


default search action
Fan Li 0012
Person information
- affiliation: Louisiana Tech University, Department of Electrical Engineering, Ruston, LA, USA
Other persons with the same name
- Fan Li — disambiguation page
- Fan Li 0001
— Beijing Institute of Technology, School of Computer Science, China (and 1 more) - Fan Li 0002
— University of Pennsylvania, Perelman School of Medicine, Philadelphia, PA, USA - Fan Li 0003
— Xi'an Jiaotong University, School of Electronic and Information Engineering, MOE Key Laboratory for Intelligent Networks and Network Security, China - Fan Li 0004
— Tsinghua University, Department of Electrical Engineering, Beijing, China - Fan Li 0005 — University of Guelph, School of Engineering, ON, Canada (and 1 more)
- Fan Li 0006
— Kunming University of Science and Technology, Faculty of Information Engineering and Automation, Kunming, China (and 1 more) - Fan Li 0007 — Microsoft Research Asia, Beijing, China
- Fan Li 0008
— City University of Hong Kong, Department of Electronic Engineering, Hong Kong - Fan Li 0009
— Shenzhen University, Shenzhen Key Laboratory of Spatial Smart Sensing and Services, China
- Fan Li 0010
— Shandong University, School of Control Science and Engineering, Jinan, China - Fan Li 0011
— Sun Yat-sen University, Key Laboratory of Optoelectronic Materials and Technologies, Guangzhou, China - Fan Li 0013
— Trinity College Dublin, Distributed Systems Group, Dublin, Ireland - Fan Li 0014 — Jiangxi Electric Power Research Institute of State Grid, Nanchang, China (and 1 more)
- Fan Li 0015
— Hong Kong Polytechnic University, Department of Aeronautical and Aviation Engineering, AAE, Hong Kong (and 1 more) - Fan Li 0016
— University of New South Wales, School of Computer Science and Engineering, Sydney, NSW, Australia - Fan Li 0017
— University of Science and Technology of China, Hefei, China - Fan Li 0018
— Wuhan University of Science and Technology, Wuhan, China - Fan Li 0019
— Guangzhou University, Guangzhou, China - Fan Li 0020
— Civil Aviation Flight University of China, Guanghan, China - Fan Li 0021
— Yale University School of Public Health, New Haven, CT, USA - Fan Li 0022
— Shanghai Jiao Tong University, Shanghai, China - Fan Li 0023
— Beihang University, Beijing, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
[j11]Jianjun Zhu, Fan Li
, Jinyuan Chen
:
A survey of blockchain, artificial intelligence, and edge computing for Web 3.0. Comput. Sci. Rev. 54: 100667 (2024)
[j10]Diego Segura Ibarra, Fan Li
, Jianjun Zhu, Jinyuan Chen
:
Blockchain application to the processes in material design, production, distribution, and disposal: A survey. J. Ind. Inf. Integr. 41: 100638 (2024)- 2023
[c6]Jianjun Zhu, Fan Li
, Jinyuan Chen:
Communication-Efficient and Error-Free Gradecast with Optimal Resilience. ISIT 2023: 108-113
[i5]Jianjun Zhu, Fan Li, Jinyuan Chen:
A Survey of Blockchain, Artificial Intelligence, and Edge Computing for Web 3.0. CoRR abs/2311.13731 (2023)- 2022
[j9]Nishant Shakya, Fan Li
, Jinyuan Chen
:
On Distributed Computing With Heterogeneous Communication Constraints. IEEE/ACM Trans. Netw. 30(6): 2776-2787 (2022)- 2021
[j8]Fan Li
, Jinyuan Chen
:
Adding Common Randomness Can Remove the Secrecy Penalty in GDoF. IEEE Trans. Inf. Theory 67(4): 2308-2333 (2021)
[c5]Fan Li
, Jinyuan Chen:
Communication-Efficient Signature-Free Asynchronous Byzantine Agreement. ISIT 2021: 2864-2869- 2020
[c4]Fan Li, Jinyuan Chen:
Secure Communications with Limited Common Randomness at Transmitters. ISIT 2020: 1552-1557
2010 – 2019
- 2019
[j7]Jinyuan Chen
, Fan Li
:
Adding a Helper Can Totally Remove the Secrecy Constraints in a Two-User Interference Channel. IEEE Trans. Inf. Forensics Secur. 14(12): 3126-3139 (2019)
[j6]Fan Li
, Jinyuan Chen
, Zhiying Wang
:
Wireless MapReduce Distributed Computing. IEEE Trans. Inf. Theory 65(10): 6101-6114 (2019)
[c3]Fan Li
, Jinyuan Chen:
How to Break the Limits of Secrecy Constraints in Communication Networks? ISIT 2019: 2743-2747
[i4]Fan Li, Jinyuan Chen:
Adding Common Randomness Can Remove the Secrecy Constraints in Communication Networks. CoRR abs/1907.04599 (2019)- 2018
[j5]Fan Li, Qian Mao, Chin-Chen Chang
:
Reversible data hiding scheme based on the Haar discrete wavelet transform and interleaving prediction method. Multim. Tools Appl. 77(5): 5149-5168 (2018)
[c2]Nishant Shakya, Fan Li, Jinyuan Chen:
On Distributed Computing with Heterogeneous Communication Constraints. ACSSC 2018: 1795-1799
[c1]Fan Li, Jinyuan Chen, Zhiying Wang
:
Wireless MapReduce Distributed Computing. ISIT 2018: 1286-1290
[i3]Nishant Shakya, Fan Li, Jinyuan Chen:
Distributed Computing with Heterogeneous Communication Constraints: The Worst-Case Computation Load and Proof by Contradiction. CoRR abs/1802.00413 (2018)
[i2]Fan Li, Jinyuan Chen, Zhiying Wang:
Wireless MapReduce Distributed Computing. CoRR abs/1802.00894 (2018)
[i1]Jinyuan Chen, Fan Li:
Adding a Helper Can Totally Remove the Secrecy Constraints in Interference Channel. CoRR abs/1812.00550 (2018)- 2016
[j4]Fan Li, Qian Mao, Chin-Chen Chang:
A Reversible Data Hiding Scheme Based on IWT and the Sudoku Method. Int. J. Netw. Secur. 18(3): 410-419 (2016)
[j3]Fan Li, K. Bharanitharan, Chin-Chen Chang, Qian Mao:
Bi-stretch reversible data hiding algorithm for absolute moment block truncation coding compressed images. Multim. Tools Appl. 75(23): 16153-16171 (2016)- 2015
[j2]Shengyun Zhai, Fan Li, Chin-Chen Chang, Qian Mao:
A Meaningful Scheme for Sharing Secret Images Using Mosaic Images. Int. J. Netw. Secur. 17(5): 643-649 (2015)
[j1]Qian Mao, Fan Li
, Chin-Chen Chang:
Reversible data hiding with oriented and minimized distortions using cascading trellis coding. Inf. Sci. 317: 170-180 (2015)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-02-10 22:58 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







