Follow
Lifeng Yuan
Title
Cited by
Cited by
Year
Novel threshold changeable secret sharing schemes based on polynomial interpolation
L Yuan, M Li, C Guo, KKR Choo, Y Ren
PloS one 11 (10), e0165512, 2016
202016
Secret image sharing scheme with threshold changeable capability
L Yuan, M Li, C Guo, W Hu, X Luo
Mathematical Problems in Engineering 2016, 2016
172016
An evaluation of deep learning-based computer generated image detection approaches
X Ni, L Chen, L Yuan, G Wu, Y Yao
IEEE Access 7, 130830-130840, 2019
142019
Reversible data hiding in encrypted images using median edge detector and two’s complement
R Wang, G Wu, Q Wang, L Yuan, Z Zhang, G Miao
Symmetry 13 (6), 921, 2021
132021
A verifiable e-voting scheme with secret sharing
LYMLCGWHZ Wang
International Journal of Network Security 19 (2), 260-271, 2017
12*2017
A verifiable e-voting scheme with secret sharing
L Yuan, M Li, C Guo, W Hu, X Tan
2015 IEEE 16th International Conference on Communication Technology (ICCT …, 2015
122015
A reversible steganography scheme of secret image sharing based on cellular automata and least significant bits construction
WT Hu, MC Li, C Guo, LF Yuan
Mathematical Problems in Engineering 2015, 2015
122015
Data poisoning attacks on graph convolutional matrix completion
Q Zhou, Y Ren, T Xia, L Yuan, L Chen
International conference on algorithms and architectures for parallel …, 2019
112019
A group authentication scheme supporting cheating detection and identification
C Guo, R Zhuang, L Yuan, B Feng
2015 Ninth International Conference on Frontier of Computer Science and …, 2015
82015
A lossless secret image sharing scheme using a larger finite field
W Hu, T Wu, Y Chen, Y Shen, L Yuan
Multimedia Tools and Applications 80 (19), 28731-28743, 2021
72021
A new blockchain-based multi-level location secure sharing scheme
Q Wang, T Xia, Y Ren, L Yuan, G Miao
Applied Sciences 11 (5), 2260, 2021
52021
A novel threshold changeable secret image sharing scheme
G Wu, M Wang, Q Wang, Y Yao, L Yuan, G Miao
Symmetry 13 (2), 286, 2021
22021
Cps: A Community Priority Based Vaccine Distribution Strategy in Different Networks
M Jiang, Y Ren, Y Yao, L Yuan, T Wu, Z Wang
2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th …, 2018
22018
一种利用数独和细胞自动机的秘密图像共享方案
胡伟通, 李明楚, 郭成, 袁理锋
小型微型计算机系统 36 (6), 1271-1275, 2015
22015
SNN-PPRL: A secure record matching scheme based on siamese neural network
S Yao, Y Ren, D Wang, Y Wang, W Yin, L Yuan
Journal of Information Security and Applications 76, 103529, 2023
12023
A Study of Local Differential Privacy Mechanisms Based on Federated Learning
Y REN, R LIU, D WANG, L YUAN, Y SHEN, G WU, Q WANG, C YANG
电子与信息学报 45 (3), 784-792, 2023
12023
Semantic Shilling Attack against Heterogeneous Information Network Based Recommend Systems
Y Ren, Z Li, L Yuan, Z Zhang, C Su, Y Wang, G Wu
IEICE TRANSACTIONS on Information and Systems 105 (2), 289-299, 2022
12022
DGNN: Dependency Graph Neural Network for Multimodal Emotion Recognition in Conversation
Z Zhang, X Wang, L Yuan, G Miao, M Liu, W Yun, G Wu
International Conference on Neural Information Processing, 86-99, 2023
2023
Feature Attribution-Guided Contrastive Learning: Mitigating Lexical Bias in Toxic Speech Detection
Z Peng, Y Ren, D Wang, L Zhang, L Yuan, Y Ji
2023 International Conference on New Trends in Computational Intelligence …, 2023
2023
Chinese Event Causality Identification Based on Retrieval Enhancement
Y Gao, Y Ren, J Rao, Z Chen, Q Xi, H Wang, D Wang, L Yuan
CCF International Conference on Natural Language Processing and Chinese …, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20