default search action
Jiangtao Li 0003
Person information
- affiliation: Purple Mountain Laboratories, Nanjing, China
- affiliation: Shanghai University, School of Computer Engineering and Science, China
- affiliation: Nanyang Technological University, School of Computer Science and Engineering, Singapore
- affiliation (PhD 2018): East China Normal University, School of Computer Science and Software Engineering, Shanghai Key Laboratory of Trustworthy Computing, China
Other persons with the same name
- Jiangtao Li — disambiguation page
- Jiangtao Li 0001 — Purdue University, West Lafayette, IN, USA
- Jiangtao Li 0002 — Beijing Normal University, School of Geography, Research Center for Remote Sensing and GIS, China
- Jiangtao Li 0004 — University of New South Wales, School of Economics, Sydney, Australia
- Jiangtao Li 0005 — Shenyang Conservatory of Music, Academy of Drama, Film, and Television, China
- Jiangtao Li 0006 — State Grid Blockchain Technology (Beijing) Co., Ltd., Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j17]Qi Liu, Ke Sun, Wenqi Liu, Yufeng Li, Xiangyu Zheng, Chenhong Cao, Jiangtao Li, Wutao Qin:
Quantitative risk assessment for connected automated Vehicles: Integrating improved STPA-SafeSec and Bayesian network. Reliab. Eng. Syst. Saf. 253: 110528 (2025) - 2024
- [j16]Xingbing Fu, Chaofan Jiang, Chaorong Li, Jiangtao Li, Xiatian Zhu, Fagen Li:
A hybrid approach for Android malware detection using improved multi-scale convolutional neural networks and residual networks. Expert Syst. Appl. 249: 123675 (2024) - [j15]Jiangtao Li, Zhaoheng Song, Zihou Zhang, Yufeng Li, Chenhong Cao:
In-Vehicle Digital Forensics for Connected and Automated Vehicles With Public Auditing. IEEE Internet Things J. 11(4): 6368-6383 (2024) - [j14]Zihou Zhang, Jiangtao Li, Yufeng Li, Yuanhang He:
Metadata-Private Resource Allocation in Edge Computing Withstands Semi-Malicious Edge Nodes. Sensors 24(10): 2989 (2024) - [j13]Zihou Zhang, Jiangtao Li, Yufeng Li, Chenhong Cao, Zhenfu Cao:
Hardware Secure Module Based Lightweight Conditional Privacy-Preserving Authentication for VANETs. IEEE Trans. Inf. Forensics Secur. 19: 6337-6350 (2024) - [c11]Ziqi Zhu, Jiangtao Li, Kai Zhang, Junqing Gong, Haifeng Qian:
Registered Functional Encryptions from Pairings. EUROCRYPT (2) 2024: 373-402 - [i1]Ziqi Zhu, Jiangtao Li, Kai Zhang, Junqing Gong, Haifeng Qian:
Registered Functional Encryptions from Pairings. IACR Cryptol. ePrint Arch. 2024: 327 (2024) - 2023
- [j12]Yufeng Li, Fengyu Yang, Qi Liu, Jiangtao Li, Chenhong Cao:
Light can be Dangerous: Stealthy and Effective Physical-world Adversarial Attack by Spot Light. Comput. Secur. 132: 103345 (2023) - [j11]Guiqi Zhang, Qi Liu, Chenhong Cao, Jiangtao Li, Yufeng Li:
Bit scanner: Anomaly detection for in-vehicle CAN bus using binary sequence whitelisting. Comput. Secur. 134: 103436 (2023) - [j10]Yufeng Li, Mengxiao Liu, Chenhong Cao, Jiangtao Li:
Communication-Traffic-Assisted Mining and Exploitation of Buffer Overflow Vulnerabilities in ADASs. Future Internet 15(5): 185 (2023) - [c10]Miaoling Dai, Chenhong Cao, Tong Liu, Meijia Su, Yufeng Li, Jiangtao Li:
WiDual: User Identified Gesture Recognition Using Commercial WiFi. CCGrid 2023: 673-683 - [c9]Yingying Su, Chenhong Cao, Jiangtao Li, Yufeng Li:
EAVA: Adaptive and Fast Edge-assisted Video Analytics On Mobile Device. ICPADS 2023: 2251-2260 - [c8]Dandan Li, Yufeng Li, Guiqi Zhang, Ke Sun, Jiangtao Li:
Fooling Object Detectors in the Physical World with Natural Adversarial Camouflage. TrustCom 2023: 141-148 - 2022
- [j9]Jiangtao Li, Yufeng Li, Chenhong Cao, Kwok-Yan Lam:
Conditional Anonymous Authentication With Abuse-Resistant Tracing and Distributed Trust for Internet of Vehicles. IEEE Internet Things J. 9(11): 8749-8762 (2022) - [j8]Chenhong Cao, Meijia Su, Shengyu Duan, Miaoling Dai, Jiangtao Li, Yufeng Li:
QoS-Aware Joint Task Scheduling and Resource Allocation in Vehicular Edge Computing. Sensors 22(23): 9340 (2022) - [j7]Lei Zhang, Hu Xiong, Qiong Huang, Jiguo Li, Kim-Kwang Raymond Choo, Jiangtao Li:
Cryptographic Solutions for Cloud Storage: Challenges and Research Opportunities. IEEE Trans. Serv. Comput. 15(1): 567-587 (2022) - [c7]Meijia Su, Chenhong Cao, Miaoling Dai, Jiangtao Li, Yufeng Li:
Towards Fast and Energy-Efficient Offloading for Vehicular Edge Computing. ICPADS 2022: 649-656 - [c6]Aihui Jiang, Yufeng Li, Jiangtao Li, Chenhong Cao:
A Reusable Convolutional Accelerator for CNN on Resource-limited FPGA. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 627-634 - 2021
- [c5]Bonan Shen, Chenhong Cao, Tong Liu, Jiangtao Li, Yufeng Li:
Neural Adaptive IoT Streaming Analytics with RL-Adapt. MSN 2021: 382-389 - [c4]Yuanhang He, Lei Chen, Yi Ni, Yuyao Wang, Jiangtao Li, Yufeng Li:
Privacy protection scheme for edge computing based on function encryption. NaNA 2021: 131-135
2010 – 2019
- 2019
- [j6]Lei Zhang, Mingxing Luo, Jiangtao Li, Man Ho Au, Kim-Kwang Raymond Choo, Tong Chen, Shengwei Tian:
Blockchain based secure data sharing system for Internet of vehicles: A position paper. Veh. Commun. 16: 85-93 (2019) - [c3]Tingting Lu, Jiangtao Li, Lei Zhang, Kwok-Yan Lam:
Group Signatures with Decentralized Tracing. Inscrypt 2019: 435-442 - 2018
- [j5]Lei Zhang, Jiangtao Li:
Enabling Robust and Privacy-Preserving Resource Allocation in Fog Computing. IEEE Access 6: 50384-50393 (2018) - [j4]Jian Liu, Jiangtao Li, Lei Zhang, Feifei Dai, Yuanfei Zhang, Xinyu Meng, Jian Shen:
Secure intelligent traffic light control using fog computing. Future Gener. Comput. Syst. 78: 817-824 (2018) - [c2]Jiangtao Li, Junqing Gong:
Improved Anonymous Broadcast Encryptions - Tight Security and Shorter Ciphertext. ACNS 2018: 497-515 - 2017
- [j3]Lei Zhang, Qianhong Wu, Bo Qin, Hua Deng, Jiangtao Li, Jianwei Liu, Wenchang Shi:
Certificateless and identity-based authenticated asymmetric group key agreement. Int. J. Inf. Sec. 16(5): 559-576 (2017) - [j2]Jiangtao Li, Lei Zhang:
Sender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocol. Inf. Sci. 414: 187-202 (2017) - 2016
- [j1]Jiangtao Li, Lei Zhang, Joseph K. Liu, Haifeng Qian, Zheming Dong:
Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud. IEEE Trans. Inf. Forensics Secur. 11(11): 2572-2583 (2016) - 2014
- [c1]Zheming Dong, Lei Zhang, Jiangtao Li:
Security Enhanced Anonymous Remote User Authentication and Key Agreement for Cloud Computing. CSE 2014: 1746-1751
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint