default search action
Qinyi Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j9]Zulu Okonkwo, Ernest Foo, Zhe Hou, Qinyi Li, Zahra Jadidi:
A graph representation framework for encrypted network traffic classification. Comput. Secur. 148: 104134 (2025) - 2024
- [j8]Qinyi Li, Xavier Boyen:
Public-Key Authenticated Encryption with Keyword Search Made Easy. IACR Commun. Cryptol. 1(2): 16 (2024) - 2023
- [c18]Ernest Foo, Qinyi Li:
Tightly Secure Lattice Identity-Based Signature in the Quantum Random Oracle Model. ACISP 2023: 381-402 - [c17]Zulu Okonkwo, Ernest Foo, Zhe Hou, Qinyi Li, Zahra Jadidi:
Encrypted Network Traffic Classification with Higher Order Graph Neural Network. ACISP 2023: 630-650 - [c16]Xavier Boyen, Qinyi Li:
Identity-Based Matchmaking Encryption with Enhanced Privacy - A Generic Construction with Practical Instantiations. ESORICS (2) 2023: 425-445 - [c15]Ayodeji James Akande, Zhe Hou, Ernest Foo, Qinyi Li:
A Runtime Verification Framework for Cyber-Physical Systems Based on Data Analytics and LTL Formula Learning. ICFEM 2023: 273-278 - [c14]Zahra Jadidi, Shantanu Pal, Qinyi Li, Ernest Foo:
Cyber Security Resilience in Industrial Control Systems using Defence-in-Depth and Zero Trust. ICST 2023: 1-6 - 2022
- [j7]Hongyao Wang, Qinyi Li, Shuang Han, Pengbo Li, Jie Tian, Shijing Zhang:
Wire Rope Damage Detection Signal Processing Using K-Singular Value Decomposition and Optimized Double-Tree Complex Wavelet Transform. IEEE Trans. Instrum. Meas. 71: 1-12 (2022) - [c13]Zulu Okonkwo, Ernest Foo, Qinyi Li, Zhe Hou:
A CNN Based Encrypted Network Traffic Classifier. ACSW 2022: 74-83 - [c12]Zhé Hóu, Qinyi Li, Ernest Foo, Jin Song Dong, Paulo de Souza:
A Digital Twin Runtime Verification Framework for Protecting Satellites Systems from Cyber Attacks. ICECCS 2022: 117-122 - 2021
- [j6]Qinyi Li, Xavier Boyen, Ernest Foo:
CCA-security from adaptive all-but-one lossy trapdoor functions. Theor. Comput. Sci. 883: 99-121 (2021) - [j5]Qinyi Li, Xavier Boyen:
Efficient public-key encryption with equality test from lattices. Theor. Comput. Sci. 892: 85-107 (2021) - [c11]Xavier Boyen, Ernest Foo, Qinyi Li:
Anonymous Lattice Identity-Based Encryption with Traceable Identities. ACISP 2021: 630-649 - [c10]Xavier Boyen, Malika Izabachène, Qinyi Li:
Secure Hybrid Encryption in the Standard Model from Hard Learning Problems. PQCrypto 2021: 399-418 - 2020
- [c9]Xavier Boyen, Malika Izabachène, Qinyi Li:
A Simple and Efficient CCA-Secure Lattice KEM in the Standard Model. SCN 2020: 321-337
2010 – 2019
- 2019
- [c8]Xavier Boyen, Qinyi Li:
Direct CCA-Secure KEM and Deterministic PKE from Plain LWE. PQCrypto 2019: 116-130 - 2018
- [c7]Xavier Boyen, Qinyi Li:
Almost Tight Multi-Instance Multi-Ciphertext Identity-Based Encryption on Lattices. ACNS 2018: 535-553 - 2017
- [c6]Xavier Boyen, Qinyi Li:
All-But-Many Lossy Trapdoor Functions from Lattices and Applications. CRYPTO (3) 2017: 298-331 - [i2]Xavier Boyen, Qinyi Li:
All-But-Many Lossy Trapdoor Functions from Lattices and Applications. IACR Cryptol. ePrint Arch. 2017: 532 (2017) - 2016
- [j4]Shengke Zeng, Qinyi Li, Zhiguang Qin, Qing Lu:
Non-interactive deniable ring signature without random oracles. Secur. Commun. Networks 9(12): 1810-1819 (2016) - [c5]Xavier Boyen, Qinyi Li:
Turing Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded Functions. ACNS 2016: 267-284 - [c4]Xavier Boyen, Qinyi Li:
Towards Tightly Secure Lattice Short Signature and Id-Based Encryption. ASIACRYPT (2) 2016: 404-434 - [i1]Xavier Boyen, Qinyi Li:
Towards Tightly Secure Short Signature and IBE. IACR Cryptol. ePrint Arch. 2016: 498 (2016) - 2015
- [j3]Qinyi Li, Fengli Zhang:
A Fully Secure Attribute Based Broadcast Encryption Scheme. Int. J. Netw. Secur. 17(3): 255-263 (2015) - [c3]Xavier Boyen, Qinyi Li:
Attribute-Based Encryption for Finite Automata from LWE. ProvSec 2015: 247-267 - 2013
- [j2]Qinyi Li, Hu Xiong, Fengli Zhang, Shengke Zeng:
An Expressive Decentralizing KP-ABE Scheme with Constant-Size Ciphertext. Int. J. Netw. Secur. 15(3): 161-170 (2013) - [j1]Qinyi Li, Hu Xiong, Fengli Zhang:
Broadcast revocation scheme in composite-order bilinear group and its application to attribute-based encryption. Int. J. Secur. Networks 8(1): 1-12 (2013) - 2012
- [c2]Fengli Zhang, Qinyi Li, Hu Xiong:
Efficient Revocable Key-Policy Attribute Based Encryption with Full Security. CIS 2012: 477-481 - [c1]Shengke Zeng, Zhiguang Qin, Qing Lu, Qinyi Li:
Efficient and Random Oracle-Free Conditionally Anonymous Ring Signature. ProvSec 2012: 21-34
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint