default search action
Lishan Ke
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j21]Anli Yan, Teng Huang, Lishan Ke, Xiaozhang Liu, Qi Chen, Changyu Dong:
Explanation leaks: Explanation-guided model extraction attacks. Inf. Sci. 632: 269-284 (2023) - [j20]Ruitao Hou, Teng Huang, Hongyang Yan, Lishan Ke, Weixuan Tang:
A stealthy and robust backdoor attack via frequency domain transform. World Wide Web (WWW) 26(5): 2767-2783 (2023) - 2022
- [j19]Wenjuan Li, Lishan Ke, Weizhi Meng, Jinguang Han:
An empirical study of supervised email classification in Internet of Things: Practical performance and key influencing factors. Int. J. Intell. Syst. 37(1): 287-304 (2022) - [j18]Zhenxin Zhang, Guanbiao Lin, Lishan Ke, Shiyu Peng, Li Hu, Hongyang Yan:
KD-GAN: An effective membership inference attacks defence framework. Int. J. Intell. Syst. 37(11): 9921-9935 (2022) - 2021
- [j17]Xiaohui Kuang, Xianfeng Gao, Lianfang Wang, Gang Zhao, Lishan Ke, Quanxin Zhang:
A discrete cosine transform-based query efficient attack on black-box object detectors. Inf. Sci. 546: 596-607 (2021) - [j16]Chunhui Wu, Lishan Ke, Yusong Du:
Quantum resistant key-exposure free chameleon hash and applications in redactable blockchain. Inf. Sci. 548: 438-449 (2021) - 2020
- [j15]Yuejin Zhang, Fei Du, Juan Wang, Lishan Ke, Meng Wang, Yong Hu, Meng Yu, Guanghui Li, Aiyun Zhan:
A Safety Collision Avoidance Algorithm Based on Comprehensive Characteristics. Complex. 2020: 1616420:1-1616420:13 (2020) - [j14]Ping Li, Shengjun Li, Hongyang Yan, Lishan Ke, Teng Huang, Alzubair Hassan:
A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme. Complex. 2020: 1784276:1-1784276:13 (2020) - [j13]Yilei Wang, Guoyu Yang, Tao Li, Lifeng Zhang, Yanli Wang, Lishan Ke, Yi Dou, Shouzhe Li, Xiaomei Yu:
Optimal mixed block withholding attacks based on reinforcement learning. Int. J. Intell. Syst. 35(12): 2032-2048 (2020) - [j12]Yuanzhang Li, Yaxiao Wang, Ye Wang, Lishan Ke, Yu-an Tan:
A feature-vector generative adversarial network for evading PDF malware classifiers. Inf. Sci. 523: 38-48 (2020) - [j11]Yilei Wang, Guoyu Yang, Andrea Bracciali, Ho-fung Leung, Haibo Tian, Lishan Ke, Xiaomei Yu:
Incentive compatible and anti-compounding of wealth in proof-of-stake. Inf. Sci. 530: 85-94 (2020) - [j10]Khaled Riad, Teng Huang, Lishan Ke:
A dynamic and hierarchical access control for IoT in multi-authority cloud storage. J. Netw. Comput. Appl. 160: 102633 (2020) - [j9]Behnam Zahednejad, Lishan Ke, Jing Li:
A Novel Machine Learning-Based Approach for Security Analysis of Authentication and Key Agreement Protocols. Secur. Commun. Networks 2020: 8848389:1-8848389:15 (2020)
2010 – 2019
- 2019
- [j8]Rafik Hamza, Alzubair Hassan, Teng Huang, Lishan Ke, Hongyang Yan:
An Efficient Cryptosystem for Video Surveillance in the Internet of Things Environment. Complex. 2019: 1625678:1-1625678:11 (2019) - [j7]Jingang Liu, Lishan Ke:
New efficient identity based encryption without pairings. J. Ambient Intell. Humaniz. Comput. 10(4): 1561-1570 (2019) - 2018
- [j6]Zongxiang Yi, Zhiqiang Lin, Lishan Ke:
A generic method to construct zero-difference balanced functions. Cryptogr. Commun. 10(4): 591-609 (2018) - [j5]Khaled Riad, Lishan Ke:
RoughDroid: Operative Scheme for Functional Android Malware Detection. Secur. Commun. Networks 2018: 8087303:1-8087303:10 (2018) - [j4]Khaled Riad, Lishan Ke:
Secure Storage and Retrieval of IoT Data Based on Private Information Retrieval. Wirel. Commun. Mob. Comput. 2018: 5452463:1-5452463:8 (2018) - 2017
- [j3]Yuyin Yu, Lishan Ke, Zhiqiang Lin, Qiuyan Wang:
Permutation Polynomials over Zpn and Their Randomness. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(3): 913-915 (2017) - 2015
- [j2]Zhiqiang Lin, Lishan Ke, Dongdai Lin, Jian Gao:
On the LFSRization of a Class of FCSR Automata. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 434-440 (2015) - [j1]Lishan Ke, Zongxiang Yi, Yan Ren:
Improved broadcast encryption schemes with enhanced security. J. Ambient Intell. Humaniz. Comput. 6(1): 121-129 (2015) - 2014
- [c1]Lishan Ke, Zhiqiang Lin:
Distribution Properties and 2-Adic Complexity of Clock-Controlled FCSR Sequences. 3PGCIC 2014: 386-389
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint