Követés
Fan Li
Fan Li
Lousiana Tech University
E-mail megerősítve itt: latech.edu
Cím
Hivatkozott rá
Hivatkozott rá
Év
Wireless MapReduce distributed computing
F Li, J Chen, Z Wang
IEEE Transactions on Information Theory 65 (10), 6101-6114, 2019
742019
Reversible data hiding scheme based on the Haar discrete wavelet transform and interleaving prediction method
F Li, Q Mao, CC Chang
Multimedia Tools and Applications 77, 5149-5168, 2018
292018
A Reversible Data Hiding Scheme Based on IWT and the Sudoku Method.
F Li, Q Mao, CC Chang
Int. J. Netw. Secur. 18 (3), 410-419, 2016
272016
Reversible data hiding with oriented and minimized distortions using cascading trellis coding
Q Mao, F Li, CC Chang
Information Sciences 317, 170-180, 2015
232015
Deep learning for predicting the thermomechanical behavior of shape memory polymers
DS Ibarra, J Mathews, F Li, H Lu, G Li, J Chen
Polymer 261, 125395, 2022
152022
On distributed computing with heterogeneous communication constraints
N Shakya, F Li, J Chen
IEEE/ACM Transactions on Networking 30 (6), 2776-2787, 2022
152022
Bi-stretch reversible data hiding algorithm for absolute moment block truncation coding compressed images
F Li, K Bharanitharan, CC Chang, Q Mao
Multimedia Tools and Applications 75, 16153-16171, 2016
152016
Adding a helper can totally remove the secrecy constraints in a two-user interference channel
J Chen, F Li
IEEE Transactions on Information Forensics and Security 14 (12), 3126-3139, 2019
122019
Communication-efficient signature-free asynchronous byzantine agreement
F Li, J Chen
2021 IEEE International Symposium on Information Theory (ISIT), 2864-2869, 2021
112021
Distributed computing with heterogeneous communication constraints: The worst-case computation load and proof by contradiction
N Shakya, F Li, J Chen
arXiv preprint arXiv:1802.00413, 2018
82018
Communication-efficient and error-free gradecast with optimal resilience
J Zhu, F Li, J Chen
2023 IEEE International Symposium on Information Theory (ISIT), 108-113, 2023
62023
A survey of blockchain, artificial intelligence, and edge computing for Web 3.0
J Zhu, F Li, J Chen
Computer Science Review 54, 100667, 2024
52024
A Meaningful Scheme for Sharing Secret Images Using Mosaic Images.
S Zhai, F Li, CC Chang, Q Mao
Int. J. Netw. Secur. 17 (5), 643-649, 2015
52015
Adding common randomness can remove the secrecy constraints in communication networks
F Li, J Chen
arXiv preprint arXiv:1907.04599, 2019
32019
How to break the limits of secrecy constraints in communication networks?
F Li, J Chen
2019 IEEE International Symposium on Information Theory (ISIT), 2743-2747, 2019
32019
Adding a helper can totally remove the secrecy constraints in interference channel
J Chen, F Li
arXiv preprint arXiv:1812.00550, 2018
22018
Blockchain application to the processes in material design, production, distribution, and disposal: A survey
DS Ibarra, F Li, J Zhu, J Chen
Journal of Industrial Information Integration 41, 100638, 2024
12024
Adding common randomness can remove the secrecy penalty in GDoF
F Li, J Chen
IEEE Transactions on Information Theory 67 (4), 2308-2333, 2020
12020
Secure Communications with Limited Common Randomness at Transmitters
F Li, J Chen
2020 IEEE International Symposium on Information Theory (ISIT), 1552-1557, 2020
2020
A rendszer jelenleg nem tudja elvégezni a műveletet. Próbálkozzon újra később.
Cikkek 1–19