Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Yanli Ren
@article{DBLP:journals/iotj/BianHFZR24, author = {Mingyun Bian and Guanghui He and Guorui Feng and Xinpeng Zhang and Yanli Ren}, title = {Verifiable Privacy-Preserving Heart Rate Estimation Based on {LSTM}}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {1}, pages = {1719--1731}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3290651}, doi = {10.1109/JIOT.2023.3290651}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/BianHFZR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/RenCHFZ24, author = {Yanli Ren and Cien Chen and Mingqi Hu and Guorui Feng and Xinpeng Zhang}, title = {{BFDAC:} {A} Blockchain-Based and Fog-Computing-Assisted Data Access Control Scheme in Vehicular Social Networks}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {2}, pages = {3510--3523}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3296906}, doi = {10.1109/JIOT.2023.3296906}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/RenCHFZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pr/WangLRZF24, author = {Yue Wang and Minjie Liu and Yanli Ren and Xinpeng Zhang and Guorui Feng}, title = {Traffic sign attack via pinpoint region probability estimation network}, journal = {Pattern Recognit.}, volume = {146}, pages = {110035}, year = {2024}, url = {https://doi.org/10.1016/j.patcog.2023.110035}, doi = {10.1016/J.PATCOG.2023.110035}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pr/WangLRZF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/HeRBF023, author = {Gang He and Yanli Ren and Mingyun Bian and Guorui Feng and Xinpeng Zhang}, title = {Privacy-enhanced and non-interactive linear regression with dropout-resilience}, journal = {Inf. Sci.}, volume = {632}, pages = {69--86}, year = {2023}, url = {https://doi.org/10.1016/j.ins.2023.02.080}, doi = {10.1016/J.INS.2023.02.080}, timestamp = {Sun, 16 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/HeRBF023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/lgrs/WuQRF23, author = {Jiayi Wu and Chuan Qin and Yanli Ren and Guorui Feng}, title = {EPFNet: Edge-Prototype Fusion Network Toward Few-Shot Semantic Segmentation for Aerial Remote-Sensing Images}, journal = {{IEEE} Geosci. Remote. Sens. Lett.}, volume = {20}, pages = {1--5}, year = {2023}, url = {https://doi.org/10.1109/LGRS.2023.3292832}, doi = {10.1109/LGRS.2023.3292832}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/lgrs/WuQRF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/HuRC23, author = {Mingqi Hu and Yanli Ren and Cien Chen}, title = {Privacy-Preserving Medical Data-Sharing System with Symmetric Encryption Based on Blockchain}, journal = {Symmetry}, volume = {15}, number = {5}, pages = {1010}, year = {2023}, url = {https://doi.org/10.3390/sym15051010}, doi = {10.3390/SYM15051010}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/symmetry/HuRC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcyb/QinFRZ23, author = {Yalan Qin and Guorui Feng and Yanli Ren and Xinpeng Zhang}, title = {Consistency-Induced Multiview Subspace Clustering}, journal = {{IEEE} Trans. Cybern.}, volume = {53}, number = {2}, pages = {832--844}, year = {2023}, url = {https://doi.org/10.1109/TCYB.2022.3165550}, doi = {10.1109/TCYB.2022.3165550}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcyb/QinFRZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RenSSLF23, author = {Yanli Ren and Zhuhuan Song and Shifeng Sun and Joseph K. Liu and Guorui Feng}, title = {Outsourcing LDA-Based Face Recognition to an Untrusted Cloud}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {3}, pages = {2058--2070}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3172143}, doi = {10.1109/TDSC.2022.3172143}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RenSSLF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/BianLSZR23, author = {Mingyun Bian and Joseph K. Liu and Shifeng Sun and Xinpeng Zhang and Yanli Ren}, title = {Verifiable Privacy-Enhanced Rotation Invariant {LBP} Feature Extraction in Fog Computing}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {19}, number = {12}, pages = {11518--11530}, year = {2023}, url = {https://doi.org/10.1109/TII.2023.3246992}, doi = {10.1109/TII.2023.3246992}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tii/BianLSZR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/QinFRZ23, author = {Yalan Qin and Guorui Feng and Yanli Ren and Xinpeng Zhang}, title = {Block-Diagonal Guided Symmetric Nonnegative Matrix Factorization}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {35}, number = {3}, pages = {2313--2325}, year = {2023}, url = {https://doi.org/10.1109/TKDE.2021.3113943}, doi = {10.1109/TKDE.2021.3113943}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tkde/QinFRZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/ZhouRXF23, author = {Yu Zhou and Yanli Ren and Mengtian Xu and Guorui Feng}, title = {An Improved {NSGA-III} Algorithm Based on Deep Q-Networks for Cloud Storage Optimization of Blockchain}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {34}, number = {5}, pages = {1406--1419}, year = {2023}, url = {https://doi.org/10.1109/TPDS.2023.3243634}, doi = {10.1109/TPDS.2023.3243634}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/ZhouRXF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/WangRZF23, author = {Quan Wang and Yanli Ren and Xinpeng Zhang and Guorui Feng}, editor = {Abdulmotaleb El{-}Saddik and Tao Mei and Rita Cucchiara and Marco Bertini and Diana Patricia Tobon Vallejo and Pradeep K. Atrey and M. Shamim Hossain}, title = {Interactive Image Style Transfer Guided by Graffiti}, booktitle = {Proceedings of the 31st {ACM} International Conference on Multimedia, {MM} 2023, Ottawa, ON, Canada, 29 October 2023- 3 November 2023}, pages = {6685--6694}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3581783.3612203}, doi = {10.1145/3581783.3612203}, timestamp = {Wed, 15 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mm/WangRZF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/RenLF022, author = {Yanli Ren and Yerong Li and Guorui Feng and Xinpeng Zhang}, title = {Privacy-Enhanced and Verification-Traceable Aggregation for Federated Learning}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {24}, pages = {24933--24948}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2022.3194930}, doi = {10.1109/JIOT.2022.3194930}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/RenLF022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/RenZGF21, author = {Yanli Ren and Xinpeng Zhang and Dawu Gu and Guorui Feng}, title = {Efficient outsourced extraction of histogram features over encrypted images in cloud}, journal = {Sci. China Inf. Sci.}, volume = {64}, number = {3}, year = {2021}, url = {https://doi.org/10.1007/s11432-018-9901-0}, doi = {10.1007/S11432-018-9901-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/RenZGF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RenXFZ21, author = {Yanli Ren and Xiao Xu and Guorui Feng and Xinpeng Zhang}, title = {Non-Interactive and secure outsourcing of PCA-Based face recognition}, journal = {Comput. Secur.}, volume = {110}, pages = {102416}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102416}, doi = {10.1016/J.COSE.2021.102416}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RenXFZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeemm/WangFR021, author = {Zichi Wang and Guorui Feng and Yanli Ren and Xinpeng Zhang}, title = {Multichannel Steganography in Digital Images for Multiple Receivers}, journal = {{IEEE} Multim.}, volume = {28}, number = {1}, pages = {65--73}, year = {2021}, url = {https://doi.org/10.1109/MMUL.2020.3045173}, doi = {10.1109/MMUL.2020.3045173}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeemm/WangFR021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RenLSYZ21, author = {Yanli Ren and Xiangyu Li and Shifeng Sun and Xingliang Yuan and Xinpeng Zhang}, title = {Privacy-preserving batch verification signature scheme based on blockchain for Vehicular Ad-Hoc Networks}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102698}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102698}, doi = {10.1016/J.JISA.2020.102698}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/RenLSYZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mms/PanRZ21, author = {Zhaoguang Pan and Yanli Ren and Xinpeng Zhang}, title = {Low-complexity fake face detection based on forensic similarity}, journal = {Multim. Syst.}, volume = {27}, number = {3}, pages = {353--361}, year = {2021}, url = {https://doi.org/10.1007/s00530-021-00756-y}, doi = {10.1007/S00530-021-00756-Y}, timestamp = {Fri, 22 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mms/PanRZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/RenCH21, author = {Yanli Ren and Xianji Cai and Mingqi Hu}, title = {Privacy-Preserving Redactable Blockchain for Internet of Things}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {4485311:1--4485311:12}, year = {2021}, url = {https://doi.org/10.1155/2021/4485311}, doi = {10.1155/2021/4485311}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/RenCH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YuRFZ21, author = {Lingzan Yu and Yanli Ren and Guorui Feng and Xinpeng Zhang}, title = {Efficient Noninteractive Outsourcing of Large-Scale {QR} and {LU} Factorizations}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {6184920:1--6184920:14}, year = {2021}, url = {https://doi.org/10.1155/2021/6184920}, doi = {10.1155/2021/6184920}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YuRFZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spl/LiFRZ21, author = {Qiangjie Li and Guorui Feng and Yanli Ren and Xinpeng Zhang}, title = {Embedding Probability Guided Network for Image Steganalysis}, journal = {{IEEE} Signal Process. Lett.}, volume = {28}, pages = {1095--1099}, year = {2021}, url = {https://doi.org/10.1109/LSP.2021.3083546}, doi = {10.1109/LSP.2021.3083546}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spl/LiFRZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/RenDQZF21, author = {Yanli Ren and Min Dong and Zhenxing Qian and Xinpeng Zhang and Guorui Feng}, title = {Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {9}, number = {1}, pages = {145--154}, year = {2021}, url = {https://doi.org/10.1109/TCC.2018.2851245}, doi = {10.1109/TCC.2018.2851245}, timestamp = {Thu, 30 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/RenDQZF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-01523, author = {Yalan Qin and Guorui Feng and Hanzhou Wu and Yanli Ren and Xinpeng Zhang}, title = {Orientation Convolutional Networks for Image Recognition}, journal = {CoRR}, volume = {abs/2102.01523}, year = {2021}, url = {https://arxiv.org/abs/2102.01523}, eprinttype = {arXiv}, eprint = {2102.01523}, timestamp = {Thu, 18 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-01523.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/CaiRZ20, author = {Xianji Cai and Yanli Ren and Xinpeng Zhang}, title = {Privacy-Protected Deletable Blockchain}, journal = {{IEEE} Access}, volume = {8}, pages = {6060--6070}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2019.2962816}, doi = {10.1109/ACCESS.2019.2962816}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/CaiRZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cogcom/HaoFRZ20, author = {Kangli Hao and Guorui Feng and Yanli Ren and Xinpeng Zhang}, title = {Iris Segmentation Using Feature Channel Optimization for Noisy Environments}, journal = {Cogn. Comput.}, volume = {12}, number = {6}, pages = {1205--1216}, year = {2020}, url = {https://doi.org/10.1007/s12559-020-09759-9}, doi = {10.1007/S12559-020-09759-9}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cogcom/HaoFRZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/XuFRZ20, author = {Mengtian Xu and Guorui Feng and Yanli Ren and Xinpeng Zhang}, title = {On Cloud Storage Optimization of Blockchain With a Clustering-Based Genetic Algorithm}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {9}, pages = {8547--8558}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2020.2993030}, doi = {10.1109/JIOT.2020.2993030}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/XuFRZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/JinFRZ20, author = {Zhiyang Jin and Guorui Feng and Yanli Ren and Xinpeng Zhang}, title = {Feature extraction optimization of {JPEG} steganalysis based on residual images}, journal = {Signal Process.}, volume = {170}, pages = {107455}, year = {2020}, url = {https://doi.org/10.1016/j.sigpro.2020.107455}, doi = {10.1016/J.SIGPRO.2020.107455}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigpro/JinFRZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/RenZFQL20, author = {Yanli Ren and Xinpeng Zhang and Guorui Feng and Zhenxing Qian and Fengyong Li}, title = {How to Extract Image Features Based on Co-Occurrence Matrix Securely and Efficiently in Cloud Computing}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {8}, number = {1}, pages = {207--219}, year = {2020}, url = {https://doi.org/10.1109/TCC.2017.2737980}, doi = {10.1109/TCC.2017.2737980}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcc/RenZFQL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/FengZRQL20, author = {Guorui Feng and Xinpeng Zhang and Yanli Ren and Zhenxing Qian and Sheng Li}, title = {Diversity-Based Cascade Filters for {JPEG} Steganalysis}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {30}, number = {2}, pages = {376--386}, year = {2020}, url = {https://doi.org/10.1109/TCSVT.2019.2891778}, doi = {10.1109/TCSVT.2019.2891778}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcsv/FengZRQL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiZQFR20, author = {Sheng Li and Xinpeng Zhang and Zhenxing Qian and Guorui Feng and Yanli Ren}, title = {Key Based Artificial Fingerprint Generation for Privacy Protection}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {4}, pages = {828--840}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2812192}, doi = {10.1109/TDSC.2018.2812192}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LiZQFR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SunFR19, author = {Yan Sun and Guorui Feng and Yanli Ren}, title = {{JPEG} Steganalysis Based on Multi-Projection Ensemble Discriminant Clustering}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {102-D}, number = {1}, pages = {198--201}, year = {2019}, url = {https://doi.org/10.1587/transinf.2018EDL8073}, doi = {10.1587/TRANSINF.2018EDL8073}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/SunFR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/GaoFRL19, author = {Chunhui Gao and Guorui Feng and Yanli Ren and Lizhuang Liu}, title = {Iris Segmentation Based on Improved U-Net Network Model}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {102-A}, number = {8}, pages = {982--985}, year = {2019}, url = {https://doi.org/10.1587/transfun.E102.A.982}, doi = {10.1587/TRANSFUN.E102.A.982}, timestamp = {Mon, 18 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/GaoFRL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/YangLR19, author = {Jiaxiang Yang and Yanping Li and Yanli Ren}, title = {Novel and Secure Outsourcing Algorithms for Multiple Bilinear Pairings with Single Untrusted Server}, journal = {Int. J. Netw. Secur.}, volume = {21}, number = {5}, pages = {872--880}, year = {2019}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v21-n5/ijns-2019-v21-n5-p872-880.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/YangLR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/DongR18, author = {Min Dong and Yanli Ren}, title = {Efficient and secure outsourcing of bilinear pairings with single server}, journal = {Sci. China Inf. Sci.}, volume = {61}, number = {3}, pages = {039104:1--039104:3}, year = {2018}, url = {https://doi.org/10.1007/s11432-017-9161-2}, doi = {10.1007/S11432-017-9161-2}, timestamp = {Thu, 30 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/DongR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/DongRF18, author = {Min Dong and Yanli Ren and Guorui Feng}, title = {Fully Verifiable Algorithm for Outsourcing Multiple Modular Exponentiations with Single Cloud Server}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {101-A}, number = {3}, pages = {608--611}, year = {2018}, url = {https://doi.org/10.1587/transfun.E101.A.608}, doi = {10.1587/TRANSFUN.E101.A.608}, timestamp = {Thu, 30 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/DongRF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NiuKRD18, author = {Zhihua Niu and Deyu Kong and Yanli Ren and Xiaoni Du}, title = {Analysis of the \emph{k}-Error Linear Complexity and Error Sequence for 2\emph{p\({}^{\mbox{n}}\)}-Periodic Binary Sequence}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {101-A}, number = {8}, pages = {1197--1203}, year = {2018}, url = {https://doi.org/10.1587/transfun.E101.A.1197}, doi = {10.1587/TRANSFUN.E101.A.1197}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/NiuKRD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LiWLWR18, author = {Fengyong Li and Kui Wu and Jingsheng Lei and Mi Wen and Yanli Ren}, title = {Unsupervised steganalysis over social networks based on multi-reference sub-image sets}, journal = {Multim. Tools Appl.}, volume = {77}, number = {14}, pages = {17953--17971}, year = {2018}, url = {https://doi.org/10.1007/s11042-017-4759-x}, doi = {10.1007/S11042-017-4759-X}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/LiWLWR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/RenJ18, author = {Yanli Ren and Tiejin Jiang}, title = {Verifiable outsourced attribute-based signature scheme}, journal = {Multim. Tools Appl.}, volume = {77}, number = {14}, pages = {18105--18115}, year = {2018}, url = {https://doi.org/10.1007/s11042-017-4539-7}, doi = {10.1007/S11042-017-4539-7}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/RenJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/LiWLR18, author = {Fengyong Li and Mi Wen and Jingsheng Lei and Yanli Ren}, title = {Efficient steganographer detection over social networks with sampling reconstruction}, journal = {Peer-to-Peer Netw. Appl.}, volume = {11}, number = {5}, pages = {924--939}, year = {2018}, url = {https://doi.org/10.1007/s12083-017-0603-3}, doi = {10.1007/S12083-017-0603-3}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/LiWLR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/FuFR17, author = {Jia Fu and Guorui Feng and Yanli Ren}, title = {{JPEG} Image Steganalysis from Imbalanced Data}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {100-A}, number = {11}, pages = {2518--2521}, year = {2017}, url = {https://doi.org/10.1587/transfun.E100.A.2518}, doi = {10.1587/TRANSFUN.E100.A.2518}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/FuFR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmic/HuZRT17, author = {Chaofang Hu and Xianpeng Zhou and Yanli Ren and Ye Tao}, title = {Output feedback polytopic {LPV} Tube-RMPC control for air-breathing hypersonic vehicles}, journal = {Int. J. Model. Identif. Control.}, volume = {28}, number = {4}, pages = {336--348}, year = {2017}, url = {https://doi.org/10.1504/IJMIC.2017.10007328}, doi = {10.1504/IJMIC.2017.10007328}, timestamp = {Thu, 17 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmic/HuZRT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/CaiRJ17, author = {Jianxing Cai and Yanli Ren and Tiejin Jiang}, title = {Verifiable Outsourcing Computation of Modular Exponentiations with Single Server}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {3}, pages = {449--457}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n3/ijns-2017-v19-n3-p449-457.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/CaiRJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/DongRZ17, author = {Min Dong and Yanli Ren and Xinpeng Zhang}, title = {Fully Verifiable Algorithm for Secure Outsourcing of Bilinear Pairing in Cloud Computing}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {11}, number = {7}, pages = {3648--3663}, year = {2017}, url = {https://doi.org/10.3837/tiis.2017.07.019}, doi = {10.3837/TIIS.2017.07.019}, timestamp = {Thu, 30 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/DongRZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/RenDND17, author = {Yanli Ren and Min Dong and Zhihua Niu and Xiaoni Du}, title = {Noninteractive Verifiable Outsourcing Algorithm for Bilinear Pairing with Improved Checkability}, journal = {Secur. Commun. Networks}, volume = {2017}, pages = {4892814:1--4892814:9}, year = {2017}, url = {https://doi.org/10.1155/2017/4892814}, doi = {10.1155/2017/4892814}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/RenDND17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/alt/DingRG17, author = {Ning Ding and Yanli Ren and Dawu Gu}, editor = {Steve Hanneke and Lev Reyzin}, title = {{PAC} Learning Depth-3 {\textdollar}{\textbackslash}textrm\{AC\}{\^{}}0{\textdollar} Circuits of Bounded Top Fanin}, booktitle = {International Conference on Algorithmic Learning Theory, {ALT} 2017, 15-17 October 2017, Kyoto University, Kyoto, Japan}, series = {Proceedings of Machine Learning Research}, volume = {76}, pages = {667--680}, publisher = {{PMLR}}, year = {2017}, url = {http://proceedings.mlr.press/v76/ding17a.html}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/alt/DingRG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tamc/DingRG17, author = {Ning Ding and Yanli Ren and Dawu Gu}, editor = {T. V. Gopal and Gerhard J{\"{a}}ger and Silvia Steila}, title = {Learning AC\({}^{\mbox{0}}\) Under k-Dependent Distributions}, booktitle = {Theory and Applications of Models of Computation - 14th Annual Conference, {TAMC} 2017, Bern, Switzerland, April 20-22, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10185}, pages = {187--200}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-55911-7\_14}, doi = {10.1007/978-3-319-55911-7\_14}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tamc/DingRG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/RenDWLG16, author = {Yanli Ren and Ning Ding and Tian{-}Yin Wang and Haining Lu and Dawu Gu}, title = {New algorithms for verifiable outsourcing of bilinear pairings}, journal = {Sci. China Inf. Sci.}, volume = {59}, number = {9}, pages = {99103}, year = {2016}, url = {https://doi.org/10.1007/s11432-016-5550-8}, doi = {10.1007/S11432-016-5550-8}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/RenDWLG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/RenDZLG16, author = {Yanli Ren and Ning Ding and Xinpeng Zhang and Haining Lu and Dawu Gu}, title = {Identity-Based Encryption with Verifiable Outsourced Revocation}, journal = {Comput. J.}, volume = {59}, number = {11}, pages = {1659--1668}, year = {2016}, url = {https://doi.org/10.1093/comjnl/bxw029}, doi = {10.1093/COMJNL/BXW029}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/RenDZLG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/WuFZR16, author = {Anxin Wu and Guorui Feng and Xinpeng Zhang and Yanli Ren}, title = {Unbalanced {JPEG} image steganalysis via multiview data match}, journal = {J. Vis. Commun. Image Represent.}, volume = {34}, pages = {103--107}, year = {2016}, url = {https://doi.org/10.1016/j.jvcir.2015.10.013}, doi = {10.1016/J.JVCIR.2015.10.013}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jvcir/WuFZR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/QianZRF16, author = {Zhenxing Qian and Xinpeng Zhang and Yanli Ren and Guorui Feng}, title = {Block cipher based separable reversible data hiding in encrypted images}, journal = {Multim. Tools Appl.}, volume = {75}, number = {21}, pages = {13749--13763}, year = {2016}, url = {https://doi.org/10.1007/s11042-015-2760-9}, doi = {10.1007/S11042-015-2760-9}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/QianZRF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RenDZLG16, author = {Yanli Ren and Ning Ding and Xinpeng Zhang and Haining Lu and Dawu Gu}, editor = {Xiaofeng Chen and XiaoFeng Wang and Xinyi Huang}, title = {Verifiable Outsourcing Algorithms for Modular Exponentiations with Improved Checkability}, booktitle = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016}, pages = {293--303}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2897845.2897881}, doi = {10.1145/2897845.2897881}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RenDZLG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cocoon/DingRG16, author = {Ning Ding and Yanli Ren and Dawu Gu}, editor = {Thang N. Dinh and My T. Thai}, title = {Four-Round Zero-Knowledge Arguments of Knowledge with Strict Polynomial-Time Simulation from Differing-Input Obfuscation for Circuits}, booktitle = {Computing and Combinatorics - 22nd International Conference, {COCOON} 2016, Ho Chi Minh City, Vietnam, August 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9797}, pages = {281--292}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-42634-1\_23}, doi = {10.1007/978-3-319-42634-1\_23}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cocoon/DingRG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/SunLGZR15, author = {Shifeng Sun and Chen Lyu and Dawu Gu and Yuanyuan Zhang and Yanli Ren}, title = {Towards Efficient, Secure, and Fine-Grained Access Control System in MSNs with Flexible Revocations}, journal = {Int. J. Distributed Sens. Networks}, volume = {11}, pages = {857405:1--857405:15}, year = {2015}, url = {https://doi.org/10.1155/2015/857405}, doi = {10.1155/2015/857405}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdsn/SunLGZR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/RenWZH15, author = {Yanli Ren and Shuozhong Wang and Xinpeng Zhang and Min{-}Shiang Hwang}, title = {An Efficient Batch Verifying Scheme for Detecting Illegal Signatures}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {4}, pages = {463--470}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n4/ijns-2015-v17-n4-p463-470.pdf}, timestamp = {Mon, 15 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/RenWZH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/QianZR15, author = {Zhenxing Qian and Xinpeng Zhang and Yanli Ren}, title = {{JPEG} encryption for image rescaling in the encrypted domain}, journal = {J. Vis. Commun. Image Represent.}, volume = {26}, pages = {9--13}, year = {2015}, url = {https://doi.org/10.1016/j.jvcir.2014.10.008}, doi = {10.1016/J.JVCIR.2014.10.008}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jvcir/QianZR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/XieR14, author = {Li Xie and Yanli Ren}, title = {Efficient Anonymous Identity-Based Broadcast Encryption without Random Oracles}, journal = {Int. J. Digit. Crime Forensics}, volume = {6}, number = {2}, pages = {40--51}, year = {2014}, url = {https://doi.org/10.4018/ijdcf.2014040103}, doi = {10.4018/IJDCF.2014040103}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/XieR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/RenNZ14, author = {Yanli Ren and Zhihua Niu and Xinpeng Zhang}, title = {Fully Anonymous Identity-based Broadcast Encryption without Random Oracles}, journal = {Int. J. Netw. Secur.}, volume = {16}, number = {4}, pages = {256--264}, year = {2014}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v16-n4/ijns-2014-v16-n4-p256-264.pdf}, timestamp = {Mon, 15 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/RenNZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/ZhangQFR14, author = {Xinpeng Zhang and Zhenxing Qian and Guorui Feng and Yanli Ren}, title = {Efficient reversible data hiding in encrypted images}, journal = {J. Vis. Commun. Image Represent.}, volume = {25}, number = {2}, pages = {322--328}, year = {2014}, url = {https://doi.org/10.1016/j.jvcir.2013.11.001}, doi = {10.1016/J.JVCIR.2013.11.001}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jvcir/ZhangQFR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/ZhangRSQF14, author = {Xinpeng Zhang and Yanli Ren and Liquan Shen and Zhenxing Qian and Guorui Feng}, title = {Compressing Encrypted Images With Auxiliary Information}, journal = {{IEEE} Trans. Multim.}, volume = {16}, number = {5}, pages = {1327--1336}, year = {2014}, url = {https://doi.org/10.1109/TMM.2014.2315974}, doi = {10.1109/TMM.2014.2315974}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmm/ZhangRSQF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cma/RenWZ13, author = {Yanli Ren and Shuozhong Wang and Xinpeng Zhang}, title = {Practical parallel key-insulated encryption with multiple helper keys}, journal = {Comput. Math. Appl.}, volume = {65}, number = {9}, pages = {1403--1412}, year = {2013}, url = {https://doi.org/10.1016/j.camwa.2012.01.032}, doi = {10.1016/J.CAMWA.2012.01.032}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cma/RenWZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tip/ZhangFRQ12, author = {Xinpeng Zhang and Guorui Feng and Yanli Ren and Zhenxing Qian}, title = {Scalable Coding of Encrypted Images}, journal = {{IEEE} Trans. Image Process.}, volume = {21}, number = {6}, pages = {3108--3114}, year = {2012}, url = {https://doi.org/10.1109/TIP.2012.2187671}, doi = {10.1109/TIP.2012.2187671}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tip/ZhangFRQ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdke/RenWZ12, author = {Yanli Ren and Shuozhong Wang and Xinpeng Zhang}, editor = {Yang Xiang and Mukaddim Pathan and Xiaohui Tao and Hua Wang}, title = {Anonymous Hierarchical Identity-Based Encryption in Prime Order Groups}, booktitle = {Data and Knowledge Engineering - Third International Conference, {ICDKE} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7696}, pages = {230--242}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34679-8\_21}, doi = {10.1007/978-3-642-34679-8\_21}, timestamp = {Thu, 09 Mar 2023 09:06:09 +0100}, biburl = {https://dblp.org/rec/conf/icdke/RenWZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/RenWZ12, author = {Yanli Ren and Shuozhong Wang and Xinpeng Zhang}, editor = {Tat Wing Chim and Tsz Hon Yuen}, title = {Non-interactive Dynamic Identity-Based Broadcast Encryption without Random Oracles}, booktitle = {Information and Communications Security - 14th International Conference, {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7618}, pages = {479--487}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34129-8\_47}, doi = {10.1007/978-3-642-34129-8\_47}, timestamp = {Mon, 15 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/RenWZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idcs/LiGRDY12, author = {Xiaohui Li and Dawu Gu and Yanli Ren and Ning Ding and Kan Yuan}, editor = {Yang Xiang and Mukaddim Pathan and Xiaohui Tao and Hua Wang}, title = {Efficient Ciphertext-Policy Attribute Based Encryption with Hidden Policy}, booktitle = {Internet and Distributed Computing Systems - 5th International Conference, {IDCS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7646}, pages = {146--159}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34883-9\_12}, doi = {10.1007/978-3-642-34883-9\_12}, timestamp = {Thu, 09 Mar 2023 09:06:05 +0100}, biburl = {https://dblp.org/rec/conf/idcs/LiGRDY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangQRF11, author = {Xinpeng Zhang and Zhenxing Qian and Yanli Ren and Guorui Feng}, title = {Watermarking With Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {6}, number = {4}, pages = {1223--1232}, year = {2011}, url = {https://doi.org/10.1109/TIFS.2011.2159208}, doi = {10.1109/TIFS.2011.2159208}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhangQRF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/ZhangRFQ11, author = {Xinpeng Zhang and Yanli Ren and Guorui Feng and Zhenxing Qian}, editor = {Xiamu Niu and Mingchu Li and Y{\^{o}}iti Suzuki and Jeng{-}Shyang Pan and Lakhmi C. Jain}, title = {Compressing Encrypted Image Using Compressive Sensing}, booktitle = {Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, {IIH-MSP} 2011, Dalian, China, October 14-16, 2011}, pages = {222--225}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IIHMSP.2011.12}, doi = {10.1109/IIHMSP.2011.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/ZhangRFQ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijfcs/RenGWZ10, author = {Yanli Ren and Dawu Gu and Shuozhong Wang and Xinpeng Zhang}, title = {Hierarchical Identity-Based Proxy Re-Encryption without Random Oracles}, journal = {Int. J. Found. Comput. Sci.}, volume = {21}, number = {6}, pages = {1049--1063}, year = {2010}, url = {https://doi.org/10.1142/S0129054110007726}, doi = {10.1142/S0129054110007726}, timestamp = {Mon, 15 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijfcs/RenGWZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmis/QianZFR10, author = {Zhenxing Qian and Xinpeng Zhang and Guorui Feng and Yanli Ren}, title = {Colour filter array interpolation based self recovery with anti-cropping capability}, journal = {Int. J. Multim. Intell. Secur.}, volume = {1}, number = {2}, pages = {191--203}, year = {2010}, url = {https://doi.org/10.1504/IJMIS.2010.036075}, doi = {10.1504/IJMIS.2010.036075}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmis/QianZFR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/informaticaLT/RenGWZ10, author = {Yanli Ren and Dawu Gu and Shuozhong Wang and Xinpeng Zhang}, title = {New Fuzzy Identity-Based Encryption in the Standard Model}, journal = {Informatica}, volume = {21}, number = {3}, pages = {393--407}, year = {2010}, url = {http://content.iospress.com/articles/informatica/info21-3-07}, timestamp = {Mon, 15 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/informaticaLT/RenGWZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/RenG10, author = {Yanli Ren and Dawu Gu}, title = {{CCA2} secure (hierarchical) identity-based parallel key-insulated encryption without random oracles}, journal = {J. Syst. Softw.}, volume = {83}, number = {1}, pages = {153--162}, year = {2010}, url = {https://doi.org/10.1016/j.jss.2009.07.046}, doi = {10.1016/J.JSS.2009.07.046}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/RenG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/waim/QianFR10, author = {Zhenxing Qian and Guorui Feng and Yanli Ren}, editor = {Lei Chen and Changjie Tang and Jun Yang and Yunjun Gao}, title = {Fragile Watermarking for Color Image Recovery Based on Color Filter Array Interpolation}, booktitle = {Web-Age Information Management, 11th International Conference, {WAIM} 2010, Jiuzhaigou, China, July 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6184}, pages = {537--543}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14246-8\_52}, doi = {10.1007/978-3-642-14246-8\_52}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/waim/QianFR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/RenG09, author = {Yanli Ren and Dawu Gu}, title = {Fully {CCA2} secure identity based broadcast encryption without random oracles}, journal = {Inf. Process. Lett.}, volume = {109}, number = {11}, pages = {527--533}, year = {2009}, url = {https://doi.org/10.1016/j.ipl.2009.01.017}, doi = {10.1016/J.IPL.2009.01.017}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/RenG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/informaticaSI/RenG08, author = {Yanli Ren and Dawu Gu}, title = {Efficient Hierarchical Identity Based Encryption Scheme in the Standard Model}, journal = {Informatica (Slovenia)}, volume = {32}, number = {2}, pages = {207--211}, year = {2008}, url = {http://www.informatica.si/index.php/informatica/article/view/192}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/informaticaSI/RenG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/RenG08, author = {Yanli Ren and Dawu Gu}, editor = {Dipanwita Roy Chowdhury and Vincent Rijmen and Abhijit Das}, title = {Secure Hierarchical Identity Based Encryption Scheme in the Standard Model}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5365}, pages = {104--115}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89754-5\_9}, doi = {10.1007/978-3-540-89754-5\_9}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/RenG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.