default search action
Xiangxue Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j36]Junchao Xiao, Lin Yang, Fuli Zhong, Hongbo Chen, Xiangxue Li:
Robust anomaly-based intrusion detection system for in-vehicle network by graph neural network framework. Appl. Intell. 53(3): 3183-3206 (2023) - [c52]Yongfeng Xu, Hanyu Jia, Xiangxue Li, Qiang Li, Yue Bao, Xintian Hou:
Constant-Round Multiparty Private Function Evaluation with (Quasi-)Linear Complexities. ACNS 2023: 115-142 - [c51]Hanyu Jia, Xiangxue Li:
PFE: Linear Active Security, Double-Shuffle Proofs, and Low-Complexity Communication. Inscrypt (1) 2023: 227-252 - [c50]Wenxing Zhu, Xiangxue Li:
Secure Mutual Learning with Low Interactions for Deep Model Training. MSN 2023: 579-587 - 2022
- [c49]Mengqi Wei, Wenxing Zhu, Liangkun Cui, Xiangxue Li, Qiang Li:
Privacy Leakage in Privacy-Preserving Neural Network Inference. ESORICS (1) 2022: 133-152 - [c48]Wenxing Zhu, Mengqi Wei, Xiangxue Li, Qiang Li:
SecureBiNN: 3-Party Secure Computation for Binarized Neural Network Inference. ESORICS (3) 2022: 275-294 - [c47]Hanyu Jia, Xiangxue Li, Qiang Li, Yue Bao, Xintian Hou:
Generic 2-Party PFE with Constant Rounds and Linear Active Security, and Efficient Instantiation. SecureComm 2022: 390-410 - [i9]Hanyu Jia, Xiangxue Li:
PFE: Linear Active Security, Double-Shuffle Proofs, and Low-Complexity Communication. IACR Cryptol. ePrint Arch. 2022: 219 (2022) - 2021
- [j35]Shengfeng Xu, Xiangxue Li:
Chosen-Ciphertext Secure Key Encapsulation Mechanism in the Standard Model. IEEE Access 9: 13683-13690 (2021) - [j34]Shouqin Lu, Xiangxue Li:
Quantum-Resistant Lightweight Authentication and Key Agreement Protocol for Fog-Based Microgrids. IEEE Access 9: 27588-27600 (2021) - [j33]Tongtong Chen, Xiangxue Li:
(Semi-)Automatically Parsing Private Protocols for In-Vehicle ECU Communications. Entropy 23(11): 1495 (2021) - [j32]Shengfeng Xu, Xiangxue Li, Haifeng Qian, Kefei Chen:
CPA/CCA2-secure PKE with squared-exponential DFR from low-noise LPN. Theor. Comput. Sci. 885: 91-103 (2021) - [c46]Yucheng Liu, Xiangxue Li:
Source Identification from In-Vehicle CAN-FD Signaling: What Can We Expect? ICICS (1) 2021: 204-223 - [c45]Yucheng Liu, Hao Wu, Xiangxue Li:
Another Look at the Connection between CAN Signal Ringing & In-Vehicle ECU Identification. TrustCom 2021: 1021-1030 - [c44]Jianfeng Ma, Xiangxue Li, Haifeng Qian:
LVRT: Low Variances of Solo Mining Reward & Inter-block Time in Collaborative PoW. TrustCom 2021: 1039-1048 - [c43]Shouqin Lu, Xiangxue Li:
Lightweight Grouping-Proof for Post-Quantum RFID Security. SmartWorld/SCALCOM/UIC/ATC/IOP/SCI 2021: 49-58 - [c42]Yuan Linghu, Xiangxue Li:
WSG-InV: Weighted State Graph Model for Intrusion Detection on In-Vehicle Network. WCNC 2021: 1-7 - 2020
- [c41]Chenlong Yang, Xiangxue Li, Jingjing Li, Haifeng Qian:
Linear Scalability from Sharding and PoS. ICA3PP (1) 2020: 548-562 - [c40]Qi Wang, Ming Xu, Xiangxue Li, Haifeng Qian:
Revisiting the Fairness and Randomness of Delegated Proof of Stake Consensus Algorithm. ISPA/BDCloud/SocialCom/SustainCom 2020: 305-312 - [c39]Yuan Linghu, Ming Xu, Xiangxue Li, Haifeng Qian:
Weighted Local Outlier Factor for Detecting Anomaly on In-Vehicle Network. MSN 2020: 479-487
2010 – 2019
- 2019
- [j31]Chenlong Yang, Xiangxue Li, Yu Yu, Ziping Wang:
Basing Diversified Services of Complex IIoT Applications on Scalable Block Graph Platform. IEEE Access 7: 22966-22975 (2019) - [j30]Junchao Xiao, Hao Wu, Xiangxue Li:
Internet of Things Meets Vehicles: Sheltering In-Vehicle Network through Lightweight Machine Learning. Symmetry 11(11): 1388 (2019) - [c38]Yu Yu, Jiang Zhang, Jian Weng, Chun Guo, Xiangxue Li:
Collision Resistant Hashing from Sub-exponential Learning Parity with Noise. ASIACRYPT (2) 2019: 3-24 - [c37]Junchao Xiao, Hao Wu, Xiangxue Li:
Robust and Self-Evolving IDS for In-Vehicle Network by Enabling Spatiotemporal Information. HPCC/SmartCity/DSS 2019: 1390-1397 - [c36]Junchao Xiao, Hao Wu, Xiangxue Li, Yuan Linghu:
Practical IDS on In-vehicle Network Against Diversified Attack Models. ICA3PP (2) 2019: 456-466 - [c35]Yuan Linghu, Xiangxue Li, Zhenlong Zhang:
Deep Learning vs. Traditional Probabilistic Models: Case Study on Short Inputs for Password Guessing. ICA3PP (1) 2019: 468-483 - 2018
- [j29]Qi Wang, Xiangxue Li, Yu Yu:
Anonymity for Bitcoin From Secure Escrow Address. IEEE Access 6: 12336-12341 (2018) - [j28]Xiangxue Li, Yu Yu, Guannan Sun, Kefei Chen:
Connected Vehicles' Security from the Perspective of the In-Vehicle Network. IEEE Netw. 32(3): 58-63 (2018) - [c34]Haitao Cheng, Xiangxue Li, Haifeng Qian, Di Yan:
CCA Secure Multi-recipient KEM from LPN. ICICS 2018: 513-529 - [c33]Haitao Cheng, Xiangxue Li, Haifeng Qian, Di Yan:
Simpler CCA Secure PKE from LPN Problem Without Double-Trapdoor. ICICS 2018: 756-766 - 2017
- [j27]Gang Han, Yu Yu, Xiangxue Li, Kefei Chen, Hui Li:
Characterizing the semantics of passwords: The role of Pinyin for Chinese Netizens. Comput. Stand. Interfaces 54: 20-28 (2017) - [j26]Qinglan Zhao, Dong Zheng, Xiangxue Li, Yinghui Zhang, Xiaoli Dong:
Characterizing Linear Structures of Boolean Functions from Arithmetic Walsh Transform. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(9): 1965-1972 (2017) - [j25]Gang Han, Yu Yu, Xiangxue Li, Qifeng Zhou, Dong Zheng, Hui Li:
1-Resilient Boolean Functions on Even Variables with Almost Perfect Algebraic Immunity. Secur. Commun. Networks 2017: 6268230:1-6268230:9 (2017) - [j24]Kai Zhang, Lifei Wei, Xiangxue Li, Haifeng Qian:
Scalable and Soundness Verifiable Outsourcing Computation in Marine Mobile Computing. Wirel. Commun. Mob. Comput. 2017 (2017) - [c32]Limin Yang, Xiangxue Li, Yu Yu:
VulDigger: A Just-in-Time and Cost-Aware Tool for Digging Vulnerability-Contributing Changes. GLOBECOM 2017: 1-7 - [c31]Kai Zhang, Lifei Wei, Xiangxue Li, Haifeng Qian:
Provably Secure Dual-Mode Publicly Verifiable Computation Protocol in Marine Wireless Sensor Networks. WASA 2017: 210-219 - [i8]Yu Yu, Jiang Zhang, Jian Weng, Chun Guo, Xiangxue Li:
Collision Resistant Hashing from Learning Parity with Noise. IACR Cryptol. ePrint Arch. 2017: 1260 (2017) - 2016
- [j23]Yang Tan, Shaohua Tang, Jie Chen, Yong Yu, Xiangxue Li:
Building a new secure variant of Rainbow signature scheme. IET Inf. Secur. 10(2): 53-59 (2016) - [j22]Kai Zhang, Wen Chen, Xiangxue Li, Jie Chen, Haifeng Qian:
New application of partitioning methodology: identity-based dual receiver encryption. Secur. Commun. Networks 9(18): 5789-5802 (2016) - [c30]Yujuan Sun, Yu Yu, Xiangxue Li, Kai Zhang, Haifeng Qian, Yuan Zhou:
Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations. ACISP (1) 2016: 293-309 - [c29]Kai Zhang, Junqing Gong, Shaohua Tang, Jie Chen, Xiangxue Li, Haifeng Qian, Zhenfu Cao:
Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable Computation. AsiaCCS 2016: 269-279 - [c28]Nan Yao, Yu Yu, Xiangxue Li, Dawu Gu:
On the Robustness of Learning Parity with Noise. ICICS 2016: 99-106 - 2015
- [j21]Qiang Li, Xiangxue Li, Xuejia Lai, Kefei Chen:
Optimal assignment schemes for general access structures based on linear programming. Des. Codes Cryptogr. 74(3): 623-644 (2015) - [j20]Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng, Yuan Zhou:
Signcryption KEM/tag-KEM, revisited. Secur. Commun. Networks 8(17): 3067-3082 (2015) - [j19]Yu Yu, Xiangxue Li, Jian Weng:
Pseudorandom generators from regular one-way functions: New constructions with improved parameters. Theor. Comput. Sci. 569: 58-69 (2015) - [c27]Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng:
(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and Beyond. CRYPTO (2) 2015: 209-229 - [c26]Qingji Zheng, Xiangxue Li, Aytac Azgin:
CLKS: Certificateless Keyword Search on Encrypted Data. NSS 2015: 239-253 - [c25]Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng:
The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs from a Broader Class of One-Way Functions. TCC (1) 2015: 7-35 - [i7]Qingji Zheng, Xiangxue Li, Aytac Azgin:
CLKS: Certificateless Keyword Search on Encrypted Data. IACR Cryptol. ePrint Arch. 2015: 814 (2015) - 2014
- [j18]Xiangxue Li, Qingji Zheng, Haifeng Qian, Dong Zheng, Kefei Chen:
PWG: Progressive Weight-Growth Algorithm for LDPC Codes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(2): 685-689 (2014) - [j17]Xiangxue Li, Haifeng Qian, Yuan Zhou:
Notes on a group-oriented setting's multisigncryption scheme with threshold designcryption. Inf. Sci. 276: 290-294 (2014) - [j16]Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng, Ziping Wang:
Robust password changing and DoS resilience for human-centric password authentication. Secur. Commun. Networks 7(10): 1552-1559 (2014) - [c24]Xiangxue Li, Yu Yu, Qiang Li, Haifeng Qian, Yuan Zhou, Jian Weng:
POSTER: Arranging the Layout of Alphanumeric Buttons-the Role of Passwords. CCS 2014: 1457-1459 - [c23]Xiangxue Li, Yu Yu, Qiang Li, Haifeng Qian, Yuan Zhou, Jian Weng:
POSTER: Using Chinese Characters for Authentication-Algorithmic Framework and Empirical Results. CCS 2014: 1460-1462 - [i6]Yu Yu, Dawu Gu, Xiangxue Li:
The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions. Electron. Colloquium Comput. Complex. TR14 (2014) - [i5]Yu Yu, Dawu Gu, Xiangxue Li:
The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions. IACR Cryptol. ePrint Arch. 2014: 392 (2014) - [i4]Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng:
(Almost) Optimal Constructions of UOWHFs from 1-to-1 and Known-Regular One-way Functions. IACR Cryptol. ePrint Arch. 2014: 393 (2014) - 2013
- [j15]Xiangxue Li, Haifeng Qian, Jian Weng, Yu Yu:
Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model. Math. Comput. Model. 57(3-4): 503-511 (2013) - [c22]Xiangxue Li, Haifeng Qian, Yu Yu, Yuan Zhou, Jian Weng:
Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles. ACNS 2013: 186-201 - [c21]Yu Yu, Xiangxue Li, Jian Weng:
Pseudorandom Generators from Regular One-Way Functions: New Constructions with Improved Parameters. ASIACRYPT (2) 2013: 261-279 - [c20]Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng, Yuan Zhou:
Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model. ICICS 2013: 167-184 - 2012
- [j14]Xiangxue Li, Haifeng Qian, Yuan Zhou:
Pitfalls in identity based encryption using an elliptic curve combined public key. Appl. Math. Lett. 25(8): 1111-1113 (2012) - [j13]Jianhong Chen, Kefei Chen, Yongtao Wang, Xiangxue Li, Yu Long, Zhongmei Wan:
Identity-Based Key-Insulated Signcryption. Informatica 23(1): 27-45 (2012) - [j12]Haifeng Qian, Xiangxue Li, Xinli Huang:
Tightly Secure Non-Interactive Multisignatures in the Plain Public Key Model. Informatica 23(3): 443-460 (2012) - [c19]Jingjing Wang, Xiangxue Li, Kefei Chen, Wenzheng Zhang:
Attack Based on Direct Sum Decomposition against the Nonlinear Filter Generator. AFRICACRYPT 2012: 53-66 - [c18]Yong Zhang, Xiangxue Li, Haifeng Qian:
An anonymous remote attestation for trusted cloud computing. CCIS 2012: 426-429 - [c17]Yu Yu, Xiangxue Li, Haifeng Qian:
Two-source extractors for leaky sources. ITW 2012: 452-456 - [i3]Qiang Li, Xiangxue Li, Dong Zheng, Kefei Chen:
Optimal Multiple Assignments with (m, m)-Scheme for General Access Structures. IACR Cryptol. ePrint Arch. 2012: 7 (2012) - [i2]Qiang Li, Xiangxue Li, Dong Zheng, Zheng Huang, Kefei Chen:
On the Equivalence between the Set Covering Problem and the Problem of Finding Optimal Cumulative Assignment Schemes. IACR Cryptol. ePrint Arch. 2012: 245 (2012) - 2011
- [j11]Jian Weng, Guoxiang Yao, Robert H. Deng, Min-Rong Chen, Xiangxue Li:
Cryptanalysis of a certificateless signcryption scheme in the standard model. Inf. Sci. 181(3): 661-667 (2011) - [c16]Yuan Zhou, Haifeng Qian, Xiangxue Li:
Non-interactive CDH-Based Multisignature Scheme in the Plain Public Key Model with Tighter Security. ISC 2011: 341-354 - [c15]Zheng Huang, Qiang Li, Dong Zheng, Kefei Chen, Xiangxue Li:
YI Cloud: Improving user privacy with secret key recovery in cloud storage. SOSE 2011: 268-272 - 2010
- [j10]Xiangxue Li, Weidong Qiu, Dong Zheng, Kefei Chen, Jianhua Li:
Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards. IEEE Trans. Ind. Electron. 57(2): 793-800 (2010) - [c14]Qingji Zheng, Xiangxue Li, Dong Zheng, Baoan Guo:
Regular Quasi-cyclic LDPC Codes with Girth 6 from Prime Fields. IIH-MSP 2010: 470-473
2000 – 2009
- 2009
- [j9]Xiangxue Li, Dong Zheng, Kefei Chen, Jianhua Li:
Democratic group signatures with collective traceability. Comput. Electr. Eng. 35(5): 664-672 (2009) - [j8]Xiangxue Li, Qingji Zheng, Haifeng Qian, Dong Zheng, Jianhua Li:
Toward optimizing cauchy matrix for cauchy reed-solomon code. IEEE Commun. Lett. 13(8): 603-605 (2009) - [c13]Zhiheng Zhou, Xiangxue Li, Dong Zheng, Kefei Chen, Jianhua Li:
Extended PEG Algorithm for High Rate LDPC Codes. ISPA 2009: 494-498 - [c12]Chaonian Guo, Xiangxue Li, Dong Zheng, Shengli Liu, Jianhua Li:
AE-BP: Adaptive Erasure Belief Propagation Decoding Algorithm of LDPC Codes. NCM 2009: 479-483 - 2008
- [j7]Jian Weng, Shengli Liu, Kefei Chen, Xiangxue Li:
Identity-Based Parallel Key-Insulated Signature: Framework and Construction. J. Res. Pract. Inf. Technol. 40(1): 55-68 (2008) - [j6]Jian Weng, Xiangxue Li, Kefei Chen, Shengli Liu:
Identity-Based Parallel Key-Insulated Signature Without Random Oracles. J. Inf. Sci. Eng. 24(4): 1143-1157 (2008) - [j5]Zheng Gong, Xiangxue Li, Dong Zheng, Kefei Chen:
A Generic Construction for Instrusion-Resilient Signatures from Linear Feedback Shift Register. J. Inf. Sci. Eng. 24(5): 1347-1360 (2008) - [i1]Dong Zheng, Xiangxue Li, Changshe Ma, Kefei Chen, Jianhua Li:
Democratic Group Signatures with Threshold Traceability. IACR Cryptol. ePrint Arch. 2008: 112 (2008) - 2007
- [j4]Xiangxue Li, Dong Zheng, Kefei Chen:
LFSR-based Signatures with Message Recovery. Int. J. Netw. Secur. 4(3): 266-270 (2007) - [j3]Dong Zheng, Xiangxue Li, Kefei Chen:
Code-based Ring Signature Scheme. Int. J. Netw. Secur. 5(2): 154-157 (2007) - [j2]Licheng Wang, Zhenfu Cao, Xiangxue Li, Haifeng Qian:
Simulatability and security of certificateless threshold signatures. Inf. Sci. 177(6): 1382-1394 (2007) - [c11]Xiangxue Li, Dong Zheng, Kefei Chen:
Efficient Blind Signatures from Linear Feedback Shift Register. CDVE 2007: 423-425 - [c10]Dong Zheng, Xiangxue Li, Kefei Chen, Jianhua Li:
Linkable Ring Signatures from Linear Feedback Shift Register. EUC Workshops 2007: 716-727 - [c9]Xiangxue Li, Dong Zheng, Kefei Chen:
Efficient Linkable Ring Signatures and Threshold Signatures from Linear Feedback Shift Register. ICA3PP 2007: 95-106 - 2006
- [c8]Jian Weng, Shengli Liu, Kefei Chen, Xiangxue Li:
Identity-Based Key-Insulated Signature with Secure Key-Updates. Inscrypt 2006: 13-26 - [c7]Zheng Gong, Xiangxue Li, Kefei Chen:
Efficient Partially Blind Signature Scheme with Provable Security. COCOON 2006: 378-386 - 2005
- [j1]Xiangxue Li, Kefei Chen:
ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings. Appl. Math. Comput. 169(1): 437-450 (2005) - [c6]Lichen Wang, Zhenfu Cao, Xiangxue Li, Haifeng Qian:
Certificateless Threshold Signature Schemes. CIS (2) 2005: 104-109 - [c5]Shiqun Li, Kefei Chen, Xiangxue Li, Rongxing Lu:
Identity Based Conference Key Distribution Scheme from Parings. ICCNMC 2005: 845-852 - [c4]Shiqun Li, Jianying Zhou, Xiangxue Li, Kefei Chen:
An Authentication Protocol for Pervasive Computing. ISPA 2005: 553-563 - 2004
- [c3]Xiangxue Li, Kefei Chen:
Identity Based Proxy-Signcryption Scheme from Pairings. IEEE SCC 2004: 494-497 - [c2]Xiangxue Li, Kefei Chen, Longjun Zhang, Shiqun Li:
Proxy Structured Multisignature Scheme from Bilinear Pairings. ISPA 2004: 705-714 - [c1]Xiangxue Li, Kefei Chen, Shiqun Li:
Multi-proxy Signature and Proxy Multi-signature Schemes from Bilinear Pairings. PDCAT 2004: 591-595
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-29 21:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint