Wireless MapReduce distributed computing F Li, J Chen, Z Wang IEEE Transactions on Information Theory 65 (10), 6101-6114, 2019 | 74 | 2019 |
Reversible data hiding scheme based on the Haar discrete wavelet transform and interleaving prediction method F Li, Q Mao, CC Chang Multimedia Tools and Applications 77, 5149-5168, 2018 | 29 | 2018 |
A Reversible Data Hiding Scheme Based on IWT and the Sudoku Method. F Li, Q Mao, CC Chang Int. J. Netw. Secur. 18 (3), 410-419, 2016 | 27 | 2016 |
Reversible data hiding with oriented and minimized distortions using cascading trellis coding Q Mao, F Li, CC Chang Information Sciences 317, 170-180, 2015 | 23 | 2015 |
Deep learning for predicting the thermomechanical behavior of shape memory polymers DS Ibarra, J Mathews, F Li, H Lu, G Li, J Chen Polymer 261, 125395, 2022 | 15 | 2022 |
On distributed computing with heterogeneous communication constraints N Shakya, F Li, J Chen IEEE/ACM Transactions on Networking 30 (6), 2776-2787, 2022 | 15 | 2022 |
Bi-stretch reversible data hiding algorithm for absolute moment block truncation coding compressed images F Li, K Bharanitharan, CC Chang, Q Mao Multimedia Tools and Applications 75, 16153-16171, 2016 | 15 | 2016 |
Adding a helper can totally remove the secrecy constraints in a two-user interference channel J Chen, F Li IEEE Transactions on Information Forensics and Security 14 (12), 3126-3139, 2019 | 12 | 2019 |
Communication-efficient signature-free asynchronous byzantine agreement F Li, J Chen 2021 IEEE International Symposium on Information Theory (ISIT), 2864-2869, 2021 | 11 | 2021 |
Distributed computing with heterogeneous communication constraints: The worst-case computation load and proof by contradiction N Shakya, F Li, J Chen arXiv preprint arXiv:1802.00413, 2018 | 8 | 2018 |
Communication-efficient and error-free gradecast with optimal resilience J Zhu, F Li, J Chen 2023 IEEE International Symposium on Information Theory (ISIT), 108-113, 2023 | 6 | 2023 |
A survey of blockchain, artificial intelligence, and edge computing for Web 3.0 J Zhu, F Li, J Chen Computer Science Review 54, 100667, 2024 | 5 | 2024 |
A Meaningful Scheme for Sharing Secret Images Using Mosaic Images. S Zhai, F Li, CC Chang, Q Mao Int. J. Netw. Secur. 17 (5), 643-649, 2015 | 5 | 2015 |
Adding common randomness can remove the secrecy constraints in communication networks F Li, J Chen arXiv preprint arXiv:1907.04599, 2019 | 3 | 2019 |
How to break the limits of secrecy constraints in communication networks? F Li, J Chen 2019 IEEE International Symposium on Information Theory (ISIT), 2743-2747, 2019 | 3 | 2019 |
Adding a helper can totally remove the secrecy constraints in interference channel J Chen, F Li arXiv preprint arXiv:1812.00550, 2018 | 2 | 2018 |
Blockchain application to the processes in material design, production, distribution, and disposal: A survey DS Ibarra, F Li, J Zhu, J Chen Journal of Industrial Information Integration 41, 100638, 2024 | 1 | 2024 |
Adding common randomness can remove the secrecy penalty in GDoF F Li, J Chen IEEE Transactions on Information Theory 67 (4), 2308-2333, 2020 | 1 | 2020 |
Secure Communications with Limited Common Randomness at Transmitters F Li, J Chen 2020 IEEE International Symposium on Information Theory (ISIT), 1552-1557, 2020 | | 2020 |