default search action
Yanli Ren
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j66]Ya Liu, Yuanhang Wu, Fengyv Zhao, Yanli Ren:
Balanced Off-Chain Payment Channel Network Routing Strategy Based On Weight Calculation. Comput. J. 67(3): 907-922 (2024) - [j65]Mingyun Bian, Guanghui He, Guorui Feng, Xinpeng Zhang, Yanli Ren:
Verifiable Privacy-Preserving Heart Rate Estimation Based on LSTM. IEEE Internet Things J. 11(1): 1719-1731 (2024) - [j64]Yanli Ren, Cien Chen, Mingqi Hu, Guorui Feng, Xinpeng Zhang:
BFDAC: A Blockchain-Based and Fog-Computing-Assisted Data Access Control Scheme in Vehicular Social Networks. IEEE Internet Things J. 11(2): 3510-3523 (2024) - [j63]Yanli Ren, Mingqi Hu, Zhe Yang, Guorui Feng, Xinpeng Zhang:
BPFL: Blockchain-based privacy-preserving federated learning against poisoning attack. Inf. Sci. 665: 120377 (2024) - [j62]Mingyun Bian, Yanli Ren, Gang He, Guorui Feng, Xinpeng Zhang:
VMMP: Verifiable privacy-preserving multi-modal multi-task prediction. Inf. Sci. 669: 120547 (2024) - [j61]Yue Wang, Minjie Liu, Yanli Ren, Xinpeng Zhang, Guorui Feng:
Traffic sign attack via pinpoint region probability estimation network. Pattern Recognit. 146: 110035 (2024) - [j60]Le Yu, Shufan Zhang, Yan Meng, Suguo Du, Yuling Chen, Yanli Ren, Haojin Zhu:
Privacy-Preserving Location-Based Advertising via Longitudinal Geo-Indistinguishability. IEEE Trans. Mob. Comput. 23(8): 8256-8273 (2024) - 2023
- [j59]Gang He, Yanli Ren, Mingyun Bian, Guorui Feng, Xinpeng Zhang:
Privacy-enhanced and non-interactive linear regression with dropout-resilience. Inf. Sci. 632: 69-86 (2023) - [j58]Jiayi Wu, Chuan Qin, Yanli Ren, Guorui Feng:
EPFNet: Edge-Prototype Fusion Network Toward Few-Shot Semantic Segmentation for Aerial Remote-Sensing Images. IEEE Geosci. Remote. Sens. Lett. 20: 1-5 (2023) - [j57]Mingqi Hu, Yanli Ren, Cien Chen:
Privacy-Preserving Medical Data-Sharing System with Symmetric Encryption Based on Blockchain. Symmetry 15(5): 1010 (2023) - [j56]Yalan Qin, Guorui Feng, Yanli Ren, Xinpeng Zhang:
Consistency-Induced Multiview Subspace Clustering. IEEE Trans. Cybern. 53(2): 832-844 (2023) - [j55]Yanli Ren, Zhuhuan Song, Shifeng Sun, Joseph K. Liu, Guorui Feng:
Outsourcing LDA-Based Face Recognition to an Untrusted Cloud. IEEE Trans. Dependable Secur. Comput. 20(3): 2058-2070 (2023) - [j54]Mingyun Bian, Joseph K. Liu, Shifeng Sun, Xinpeng Zhang, Yanli Ren:
Verifiable Privacy-Enhanced Rotation Invariant LBP Feature Extraction in Fog Computing. IEEE Trans. Ind. Informatics 19(12): 11518-11530 (2023) - [j53]Yalan Qin, Guorui Feng, Yanli Ren, Xinpeng Zhang:
Block-Diagonal Guided Symmetric Nonnegative Matrix Factorization. IEEE Trans. Knowl. Data Eng. 35(3): 2313-2325 (2023) - [j52]Yu Zhou, Yanli Ren, Mengtian Xu, Guorui Feng:
An Improved NSGA-III Algorithm Based on Deep Q-Networks for Cloud Storage Optimization of Blockchain. IEEE Trans. Parallel Distributed Syst. 34(5): 1406-1419 (2023) - [c11]Quan Wang, Yanli Ren, Xinpeng Zhang, Guorui Feng:
Interactive Image Style Transfer Guided by Graffiti. ACM Multimedia 2023: 6685-6694 - 2022
- [j51]Yanli Ren, Yerong Li, Guorui Feng, Xinpeng Zhang:
Privacy-Enhanced and Verification-Traceable Aggregation for Federated Learning. IEEE Internet Things J. 9(24): 24933-24948 (2022) - 2021
- [j50]Yanli Ren, Xinpeng Zhang, Dawu Gu, Guorui Feng:
Efficient outsourced extraction of histogram features over encrypted images in cloud. Sci. China Inf. Sci. 64(3) (2021) - [j49]Yanli Ren, Xiao Xu, Guorui Feng, Xinpeng Zhang:
Non-Interactive and secure outsourcing of PCA-Based face recognition. Comput. Secur. 110: 102416 (2021) - [j48]Zichi Wang, Guorui Feng, Yanli Ren, Xinpeng Zhang:
Multichannel Steganography in Digital Images for Multiple Receivers. IEEE Multim. 28(1): 65-73 (2021) - [j47]Yanli Ren, Xiangyu Li, Shifeng Sun, Xingliang Yuan, Xinpeng Zhang:
Privacy-preserving batch verification signature scheme based on blockchain for Vehicular Ad-Hoc Networks. J. Inf. Secur. Appl. 58: 102698 (2021) - [j46]Zhaoguang Pan, Yanli Ren, Xinpeng Zhang:
Low-complexity fake face detection based on forensic similarity. Multim. Syst. 27(3): 353-361 (2021) - [j45]Yanli Ren, Xianji Cai, Mingqi Hu:
Privacy-Preserving Redactable Blockchain for Internet of Things. Secur. Commun. Networks 2021: 4485311:1-4485311:12 (2021) - [j44]Lingzan Yu, Yanli Ren, Guorui Feng, Xinpeng Zhang:
Efficient Noninteractive Outsourcing of Large-Scale QR and LU Factorizations. Secur. Commun. Networks 2021: 6184920:1-6184920:14 (2021) - [j43]Qiangjie Li, Guorui Feng, Yanli Ren, Xinpeng Zhang:
Embedding Probability Guided Network for Image Steganalysis. IEEE Signal Process. Lett. 28: 1095-1099 (2021) - [j42]Yanli Ren, Min Dong, Zhenxing Qian, Xinpeng Zhang, Guorui Feng:
Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server. IEEE Trans. Cloud Comput. 9(1): 145-154 (2021) - [i1]Yalan Qin, Guorui Feng, Hanzhou Wu, Yanli Ren, Xinpeng Zhang:
Orientation Convolutional Networks for Image Recognition. CoRR abs/2102.01523 (2021) - 2020
- [j41]Xianji Cai, Yanli Ren, Xinpeng Zhang:
Privacy-Protected Deletable Blockchain. IEEE Access 8: 6060-6070 (2020) - [j40]Kangli Hao, Guorui Feng, Yanli Ren, Xinpeng Zhang:
Iris Segmentation Using Feature Channel Optimization for Noisy Environments. Cogn. Comput. 12(6): 1205-1216 (2020) - [j39]Mengtian Xu, Guorui Feng, Yanli Ren, Xinpeng Zhang:
On Cloud Storage Optimization of Blockchain With a Clustering-Based Genetic Algorithm. IEEE Internet Things J. 7(9): 8547-8558 (2020) - [j38]Zhiyang Jin, Guorui Feng, Yanli Ren, Xinpeng Zhang:
Feature extraction optimization of JPEG steganalysis based on residual images. Signal Process. 170: 107455 (2020) - [j37]Yanli Ren, Xinpeng Zhang, Guorui Feng, Zhenxing Qian, Fengyong Li:
How to Extract Image Features Based on Co-Occurrence Matrix Securely and Efficiently in Cloud Computing. IEEE Trans. Cloud Comput. 8(1): 207-219 (2020) - [j36]Guorui Feng, Xinpeng Zhang, Yanli Ren, Zhenxing Qian, Sheng Li:
Diversity-Based Cascade Filters for JPEG Steganalysis. IEEE Trans. Circuits Syst. Video Technol. 30(2): 376-386 (2020) - [j35]Sheng Li, Xinpeng Zhang, Zhenxing Qian, Guorui Feng, Yanli Ren:
Key Based Artificial Fingerprint Generation for Privacy Protection. IEEE Trans. Dependable Secur. Comput. 17(4): 828-840 (2020)
2010 – 2019
- 2019
- [j34]Yan Sun, Guorui Feng, Yanli Ren:
JPEG Steganalysis Based on Multi-Projection Ensemble Discriminant Clustering. IEICE Trans. Inf. Syst. 102-D(1): 198-201 (2019) - [j33]Chunhui Gao, Guorui Feng, Yanli Ren, Lizhuang Liu:
Iris Segmentation Based on Improved U-Net Network Model. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(8): 982-985 (2019) - [j32]Jiaxiang Yang, Yanping Li, Yanli Ren:
Novel and Secure Outsourcing Algorithms for Multiple Bilinear Pairings with Single Untrusted Server. Int. J. Netw. Secur. 21(5): 872-880 (2019) - 2018
- [j31]Min Dong, Yanli Ren:
Efficient and secure outsourcing of bilinear pairings with single server. Sci. China Inf. Sci. 61(3): 039104:1-039104:3 (2018) - [j30]Min Dong, Yanli Ren, Guorui Feng:
Fully Verifiable Algorithm for Outsourcing Multiple Modular Exponentiations with Single Cloud Server. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(3): 608-611 (2018) - [j29]Zhihua Niu, Deyu Kong, Yanli Ren, Xiaoni Du:
Analysis of the k-Error Linear Complexity and Error Sequence for 2pn-Periodic Binary Sequence. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(8): 1197-1203 (2018) - [j28]Fengyong Li, Kui Wu, Jingsheng Lei, Mi Wen, Yanli Ren:
Unsupervised steganalysis over social networks based on multi-reference sub-image sets. Multim. Tools Appl. 77(14): 17953-17971 (2018) - [j27]Yanli Ren, Tiejin Jiang:
Verifiable outsourced attribute-based signature scheme. Multim. Tools Appl. 77(14): 18105-18115 (2018) - [j26]Fengyong Li, Mi Wen, Jingsheng Lei, Yanli Ren:
Efficient steganographer detection over social networks with sampling reconstruction. Peer-to-Peer Netw. Appl. 11(5): 924-939 (2018) - 2017
- [j25]Jia Fu, Guorui Feng, Yanli Ren:
JPEG Image Steganalysis from Imbalanced Data. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(11): 2518-2521 (2017) - [j24]Chaofang Hu, Xianpeng Zhou, Yanli Ren, Ye Tao:
Output feedback polytopic LPV Tube-RMPC control for air-breathing hypersonic vehicles. Int. J. Model. Identif. Control. 28(4): 336-348 (2017) - [j23]Jianxing Cai, Yanli Ren, Tiejin Jiang:
Verifiable Outsourcing Computation of Modular Exponentiations with Single Server. Int. J. Netw. Secur. 19(3): 449-457 (2017) - [j22]Min Dong, Yanli Ren, Xinpeng Zhang:
Fully Verifiable Algorithm for Secure Outsourcing of Bilinear Pairing in Cloud Computing. KSII Trans. Internet Inf. Syst. 11(7): 3648-3663 (2017) - [j21]Yanli Ren, Min Dong, Zhihua Niu, Xiaoni Du:
Noninteractive Verifiable Outsourcing Algorithm for Bilinear Pairing with Improved Checkability. Secur. Commun. Networks 2017: 4892814:1-4892814:9 (2017) - [c10]Ning Ding, Yanli Ren, Dawu Gu:
PAC Learning Depth-3 $\textrm{AC}^0$ Circuits of Bounded Top Fanin. ALT 2017: 667-680 - [c9]Ning Ding, Yanli Ren, Dawu Gu:
Learning AC0 Under k-Dependent Distributions. TAMC 2017: 187-200 - 2016
- [j20]Yanli Ren, Ning Ding, Tian-Yin Wang, Haining Lu, Dawu Gu:
New algorithms for verifiable outsourcing of bilinear pairings. Sci. China Inf. Sci. 59(9): 99103 (2016) - [j19]Yanli Ren, Ning Ding, Xinpeng Zhang, Haining Lu, Dawu Gu:
Identity-Based Encryption with Verifiable Outsourced Revocation. Comput. J. 59(11): 1659-1668 (2016) - [j18]Anxin Wu, Guorui Feng, Xinpeng Zhang, Yanli Ren:
Unbalanced JPEG image steganalysis via multiview data match. J. Vis. Commun. Image Represent. 34: 103-107 (2016) - [j17]Zhenxing Qian, Xinpeng Zhang, Yanli Ren, Guorui Feng:
Block cipher based separable reversible data hiding in encrypted images. Multim. Tools Appl. 75(21): 13749-13763 (2016) - [c8]Yanli Ren, Ning Ding, Xinpeng Zhang, Haining Lu, Dawu Gu:
Verifiable Outsourcing Algorithms for Modular Exponentiations with Improved Checkability. AsiaCCS 2016: 293-303 - [c7]Ning Ding, Yanli Ren, Dawu Gu:
Four-Round Zero-Knowledge Arguments of Knowledge with Strict Polynomial-Time Simulation from Differing-Input Obfuscation for Circuits. COCOON 2016: 281-292 - 2015
- [j16]Shifeng Sun, Chen Lyu, Dawu Gu, Yuanyuan Zhang, Yanli Ren:
Towards Efficient, Secure, and Fine-Grained Access Control System in MSNs with Flexible Revocations. Int. J. Distributed Sens. Networks 11: 857405:1-857405:15 (2015) - [j15]Yanli Ren, Shuozhong Wang, Xinpeng Zhang, Min-Shiang Hwang:
