default search action
Yannan Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j42]Qiang Sun, Yannan Li, Ahreum Hong:
Integrating ESG into Corporate Strategy: Unveiling the Moderating Effect of Digital Transformation on Green Innovation through Employee Insights. Syst. 12(5): 148 (2024) - [j41]Guanming Qiao, Yannan Li, Ahreum Hong:
The Strategic Role of Digital Transformation: Leveraging Digital Leadership to Enhance Employee Performance and Organizational Commitment in the Digital Era. Syst. 12(11): 457 (2024) - [j40]Mei Jiang, Yannan Li, Willy Susilo, Dung Hoang Duong:
Quantum-Safe Puncturable Signatures With Their Application in Blockchain. IEEE Trans. Inf. Forensics Secur. 19: 2761-2770 (2024) - [j39]Yanhong Luo, Yannan Li, Jinliang Ding, Huaguang Zhang:
Optimal Moving-Target Circumnavigation Control of Multiple Wheeled Mobile Robots Based on Adaptive Dynamic Programming. IEEE Trans. Netw. Sci. Eng. 11(5): 4679-4688 (2024) - [j38]Lianhai Wang, Huilin Li, Yannan Li, Yong Yu, Xiaojiang Du:
Self-Tallying Voting with Blockchain in Wireless Network Environment. IEEE Wirel. Commun. 31(5): 142-147 (2024) - [e5]Tianqing Zhu, Yannan Li:
Information Security and Privacy - 29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15-17, 2024, Proceedings, Part I. Lecture Notes in Computer Science 14895, Springer 2024, ISBN 978-981-97-5024-5 [contents] - [e4]Tianqing Zhu, Yannan Li:
Information Security and Privacy - 29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15-17, 2024, Proceedings, Part II. Lecture Notes in Computer Science 14896, Springer 2024, ISBN 978-981-97-5027-6 [contents] - [e3]Tianqing Zhu, Yannan Li:
Information Security and Privacy - 29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15-17, 2024, Proceedings, Part III. Lecture Notes in Computer Science 14897, Springer 2024, ISBN 978-981-97-5100-6 [contents] - 2023
- [j37]Yang-Wai Chow, Willy Susilo, Yannan Li, Nan Li, Chau Nguyen:
Visualization and Cybersecurity in the Metaverse: A Survey. J. Imaging 9(1): 11 (2023) - [c14]Yannan Li, Jingbo Wang, Chao Wang:
Certifying the Fairness of KNN in the Presence of Dataset Bias. CAV (2) 2023: 335-357 - [c13]Yannan Li, Chao Wang:
Constraint Based Compiler Optimization for Energy Harvesting Applications. ECOOP 2023: 16:1-16:29 - [c12]Yannan Li, Jingbo Wang, Chao Wang:
Systematic Testing of the Data-Poisoning Robustness of KNN. ISSTA 2023: 1207-1218 - [c11]Minh Thuy Truc Pham, Dung Hoang Duong, Yannan Li, Willy Susilo:
Threshold Ring Signature Scheme from Cryptographic Group Action. ProvSec 2023: 207-227 - [c10]Minh Vu Nguyen, Ngoc-Thuy Le, Dung Hoang Duong, Yannan Li, Madhav Mukherjee:
Blockchain Oracles: Implications for Smart Contracts in Legal Reasoning and Addressing the Oracle Problem. SoICT 2023: 296-303 - [i9]Yannan Li, Jingbo Wang, Chao Wang:
Systematic Testing of the Data-Poisoning Robustness of KNN. CoRR abs/2307.08288 (2023) - [i8]Yannan Li, Jingbo Wang, Chao Wang:
Certifying the Fairness of KNN in the Presence of Dataset Bias. CoRR abs/2307.08722 (2023) - 2022
- [j36]Yiting Huang, Yong Yu, Huilin Li, Yannan Li, Aikui Tian:
Blockchain-based continuous data integrity checking protocol with zero-knowledge privacy protection. Digit. Commun. Networks 8(5): 604-613 (2022) - [j35]Yannan Li, Willy Susilo, Guomin Yang, Yong Yu, Dongxi Liu, Xiaojiang Du, Mohsen Guizani:
A Blockchain-Based Self-Tallying Voting Protocol in Decentralized IoT. IEEE Trans. Dependable Secur. Comput. 19(1): 119-130 (2022) - [j34]Lianhai Wang, Yannan Li, Qiming Yu, Yong Yu:
Outsourced Data Integrity Checking with Practical Key Update in Edge-Cloud Resilient Networks. IEEE Wirel. Commun. 29(3): 56-62 (2022) - [c9]Jingbo Wang, Yannan Li, Chao Wang:
Synthesizing Fair Decision Trees via Iterative Constraint Solving. CAV (2) 2022: 364-385 - [c8]Willy Susilo, Yannan Li, Fuchun Guo, Jianchang Lai, Ge Wu:
Public Cloud Data Auditing Revisited: Removing the Tradeoff Between Proof Size and Storage Cost. ESORICS (2) 2022: 65-85 - [c7]Yannan Li, Jingbo Wang, Chao Wang:
Proving Robustness of KNN Against Adversarial Data Poisoning. FMCAD 2022: 7-16 - 2021
- [j33]Yanqi Zhao, Yong Yu, Ruonan Chen, Yannan Li, Aikui Tian:
Toward Transparent and Accountable Privacy-Preserving Data Classification. IEEE Netw. 35(4): 184-189 (2021) - [j32]Yannan Li, Guomin Yang, Willy Susilo, Yong Yu, Man Ho Au, Dongxi Liu:
Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability. IEEE Trans. Dependable Secur. Comput. 18(2): 679-691 (2021) - [j31]Huilin Li, Yannan Li, Yong Yu, Baocang Wang, Kefei Chen:
A Blockchain-Based Traceable Self-Tallying E-Voting Protocol in AI Era. IEEE Trans. Netw. Sci. Eng. 8(2): 1019-1032 (2021) - [j30]Yannan Li, Yong Yu, Willy Susilo, Zhiyong Hong, Mohsen Guizani:
Security and Privacy for Edge Intelligence in 5G and Beyond Networks: Challenges and Solutions. IEEE Wirel. Commun. 28(2): 63-69 (2021) - [c6]Yannan Li, Willy Susilo, Guomin Yang, Tran Viet Xuan Phuong, Yong Yu, Dongxi Liu:
Concise Mercurial Subvector Commitments: Definitions and Constructions. ACISP 2021: 353-371 - [c5]Yannan Li, Willy Susilo, Guomin Yang, Yong Yu, Tran Viet Xuan Phuong, Dongxi Liu:
Non-Equivocation in Blockchain: Double-Authentication-Preventing Signatures Gone Contractual. AsiaCCS 2021: 859-871 - 2020
- [j29]Ruonan Chen, Yannan Li, Yong Yu, Huilin Li, Xiaofeng Chen, Willy Susilo:
Blockchain-Based Dynamic Provable Data Possession for Smart Cities. IEEE Internet Things J. 7(5): 4143-4154 (2020) - [j28]Yannan Li, Yong Yu, Ruonan Chen, Xiaojiang Du, Mohsen Guizani:
IntegrityChain: Provable Data Possession for Decentralized Storage. IEEE J. Sel. Areas Commun. 38(6): 1205-1217 (2020) - [j27]Yong Yu, Junbin Shi, Huilin Li, Yannan Li, Xiaojiang Du, Mohsen Guizani:
Key-Policy Attribute-Based Encryption With Keyword Search in Virtualized Environments. IEEE J. Sel. Areas Commun. 38(6): 1242-1251 (2020) - [j26]Dong Zheng, Liang Xue, Chao Yu, Yannan Li, Yong Yu:
Toward Assured Data Deletion in Cloud Storage. IEEE Netw. 34(3): 101-107 (2020) - [j25]Gang Han, Yannan Li, Yong Yu, Kim-Kwang Raymond Choo, Nadra Guizani:
Blockchain-Based Self-Tallying Voting System with Software Updates in Decentralized IoT. IEEE Netw. 34(4): 166-172 (2020) - [j24]Yannan Li, Yong Yu, Chunwei Lou, Nadra Guizani, Lianhai Wang:
Decentralized Public Key Infrastructures atop Blockchain. IEEE Netw. 34(6): 133-139 (2020) - [j23]Yong Yu, Yannan Li, Bo Yang, Willy Susilo, Guomin Yang, Jian Bai:
Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage. IEEE Trans. Emerg. Top. Comput. 8(2): 377-390 (2020) - [j22]Yong Yu, Yanqi Zhao, Yannan Li, Xiaojiang Du, Lianhai Wang, Mohsen Guizani:
Blockchain-Based Anonymous Authentication With Selective Revocation for Smart Industrial Applications. IEEE Trans. Ind. Informatics 16(5): 3290-3300 (2020) - [j21]Dong Zheng, Baodong Qin, Yannan Li, Aikui Tian:
Cloud-Assisted Attribute-Based Data Sharing with Efficient User Revocation in the Internet of Things. IEEE Wirel. Commun. 27(3): 18-23 (2020) - [e2]Willy Susilo, Robert H. Deng, Fuchun Guo, Yannan Li, Rolly Intan:
Information Security - 23rd International Conference, ISC 2020, Bali, Indonesia, December 16-18, 2020, Proceedings. Lecture Notes in Computer Science 12472, Springer 2020, ISBN 978-3-030-62973-1 [contents]
2010 – 2019
- 2019
- [j20]Lingyue Zhang, Huilin Li, Yannan Li, Yong Yu, Man Ho Au, Baocang Wang:
An efficient linkable group signature for payer tracing in anonymous cryptocurrencies. Future Gener. Comput. Syst. 101: 29-38 (2019) - [j19]Qiqi Lai, Bo Yang, Zhe Xia, Yannan Li, Yuan Chen, Zhenlong Li:
Novel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard Model. Int. J. Found. Comput. Sci. 30(4): 589-606 (2019) - [j18]Yao Wang, Wandong Cai, Tao Gu, Wei Shao, Yannan Li, Yong Yu:
Secure Your Voice: An Oral Airflow-Based Continuous Liveness Detection for Voice Assistants. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 3(4): 157:1-157:28 (2019) - [j17]Yong Yu, Yujie Ding, Yanqi Zhao, Yannan Li, Yi Zhao, Xiaojiang Du, Mohsen Guizani:
LRCoin: Leakage-Resilient Cryptocurrency Based on Bitcoin for Data Trading in IoT. IEEE Internet Things J. 6(3): 4702-4710 (2019) - [j16]Yanqi Zhao, Yong Yu, Yannan Li, Gang Han, Xiaojiang Du:
Machine learning based privacy-preserving fair data trading in big data market. Inf. Sci. 478: 449-460 (2019) - [j15]Liang Xue, Yong Yu, Yannan Li, Man Ho Au, Xiaojiang Du, Bo Yang:
Efficient attribute-based encryption with attribute revocation for assured data deletion. Inf. Sci. 479: 640-650 (2019) - [j14]Yuan Chen, Qingkuan Dong, Yannan Li, Qiqi Lai, Zhedong Wang:
Natural sd-RCCA Secure Public-key Encryptions from Hybrid Paradigms. J. Univers. Comput. Sci. 25(3): 158-181 (2019) - [j13]Yong Yu, Ruonan Chen, Huilin Li, Yannan Li, Aikui Tian:
Toward Data Security in Edge Intelligent IIoT. IEEE Netw. 33(5): 20-26 (2019) - [j12]Yannan Li, Willy Susilo, Guomin Yang, Yong Yu, Xiaojiang Du, Dongxi Liu, Nadra Guizani:
Toward Privacy and Regulation in Blockchain-Based Cryptocurrencies. IEEE Netw. 33(5): 111-117 (2019) - [j11]Yannan Li, Yong Yu, Geyong Min, Willy Susilo, Jianbing Ni, Kim-Kwang Raymond Choo:
Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems. IEEE Trans. Dependable Secur. Comput. 16(1): 72-83 (2019) - [i7]Lingyue Zhang, Huilin Li, Yannan Li, Yanqi Zhao, Yong Yu:
An Efficient Linkable Group Signature for Payer Tracing in Anonymous Cryptocurrencies. CoRR abs/1902.03420 (2019) - [i6]Yannan Li, Willy Susilo, Guomin Yang, Yong Yu, Dongxi Liu, Mohsen Guizani:
A Blockchain-based Self-tallying Voting Scheme in Decentralized IoT. CoRR abs/1902.03710 (2019) - [i5]Yanqi Zhao, Yiming Liu, Yong Yu, Yannan Li:
Blockchain based Privacy-Preserving Software Updates with Proof-of-Delivery for Internet of Things. CoRR abs/1902.03712 (2019) - 2018
- [j10]Yanqi Zhao, Yannan Li, Qilin Mu, Bo Yang, Yong Yu:
Secure Pub-Sub: Blockchain-Based Fair Payment With Reputation for Reliable Cyber Physical Systems. IEEE Access 6: 12295-12303 (2018) - [j9]Yong Yu, Yannan Li, Xiaojiang Du, Ruonan Chen, Bo Yang:
Content Protection in Named Data Networking: Challenges and Potential Solutions. IEEE Commun. Mag. 56(11): 82-87 (2018) - [j8]Yannan Li, Yong Yu, Bo Yang, Geyong Min, Huai Wu:
Privacy preserving cloud data auditing with efficient key update. Future Gener. Comput. Syst. 78: 789-798 (2018) - [j7]Yong Yu, Liang Xue, Yannan Li, Xiaojiang Du, Mohsen Guizani, Bo Yang:
Assured Data Deletion With Fine-Grained Access Control for Fog-Based Industrial Applications. IEEE Trans. Ind. Informatics 14(10): 4538-4547 (2018) - [j6]Yong Yu, Yannan Li, Junfeng Tian, Jianwei Liu:
Blockchain-Based Solutions to Security and Privacy Issues in the Internet of Things. IEEE Wirel. Commun. 25(6): 12-18 (2018) - [c4]Jinhui Liu, Yong Yu, Yannan Li, Yanqi Zhao, Xiaojiang Du:
An Efficient Anonymous Authentication Scheme Based on Double Authentication Preventing Signature for Mobile Healthcare Crowd Sensing. Inscrypt 2018: 626-636 - [c3]Lan Zhang, Yannan Li, Xiang Xiao, Xiang-Yang Li, Junjun Wang, Anxin Zhou, Qiang Li:
CrowdBuy: Privacy-friendly Image Dataset Purchasing via Crowdsourcing. INFOCOM 2018: 2735-2743 - [i4]Yong Yu, Liang Xue, Yannan Li, Xiaojiang Du, Mohsen Guizani, Bo Yang:
Assured Data Deletion with Fine-grained Access Control for Fog-based Industrial Applications. CoRR abs/1804.02834 (2018) - [i3]Yong Yu, Yujie Ding, Yanqi Zhao, Yannan Li, Xiaojiang Du, Mohsen Guizani:
LRCoin: Leakage-resilient Cryptocurrency Based on Bitcoin for Data Trading in IoT. CoRR abs/1810.11175 (2018) - [i2]Yong Yu, Yannan Li, Xiaojiang Du, Ruonan Chen, Bo Yang:
Content Protection in Named Data Networking: Challenges and Potential Solutions. CoRR abs/1810.11179 (2018) - 2017
- [j5]Liang Xue, Jianbing Ni, Yannan Li, Jian Shen:
Provable data transfer from provable data possession and deletion in cloud storage. Comput. Stand. Interfaces 54: 46-54 (2017) - [j4]Li Zang, Yong Yu, Liang Xue, Yannan Li, Yujie Ding, Xiaoling Tao:
Improved dynamic remote data auditing protocol for smart city security. Pers. Ubiquitous Comput. 21(5): 911-921 (2017) - [e1]Tatsuaki Okamoto, Yong Yu, Man Ho Au, Yannan Li:
Provable Security - 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings. Lecture Notes in Computer Science 10592, Springer 2017, ISBN 978-3-319-68636-3 [contents] - [i1]Xin Jin, Yannan Li, Ningning Liu, Xiaodong Li, Xianggang Jiang, Chaoen Xiao, Shiming Ge:
Single Reference Image based Scene Relighting via Material Guided Filtering. CoRR abs/1708.07066 (2017) - 2016
- [j3]Yongyong Ge, Yannan Li, Zhusong Liu:
Delegation of signing rights for emerging 5G networks. Concurr. Comput. Pract. Exp. 28(4): 1193-1203 (2016) - [j2]Yong Yu, Yannan Li, Jianbing Ni, Guomin Yang, Yi Mu, Willy Susilo:
Comments on "Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification". IEEE Trans. Inf. Forensics Secur. 11(3): 658-659 (2016) - [c2]Yong Yu, Yannan Li, Man Ho Au, Willy Susilo, Kim-Kwang Raymond Choo, Xinpeng Zhang:
Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy. ACISP (1) 2016: 389-405 - 2013
- [c1]Yannan Li, Qi Xia, Jianbing Ni, Yong Yu:
A New Construction of Proxy Signature Using Chameleon Hash Function. INCoS 2013: 388-391 - 2012
- [j1]Yannan Li, Yanxun Chang, Bingli Fan:
The intersection numbers of KTSs with a common parallel class. Discret. Math. 312(19): 2893-2904 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-05 20:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint