default search action
Wenmin Li 0001
Person information
- affiliation: State Key Laboratory of Cryptology, Beijing, China
- affiliation: Beijing University of Posts and Telecommunications, State Key Laboratory of Networking and Switching Technology, Beijing, China
Other persons with the same name
- Wenmin Li — disambiguation page
- Wenmin Li 0002 — Zhejiang University, Department of Psychology and Behavioral Sciences, Hangzhou, China
- Wenmin Li 0003 — Chang'an University, Xi'an, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j58]Yanxin Xu, Hua Zhang, Shaohua Zhao, Xin Zhang, Wenmin Li, Fei Gao, Kaixuan Li:
Comments on "VERSA: Verifiable Secure Aggregation for Cross-Device Federated Learning". IEEE Trans. Dependable Secur. Comput. 21(4): 4297-4298 (2024) - [j57]Haoran Gao, Hua Zhang, Jiahui Wang, Xin Zhang, Huawei Wang, Wenmin Li, Tengfei Tu:
NUAT-GAN: Generating Black-Box Natural Universal Adversarial Triggers for Text Classifiers Using Generative Adversarial Networks. IEEE Trans. Inf. Forensics Secur. 19: 6484-6498 (2024) - 2023
- [j56]Wenmin Li, Yang Chen, Fei Gao, Shuo Zhang, Hua Zhang, Qiaoyan Wen:
Privacy Protection Data Retrieval Scheme With Inverted Index for IoT Based on Blockchain. IEEE Internet Things J. 10(14): 12090-12101 (2023) - [j55]Hua Zhang, Kaixuan Li, Teng Huang, Xin Zhang, Wenmin Li, Zhengping Jin, Fei Gao, Minghui Gao:
Publishing locally private high-dimensional synthetic data efficiently. Inf. Sci. 633: 343-356 (2023) - [j54]Haoran Gao, Hua Zhang, Xin Zhang, Wenmin Li, Jiahui Wang, Fei Gao:
Enhanced covertness class discriminative universal adversarial perturbations. Neural Networks 165: 516-526 (2023) - [j53]Hua Zhang, Shaohua Zhao, Ziqing Guo, Qiaoyan Wen, Wenmin Li, Fei Gao:
Scalable Fuzzy Keyword Ranked Search Over Encrypted Data on Hybrid Clouds. IEEE Trans. Cloud Comput. 11(1): 308-323 (2023) - 2022
- [j52]Ping Yu, Wei Ni, Hua Zhang, Ren Ping Liu, Qiaoyan Wen, Wenmin Li, Fei Gao:
Secure and Differentiated Fog-Assisted Data Access for Internet of Things. Comput. J. 65(8): 1948-1963 (2022) - [j51]Senmiao Wang, Luli Sun, Su-Juan Qin, Wenmin Li, Wentao Liu:
KRTunnel: DNS channel detector for mobile devices. Comput. Secur. 120: 102818 (2022) - [j50]Shaohua Zhao, Hua Zhang, Xin Zhang, Wenmin Li, Fei Gao, Qiaoyan Wen:
Forward privacy multikeyword ranked search over encrypted database. Int. J. Intell. Syst. 37(10): 7356-7378 (2022) - [j49]Yunping Gong, Fei Gao, Wenmin Li, Hua Zhang, Zhengping Jin, Qiaoyan Wen:
A rORAM scheme with logarithmic bandwidth and logarithmic locality. Int. J. Intell. Syst. 37(10): 8068-8091 (2022) - [j48]Haoran Gao, Hua Zhang, Xingguo Yang, Wenmin Li, Fei Gao, Qiaoyan Wen:
Generating natural adversarial examples with universal perturbations for text classification. Neurocomputing 471: 175-182 (2022) - [j47]Senmiao Wang, Hua Zhang, Su-Juan Qin, Wenmin Li, Tengfei Tu, Ana Shen, Wentao Liu:
KRProtector: Detection and Files Protection for IoT Devices on Android Without ROOT Against Ransomware Based on Decoys. IEEE Internet Things J. 9(19): 18251-18266 (2022) - [j46]Hao Lin, Fei Gao, Hua Zhang, Zhengping Jin, Wenmin Li, Qiaoyan Wen:
Public Key Encryption With Equality Test Supporting Flexible Designated Authorization in Cloud Storage. IEEE Syst. J. 16(1): 1460-1470 (2022) - [j45]Yang Chen, Wenmin Li, Fei Gao, Qiaoyan Wen, Hua Zhang, Huawei Wang:
Practical Attribute-Based Multi-Keyword Ranked Search Scheme in Cloud Computing. IEEE Trans. Serv. Comput. 15(2): 724-735 (2022) - [j44]Wei Guo, Su-Juan Qin, Fei Gao, Hua Zhang, Wenmin Li, Zhengping Jin, Qiaoyan Wen:
Dynamic Proof of Data Possession and Replication With Tree Sharing and Batch Verification in the Cloud. IEEE Trans. Serv. Comput. 15(4): 1813-1824 (2022) - 2021
- [j43]Wenmin Li, Sanqi Sun, Shuo Zhang, Hua Zhang, Yijie Shi:
Cost-Sensitive Approach to Improve the HTTP Traffic Detection Performance on Imbalanced Data. Secur. Commun. Networks 2021: 6674325:1-6674325:11 (2021) - [j42]Peng Jiang, Fuchun Guo, Willy Susilo, Man Ho Au, Jianchang Lai, Wenmin Li:
PPFilter: Provider Privacy-Aware Encrypted Filtering System. IEEE Trans. Serv. Comput. 14(5): 1519-1530 (2021) - 2020
- [j41]Yang Chen, Wenmin Li, Fei Gao, Kaitai Liang, Hua Zhang, Qiaoyan Wen:
Practical Attribute-Based Conjunctive Keyword Search Scheme. Comput. J. 63(8): 1203-1215 (2020) - [j40]Zhidan Li, Wenmin Li, Fei Gao, Ping Yu, Hua Zhang, Zhengping Jin, Qiaoyan Wen:
New Blind Filter Protocol: An Improved Privacy-Preserving Scheme for Location-Based Services. Comput. J. 63(12): 1886-1903 (2020) - [j39]Dianli Guo, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
Adaptively secure broadcast encryption with authenticated content distributors. Multim. Tools Appl. 79(11-12): 7889-7910 (2020) - [j38]Yuanbo Cui, Fei Gao, Wenmin Li, Yijie Shi, Hua Zhang, Qiaoyan Wen, Emmanouil Panaousis:
Cache-Based Privacy Preserving Solution for Location and Content Protection in Location-Based Services. Sensors 20(16): 4651 (2020) - [j37]Shuo Zhang, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
A Multi-User Public Key Encryption with Multi-Keyword Search out of Bilinear Pairings. Sensors 20(23): 6962 (2020) - [j36]Yuanbo Cui, Fei Gao, Hua Zhang, Wenmin Li, Zhengping Jin:
KNN search-based trajectory cloaking against the Cell-ID tracking in cellular network. Soft Comput. 24(2): 965-980 (2020) - [j35]Wei Guo, Su-Juan Qin, Fei Gao, Hua Zhang, Wenmin Li, Zhengping Jin, Qiaoyan Wen:
Comments on "Provable Multicopy Dynamic Data Possession in Cloud Computing Systems". IEEE Trans. Inf. Forensics Secur. 15: 2584-2586 (2020) - [j34]Shuo Zhang, Wenmin Li, Qiaoyan Wen, Hua Zhang, Zhengping Jin:
A Flexible KP-ABE Suit for Mobile User Realizing Decryption Outsourcing and Attribute Revocation. Wirel. Pers. Commun. 114(4): 2783-2800 (2020)
2010 – 2019
- 2019
- [j33]Zhidan Li, Wenmin Li, Zhengping Jin, Hua Zhang, Qiaoyan Wen:
An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption. IEEE Access 7: 29023-29037 (2019) - [j32]Yang Chen, Wenmin Li, Fei Gao, Wei Yin, Kaitai Liang, Hua Zhang, Qiaoyan Wen:
Efficient Attribute-Based Data Sharing Scheme with Hidden Access Structures. Comput. J. 62(12): 1748-1760 (2019) - [j31]Wei Guo, Hua Zhang, Su-Juan Qin, Fei Gao, Zhengping Jin, Wenmin Li, Qiaoyan Wen:
Outsourced dynamic provable data possession with batch update for secure cloud storage. Future Gener. Comput. Syst. 95: 309-322 (2019) - [j30]Zhidan Li, Wenmin Li, Qiaoyan Wen, Jiageng Chen, Wei Yin, Kaitai Liang:
An efficient blind filter: Location privacy protection and the access control in FinTech. Future Gener. Comput. Syst. 100: 797-810 (2019) - [j29]Dianli Guo, Qiaoyan Wen, Zhengping Jin, Hua Zhang, Wenmin Li:
Authenticated public key broadcast encryption with short ciphertexts. Multim. Tools Appl. 78(16): 23399-23414 (2019) - [j28]Ping Yu, Qiaoyan Wen, Wei Ni, Wenmin Li, Caijun Sun, Hua Zhang, Zhengping Jin:
Decentralized, Revocable and Verifiable Attribute-Based Encryption in Hybrid Cloud System. Wirel. Pers. Commun. 106(2): 719-738 (2019) - [i2]Zhidan Li, Wenmin Li, Fei Gao, Wei Yin, Hua Zhang, Qiaoyan Wen, Kaitai Liang:
Towards Privacy-Preserving and Efficient Attribute-Based Multi-Keyword Search. IACR Cryptol. ePrint Arch. 2019: 1314 (2019) - 2018
- [j27]Wei Yin, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
An Anti-Quantum Transaction Authentication Approach in Blockchain. IEEE Access 6: 5393-5401 (2018) - [j26]Xiuhua Lu, Wei Yin, Qiaoyan Wen, Zhengping Jin, Wenmin Li:
A Lattice-Based Unordered Aggregate Signature Scheme Based on the Intersection Method. IEEE Access 6: 33986-33994 (2018) - [j25]Yang Chen, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
Generic Construction of Outsourced Attribute-Based Encryption Without Key Escrow. IEEE Access 6: 58955-58966 (2018) - [j24]Hua Zhang, Hongchao Guan, Hanbing Yan, Wenmin Li, Yuqi Yu, Hao Zhou, Xingyu Zeng:
Webshell Traffic Detection With Character-Level Features Based on Deep Learning. IEEE Access 6: 75268-75277 (2018) - [j23]Ziqing Guo, Hua Zhang, Caijun Sun, Qiaoyan Wen, Wenmin Li:
Secure multi-keyword ranked search over encrypted cloud data for multiple data owners. J. Syst. Softw. 137: 380-395 (2018) - [j22]Wenmin Li, Qiaoyan Wen, Xuelei Li, Debiao He:
Attribute-based fuzzy identity access control in multicloud computing environments. Soft Comput. 22(12): 4071-4082 (2018) - [j21]Wenmin Li, Shuo Zhang, Qi Su, Qiaoyan Wen, Yang Chen:
An Anonymous Authentication Protocol Based on Cloud for Telemedical Systems. Wirel. Commun. Mob. Comput. 2018: 8131367:1-8131367:12 (2018) - [c2]Wei Yin, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
A New Insight - Proxy Re-encryption Under LWE with Strong Anti-collusion. ISPEC 2018: 559-577 - 2017
- [j20]Wei Yin, Qiaoyan Wen, Wenmin Li, Hua Zhang, Ping Zheng:
Identity Based Proxy Re-encryption Scheme under LWE. KSII Trans. Internet Inf. Syst. 11(12): 6116-6132 (2017) - [j19]Wenmin Li, Xuelei Li, Qiao-Yan Wen, Shuo Zhang, Hua Zhang:
Flexible CP-ABE Based Access Control on Encrypted Data for Mobile Users in Hybrid Cloud System. J. Comput. Sci. Technol. 32(5): 974-990 (2017) - [j18]Jie Xu, Qiaoyan Wen, Wenmin Li, Jian Shen, Debiao He:
Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing. Soft Comput. 21(18): 5265-5279 (2017) - 2016
- [j17]Haiyan Sun, Qiaoyan Wen, Wenmin Li:
A strongly secure pairing-free certificateless authenticated key agreement protocol under the CDH assumption. Sci. China Inf. Sci. 59(3): 32109:1-32109:16 (2016) - [j16]Rui Wang, Qiaoyan Wen, Hua Zhang, Su-Juan Qin, Wenmin Li:
Transparent Discovery of Hidden Service. IEICE Trans. Inf. Syst. 99-D(11): 2817-2820 (2016) - [j15]Dianli Guo, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
Adaptively Secure Broadcast Encryption With Constant Ciphertexts. IEEE Trans. Broadcast. 62(3): 709-715 (2016) - [j14]Jie Xu, Qiaoyan Wen, Wenmin Li, Zhengping Jin:
Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing. IEEE Trans. Parallel Distributed Syst. 27(1): 119-129 (2016) - [j13]Xuelei Li, Qiaoyan Wen, Wenmin Li:
A Three-Factor Based Remote User Authentication Scheme: Strengthening Systematic Security and Personal Privacy for Wireless Communications. Wirel. Pers. Commun. 86(3): 1593-1610 (2016) - 2015
- [j12]Peng Jiang, Qiaoyan Wen, Wenmin Li, Zhengping Jin, Hua Zhang:
An anonymous and efficient remote biometrics user authentication scheme in a multi server environment. Frontiers Comput. Sci. 9(1): 142-156 (2015) - [j11]Dianli Guo, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
An Improved Biometrics-Based Authentication Scheme for Telecare Medical Information Systems. J. Medical Syst. 39(3): 20 (2015) - [j10]Dianli Guo, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
A Novel Authentication Scheme Using Self-certified Public Keys for Telecare Medical Information Systems. J. Medical Syst. 39(6): 62:1-62:8 (2015) - [j9]Dianli Guo, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
Analysis and Improvement of 'Chaotic Map Based Mobile Dynamic ID Authenticated Key Agreement Scheme'. Wirel. Pers. Commun. 83(1): 35-48 (2015) - 2014
- [j8]Yi Sun, Qiaoyan Wen, Yudong Zhang, Wenmin Li:
Privacy-Preserving Self-Helped Medical Diagnosis Scheme Based on Secure Two-Party Computation in Wireless Sensor Networks. Comput. Math. Methods Medicine 2014: 214841:1-214841:9 (2014) - [j7]Xiuhua Lu, Qiaoyan Wen, Wenmin Li, Licheng Wang, Hua Zhang:
A Fuzzy Identity-Based Signcryption Scheme from Lattices. KSII Trans. Internet Inf. Syst. 8(11): 4203-4225 (2014) - [j6]Xuelei Li, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
Secure Privacy-Preserving Biometric Authentication Scheme for Telecare Medicine Information Systems. J. Medical Syst. 38(11): 139 (2014) - [j5]Qi Su, Wenmin Li:
Cryptanalysis of enhancement on "quantum blind signature based on two-state vector formalism". Quantum Inf. Process. 13(5): 1245-1254 (2014) - [j4]Qi Su, Wenmin Li:
Cryptanalysis of a sessional blind signature based on quantum cryptography. Quantum Inf. Process. 13(9): 1917-1929 (2014) - 2013
- [i1]Haiyan Sun, Qiaoyan Wen, Hua Zhang, Zhengping Jin, Wenmin Li:
Cryptanalysis and improvement of two certificateless three-party authenticated key agreement protocols. CoRR abs/1301.5091 (2013) - 2012
- [j3]Wenmin Li, Qiaoyan Wen, Qi Su, Zhengping Jin, Yanjiong Wang:
An Anonymous Password-Authenticated and Key Exchange Protocol for Roaming Services in Wireless Networks. Ad Hoc Sens. Wirel. Networks 16(1-3): 29-44 (2012) - [j2]Wenmin Li, Qiaoyan Wen, Qi Su, Zhengping Jin:
An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network. Comput. Commun. 35(2): 188-195 (2012)
2000 – 2009
- 2009
- [j1]Hua Zhang, Qiao-Yan Wen, Jie Zhang, Wenmin Li:
A constant rounds group key agreement protocol without using hash functions. Int. J. Netw. Manag. 19(6): 457-464 (2009) - 2008
- [c1]Wenmin Li, Qiao-Yan Wen:
Efficient Verifier-Based Password-Authentication Key Exchange Protocol via Elliptic Curves. CSSE (3) 2008: 1003-1006
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint