Hui Li

From MaRDI portal
Person:280927

Available identifiers

zbMath Open li.hui.8MaRDI QIDQ280927

List of research outcomes





PublicationDate of PublicationType
iDP-FL: a fine-grained and privacy-aware federated learning framework for deep neural networks2024-07-23Paper
Achieving federated logistic regression training towards model confidentiality with semi-honest TEE2024-07-23Paper
Efficient and privacy-preserving tree-based inference via additive homomorphic encryption2023-11-01Paper
Allocating rotational cryptanalysis-based preimage attack on 4-round \textsc{Keccak}-224 for quantum setting2023-06-13Paper
Short-ciphertext and BDH-based CCA2 secure certificateless encryption2022-10-28Paper
Efficient signcryption between TPKC and IDPKC and its multi-receiver construction2022-10-28Paper
Information dissemination model for social media with constant updates2022-06-28Paper
https://portal.mardi4nfdi.de/entity/Q50355432022-02-22Paper
The optimal upper bound of the number of queries for Laplace mechanism under differential privacy2021-02-04Paper
Linear complexity of generalized cyclotomic sequences of order 4 over \(\mathbb{F}_l\)2020-04-17Paper
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing2020-02-06Paper
A reusable and single-interactive model for secure approximate \(k\)-nearest neighbor query in cloud2020-02-06Paper
Blockchain-based privacy preserving deep learning2019-10-31Paper
Comment on “An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding”2017-05-16Paper
Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures2016-08-31Paper
Efficient multi-party concurrent signature from lattices2016-05-10Paper
Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts2015-09-29Paper
Key management for Smart Grid based on asymmetric key-wrapping2015-06-24Paper
Authenticated asymmetric group key agreement based on certificateless cryptosystem2014-08-14Paper
Affinity-driven blog cascade analysis and prediction2014-02-19Paper
The cross-correlation distribution of a \(p\)-ary \(m\)-sequence of period \(p^{2k} - 1\) and its decimated sequence by \(\frac{(p^{k} + 1)^{2}}{2(p^{e} + 1)}\)2013-11-14Paper
ID-based authenticated group key agreement from bilinear maps2013-07-04Paper
Identity-based key distribution for mobile ad hoc networks2013-07-04Paper
An efficient MAC scheme for secure network coding with probabilistic detection2012-11-15Paper
Codes Based Tracing and Revoking Scheme with Constant Ciphertext2012-11-06Paper
Group key agreement for secure group communication in dynamic peer systems2012-10-23Paper
https://portal.mardi4nfdi.de/entity/Q31695202011-09-29Paper
Secure Error-Correction Network Coding in a Randomized Setting2009-06-25Paper
Publicly verifiable secret sharing schemes in vector space2006-01-27Paper
https://portal.mardi4nfdi.de/entity/Q56980972005-10-27Paper

Research outcomes over time

This page was built for person: Hui Li