关注
Ping Li
Ping Li
South China Normal University
在 mail2.sysu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Multi-key privacy-preserving deep learning in cloud computing
P Li, J Li, Z Huang, T Li, CZ Gao, SM Yiu, K Chen
Future Generation Computer Systems 74, 76-85, 2017
5122017
Privacy-preserving outsourced classification in cloud computing
P Li, J Li, Z Huang, CZ Gao, WB Chen, K Chen
Cluster Computing 21, 277-286, 2018
3982018
Differentially private Naive Bayes learning over multiple data sources
T Li, J Li, Z Liu, P Li, C Jia
Information Sciences 444, 89-104, 2018
2362018
Verifiable searchable encryption with aggregate keys for data sharing system
Z Liu, T Li, P Li, C Jia, J Li
Future Generation Computer Systems 78, 778-788, 2018
1362018
Privacy-preserving machine learning with multiple data providers
P Li, T Li, H Ye, J Li, X Chen, Y Xiang
Future Generation Computer Systems 87, 341-350, 2018
1072018
New directly revocable attribute-based encryption scheme and its application in cloud storage environment
H Wang, Z Zheng, L Wu, P Li
Cluster Computing 20, 2385-2392, 2017
1042017
Generating stable biometric keys for flexible cloud computing authentication using finger vein
Z Wu, L Tian, P Li, T Wu, M Jiang, C Wu
Information Sciences 433, 431-447, 2018
942018
Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice
Y Zhang, J Li, D Zheng, P Li, Y Tian
Journal of Network and Computer Applications 122, 50-60, 2018
882018
Towards secure and flexible EHR sharing in mobile health cloud under static assumptions
Z Cai, H Yan, P Li, Z Huang, C Gao
Cluster Computing 20, 2415-2422, 2017
872017
Outsourced privacy-preserving classification service over encrypted data
T Li, Z Huang, P Li, Z Liu, C Jia
Journal of Network and Computer Applications 106, 100-110, 2018
772018
A QDCT-and SVD-based color image watermarking scheme using an optimized encrypted binary computer-generated hologram
J Li, Q Lin, C Yu, X Ren, P Li
Soft Computing 22, 47-65, 2018
492018
High-dimension space projection-based biometric encryption for fingerprint with fuzzy minutia
Z Wu, B Liang, L You, Z Jian, J Li
Soft Computing 20, 4907-4918, 2016
312016
Secure and efficient outsourcing differential privacy data release scheme in cyber–physical system
H Ye, J Liu, W Wang, P Li, T Li, J Li
Future Generation Computer Systems 108, 1314-1323, 2020
292020
Privacy-preserving outsourcing of image feature extraction in cloud computing
P Li, T Li, ZA Yao, CM Tang, J Li
Soft Computing 21, 4349-4359, 2017
272017
A finger vein recognition algorithm based on deep learning
C Chen, Z Wu, J Zhang, P Li, F Azmat
International Journal of Embedded Systems 9 (3), 220-228, 2017
152017
Face recognition based on the fusion of wavelet packet sub-images and fisher linear discriminant
T Wenjing, G Fei, D Renren, S Yujuan, L Ping
Multimedia Tools and Applications 76, 22725-22740, 2017
142017
Privacy-preserving multikey computing framework for encrypted data in the cloud
J Zhang, ZL Jiang, P Li, SM Yiu
Information Sciences 575, 217-230, 2021
112021
Rational computing protocol based on fuzzy theory
Y Wang, T Li, L Chen, P Li, H Leung, Z Liu, Q Xu
Soft Computing 20, 429-438, 2016
112016
A finger vein recognition algorithm using feature block fusion and depth neural network
C Chen, Z Wu, P Li, J Zhang, Y Wang, H Li
Computational Intelligence and Intelligent Systems: 7th International …, 2016
52016
Linear Codes from Two Weakly Regular Plateaued Balanced Functions
S Yang, T Zhang, P Li
Entropy 25 (2), 369, 2023
32023
系统目前无法执行此操作,请稍后再试。
文章 1–20