What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Jin Li
Google Scholar
54
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Side-Channel Attacks and New Principles in the Shuffle Model of Differential Privacy.
Shaowei Wang
Jin Li
Changyu Dong
Jin Li
Zhili Zhou
Di Wang
Zikai Wen
2025
conf/acisp
Zeroth-Order Federated Private Tuning for Pretrained Large Language Models.
Xiaoyu Zhang
Yong Lin
Meixia Miao
Jian Lou
Jin Li
Xiaofeng Chen
2025
journals/tifs
Enhancing Model Intellectual Property Protection With Robustness Fingerprint Technology.
Anli Yan
Huali Ren
Kanghua Mo
Zhenxin Zhang
Shaowei Wang
Jin Li
2025
conf/uss
Beyond Statistical Estimation: Differentially Private Individual Computation via Shuffling.
Shaowei Wang
Changyu Dong
Xiangfu Song
Jin Li
Zhili Zhou
Di Wang
Han Wu
2024
journals/istr
Self-sovereign identity management in ciphertext policy attribute based encryption for IoT protocols.
Weichu Deng
Jin Li
Hongyang Yan
Arthur Sandor Voundi Koe
Teng Huang
Jianfeng Wang
Cong Peng
2024
journals/tifs
Sweeper: Breaking the Validity-Latency Tradeoff in Asynchronous Common Subset.
Guoyu Yang
Chang Chen
Qi Chen
Jianan Jiang
Jin Li
Debiao He
2023
journals/tifs
Collaborative Sampling for Partial Multi-Dimensional Value Collection Under Local Differential Privacy.
Qiuyu Qian
Qingqing Ye
Haibo Hu
Kai Huang
Tom Tak-Lam Chan
Jin Li
2023
conf/sp
3DFed: Adaptive and Extensible Framework for Covert Backdoor Attack in Federated Learning.
Haoyang Li
Qingqing Ye
Haibo Hu
Jin Li
Leixia Wang
Chengfang Fang
Jie Shi
2023
conf/asiaccs
Boost Off/On-Manifold Adversarial Robustness for Deep Learning with Latent Representation Mixup.
Mengdie Huang
Yi Xie
Xiaofeng Chen
Jin Li
Changyu Dong
Zheli Liu
Willy Susilo
2022
conf/ccs
StrongBox: A GPU TEE on Arm Endpoints.
Yunjie Deng
Chenxu Wang
Shunchang Yu
Shiqing Liu
Zhenyu Ning
Kevin Leach
Jin Li
Shoumeng Yan
Zhengyu He
Jiannong Cao
Fengwei Zhang
2022
conf/uss
Birds of a Feather Flock Together: How Set Bias Helps to Deanonymize You via Revealed Intersection Sizes.
Xiaojie Guo
Ye Han
Zheli Liu
Ding Wang
Yan Jia
Jin Li
2021
journals/tifs
An Automatic Cost Learning Framework for Image Steganography Using Deep Reinforcement Learning.
Weixuan Tang
Bin Li
Mauro Barni
Jin Li
Jiwu Huang
2021
journals/tifs
VeriFL: Communication-Efficient and Fast Verifiable Aggregation for Federated Learning.
Xiaojie Guo
Zheli Liu
Jin Li
Jiqiang Gao
Boyu Hou
Changyu Dong
Thar Baker
2021
conf/ccs
Reverse Attack: Black-box Attacks on Collaborative Recommendation.
Yihe Zhang
Xu Yuan
Jin Li
Jiadong Lou
Li Chen
Nian-Feng Tzeng
2021
conf/uss
How to Make Private Distributed Cardinality Estimation Practical, and Get Differential Privacy for Free.
Changhui Hu
Jin Li
Zheli Liu
Xiaojie Guo
Yu Wei
Xuan Guang
Grigorios Loukides
Changyu Dong
2021
conf/provsec
Public Key Based Searchable Encryption with Fine-Grained Sender Permission Control.
Zhongming Wang
Biwen Chen
Tao Xiang
Lu Zhou
Yan-Hong Liu
Jin Li
2021
conf/asiaccs
Targeting the Weakest Link: Social Engineering Attacks in Ethereum Smart Contracts.
Nikolay Ivanov
Jianzhi Lou
Ting Chen
Jin Li
Qiben Yan
2020
journals/compsec
Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts.
Akash Suresh Patil
Rafik Hamza
Alzubair Hassan
Nan Jiang
Hongyang Yan
Jin Li
2020
journals/istr
Toward supervised shape-based behavioral authentication on smartphones.
Wenjuan Li
Yu Wang
Jin Li
Yang Xiang
2020
conf/esorics
PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Attested Off-Chain Contract Execution.
Yang Xiao
Ning Zhang
Jin Li
Wenjing Lou
Y. Thomas Hou
2020
conf/esorics
Towards Poisoning the Neural Collaborative Filtering-Based Recommender Systems.
Yihe Zhang
Jiadong Lou
Li Chen
Xu Yuan
Jin Li
Tom Johnsten
Nian-Feng Tzeng
2019
journals/tifs
Distributed Secure Switch-and-Stay Combining Over Correlated Fading Channels.
Xiazhi Lai
Lisheng Fan
Xianfu Lei
Jin Li
Nan Yang
George K. Karagiannidis
2019
conf/acns
Towards Blockchained Challenge-Based Collaborative Intrusion Detection.
Wenjuan Li
Yu Wang
Jin Li
Man Ho Au
2018
journals/compsec
JFCGuard: Detecting juice filming charging attack via processor usage analysis on smartphones.
Weizhi Meng
Lijun Jiang
Yu Wang
Jin Li
Jun Zhang
Yang Xiang
2018
journals/compsec
Secure attribute-based data sharing for resource-limited users in cloud computing.
Jin Li
Yinghui Zhang
Xiaofeng Chen
Yang Xiang
2018
journals/tifs
Anonymous and Traceable Group Data Sharing in Cloud Computing.
Jian Shen
Tianqi Zhou
Xiaofeng Chen
Jin Li
Willy Susilo
2018
conf/acisp
Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing.
Weizhi Meng
Yu Wang
Wenjuan Li
Zhe Liu
Jin Li
Christian W. Probst
2018
conf/esorics
Efficient and Secure Outsourcing of Differentially Private Data Publication.
Jin Li
Heng Ye
Wei Wang
Wenjing Lou
Y. Thomas Hou
Jiqiang Liu
Rongxing Lu
2018
conf/esorics
PrivacyGuard: Enforcing Private Data Usage with Blockchain and Attested Execution.
Ning Zhang
Jin Li
Wenjing Lou
Y. Thomas Hou
2018
conf/pkc
Hedged Nonce-Based Public-Key Encryption: Adaptive Security Under Randomness Failures.
Zhengan Huang
Junzuo Lai
Wenbin Chen
Man Ho Au
Zhen Peng
Jin Li
2017
conf/ccs
Secure Dot Product of Outsourced Encrypted Vectors and its Application to SVM.
Jun Zhang
Xin Wang
Siu-Ming Yiu
Zoe Lin Jiang
Jin Li
2016
journals/tifs
Hierarchical and Shared Access Control.
Arcangelo Castiglione
Alfredo De Santis
Barbara Masucci
Francesco Palmieri
Aniello Castiglione
Jin Li
Xinyi Huang
2016
journals/tifs
Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services.
Joseph K. Liu
Man Ho Au
Xinyi Huang
Rongxing Lu
Jin Li
2016
conf/ccs
Generic Construction of Publicly Verifiable Predicate Encryption.
Chuting Tan
Zoe Lin Jiang
Xuan Wang
Siu-Ming Yiu
Jun-bin Fang
Jin Li
Yabin Jin
Jiajun Huang
2016
conf/acisp
Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage.
Tong Li
Zheli Liu
Ping Li
Chunfu Jia
Zoe Lin Jiang
Jin Li
2016
conf/acisp
Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures.
Yinghui Zhang
Jin Li
Dong Zheng
Xiaofeng Chen
Hui Li
2016
conf/dsn
Rekeying for Encrypted Deduplication Storage.
Jingwei Li
Chuan Qin
Patrick P. C. Lee
Jin Li
2015
journals/tifs
New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations.
Xiaofeng Chen
Xinyi Huang
Jin Li
Jianfeng Ma
Wenjing Lou
Duncan S. Wong
2014
conf/acisp
TMDS: Thin-Model Data Sharing Scheme Supporting Keyword Search in Cloud Storage.
Zheli Liu
Jin Li
Xiaofeng Chen
Jun Yang
Chunfu Jia
2014
conf/provsec
Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts.
Yinghui Zhang
Dong Zheng
Xiaofeng Chen
Jin Li
Hui Li
2014
conf/esorics
Verifiable Computation over Large Database with Incremental Updates.
Xiaofeng Chen
Jin Li
Jian Weng
Jianfeng Ma
Wenjing Lou
2013
conf/ccs
Anonymous attribute-based encryption supporting efficient decryption test.
Yinghui Zhang
Xiaofeng Chen
Jin Li
Duncan S. Wong
Hui Li
2013
conf/esorics
Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption.
Jin Li
Xiaofeng Chen
Jingwei Li
Chunfu Jia
Jianfeng Ma
Wenjing Lou
2012
journals/tifs
Efficient Fair Conditional Payments for Outsourcing Computations.
Xiaofeng Chen
Jin Li
Willy Susilo
2012
conf/acisp
A Short Non-delegatable Strong Designated Verifier Signature.
Haibo Tian
Xiaofeng Chen
Jin Li
2012
conf/esorics
New Algorithms for Secure Outsourcing of Modular Exponentiations.
Xiaofeng Chen
Jin Li
Jianfeng Ma
Qiang Tang
Wenjing Lou
2012
conf/icics
Outsourcing Encryption of Attribute-Based Encryption with MapReduce.
Jingwei Li
Chunfu Jia
Jin Li
Xiaofeng Chen
2011
conf/ccs
Multi-authority ciphertext-policy attribute-based encryption with accountability.
Jin Li
Qiong Huang
Xiaofeng Chen
Sherman S. M. Chow
Duncan S. Wong
Dongqing Xie
2010
conf/ccs
Attribute-based signature and its applications.
Jin Li
Man Ho Au
Willy Susilo
Dongqing Xie
Kui Ren
2010
conf/acisp
Identity-Based Chameleon Hash Scheme without Key Exposure.
Xiaofeng Chen
Fangguo Zhang
Willy Susilo
Haibo Tian
Jin Li
Kwangjo Kim
2009
conf/esorics
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing.
Qian Wang
Cong Wang
Jin Li
Kui Ren
Wenjing Lou
2008
conf/acns
Generic Security-Amplifying Methods of Ordinary Digital Signatures.
Jin Li
Kwangjo Kim
Fangguo Zhang
Duncan S. Wong
2007
conf/provsec
Practical Threshold Signatures Without Random Oracles.
Jin Li
Tsz Hon Yuen
Kwangjo Kim
2007
conf/provsec
Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature.
Jin Li
Kwangjo Kim
Fangguo Zhang
Xiaofeng Chen
Coauthors
Akash Suresh Patil
(1)
Alfredo De Santis
(1)
Alzubair Hassan
(1)
Aniello Castiglione
(1)
Anli Yan
(1)
Arcangelo Castiglione
(1)
Arthur Sandor Voundi Koe
(1)
Barbara Masucci
(1)
Bin Li
(1)
Biwen Chen
(1)
Boyu Hou
(1)
Chang Chen
(1)
Changhui Hu
(1)
Changyu Dong
(5)
Chengfang Fang
(1)
Chenxu Wang
(1)
Christian W. Probst
(1)
Chuan Qin
(1)
Chunfu Jia
(4)
Chuting Tan
(1)
Cong Peng
(1)
Cong Wang
(1)
Debiao He
(1)
Di Wang
(2)
Ding Wang
(1)
Dong Zheng
(2)
Dongqing Xie
(2)
Duncan S. Wong
(4)
Fangguo Zhang
(3)
Fengwei Zhang
(1)
Francesco Palmieri
(1)
George K. Karagiannidis
(1)
Grigorios Loukides
(1)
Guoyu Yang
(1)
Haibo Hu
(2)
Haibo Tian
(2)
Han Wu
(1)
Haoyang Li
(1)
Heng Ye
(1)
Hongyang Yan
(2)
Huali Ren
(1)
Hui Li
(3)
Jiadong Lou
(2)
Jiajun Huang
(1)
Jian Lou
(1)
Jian Shen
(1)
Jian Weng
(1)
Jianan Jiang
(1)
Jianfeng Ma
(4)
Jianfeng Wang
(1)
Jiannong Cao
(1)
Jianzhi Lou
(1)
Jie Shi
(1)
Jin Li
(55)
Jingwei Li
(3)
Jiqiang Gao
(1)
Jiqiang Liu
(1)
Jiwu Huang
(1)
Joseph K. Liu
(1)
Jun Yang
(1)
Jun Zhang
(1)
Jun Zhang
(1)
Jun-bin Fang
(1)
Junzuo Lai
(1)
Kai Huang
(1)
Kanghua Mo
(1)
Kevin Leach
(1)
Kui Ren
(2)
Kwangjo Kim
(4)
Leixia Wang
(1)
Li Chen
(2)
Lijun Jiang
(1)
Lisheng Fan
(1)
Lu Zhou
(1)
Man Ho Au
(4)
Mauro Barni
(1)
Meixia Miao
(1)
Mengdie Huang
(1)
Nan Jiang
(1)
Nan Yang
(1)
Nian-Feng Tzeng
(2)
Nikolay Ivanov
(1)
Ning Zhang
(2)
Patrick P. C. Lee
(1)
Ping Li
(1)
Qi Chen
(1)
Qian Wang
(1)
Qiang Tang
(1)
Qiben Yan
(1)
Qingqing Ye
(2)
Qiong Huang
(1)
Qiuyu Qian
(1)
Rafik Hamza
(1)
Rongxing Lu
(2)
Shaowei Wang
(3)
Sherman S. M. Chow
(1)
Shiqing Liu
(1)
Shoumeng Yan
(1)
Shunchang Yu
(1)
Siu-Ming Yiu
(2)
Tao Xiang
(1)
Teng Huang
(1)
Thar Baker
(1)
Tianqi Zhou
(1)
Ting Chen
(1)
Tom Johnsten
(1)
Tom Tak-Lam Chan
(1)
Tong Li
(1)
Tsz Hon Yuen
(1)
Wei Wang
(1)
Weichu Deng
(1)
Weixuan Tang
(1)
Weizhi Meng
(2)
Wenbin Chen
(1)
Wenjing Lou
(8)
Wenjuan Li
(3)
Willy Susilo
(5)
Xianfu Lei
(1)
Xiangfu Song
(1)
Xiaofeng Chen
(18)
Xiaojie Guo
(3)
Xiaoyu Zhang
(1)
Xiazhi Lai
(1)
Xin Wang
(1)
Xinyi Huang
(3)
Xu Yuan
(2)
Xuan Guang
(1)
Xuan Wang
(1)
Y. Thomas Hou
(3)
Yabin Jin
(1)
Yan Jia
(1)
Yan-Hong Liu
(1)
Yang Xiang
(3)
Yang Xiao
(1)
Ye Han
(1)
Yi Xie
(1)
Yihe Zhang
(2)
Yinghui Zhang
(4)
Yong Lin
(1)
Yu Wang
(4)
Yu Wei
(1)
Yunjie Deng
(1)
Zhe Liu
(1)
Zheli Liu
(6)
Zhen Peng
(1)
Zhengan Huang
(1)
Zhengyu He
(1)
Zhenxin Zhang
(1)
Zhenyu Ning
(1)
Zhili Zhou
(1)
Zhili Zhou
(1)
Zhongming Wang
(1)
Zikai Wen
(1)
Zoe Lin Jiang
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to