An Efficient Batch Verifying Scheme for Detecting Illegal Signatures. Int. J. Netw. Secur. 17(4): 463-470 (2015) - [j14]Zhenxing Qian, Xinpeng Zhang, Yanli Ren:
JPEG encryption for image rescaling in the encrypted domain. J. Vis. Commun. Image Represent. 26: 9-13 (2015) - 2014
- [j13]Li Xie, Yanli Ren:
Efficient Anonymous Identity-Based Broadcast Encryption without Random Oracles. Int. J. Digit. Crime Forensics 6(2): 40-51 (2014) - [j12]Yanli Ren, Zhihua Niu, Xinpeng Zhang:
Fully Anonymous Identity-based Broadcast Encryption without Random Oracles. Int. J. Netw. Secur. 16(4): 256-264 (2014) - [j11]Xinpeng Zhang, Zhenxing Qian, Guorui Feng, Yanli Ren:
Efficient reversible data hiding in encrypted images. J. Vis. Commun. Image Represent. 25(2): 322-328 (2014) - [j10]Xinpeng Zhang, Yanli Ren, Liquan Shen, Zhenxing Qian, Guorui Feng:
Compressing Encrypted Images With Auxiliary Information. IEEE Trans. Multim. 16(5): 1327-1336 (2014) - 2013
- [j9]Yanli Ren, Shuozhong Wang, Xinpeng Zhang:
Practical parallel key-insulated encryption with multiple helper keys. Comput. Math. Appl. 65(9): 1403-1412 (2013) - 2012
- [j8]Xinpeng Zhang, Guorui Feng, Yanli Ren, Zhenxing Qian:
Scalable Coding of Encrypted Images. IEEE Trans. Image Process. 21(6): 3108-3114 (2012) - [c6]Yanli Ren, Shuozhong Wang, Xinpeng Zhang:
Anonymous Hierarchical Identity-Based Encryption in Prime Order Groups. ICDKE 2012: 230-242 - [c5]Yanli Ren, Shuozhong Wang, Xinpeng Zhang:
Non-interactive Dynamic Identity-Based Broadcast Encryption without Random Oracles. ICICS 2012: 479-487 - [c4]Xiaohui Li, Dawu Gu, Yanli Ren, Ning Ding, Kan Yuan:
Efficient Ciphertext-Policy Attribute Based Encryption with Hidden Policy. IDCS 2012: 146-159 - 2011
- [j7]Xinpeng Zhang, Zhenxing Qian, Yanli Ren, Guorui Feng:
Watermarking With Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction. IEEE Trans. Inf. Forensics Secur. 6(4): 1223-1232 (2011) - [c3]Xinpeng Zhang, Yanli Ren, Guorui Feng, Zhenxing Qian:
Compressing Encrypted Image Using Compressive Sensing. IIH-MSP 2011: 222-225 - 2010
- [j6]Yanli Ren, Dawu Gu, Shuozhong Wang, Xinpeng Zhang:
Hierarchical Identity-Based Proxy Re-Encryption without Random Oracles. Int. J. Found. Comput. Sci. 21(6): 1049-1063 (2010) - [j5]Zhenxing Qian, Xinpeng Zhang, Guorui Feng, Yanli Ren:
Colour filter array interpolation based self recovery with anti-cropping capability. Int. J. Multim. Intell. Secur. 1(2): 191-203 (2010) - [j4]Yanli Ren, Dawu Gu, Shuozhong Wang, Xinpeng Zhang:
New Fuzzy Identity-Based Encryption in the Standard Model. Informatica 21(3): 393-407 (2010) - [j3]Yanli Ren, Dawu Gu:
CCA2 secure (hierarchical) identity-based parallel key-insulated encryption without random oracles. J. Syst. Softw. 83(1): 153-162 (2010) - [c2]Zhenxing Qian, Guorui Feng, Yanli Ren:
Fragile Watermarking for Color Image Recovery Based on Color Filter Array Interpolation. WAIM 2010: 537-543
2000 – 2009
- 2009
- [j2]Yanli Ren, Dawu Gu:
Fully CCA2 secure identity based broadcast encryption without random oracles. Inf. Process. Lett. 109(11): 527-533 (2009) - 2008
- [j1]Yanli Ren, Dawu Gu:
Efficient Hierarchical Identity Based Encryption Scheme in the Standard Model. Informatica (Slovenia) 32(2): 207-211 (2008) - [c1]Yanli Ren, Dawu Gu:
Secure Hierarchical Identity Based Encryption Scheme in the Standard Model. INDOCRYPT 2008: 104-115
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 01:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint