-to-Aircraft Access and Resource Management Approach.
IEEE Internet Things J., 2023

Efficient Oblivious Sorting and Shuffling for Hardware Enclaves.
IACR Cryptol. ePrint Arch., 2023

CGMI: Configurable General Multi-Agent Interaction Framework.
CoRR, 2023

EduChat: A Large-Scale Language Model-based Chatbot System for Intelligent Education.
CoRR, 2023

A Diffusion of Innovation Perspective for Digital Transformation on Education.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 27th International Conference KES-2023, 2023

Reflecting Intelligent Surface Aided Downlink Transmission in Ultra-Dense LEO Satellite Networks.
Proceedings of the 23rd IEEE International Conference on Communication Technology, 2023

A Lightweight Hierarchical Mobility Management Architecture for Ultra-Dense LEO Satellite Network.
Proceedings of the IEEE International Conference on Communications, 2023

AF Recognition Algorithm Based on Fusion Transformer Model.
Proceedings of the International Conference on Human-Centered Cognitive Systems, 2023

OSPCT-Chain: A One-stop Service Blockchain Platform for Copyright Traceability Based on FISCO BCOS.
Proceedings of the International Conference on Human-Centered Cognitive Systems, 2023

MI Identification Algorithm Based on Feature Selection via Chi-square Test.
Proceedings of the International Conference on Human-Centered Cognitive Systems, 2023

Epoch: Enabling Path Concealing Payment Channel Hubs with Optimal Path Encryption.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

2022
STSIIML: Study on token shuffling under incomplete information based on machine learning.
Int. J. Intell. Syst., December, 2022

Edge-cloud-enabled matrix factorization for diversified APIs recommendation in mashup creation.
World Wide Web, 2022

Collusion-free for Cloud Verification toward the View of Game Theory.
ACM Trans. Internet Techn., 2022

An Entropy-View Secure Multiparty Computation Protocol Based on Semi-Honest Model.
J. Organ. End User Comput., 2022

Research cooperations of blockchain: toward the view of complexity network.
J. Ambient Intell. Humaniz. Comput., 2022

Aitac: an identity-based traceable anonymous communication model.
J. Ambient Intell. Humaniz. Comput., 2022

BSM-ether: Bribery selfish mining in blockchain-based healthcare systems.
Inf. Sci., 2022

An intelligent forecast for COVID-19 based on single and multiple features.
Int. J. Intell. Syst., 2022

ScratchGAN: Network representation learning for scratch with preference-based generative adversarial nets.
Int. J. Intell. Syst., 2022

Label-only membership inference attacks on machine unlearning without dependence of posteriors.
Int. J. Intell. Syst., 2022

Improving transaction succeed ratio in payment channel networks via enhanced node connectivity and balanced channel capacity.
Int. J. Intell. Syst., 2022

A systematic mapping study for blockchain based on complex network.
Concurr. Comput. Pract. Exp., 2022

Tesia: A trusted efficient service evaluation model in Internet of things based on improved aggregation signature.
Concurr. Comput. Pract. Exp., 2022

An anonymous authentication and key agreement protocol in smart living.
Comput. Commun., 2022

Reinforcement-Mining: Protecting Reward in Selfish Mining.
Proceedings of the Provable and Practical Security, 2022

FP<sup>2</sup>-MIA: A Membership Inference Attack Free of Posterior Probability in Machine Unlearning.
Proceedings of the Provable and Practical Security, 2022

Chinese Medical Named Entity Recognition Using External Knowledge.
Proceedings of the PRICAI 2022: Trends in Artificial Intelligence, 2022

Query Evaluation by Circuits.
Proceedings of the PODS '22: International Conference on Management of Data, Philadelphia, PA, USA, June 12, 2022

Optimal Revenue Analysis of the Stubborn Mining Based on Markov Decision Process.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

PAMP: A New Atomic Multi-Path Payments Method with Higher Routing Efficiency.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

TSHML: Token Shuffling under Haircut Policy Based on Machine Learning.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022

A Secure Multiparty Computation Round Optimization Scheme Based on Standard Assumption.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022

RETSR: An Effective Review-Enhanced and Time-Aware Sequential Recommendation Framework.
Proceedings of the 34th IEEE International Conference on Tools with Artificial Intelligence, 2022

Intelligent Experimental Teaching Auxiliary Platform Based on BERT.
Proceedings of the Computer Science and Education - 17th International Conference, 2022

QoS-Centric Handover for Civil Aviation Aircraft Access in Ultra-Dense LEO Satellite Networks.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2022

PCBERT: Parent and Child BERT for Chinese Few-shot NER.
Proceedings of the 29th International Conference on Computational Linguistics, 2022

Frequency Estimation in the Shuffle Model with Almost a Single Message.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

RI-GCN: Review-aware Interactive Graph Convolutional Network for Review-based Item Recommendation.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
Equation Chapter 1 Section 1 Differentially Private High-Dimensional Binary Data Publication via Adaptive Bayesian Network.
Wirel. Commun. Mob. Comput., 2021

Dynamic Multi-Key FHE in Asymmetric Key Setting From LWE.
IEEE Trans. Inf. Forensics Secur., 2021

An Efficient Anonymous Communication Scheme to Protect the Privacy of the Source Node Location in the Internet of Things.
Secur. Commun. Networks, 2021

Corrigendum to "Rational Protocols and Attacks in Blockchain System".
Secur. Commun. Networks, 2021

ToStaGAN: An end-to-end two-stage generative adversarial network for brain tumor segmentation.
Neurocomputing, 2021

ImpSuic: A quality updating rule in mixing coins with maximum utilities.
Int. J. Intell. Syst., 2021

Secure computation protocols under asymmetric scenarios in enterprise information system.
Enterp. Inf. Syst., 2021

Secure Machine Learning over Relational Data.
CoRR, 2021

Carbon emission reduction decisions of supply chain members under cap-and-trade regulations: A differential game analysis.
Comput. Ind. Eng., 2021

Secure Yannakakis: Join-Aggregate Queries over Private Data.
Proceedings of the SIGMOD '21: International Conference on Management of Data, 2021

Weighted Distinct Sampling: Cardinality Estimation for SPJ Queries.
Proceedings of the SIGMOD '21: International Conference on Management of Data, 2021

A Deep Learning Approach with Conditional Random Field for Automatic Sleep Stage Scoring.
Proceedings of the EITCE 2021: 5th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, October 22, 2021

BSMRL: Bribery Selfish Mining with Reinforcement Learning.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021

Using information entropy to analyze secure multi-party computation protocol.
Proceedings of the IEEE Intl Conf on Dependable, 2021

2020
Wireless Communications and Mobile Computing Blockchain-Based Trust Management in Distributed Internet of Things.
Wirel. Commun. Mob. Comput., 2020

Rational Protocols and Attacks in Blockchain System.
Secur. Commun. Networks, 2020

Belief and fairness: A secure two-party protocol toward the view of entropy for IoT devices.
J. Netw. Comput. Appl., 2020

Incentive compatible and anti-compounding of wealth in proof-of-stake.
Inf. Sci., 2020

IPBSM: An optimal bribery selfish mining in the presence of intelligent and pure attackers.
Int. J. Intell. Syst., 2020

Optimal mixed block withholding attacks based on reinforcement learning.
Int. J. Intell. Syst., 2020

A game-theoretic approach of mixing different qualities of coins.
Int. J. Intell. Syst., 2020

Efficient Message Authentication with Revocation Transparency Using Blockchain for Vehicular Networks.
Comput. Electr. Eng., 2020

Adversarial behaviours in mixing coins under incomplete information.
Appl. Soft Comput., 2020

Personalized Mobile Information Recommendation Based on Fine-Grained User Behaviors.
Proceedings of the Fuzzy Systems and Data Mining VI, 2020

2019
Rational adversary with flexible utility in secure two-party computation.
J. Ambient Intell. Humaniz. Comput., 2019

A game-theoretic method based on Q-learning to invalidate criminal smart contracts.
Inf. Sci., 2019

Randomness invalidates criminal smart contracts.
Inf. Sci., 2019

Thermodynamic Entropy in Quantum Statistics for Stock Market Networks.
Complex., 2019

An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks Using Online/Offline Certificateless Aggregate Signature.
Proceedings of the Provable Security, 2019

Multi-modal Feature Fusion Based on Variational Autoencoder for Visual Question Answering.
Proceedings of the Pattern Recognition and Computer Vision - Second Chinese Conference, 2019

Optimal Sparsity-Sensitive Bounds for Distributed Mean Estimation.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019

A Novel Color Image Watermarking Algorithm Based on Digital Signature.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

Counting Attention Based on Classification Confidence for Visual Question Answering.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

An Image Denoising Algorithm Based on Singular Value Decomposition and Non-local Self-similarity.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2018
Demographic Information Prediction: A Portrait of Smartphone Application Users.
IEEE Trans. Emerg. Top. Comput., 2018

Incentive-driven attacker for corrupting two-party protocols.
Soft Comput., 2018

Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing.
IACR Cryptol. ePrint Arch., 2018

2017
A Key-insulated Proxy Re-encryption Scheme for Data Sharing in a Cloud Environment.
Int. J. Netw. Secur., 2017

Cloud-aided online/offline ciphertext-policy attribute-based encryption in the standard model.
Int. J. Grid Util. Comput., 2017

2016
Rational computing protocol based on fuzzy theory.
Soft Comput., 2016

Fairness in secure computing protocols based on incentives.
Soft Comput., 2016

Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks.
Soft Comput., 2016

Corrigendum to "New Rational Parties Relying on Reputation".
Secur. Commun. Networks, 2016

An image segmentation algorithm based on improved multiscale random field model in wavelet domain.
J. Ambient Intell. Humaniz. Comput., 2016

On the security of two identity-based signature schemes based on pairings.
Inf. Process. Lett., 2016

An ElGamal Encryption with Fuzzy Keyword Search on Cloud Environment.
Int. J. Netw. Secur., 2016

Effective algorithms for vertical mining probabilistic frequent patterns in uncertain mobile environments.
Int. J. Ad Hoc Ubiquitous Comput., 2016

A restricted proxy re-encryption with keyword search for fine-grained data access control in cloud storage.
Concurr. Comput. Pract. Exp., 2016

Longest Common Sub-sequence Computation and Retrieve for Encrypted Character Strings.
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016

2015
Fair two-party computation with rational parties holding private types.
Secur. Commun. Networks, 2015

Achieving fairness by sequential equilibrium in rational two-party computation under incomplete information.
Secur. Commun. Networks, 2015

Fair Secure Computation with Reputation Assumptions in the Mobile Social Networks.
Mob. Inf. Syst., 2015

The impact of social cloud reputation and structure on rational computation.
J. High Speed Networks, 2015

A brief survey on secure multi-party computing in the presence of rational parties.
J. Ambient Intell. Humaniz. Comput., 2015

An adaptive texture-preserved image denoising model.
J. Ambient Intell. Humaniz. Comput., 2015

Cloud data integrity checking protocol from lattice.
Int. J. High Perform. Comput. Netw., 2015

File sharing in cloud computing using win stay lose shift strategy.
Int. J. High Perform. Comput. Netw., 2015

10 Observations on Google Cluster Trace + 2 Measures for Cluster Utilization Enhancement.
CoRR, 2015

Multi-tenants Data Duplication Secure Storage in SaaS.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

SHAFT: Supporting Transactions with Serializability and Fault-Tolerance in Highly-Available Datastores.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

Provable Data Possession Supporting Secure Data Transfer for Cloud Storage.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

Improving transaction processing performance by consensus reduction.
Proceedings of the 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29, 2015

Gender Prediction Based on Data Streams of Smartphone Applications.
Proceedings of the Big Data Computing and Communications - First International Conference, 2015

Server Aided Ciphertext-Policy Attribute-Based Encryption.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

Anonymous Identity-Based Encryption with Bounded Leakage Resilience.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

The Electronic Voting in the Presence of Rational Voters.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

2014
New rational parties relying on reputation.
Secur. Commun. Networks, 2014

Social rational secure multi-party computation.
Concurr. Comput. Pract. Exp., 2014

Demographic information prediction based on smartphone application usage.
Proceedings of the International Conference on Smart Computing, 2014

Rational Secure Two-party Computation in Social Cloud.
Proceedings of the Network and System Security - 8th International Conference, 2014

A Limited Proxy Re-encryption with Keyword Search for Data Access Control in Cloud Computing.
Proceedings of the Network and System Security - 8th International Conference, 2014

A PID-based quality control algorithm for SVC video streaming.
Proceedings of the IEEE International Conference on Communications, 2014

2013
Short Convertible Undeniable Signature From Pairing.
J. Softw., 2013

Identity-Based Key-Encapsulation Mechanism from Multilinear Maps.
IACR Cryptol. ePrint Arch., 2013

A New Privacy-Preserving Broadcast Encryption Scheme from DPVS.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Fair Computation with Tit-for-Tat Strategy.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Texture Image Denoising Algorithm Based on Structure Tensor and Total Variation.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Identity-Based Authenticate Key Exchange Protocol from Lattice.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2012
An Efficient Certificateless Threshold Decryption Schemes Based On Pairings.
J. Comput., 2012

Rational secret sharing with semi-rational players.
Int. J. Grid Util. Comput., 2012

Repeated rational secret sharing, revisited.
Int. J. Grid Util. Comput., 2012

Multi-party Computation with Social Rational Parties.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

A novel local patch framework for fixing supervised learning models.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

Multi-objective optimization for sponsored search.
Proceedings of the Sixth International Workshop on Data Mining for Online Advertising and Internet Economy, 2012

2011
Fairness with Semi-rational Players in Standard Communication Networks.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

2-out-of-2 Rational Secret Sharing in Extensive Form.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2009
A Dynamic Programming Model about Optimized Port Transport Expense Paper.
Proceedings of the 2009 IITA International Conference on Services Science, 2009

The Application of Saftey Audit and Monitor Technology in Power Management.
Proceedings of the 2009 IITA International Conference on Services Science, 2009

The Application of EDI Technology in Electronic Commerce System.
Proceedings of the First IITA International Joint Conference on Artificial Intelligence, 2009

2008
An Improved K-Means Clustering Algorithm Based on Spectral Method.
Proceedings of the Advances in Computation and Intelligence, Third International Symposium, 2008

2007
A New BP Neural Network Model Based on the Random Fuzzy Theory.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007


  Loading...