What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Meng Li
Google Scholar
24
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
The Deferred Byzantine Generals Problem.
Xuyang Liu
Zijian Zhang
Zhen Li
Peng Jiang
Yajie Wang
Meng Li
Liehuang Zhu
2025
journals/tifs
Rethinking Prefix-Based Steganography for Enhanced Security and Efficiency.
Chao Pan
Donghui Hu
Yaofei Wang
Kejiang Chen
Yinyin Peng
Xianjin Rong
Chen Gu
Meng Li
2025
journals/tifs
RaSA: Robust and Adaptive Secure Aggregation for Edge-Assisted Hierarchical Federated Learning.
Lingling Wang
Mei Huang
Zhengyin Zhang
Meng Li
Jingjing Wang
Keke Gai
2025
journals/tifs
Privacy-Preserving Statistical Analysis With Low Redundancy Over Task-Relevant Microdata.
Jingcheng Zhao
Kaiping Xue
Yingjie Xue
Meng Li
Bin Zhu
Shaoxian Yuan
2025
journals/tifs
Efficient Intrusion Detection for In-Vehicle Networks Using Knowledge Distillation From BERT to CNN-BiLSTM.
Sifan Li
Yue Cao
Guojun Peng
Meng Li
Wei Sun
Luan Chen
2025
journals/tifs
Balancing Differential Privacy and Utility: A Relevance-Based Adaptive Private Fine-Tuning Framework for Language Models.
Naiyu Wang
Shen Wang
Meng Li
Longfei Wu
Zijian Zhang
Zhitao Guan
Liehuang Zhu
2025
journals/tifs
Resisting Poisoning Attacks in Federated Learning via Dual-Domain Distance and Trust Assessment.
Zhaoqi Wang
Zijian Zhang
Zhen Li
Yan Wu
Ye Liu
Meng Li
Xin Li
Yong Liu
Jincheng An
Wei Liang
Liehuang Zhu
2025
journals/tifs
Gupacker: Generalized Unpacking Framework for Android Malware.
Tao Zheng
Qiyu Hou
Xingshu Chen
Hao Ren
Meng Li
Hongwei Li
Changxiang Shen
2025
conf/sp
CamLopa: A Hidden Wireless Camera Localization Framework via Signal Propagation Path Analysis.
Xiang Zhang
Jie Zhang
Zehua Ma
Jinyang Huang
Meng Li
Huan Yan
Peng Zhao
Zijian Zhang
Bin Liu
Qing Guo
Tianwei Zhang
Nenghai Yu
2025
journals/tifs
IDCNet: Image Decomposition and Cross-View Distillation for Generalizable Deepfake Detection.
Zhiyuan Wang
Yanxiang Chen
Yuanzhi Yao
Meng Han
Wenpeng Xing
Meng Li
2025
journals/tifs
Threshold Signatures With Verifiably Timed Combining and Message-Dependent Tracing.
Meng Li
Hanni Ding
Yifei Chen
Yan Qiao
Zijian Zhang
Liehuang Zhu
Mauro Conti
2025
conf/icics
Artemis: Decentralized, Secure, and Efficient Safety Monitoring with Dynamic Trajectories.
Meng Li
Zhuangwei Li
Yifei Chen
Yan Qiao
Mauro Conti
2025
conf/uss
DiffLoc: WiFi Hidden Camera Localization Based on Electromagnetic Diffraction.
Xiang Zhang
Jie Zhang
Huan Yan
Jinyang Huang
Zehua Ma
Bin Liu
Meng Li
Kejiang Chen
Qing Guo
Tianwei Zhang
Zhi Liu
2025
journals/tifs
VSecNN: Verifiable and Privacy-Preserving Neural Network Inference in Cloud Service.
Wenti Yang
Xuan Li
Meng Li
Zijian Zhang
Zhitao Guan
Liehuang Zhu
2024
journals/tifs
KeystrokeSniffer: An Off-the-Shelf Smartphone Can Eavesdrop on Your Privacy From Anywhere.
Jinyang Huang
Jia-Xuan Bai
Xiang Zhang
Zhi Liu
Yuanhao Feng
Jianchun Liu
Xiao Sun
Mianxiong Dong
Meng Li
2024
journals/tifs
Decentralized Threshold Signatures With Dynamically Private Accountability.
Meng Li
Hanni Ding
Qing Wang
Mingwei Zhang
Weizhi Meng
Liehuang Zhu
Zijian Zhang
Xiaodong Lin
2024
journals/tifs
Secure and Flexible Wildcard Queries.
Qing Wang
Donghui Hu
Meng Li
Guomin Yang
2024
journals/tifs
Graph-Based Covert Transaction Detection and Protection in Blockchain.
Zhenyu Guo
Xin Li
Jiamou Liu
Zijian Zhang
Meng Li
Jingjing Hu
Liehuang Zhu
2024
journals/tifs
Cross-Modal Learning Based Flexible Bimodal Biometric Authentication With Template Protection.
Qi Jiang
Guichuan Zhao
Xindi Ma
Meng Li
Youliang Tian
Xinghua Li
2024
conf/acisp
Threshold Signatures with Private Accountability via Secretly Designated Witnesses.
Meng Li
Hanni Ding
Qing Wang
Zijian Zhang
Mauro Conti
2022
conf/icics
Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud.
Meng Li
Mingwei Zhang
Jianbo Gao
Chhagan Lal
Mauro Conti
Mamoun Alazab
2020
conf/icics
One-Time, Oblivious, and Unlinkable Query Processing Over Encrypted Data on Cloud.
Yifei Chen
Meng Li
Shuli Zheng
Donghui Hu
Chhagan Lal
Mauro Conti
2019
journals/compsec
Find me a safe zone: A countermeasure for channel state information based attacks.
Jie Zhang
Zhanyong Tang
Meng Li
Dingyi Fang
Xiaojiang Chen
Zheng Wang
2017
conf/ccs
A Privacy-Preserving and Vessel Authentication Scheme Using Automatic Identification System.
Pengchuan Su
Nan Sun
Liehuang Zhu
Yandong Li
RongRong Bi
Meng Li
Zijian Zhang
Coauthors
Bin Liu
(2)
Bin Zhu
(1)
Changxiang Shen
(1)
Chao Pan
(1)
Chen Gu
(1)
Chhagan Lal
(2)
Dingyi Fang
(1)
Donghui Hu
(3)
Guichuan Zhao
(1)
Guojun Peng
(1)
Guomin Yang
(1)
Hanni Ding
(3)
Hao Ren
(1)
Hongwei Li
(1)
Huan Yan
(1)
Huan Yan
(1)
Jia-Xuan Bai
(1)
Jiamou Liu
(1)
Jianbo Gao
(1)
Jianchun Liu
(1)
Jie Zhang
(2)
Jie Zhang
(1)
Jincheng An
(1)
Jingcheng Zhao
(1)
Jingjing Hu
(1)
Jingjing Wang
(1)
Jinyang Huang
(3)
Kaiping Xue
(1)
Kejiang Chen
(2)
Keke Gai
(1)
Liehuang Zhu
(8)
Lingling Wang
(1)
Longfei Wu
(1)
Luan Chen
(1)
Mamoun Alazab
(1)
Mauro Conti
(5)
Mei Huang
(1)
Meng Han
(1)
Meng Li
(24)
Mianxiong Dong
(1)
Mingwei Zhang
(2)
Naiyu Wang
(1)
Nan Sun
(1)
Nenghai Yu
(1)
Peng Jiang
(1)
Peng Zhao
(1)
Pengchuan Su
(1)
Qi Jiang
(1)
Qing Guo
(2)
Qing Wang
(3)
Qiyu Hou
(1)
RongRong Bi
(1)
Shaoxian Yuan
(1)
Shen Wang
(1)
Shuli Zheng
(1)
Sifan Li
(1)
Tao Zheng
(1)
Tianwei Zhang
(2)
Wei Liang
(1)
Wei Sun
(1)
Weizhi Meng
(1)
Wenpeng Xing
(1)
Wenti Yang
(1)
Xiang Zhang
(3)
Xianjin Rong
(1)
Xiao Sun
(1)
Xiaodong Lin
(1)
Xiaojiang Chen
(1)
Xin Li
(2)
Xindi Ma
(1)
Xinghua Li
(1)
Xingshu Chen
(1)
Xuan Li
(1)
Xuyang Liu
(1)
Yajie Wang
(1)
Yan Qiao
(2)
Yan Wu
(1)
Yandong Li
(1)
Yanxiang Chen
(1)
Yaofei Wang
(1)
Ye Liu
(1)
Yifei Chen
(2)
Yifei Chen
(1)
Yingjie Xue
(1)
Yinyin Peng
(1)
Yong Liu
(1)
Youliang Tian
(1)
Yuanhao Feng
(1)
Yuanzhi Yao
(1)
Yue Cao
(1)
Zehua Ma
(2)
Zhanyong Tang
(1)
Zhaoqi Wang
(1)
Zhen Li
(2)
Zheng Wang
(1)
Zhengyin Zhang
(1)
Zhenyu Guo
(1)
Zhi Liu
(2)
Zhitao Guan
(2)
Zhiyuan Wang
(1)
Zhuangwei Li
(1)
Zijian Zhang
(10)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to