BibTeX records: Yanli Ren

download as .bib file

@article{DBLP:journals/iotj/BianHFZR24,
  author       = {Mingyun Bian and
                  Guanghui He and
                  Guorui Feng and
                  Xinpeng Zhang and
                  Yanli Ren},
  title        = {Verifiable Privacy-Preserving Heart Rate Estimation Based on {LSTM}},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {1},
  pages        = {1719--1731},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3290651},
  doi          = {10.1109/JIOT.2023.3290651},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/BianHFZR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/RenCHFZ24,
  author       = {Yanli Ren and
                  Cien Chen and
                  Mingqi Hu and
                  Guorui Feng and
                  Xinpeng Zhang},
  title        = {{BFDAC:} {A} Blockchain-Based and Fog-Computing-Assisted Data Access
                  Control Scheme in Vehicular Social Networks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {2},
  pages        = {3510--3523},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3296906},
  doi          = {10.1109/JIOT.2023.3296906},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/RenCHFZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pr/WangLRZF24,
  author       = {Yue Wang and
                  Minjie Liu and
                  Yanli Ren and
                  Xinpeng Zhang and
                  Guorui Feng},
  title        = {Traffic sign attack via pinpoint region probability estimation network},
  journal      = {Pattern Recognit.},
  volume       = {146},
  pages        = {110035},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.patcog.2023.110035},
  doi          = {10.1016/J.PATCOG.2023.110035},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pr/WangLRZF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/HeRBF023,
  author       = {Gang He and
                  Yanli Ren and
                  Mingyun Bian and
                  Guorui Feng and
                  Xinpeng Zhang},
  title        = {Privacy-enhanced and non-interactive linear regression with dropout-resilience},
  journal      = {Inf. Sci.},
  volume       = {632},
  pages        = {69--86},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ins.2023.02.080},
  doi          = {10.1016/J.INS.2023.02.080},
  timestamp    = {Sun, 16 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/HeRBF023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/lgrs/WuQRF23,
  author       = {Jiayi Wu and
                  Chuan Qin and
                  Yanli Ren and
                  Guorui Feng},
  title        = {EPFNet: Edge-Prototype Fusion Network Toward Few-Shot Semantic Segmentation
                  for Aerial Remote-Sensing Images},
  journal      = {{IEEE} Geosci. Remote. Sens. Lett.},
  volume       = {20},
  pages        = {1--5},
  year         = {2023},
  url          = {https://doi.org/10.1109/LGRS.2023.3292832},
  doi          = {10.1109/LGRS.2023.3292832},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/lgrs/WuQRF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/HuRC23,
  author       = {Mingqi Hu and
                  Yanli Ren and
                  Cien Chen},
  title        = {Privacy-Preserving Medical Data-Sharing System with Symmetric Encryption
                  Based on Blockchain},
  journal      = {Symmetry},
  volume       = {15},
  number       = {5},
  pages        = {1010},
  year         = {2023},
  url          = {https://doi.org/10.3390/sym15051010},
  doi          = {10.3390/SYM15051010},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/symmetry/HuRC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcyb/QinFRZ23,
  author       = {Yalan Qin and
                  Guorui Feng and
                  Yanli Ren and
                  Xinpeng Zhang},
  title        = {Consistency-Induced Multiview Subspace Clustering},
  journal      = {{IEEE} Trans. Cybern.},
  volume       = {53},
  number       = {2},
  pages        = {832--844},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCYB.2022.3165550},
  doi          = {10.1109/TCYB.2022.3165550},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcyb/QinFRZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RenSSLF23,
  author       = {Yanli Ren and
                  Zhuhuan Song and
                  Shifeng Sun and
                  Joseph K. Liu and
                  Guorui Feng},
  title        = {Outsourcing LDA-Based Face Recognition to an Untrusted Cloud},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {3},
  pages        = {2058--2070},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3172143},
  doi          = {10.1109/TDSC.2022.3172143},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/RenSSLF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/BianLSZR23,
  author       = {Mingyun Bian and
                  Joseph K. Liu and
                  Shifeng Sun and
                  Xinpeng Zhang and
                  Yanli Ren},
  title        = {Verifiable Privacy-Enhanced Rotation Invariant {LBP} Feature Extraction
                  in Fog Computing},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {19},
  number       = {12},
  pages        = {11518--11530},
  year         = {2023},
  url          = {https://doi.org/10.1109/TII.2023.3246992},
  doi          = {10.1109/TII.2023.3246992},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/BianLSZR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/QinFRZ23,
  author       = {Yalan Qin and
                  Guorui Feng and
                  Yanli Ren and
                  Xinpeng Zhang},
  title        = {Block-Diagonal Guided Symmetric Nonnegative Matrix Factorization},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {35},
  number       = {3},
  pages        = {2313--2325},
  year         = {2023},
  url          = {https://doi.org/10.1109/TKDE.2021.3113943},
  doi          = {10.1109/TKDE.2021.3113943},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tkde/QinFRZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/ZhouRXF23,
  author       = {Yu Zhou and
                  Yanli Ren and
                  Mengtian Xu and
                  Guorui Feng},
  title        = {An Improved {NSGA-III} Algorithm Based on Deep Q-Networks for Cloud
                  Storage Optimization of Blockchain},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {34},
  number       = {5},
  pages        = {1406--1419},
  year         = {2023},
  url          = {https://doi.org/10.1109/TPDS.2023.3243634},
  doi          = {10.1109/TPDS.2023.3243634},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/ZhouRXF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mm/WangRZF23,
  author       = {Quan Wang and
                  Yanli Ren and
                  Xinpeng Zhang and
                  Guorui Feng},
  editor       = {Abdulmotaleb El{-}Saddik and
                  Tao Mei and
                  Rita Cucchiara and
                  Marco Bertini and
                  Diana Patricia Tobon Vallejo and
                  Pradeep K. Atrey and
                  M. Shamim Hossain},
  title        = {Interactive Image Style Transfer Guided by Graffiti},
  booktitle    = {Proceedings of the 31st {ACM} International Conference on Multimedia,
                  {MM} 2023, Ottawa, ON, Canada, 29 October 2023- 3 November 2023},
  pages        = {6685--6694},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3581783.3612203},
  doi          = {10.1145/3581783.3612203},
  timestamp    = {Wed, 15 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mm/WangRZF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/RenLF022,
  author       = {Yanli Ren and
                  Yerong Li and
                  Guorui Feng and
                  Xinpeng Zhang},
  title        = {Privacy-Enhanced and Verification-Traceable Aggregation for Federated
                  Learning},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {24},
  pages        = {24933--24948},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2022.3194930},
  doi          = {10.1109/JIOT.2022.3194930},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/RenLF022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/RenZGF21,
  author       = {Yanli Ren and
                  Xinpeng Zhang and
                  Dawu Gu and
                  Guorui Feng},
  title        = {Efficient outsourced extraction of histogram features over encrypted
                  images in cloud},
  journal      = {Sci. China Inf. Sci.},
  volume       = {64},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11432-018-9901-0},
  doi          = {10.1007/S11432-018-9901-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/RenZGF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RenXFZ21,
  author       = {Yanli Ren and
                  Xiao Xu and
                  Guorui Feng and
                  Xinpeng Zhang},
  title        = {Non-Interactive and secure outsourcing of PCA-Based face recognition},
  journal      = {Comput. Secur.},
  volume       = {110},
  pages        = {102416},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102416},
  doi          = {10.1016/J.COSE.2021.102416},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RenXFZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeemm/WangFR021,
  author       = {Zichi Wang and
                  Guorui Feng and
                  Yanli Ren and
                  Xinpeng Zhang},
  title        = {Multichannel Steganography in Digital Images for Multiple Receivers},
  journal      = {{IEEE} Multim.},
  volume       = {28},
  number       = {1},
  pages        = {65--73},
  year         = {2021},
  url          = {https://doi.org/10.1109/MMUL.2020.3045173},
  doi          = {10.1109/MMUL.2020.3045173},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeemm/WangFR021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RenLSYZ21,
  author       = {Yanli Ren and
                  Xiangyu Li and
                  Shifeng Sun and
                  Xingliang Yuan and
                  Xinpeng Zhang},
  title        = {Privacy-preserving batch verification signature scheme based on blockchain
                  for Vehicular Ad-Hoc Networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102698},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102698},
  doi          = {10.1016/J.JISA.2020.102698},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/RenLSYZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mms/PanRZ21,
  author       = {Zhaoguang Pan and
                  Yanli Ren and
                  Xinpeng Zhang},
  title        = {Low-complexity fake face detection based on forensic similarity},
  journal      = {Multim. Syst.},
  volume       = {27},
  number       = {3},
  pages        = {353--361},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00530-021-00756-y},
  doi          = {10.1007/S00530-021-00756-Y},
  timestamp    = {Fri, 22 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mms/PanRZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/RenCH21,
  author       = {Yanli Ren and
                  Xianji Cai and
                  Mingqi Hu},
  title        = {Privacy-Preserving Redactable Blockchain for Internet of Things},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {4485311:1--4485311:12},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/4485311},
  doi          = {10.1155/2021/4485311},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/RenCH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YuRFZ21,
  author       = {Lingzan Yu and
                  Yanli Ren and
                  Guorui Feng and
                  Xinpeng Zhang},
  title        = {Efficient Noninteractive Outsourcing of Large-Scale {QR} and {LU}
                  Factorizations},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {6184920:1--6184920:14},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/6184920},
  doi          = {10.1155/2021/6184920},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YuRFZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spl/LiFRZ21,
  author       = {Qiangjie Li and
                  Guorui Feng and
                  Yanli Ren and
                  Xinpeng Zhang},
  title        = {Embedding Probability Guided Network for Image Steganalysis},
  journal      = {{IEEE} Signal Process. Lett.},
  volume       = {28},
  pages        = {1095--1099},
  year         = {2021},
  url          = {https://doi.org/10.1109/LSP.2021.3083546},
  doi          = {10.1109/LSP.2021.3083546},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spl/LiFRZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/RenDQZF21,
  author       = {Yanli Ren and
                  Min Dong and
                  Zhenxing Qian and
                  Xinpeng Zhang and
                  Guorui Feng},
  title        = {Efficient Algorithm for Secure Outsourcing of Modular Exponentiation
                  with Single Server},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {9},
  number       = {1},
  pages        = {145--154},
  year         = {2021},
  url          = {https://doi.org/10.1109/TCC.2018.2851245},
  doi          = {10.1109/TCC.2018.2851245},
  timestamp    = {Thu, 30 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/RenDQZF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-01523,
  author       = {Yalan Qin and
                  Guorui Feng and
                  Hanzhou Wu and
                  Yanli Ren and
                  Xinpeng Zhang},
  title        = {Orientation Convolutional Networks for Image Recognition},
  journal      = {CoRR},
  volume       = {abs/2102.01523},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.01523},
  eprinttype    = {arXiv},
  eprint       = {2102.01523},
  timestamp    = {Thu, 18 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-01523.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/CaiRZ20,
  author       = {Xianji Cai and
                  Yanli Ren and
                  Xinpeng Zhang},
  title        = {Privacy-Protected Deletable Blockchain},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {6060--6070},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2019.2962816},
  doi          = {10.1109/ACCESS.2019.2962816},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/CaiRZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cogcom/HaoFRZ20,
  author       = {Kangli Hao and
                  Guorui Feng and
                  Yanli Ren and
                  Xinpeng Zhang},
  title        = {Iris Segmentation Using Feature Channel Optimization for Noisy Environments},
  journal      = {Cogn. Comput.},
  volume       = {12},
  number       = {6},
  pages        = {1205--1216},
  year         = {2020},
  url          = {https://doi.org/10.1007/s12559-020-09759-9},
  doi          = {10.1007/S12559-020-09759-9},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cogcom/HaoFRZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/XuFRZ20,
  author       = {Mengtian Xu and
                  Guorui Feng and
                  Yanli Ren and
                  Xinpeng Zhang},
  title        = {On Cloud Storage Optimization of Blockchain With a Clustering-Based
                  Genetic Algorithm},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {9},
  pages        = {8547--8558},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2020.2993030},
  doi          = {10.1109/JIOT.2020.2993030},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/XuFRZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/JinFRZ20,
  author       = {Zhiyang Jin and
                  Guorui Feng and
                  Yanli Ren and
                  Xinpeng Zhang},
  title        = {Feature extraction optimization of {JPEG} steganalysis based on residual
                  images},
  journal      = {Signal Process.},
  volume       = {170},
  pages        = {107455},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.sigpro.2020.107455},
  doi          = {10.1016/J.SIGPRO.2020.107455},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigpro/JinFRZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/RenZFQL20,
  author       = {Yanli Ren and
                  Xinpeng Zhang and
                  Guorui Feng and
                  Zhenxing Qian and
                  Fengyong Li},
  title        = {How to Extract Image Features Based on Co-Occurrence Matrix Securely
                  and Efficiently in Cloud Computing},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {8},
  number       = {1},
  pages        = {207--219},
  year         = {2020},
  url          = {https://doi.org/10.1109/TCC.2017.2737980},
  doi          = {10.1109/TCC.2017.2737980},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcc/RenZFQL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/FengZRQL20,
  author       = {Guorui Feng and
                  Xinpeng Zhang and
                  Yanli Ren and
                  Zhenxing Qian and
                  Sheng Li},
  title        = {Diversity-Based Cascade Filters for {JPEG} Steganalysis},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {30},
  number       = {2},
  pages        = {376--386},
  year         = {2020},
  url          = {https://doi.org/10.1109/TCSVT.2019.2891778},
  doi          = {10.1109/TCSVT.2019.2891778},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcsv/FengZRQL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiZQFR20,
  author       = {Sheng Li and
                  Xinpeng Zhang and
                  Zhenxing Qian and
                  Guorui Feng and
                  Yanli Ren},
  title        = {Key Based Artificial Fingerprint Generation for Privacy Protection},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {4},
  pages        = {828--840},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2812192},
  doi          = {10.1109/TDSC.2018.2812192},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiZQFR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SunFR19,
  author       = {Yan Sun and
                  Guorui Feng and
                  Yanli Ren},
  title        = {{JPEG} Steganalysis Based on Multi-Projection Ensemble Discriminant
                  Clustering},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {102-D},
  number       = {1},
  pages        = {198--201},
  year         = {2019},
  url          = {https://doi.org/10.1587/transinf.2018EDL8073},
  doi          = {10.1587/TRANSINF.2018EDL8073},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/SunFR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/GaoFRL19,
  author       = {Chunhui Gao and
                  Guorui Feng and
                  Yanli Ren and
                  Lizhuang Liu},
  title        = {Iris Segmentation Based on Improved U-Net Network Model},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {102-A},
  number       = {8},
  pages        = {982--985},
  year         = {2019},
  url          = {https://doi.org/10.1587/transfun.E102.A.982},
  doi          = {10.1587/TRANSFUN.E102.A.982},
  timestamp    = {Mon, 18 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/GaoFRL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/YangLR19,
  author       = {Jiaxiang Yang and
                  Yanping Li and
                  Yanli Ren},
  title        = {Novel and Secure Outsourcing Algorithms for Multiple Bilinear Pairings
                  with Single Untrusted Server},
  journal      = {Int. J. Netw. Secur.},
  volume       = {21},
  number       = {5},
  pages        = {872--880},
  year         = {2019},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v21-n5/ijns-2019-v21-n5-p872-880.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/YangLR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/DongR18,
  author       = {Min Dong and
                  Yanli Ren},
  title        = {Efficient and secure outsourcing of bilinear pairings with single
                  server},
  journal      = {Sci. China Inf. Sci.},
  volume       = {61},
  number       = {3},
  pages        = {039104:1--039104:3},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11432-017-9161-2},
  doi          = {10.1007/S11432-017-9161-2},
  timestamp    = {Thu, 30 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/DongR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/DongRF18,
  author       = {Min Dong and
                  Yanli Ren and
                  Guorui Feng},
  title        = {Fully Verifiable Algorithm for Outsourcing Multiple Modular Exponentiations
                  with Single Cloud Server},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {101-A},
  number       = {3},
  pages        = {608--611},
  year         = {2018},
  url          = {https://doi.org/10.1587/transfun.E101.A.608},
  doi          = {10.1587/TRANSFUN.E101.A.608},
  timestamp    = {Thu, 30 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/DongRF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NiuKRD18,
  author       = {Zhihua Niu and
                  Deyu Kong and
                  Yanli Ren and
                  Xiaoni Du},
  title        = {Analysis of the \emph{k}-Error Linear Complexity and Error Sequence
                  for 2\emph{p\({}^{\mbox{n}}\)}-Periodic Binary Sequence},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {101-A},
  number       = {8},
  pages        = {1197--1203},
  year         = {2018},
  url          = {https://doi.org/10.1587/transfun.E101.A.1197},
  doi          = {10.1587/TRANSFUN.E101.A.1197},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/NiuKRD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LiWLWR18,
  author       = {Fengyong Li and
                  Kui Wu and
                  Jingsheng Lei and
                  Mi Wen and
                  Yanli Ren},
  title        = {Unsupervised steganalysis over social networks based on multi-reference
                  sub-image sets},
  journal      = {Multim. Tools Appl.},
  volume       = {77},
  number       = {14},
  pages        = {17953--17971},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11042-017-4759-x},
  doi          = {10.1007/S11042-017-4759-X},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/LiWLWR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/RenJ18,
  author       = {Yanli Ren and
                  Tiejin Jiang},
  title        = {Verifiable outsourced attribute-based signature scheme},
  journal      = {Multim. Tools Appl.},
  volume       = {77},
  number       = {14},
  pages        = {18105--18115},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11042-017-4539-7},
  doi          = {10.1007/S11042-017-4539-7},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/RenJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/LiWLR18,
  author       = {Fengyong Li and
                  Mi Wen and
                  Jingsheng Lei and
                  Yanli Ren},
  title        = {Efficient steganographer detection over social networks with sampling
                  reconstruction},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {11},
  number       = {5},
  pages        = {924--939},
  year         = {2018},
  url          = {https://doi.org/10.1007/s12083-017-0603-3},
  doi          = {10.1007/S12083-017-0603-3},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/LiWLR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/FuFR17,
  author       = {Jia Fu and
                  Guorui Feng and
                  Yanli Ren},
  title        = {{JPEG} Image Steganalysis from Imbalanced Data},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {100-A},
  number       = {11},
  pages        = {2518--2521},
  year         = {2017},
  url          = {https://doi.org/10.1587/transfun.E100.A.2518},
  doi          = {10.1587/TRANSFUN.E100.A.2518},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/FuFR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmic/HuZRT17,
  author       = {Chaofang Hu and
                  Xianpeng Zhou and
                  Yanli Ren and
                  Ye Tao},
  title        = {Output feedback polytopic {LPV} Tube-RMPC control for air-breathing
                  hypersonic vehicles},
  journal      = {Int. J. Model. Identif. Control.},
  volume       = {28},
  number       = {4},
  pages        = {336--348},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJMIC.2017.10007328},
  doi          = {10.1504/IJMIC.2017.10007328},
  timestamp    = {Thu, 17 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmic/HuZRT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/CaiRJ17,
  author       = {Jianxing Cai and
                  Yanli Ren and
                  Tiejin Jiang},
  title        = {Verifiable Outsourcing Computation of Modular Exponentiations with
                  Single Server},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {3},
  pages        = {449--457},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n3/ijns-2017-v19-n3-p449-457.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/CaiRJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/DongRZ17,
  author       = {Min Dong and
                  Yanli Ren and
                  Xinpeng Zhang},
  title        = {Fully Verifiable Algorithm for Secure Outsourcing of Bilinear Pairing
                  in Cloud Computing},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {11},
  number       = {7},
  pages        = {3648--3663},
  year         = {2017},
  url          = {https://doi.org/10.3837/tiis.2017.07.019},
  doi          = {10.3837/TIIS.2017.07.019},
  timestamp    = {Thu, 30 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itiis/DongRZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/RenDND17,
  author       = {Yanli Ren and
                  Min Dong and
                  Zhihua Niu and
                  Xiaoni Du},
  title        = {Noninteractive Verifiable Outsourcing Algorithm for Bilinear Pairing
                  with Improved Checkability},
  journal      = {Secur. Commun. Networks},
  volume       = {2017},
  pages        = {4892814:1--4892814:9},
  year         = {2017},
  url          = {https://doi.org/10.1155/2017/4892814},
  doi          = {10.1155/2017/4892814},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/RenDND17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/alt/DingRG17,
  author       = {Ning Ding and
                  Yanli Ren and
                  Dawu Gu},
  editor       = {Steve Hanneke and
                  Lev Reyzin},
  title        = {{PAC} Learning Depth-3 {\textdollar}{\textbackslash}textrm\{AC\}{\^{}}0{\textdollar}
                  Circuits of Bounded Top Fanin},
  booktitle    = {International Conference on Algorithmic Learning Theory, {ALT} 2017,
                  15-17 October 2017, Kyoto University, Kyoto, Japan},
  series       = {Proceedings of Machine Learning Research},
  volume       = {76},
  pages        = {667--680},
  publisher    = {{PMLR}},
  year         = {2017},
  url          = {http://proceedings.mlr.press/v76/ding17a.html},
  timestamp    = {Tue, 24 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/alt/DingRG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tamc/DingRG17,
  author       = {Ning Ding and
                  Yanli Ren and
                  Dawu Gu},
  editor       = {T. V. Gopal and
                  Gerhard J{\"{a}}ger and
                  Silvia Steila},
  title        = {Learning AC\({}^{\mbox{0}}\) Under k-Dependent Distributions},
  booktitle    = {Theory and Applications of Models of Computation - 14th Annual Conference,
                  {TAMC} 2017, Bern, Switzerland, April 20-22, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10185},
  pages        = {187--200},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-55911-7\_14},
  doi          = {10.1007/978-3-319-55911-7\_14},
  timestamp    = {Tue, 24 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tamc/DingRG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/RenDWLG16,
  author       = {Yanli Ren and
                  Ning Ding and
                  Tian{-}Yin Wang and
                  Haining Lu and
                  Dawu Gu},
  title        = {New algorithms for verifiable outsourcing of bilinear pairings},
  journal      = {Sci. China Inf. Sci.},
  volume       = {59},
  number       = {9},
  pages        = {99103},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11432-016-5550-8},
  doi          = {10.1007/S11432-016-5550-8},
  timestamp    = {Tue, 24 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/RenDWLG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/RenDZLG16,
  author       = {Yanli Ren and
                  Ning Ding and
                  Xinpeng Zhang and
                  Haining Lu and
