default search action
Haifeng Li 0009
Person information
- affiliation: Dalian University of Technology, School of Software, China
Other persons with the same name
- Haifeng Li — disambiguation page
- Haifeng Li 0001 — Harbin Institute of Technology, School of Computer Science and Technology, China (and 2 more)
- Haifeng Li 0002 — Zhejiang University, State Key Laboratory of Modern Optical Instrumentations, Hangzhou, China
- Haifeng Li 0003 — Beijing Jiaotong University, School of Electronic and Information Engineering, China
- Haifeng Li 0004 — Jinan University, College of Information Science and Technology / College of Cyber Security, Guangzhou, China (and 2 more)
- Haifeng Li 0005 — South China University of Technology, School of Electric Power, Guangzhou, China
- Haifeng Li 0006 — Central University of Finance and Economics, School of Information, Beijing, China (and 1 more)
- Haifeng Li 0007 — Central South University, School of Geosciences and Info-Physics, Changsha, Hunan, China (and 1 more)
- Haifeng Li 0008 — Civil Aviation University of China, Computer Science Department, Tianjin, China (and 2 more)
- Haifeng Li 0010 — Jiangsu Electric Power Company, State Grid, Nanjing, China
- Haifeng Li 0011 — Suzhou University of Science and Technology, School of Electronic and Information Engineering, China
- Haifeng Li 0012 — Motorola, Inc., Applied Research Center, Tempe, AZ, USA (and 2 more)
- Haifeng Li 0013 — Beihang University, School of reliability and systems engineering, Beijing, China
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Caihui Lan, Haifeng Li, Caifen Wang, Xiaodong Yang, Hailong Yao:
KASE-AKA: Key-aggregate keyword searchable encryption against keyword guessing attack and authorization abuse. Comput. Stand. Interfaces 90: 103852 (2024) - 2023
- [j13]Caihui Lan, Liangliang Liu, Caifen Wang, Haifeng Li:
An efficient and revocable attribute-based data sharing scheme with rich expression and escrow freedom. Inf. Sci. 624: 435-450 (2023) - 2022
- [j12]Xingbing Fu, Yong Ding, Haifeng Li, Jianting Ning, Ting Wu, Fagen Li:
A survey of lattice based expressive attribute based encryption. Comput. Sci. Rev. 43: 100438 (2022) - 2021
- [j11]Xingbing Fu, Nan Zhou, Libin Jiao, Haifeng Li, Jianwu Zhang:
The robust deep learning-based schemes for intrusion detection in Internet of Things environments. Ann. des Télécommunications 76(5-6): 273-285 (2021) - [j10]Haifeng Li, Yuxin Wang, Xingbing Fu, Caihui Lan, Caifen Wang, Fagen Li, He Guo:
PSCPAC: Post-quantum secure certificateless public auditing scheme in cloud storage. J. Inf. Secur. Appl. 61: 102927 (2021) - [j9]Caihui Lan, Caifen Wang, Haifeng Li, Liangliang Liu:
Comments on "Attribute-Based Data Sharing Scheme Revisited in Cloud Computing". IEEE Trans. Inf. Forensics Secur. 16: 2579-2580 (2021) - [j8]Caihui Lan, Haifeng Li, Caifen Wang:
Analysis of the Comments on "Identity-Based Distributed Provable Data Possession in Multicloud Storage". IEEE Trans. Serv. Comput. 14(1): 44-46 (2021) - 2020
- [j7]Haifeng Li, Liangliang Liu, Caihui Lan, Caifen Wang, He Guo:
Lattice-Based Privacy-Preserving and Forward-Secure Cloud Storage Public Auditing Scheme. IEEE Access 8: 86797-86809 (2020) - [j6]Wenyu Cao, Qiuyan Zhong, Haifeng Li, Shuyuan Liang:
A Novel Approach for Associative Classification Based on Information Entropy of Frequent Attribute Set. IEEE Access 8: 140181-140193 (2020) - [j5]Haifeng Li, Caihui Lan, Xingbing Fu, Caifen Wang, Fagen Li, He Guo:
A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing. Sensors 20(17): 4720 (2020)
2010 – 2019
- 2017
- [j4]Caihui Lan, Haifeng Li, Shoulin Yin, Lin Teng:
A New Security Cloud Storage Data Encryption Scheme Based on Identity Proxy Re-encryption. Int. J. Netw. Secur. 19(5): 804-810 (2017) - [j3]Haiyun Li, Haifeng Li, Kaibin Wei, Shoulin Yin, Chu Zhao:
A Multi-keyword Search Algorithm Based on Polynomial Function and Safety Inner-product Method in Secure Cloud Environment. J. Inf. Hiding Multim. Signal Process. 8(2): 413-422 (2017) - [j2]Haiyun Ma, Zhonglin Zhang, Haifeng Li, Shoulin Yin, Chu Zhao:
A Provable Private Data Aggregation Scheme Based on Digital Signatures and Homomorphic Encryption for Wireless Sensor Networks. J. Inf. Hiding Multim. Signal Process. 8(3): 536-543 (2017) - [j1]Wencui Chang, Haifeng Li, Shoulin Yin:
Mixed Symmetric Key and Elliptic Curve Encryption Scheme Used for Password Authentication and Update Under Unstable Network Environment. J. Inf. Hiding Multim. Signal Process. 8(3): 632-639 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 20:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint