关注
Tao Li
Tao Li
School of Computer Science, Qufu Normal University
在 qfnu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Semi‐selfish mining based on hidden Markov decision process
T Li, Z Wang, G Yang, Y Cui, Y Chen, X Yu
International Journal of Intelligent Systems 36 (7), 3596-3612, 2021
1012021
Is semi‐selfish mining available without being detected?
T Li, Z Wang, Y Chen, C Li, Y Jia, Y Yang
International Journal of Intelligent Systems 37 (12), 10576-10597, 2022
832022
PSSPR: a source location privacy protection scheme based on sector phantom routing in WSNs
Y Chen, J Sun, Y Yang, T Li, X Niu, H Zhou
International Journal of Intelligent Systems 37 (2), 1204-1221, 2022
792022
Rational protocols and attacks in blockchain system
T Li, Y Chen, Y Wang, Y Wang, M Zhao, H Zhu, Y Tian, X Yu, Y Yang
Security and Communication Networks 2020 (1), 8839047, 2020
762020
Randomness invalidates criminal smart contracts
Y Wang, A Bracciali, T Li, F Li, X Cui, M Zhao
Information Sciences 477, 291-301, 2019
502019
Dynamic multi-key FHE in asymmetric key setting from LWE
Y Chen, S Dong, T Li, Y Wang, H Zhou
IEEE Transactions on Information Forensics and Security 16, 5239-5249, 2021
452021
Optimal mixed block withholding attacks based on reinforcement learning
Y Wang, G Yang, T Li, L Zhang, Y Wang, L Ke, Y Dou, S Li, X Yu
International Journal of Intelligent Systems 35 (12), 2032-2048, 2020
432020
Socially-conforming cooperative computation in cloud networks
T Li, BB Gupta, R Metere
Journal of Parallel and Distributed Computing 117, 274-280, 2018
352018
Trust-based secure directed diffusion routing protocol in WSN
X Yu, F Li, T Li, N Wu, H Wang, H Zhou
Journal of Ambient Intelligence and Humanized Computing, 1-13, 2022
302022
Energy trading scheme based on consortium blockchain and game theory
Y Chen, Y Li, Q Chen, X Wang, T Li, C Tan
Computer Standards & Interfaces 84, 103699, 2023
282023
Belief and fairness: A secure two-party protocol toward the view of entropy for IoT devices
Y Wang, G Yang, T Li, F Li, Y Tian, X Yu
Journal of Network and Computer Applications 161, 102641, 2020
282020
Privacy‐aware PKI model with strong forward security
F Li, Z Liu, T Li, H Ju, H Wang, H Zhou
International Journal of Intelligent Systems 37 (12), 10049-10065, 2022
262022
Dual attention guided multi-scale CNN for fine-grained image classification
X Liu, L Zhang, T Li, D Wang, Z Wang
Information Sciences 573, 37-45, 2021
262021
Impsuic: a quality updating rule in mixing coins with maximum utilities
X Yu, Z Wang, Y Wang, F Li, T Li, Y Chen, Y Tian, X Yu
International Journal of Intelligent Systems 36 (3), 1182-1198, 2021
202021
A blockchain-empowered authentication scheme for worm detection in wireless sensor network
Y Chen, X Yang, T Li, Y Ren, Y Long
Digital Communications and Networks, 2022
172022
BCEAD: A Blockchain‐Empowered Ensemble Anomaly Detection for Wireless Sensor Network via Isolation Forest
X Yang, Y Chen, X Qian, T Li, X Lv
Security and Communication Networks 2021 (1), 9430132, 2021
162021
A blockchain index structure based on subchain query
et al. Xing X, Chen Y, Li T
Journal of Cloud Computing 10 (01), 1-11, 2021
162021
A brief survey on secure multi-party computing in the presence of rational parties
Y Wang, T Li, H Qin, J Li, W Gao, Z Liu, Q Xu
Journal of Ambient Intelligence and Humanized Computing 6, 807-824, 2015
162015
STSIIML: Study on token shuffling under incomplete information based on machine learning
Y Wang, T Li, M Liu, C Li, H Wang
International Journal of Intelligent Systems 37 (12), 11078-11100, 2022
152022
Adversarial behaviours in mixing coins under incomplete information
Y Wang, A Bracciali, G Yang, T Li, X Yu
Applied Soft Computing 96, 106605, 2020
122020
系统目前无法执行此操作,请稍后再试。
文章 1–20