Zengpeng Li

Orcid: 0000-0003-0758-7230

According to our database1, Zengpeng Li authored at least 49 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Energy-efficient offloading for DNN-based applications in edge-cloud computing: A hybrid chaotic evolutionary approach.
J. Parallel Distributed Comput., May, 2024

Adaptive edge service deployment in burst load scenarios using deep reinforcement learning.
J. Supercomput., March, 2024

Funder: Future-Proof Unbiased Decentralized Randomness.
IEEE Internet Things J., March, 2024

Controlled Search: Building Inverted-Index PEKS With Less Leakage in Multiuser Setting.
IEEE Internet Things J., January, 2024

2023
Sustainable and Round-Optimized Group Authenticated Key Exchange in Vehicle Communication.
IEEE Trans. Intell. Transp. Syst., December, 2023

Retrieval Transformation: Dynamic Searchable Symmetric Encryption With Strong Security.
IEEE Syst. J., December, 2023

Cost-efficient security-aware scheduling for dependent tasks with endpoint contention in edge computing.
Comput. Commun., November, 2023

Cost-Efficient Fault-Tolerant Workflow Scheduling for Deadline-Constrained Microservice-Based Applications in Clouds.
IEEE Trans. Netw. Serv. Manag., September, 2023

An Energy-Efficient Dynamic Scheduling Method of Deadline-Constrained Workflows in a Cloud Environment.
IEEE Trans. Netw. Serv. Manag., September, 2023

Cost-effective approaches for deadline-constrained workflow scheduling in clouds.
J. Supercomput., May, 2023

Decentralized Identity Authentication with Auditability and Privacy.
Algorithms, January, 2023

QR-PUF: Design and Implementation of a RFID-Based Secure Inpatient Management System Using XOR-Arbiter-PUF and QR-Code.
IEEE Trans. Netw. Sci. Eng., 2023

BBB-Voting: Self-Tallying End-to-End Verifiable 1-out-of-k Blockchain-Based Boardroom Voting.
Proceedings of the IEEE International Conference on Blockchain, 2023

2022
Achieving One-Round Password-Based Authenticated Key Exchange over Lattices.
IEEE Trans. Serv. Comput., 2022

Quantum-Safe Round-Optimal Password Authentication for Mobile Devices.
IEEE Trans. Dependable Secur. Comput., 2022

Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location.
IACR Cryptol. ePrint Arch., 2022

ZKBdf: A ZKBoo-based Quantum-Secure Verifiable Delay Function with Prover-secret.
IACR Cryptol. ePrint Arch., 2022

PANDA: Lightweight non-interactive privacy-preserving data aggregation for constrained devices.
Future Gener. Comput. Syst., 2022

Reinshard: An Optimally Sharded Dual-Blockchain for Concurrency Resolution.
Distributed Ledger Technol. Res. Pract., 2022

Time-cost efficient memory configuration for serverless workflow applications.
Concurr. Comput. Pract. Exp., 2022

Cold-start aware cloud-native service function chain caching in resource-constrained edge: A reinforcement learning approach.
Comput. Commun., 2022

2021
PriParkRec: Privacy-Preserving Decentralized Parking Recommendation Service.
IEEE Trans. Veh. Technol., 2021

Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification.
IEEE Trans. Dependable Secur. Comput., 2021

Leakage Resilient Leveled $\mathsf {FHE}$FHE on Multiple Bits Message.
IEEE Trans. Big Data, 2021

Building Low-Interactivity Multifactor Authenticated Key Exchange for Industrial Internet of Things.
IEEE Internet Things J., 2021

Post-Quantum VRF and its Applications in Future-Proof Blockchain System.
CoRR, 2021

UC Modelling and Security Analysis of the Estonian IVXV Internet Voting System.
CoRR, 2021

Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs.
Sci. China Inf. Sci., 2021

LaKSA: A Probabilistic Proof-of-Stake Protocol.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Biometrics-Authenticated Key Exchange for Secure Messaging.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Achieving Multi-Hop PRE via Branching Program.
IEEE Trans. Cloud Comput., 2020

Revisiting post-quantum hash proof systems over lattices for Internet of Thing authentications.
J. Ambient Intell. Humaniz. Comput., 2020

BBB-Voting: 1-out-of-k Blockchain-Based Boardroom Voting.
CoRR, 2020

ProPoS: A Probabilistic Proof-of-Stake Protocol.
CoRR, 2020

Preserving Data Privacy via Federated Learning: Challenges and Solutions.
IEEE Consumer Electron. Mag., 2020

SecDedup: Secure Encrypted Data Deduplication With Dynamic Ownership Updating.
IEEE Access, 2020

2018
Oblivious Transfer via Lossy Encryption from Lattice-Based Cryptography.
Wirel. Commun. Mob. Comput., 2018

Multi-key FHE for multi-bit messages.
Sci. China Inf. Sci., 2018

Two-Round PAKE Protocol over Lattices Without NIZK.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
Toward single-server private information retrieval protocol via learning with errors.
J. Inf. Secur. Appl., 2017

Towards Multi-Hop Homomorphic Identity-Based Proxy Re-Encryption via Branching Program.
IEEE Access, 2017

Toward Proxy Re-encryption From Learning with Errors in the Exponent.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

An Uncertain Continuous Collaborative Users Finding Algorithm for Location Privacy Protection.
Proceedings of the 20th ACM International Conference on Modelling, 2017

Towards Fully Homomorphic Encryption From Gentry-Peikert-Vaikuntanathan Scheme.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
Preventing Adaptive Key Recovery Attacks on the Gentry-Sahai-Waters Leveled Homomorphic Encryption Scheme.
IACR Cryptol. ePrint Arch., 2016

Preventing Adaptive Key Recovery Attacks on the GSW Levelled Homomorphic Encryption Scheme.
Proceedings of the Provable Security, 2016

Dual LWE-Based Fully Homomorphic Encryption with Errorless Key Switching.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

Multi-bit Leveled Homomorphic Encryption via \mathsf Dual.LWE -Based.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016


  Loading...