                  Dawu Gu},
  title        = {Identity-Based Encryption with Verifiable Outsourced Revocation},
  journal      = {Comput. J.},
  volume       = {59},
  number       = {11},
  pages        = {1659--1668},
  year         = {2016},
  url          = {https://doi.org/10.1093/comjnl/bxw029},
  doi          = {10.1093/COMJNL/BXW029},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/RenDZLG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/WuFZR16,
  author       = {Anxin Wu and
                  Guorui Feng and
                  Xinpeng Zhang and
                  Yanli Ren},
  title        = {Unbalanced {JPEG} image steganalysis via multiview data match},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {34},
  pages        = {103--107},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jvcir.2015.10.013},
  doi          = {10.1016/J.JVCIR.2015.10.013},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jvcir/WuFZR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/QianZRF16,
  author       = {Zhenxing Qian and
                  Xinpeng Zhang and
                  Yanli Ren and
                  Guorui Feng},
  title        = {Block cipher based separable reversible data hiding in encrypted images},
  journal      = {Multim. Tools Appl.},
  volume       = {75},
  number       = {21},
  pages        = {13749--13763},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11042-015-2760-9},
  doi          = {10.1007/S11042-015-2760-9},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/QianZRF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RenDZLG16,
  author       = {Yanli Ren and
                  Ning Ding and
                  Xinpeng Zhang and
                  Haining Lu and
                  Dawu Gu},
  editor       = {Xiaofeng Chen and
                  XiaoFeng Wang and
                  Xinyi Huang},
  title        = {Verifiable Outsourcing Algorithms for Modular Exponentiations with
                  Improved Checkability},
  booktitle    = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016},
  pages        = {293--303},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897845.2897881},
  doi          = {10.1145/2897845.2897881},
  timestamp    = {Tue, 24 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RenDZLG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cocoon/DingRG16,
  author       = {Ning Ding and
                  Yanli Ren and
                  Dawu Gu},
  editor       = {Thang N. Dinh and
                  My T. Thai},
  title        = {Four-Round Zero-Knowledge Arguments of Knowledge with Strict Polynomial-Time
                  Simulation from Differing-Input Obfuscation for Circuits},
  booktitle    = {Computing and Combinatorics - 22nd International Conference, {COCOON}
                  2016, Ho Chi Minh City, Vietnam, August 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9797},
  pages        = {281--292},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-42634-1\_23},
  doi          = {10.1007/978-3-319-42634-1\_23},
  timestamp    = {Tue, 24 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cocoon/DingRG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/SunLGZR15,
  author       = {Shifeng Sun and
                  Chen Lyu and
                  Dawu Gu and
                  Yuanyuan Zhang and
                  Yanli Ren},
  title        = {Towards Efficient, Secure, and Fine-Grained Access Control System
                  in MSNs with Flexible Revocations},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {11},
  pages        = {857405:1--857405:15},
  year         = {2015},
  url          = {https://doi.org/10.1155/2015/857405},
  doi          = {10.1155/2015/857405},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdsn/SunLGZR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/RenWZH15,
  author       = {Yanli Ren and
                  Shuozhong Wang and
                  Xinpeng Zhang and
                  Min{-}Shiang Hwang},
  title        = {An Efficient Batch Verifying Scheme for Detecting Illegal Signatures},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {4},
  pages        = {463--470},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n4/ijns-2015-v17-n4-p463-470.pdf},
  timestamp    = {Mon, 15 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/RenWZH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/QianZR15,
  author       = {Zhenxing Qian and
                  Xinpeng Zhang and
                  Yanli Ren},
  title        = {{JPEG} encryption for image rescaling in the encrypted domain},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {26},
  pages        = {9--13},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jvcir.2014.10.008},
  doi          = {10.1016/J.JVCIR.2014.10.008},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jvcir/QianZR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/XieR14,
  author       = {Li Xie and
                  Yanli Ren},
  title        = {Efficient Anonymous Identity-Based Broadcast Encryption without Random
                  Oracles},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {6},
  number       = {2},
  pages        = {40--51},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijdcf.2014040103},
  doi          = {10.4018/IJDCF.2014040103},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/XieR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/RenNZ14,
  author       = {Yanli Ren and
                  Zhihua Niu and
                  Xinpeng Zhang},
  title        = {Fully Anonymous Identity-based Broadcast Encryption without Random
                  Oracles},
  journal      = {Int. J. Netw. Secur.},
  volume       = {16},
  number       = {4},
  pages        = {256--264},
  year         = {2014},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v16-n4/ijns-2014-v16-n4-p256-264.pdf},
  timestamp    = {Mon, 15 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/RenNZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/ZhangQFR14,
  author       = {Xinpeng Zhang and
                  Zhenxing Qian and
                  Guorui Feng and
                  Yanli Ren},
  title        = {Efficient reversible data hiding in encrypted images},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {25},
  number       = {2},
  pages        = {322--328},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jvcir.2013.11.001},
  doi          = {10.1016/J.JVCIR.2013.11.001},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jvcir/ZhangQFR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmm/ZhangRSQF14,
  author       = {Xinpeng Zhang and
                  Yanli Ren and
                  Liquan Shen and
                  Zhenxing Qian and
                  Guorui Feng},
  title        = {Compressing Encrypted Images With Auxiliary Information},
  journal      = {{IEEE} Trans. Multim.},
  volume       = {16},
  number       = {5},
  pages        = {1327--1336},
  year         = {2014},
  url          = {https://doi.org/10.1109/TMM.2014.2315974},
  doi          = {10.1109/TMM.2014.2315974},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmm/ZhangRSQF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cma/RenWZ13,
  author       = {Yanli Ren and
                  Shuozhong Wang and
                  Xinpeng Zhang},
  title        = {Practical parallel key-insulated encryption with multiple helper keys},
  journal      = {Comput. Math. Appl.},
  volume       = {65},
  number       = {9},
  pages        = {1403--1412},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.camwa.2012.01.032},
  doi          = {10.1016/J.CAMWA.2012.01.032},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cma/RenWZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tip/ZhangFRQ12,
  author       = {Xinpeng Zhang and
                  Guorui Feng and
                  Yanli Ren and
                  Zhenxing Qian},
  title        = {Scalable Coding of Encrypted Images},
  journal      = {{IEEE} Trans. Image Process.},
  volume       = {21},
  number       = {6},
  pages        = {3108--3114},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIP.2012.2187671},
  doi          = {10.1109/TIP.2012.2187671},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tip/ZhangFRQ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdke/RenWZ12,
  author       = {Yanli Ren and
                  Shuozhong Wang and
                  Xinpeng Zhang},
  editor       = {Yang Xiang and
                  Mukaddim Pathan and
                  Xiaohui Tao and
                  Hua Wang},
  title        = {Anonymous Hierarchical Identity-Based Encryption in Prime Order Groups},
  booktitle    = {Data and Knowledge Engineering - Third International Conference, {ICDKE}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7696},
  pages        = {230--242},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34679-8\_21},
  doi          = {10.1007/978-3-642-34679-8\_21},
  timestamp    = {Thu, 09 Mar 2023 09:06:09 +0100},
  biburl       = {https://dblp.org/rec/conf/icdke/RenWZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/RenWZ12,
  author       = {Yanli Ren and
                  Shuozhong Wang and
                  Xinpeng Zhang},
  editor       = {Tat Wing Chim and
                  Tsz Hon Yuen},
  title        = {Non-interactive Dynamic Identity-Based Broadcast Encryption without
                  Random Oracles},
  booktitle    = {Information and Communications Security - 14th International Conference,
                  {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7618},
  pages        = {479--487},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34129-8\_47},
  doi          = {10.1007/978-3-642-34129-8\_47},
  timestamp    = {Mon, 15 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/RenWZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idcs/LiGRDY12,
  author       = {Xiaohui Li and
                  Dawu Gu and
                  Yanli Ren and
                  Ning Ding and
                  Kan Yuan},
  editor       = {Yang Xiang and
                  Mukaddim Pathan and
                  Xiaohui Tao and
                  Hua Wang},
  title        = {Efficient Ciphertext-Policy Attribute Based Encryption with Hidden
                  Policy},
  booktitle    = {Internet and Distributed Computing Systems - 5th International Conference,
                  {IDCS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7646},
  pages        = {146--159},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34883-9\_12},
  doi          = {10.1007/978-3-642-34883-9\_12},
  timestamp    = {Thu, 09 Mar 2023 09:06:05 +0100},
  biburl       = {https://dblp.org/rec/conf/idcs/LiGRDY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangQRF11,
  author       = {Xinpeng Zhang and
                  Zhenxing Qian and
                  Yanli Ren and
                  Guorui Feng},
  title        = {Watermarking With Flexible Self-Recovery Quality Based on Compressive
                  Sensing and Compositive Reconstruction},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {6},
  number       = {4},
  pages        = {1223--1232},
  year         = {2011},
  url          = {https://doi.org/10.1109/TIFS.2011.2159208},
  doi          = {10.1109/TIFS.2011.2159208},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangQRF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/ZhangRFQ11,
  author       = {Xinpeng Zhang and
                  Yanli Ren and
                  Guorui Feng and
                  Zhenxing Qian},
  editor       = {Xiamu Niu and
                  Mingchu Li and
                  Y{\^{o}}iti Suzuki and
                  Jeng{-}Shyang Pan and
                  Lakhmi C. Jain},
  title        = {Compressing Encrypted Image Using Compressive Sensing},
  booktitle    = {Seventh International Conference on Intelligent Information Hiding
                  and Multimedia Signal Processing, {IIH-MSP} 2011, Dalian, China, October
                  14-16, 2011},
  pages        = {222--225},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IIHMSP.2011.12},
  doi          = {10.1109/IIHMSP.2011.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/ZhangRFQ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijfcs/RenGWZ10,
  author       = {Yanli Ren and
                  Dawu Gu and
                  Shuozhong Wang and
                  Xinpeng Zhang},
  title        = {Hierarchical Identity-Based Proxy Re-Encryption without Random Oracles},
  journal      = {Int. J. Found. Comput. Sci.},
  volume       = {21},
  number       = {6},
  pages        = {1049--1063},
  year         = {2010},
  url          = {https://doi.org/10.1142/S0129054110007726},
  doi          = {10.1142/S0129054110007726},
  timestamp    = {Mon, 15 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijfcs/RenGWZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/QianZFR10,
  author       = {Zhenxing Qian and
                  Xinpeng Zhang and
                  Guorui Feng and
                  Yanli Ren},
  title        = {Colour filter array interpolation based self recovery with anti-cropping
                  capability},
  journal      = {Int. J. Multim. Intell. Secur.},
  volume       = {1},
  number       = {2},
  pages        = {191--203},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJMIS.2010.036075},
  doi          = {10.1504/IJMIS.2010.036075},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijmis/QianZFR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaLT/RenGWZ10,
  author       = {Yanli Ren and
                  Dawu Gu and
                  Shuozhong Wang and
                  Xinpeng Zhang},
  title        = {New Fuzzy Identity-Based Encryption in the Standard Model},
  journal      = {Informatica},
  volume       = {21},
  number       = {3},
  pages        = {393--407},
  year         = {2010},
  url          = {http://content.iospress.com/articles/informatica/info21-3-07},
  timestamp    = {Mon, 15 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/informaticaLT/RenGWZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/RenG10,
  author       = {Yanli Ren and
                  Dawu Gu},
  title        = {{CCA2} secure (hierarchical) identity-based parallel key-insulated
                  encryption without random oracles},
  journal      = {J. Syst. Softw.},
  volume       = {83},
  number       = {1},
  pages        = {153--162},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.jss.2009.07.046},
  doi          = {10.1016/J.JSS.2009.07.046},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/RenG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/waim/QianFR10,
  author       = {Zhenxing Qian and
                  Guorui Feng and
                  Yanli Ren},
  editor       = {Lei Chen and
                  Changjie Tang and
                  Jun Yang and
                  Yunjun Gao},
  title        = {Fragile Watermarking for Color Image Recovery Based on Color Filter
                  Array Interpolation},
  booktitle    = {Web-Age Information Management, 11th International Conference, {WAIM}
                  2010, Jiuzhaigou, China, July 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6184},
  pages        = {537--543},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14246-8\_52},
  doi          = {10.1007/978-3-642-14246-8\_52},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/waim/QianFR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/RenG09,
  author       = {Yanli Ren and
                  Dawu Gu},
  title        = {Fully {CCA2} secure identity based broadcast encryption without random
                  oracles},
  journal      = {Inf. Process. Lett.},
  volume       = {109},
  number       = {11},
  pages        = {527--533},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ipl.2009.01.017},
  doi          = {10.1016/J.IPL.2009.01.017},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/RenG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaSI/RenG08,
  author       = {Yanli Ren and
                  Dawu Gu},
  title        = {Efficient Hierarchical Identity Based Encryption Scheme in the Standard
                  Model},
  journal      = {Informatica (Slovenia)},
  volume       = {32},
  number       = {2},
  pages        = {207--211},
  year         = {2008},
  url          = {http://www.informatica.si/index.php/informatica/article/view/192},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/informaticaSI/RenG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/RenG08,
  author       = {Yanli Ren and
                  Dawu Gu},
  editor       = {Dipanwita Roy Chowdhury and
                  Vincent Rijmen and
                  Abhijit Das},
  title        = {Secure Hierarchical Identity Based Encryption Scheme in the Standard
                  Model},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2008, 9th International Conference
                  on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5365},
  pages        = {104--115},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89754-5\_9},
  doi          = {10.1007/978-3-540-89754-5\_9},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/RenG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics