Gongli Li

ORCID: 0000-0003-0864-4858
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy-Preserving Technologies in Data
  • Cryptographic Implementations and Security
  • Cryptography and Data Security
  • Chaos-based Image/Signal Encryption
  • Traffic and Road Safety
  • Injury Epidemiology and Prevention
  • Video Coding and Compression Technologies
  • Genetics, Bioinformatics, and Biomedical Research
  • Human Mobility and Location-Based Analysis
  • Machine Learning and Data Classification
  • Image and Video Quality Assessment
  • Simulation and Modeling Applications
  • Urban Transport and Accessibility
  • Complexity and Algorithms in Graphs
  • Educational Technology and Pedagogy
  • Research studies in Vietnam
  • Interconnection Networks and Systems
  • Advanced Algorithms and Applications
  • Cloud Data Security Solutions
  • Teaching and Learning Programming
  • Embedded Systems and FPGA Design
  • Artificial Intelligence in Healthcare
  • Algorithms and Data Compression
  • Educational Games and Gamification
  • Internet Traffic Analysis and Secure E-voting

Henan Normal University
2016-2025

Henan University of Economic and Law
2021

Xinxiang University
2020

Zhejiang Science and Technology Information Institute
2017

Urban Planning & Design Institute of Shenzhen (China)
2010-2011

Shantou University
2008

Shantou University Medical College
2008

ABSTRACT Private Set Intersection Cardinality (PSI‐CA) is a privacy‐preserving method designed to compute the size of intersection between two or more sets without revealing any additional information. In scenarios that require extensive computational resources, outsourcing tasks cloud servers has emerged as common solution. Nevertheless, malicious behavior may lead incorrect results and pose challenges for clients when verifying correctness. First, with limited capabilities, cloud‐assisted...

10.1002/cpe.70126 article EN Concurrency and Computation Practice and Experience 2025-05-16

Objective. In China, despite national motorcycle helmet legislation and the known safety benefits of helmets, use remains low. The aim this study was to determine rate attitudes towards among drivers passengers in two cities Southern China provide baseline data scientific evidence for formulation an intervention aimed at strengthening road law enforcement. Methods. Observational sites were randomly selected from three types (national roads, main streets, subordinate streets). Observations...

10.1080/15389580801895152 article EN Traffic Injury Prevention 2008-04-04

Secret sharing is a basic tool in modern communication, which protects privacy and provides information security. Among the secret schemes, fairness vital desirable property. To achieve fairness, existing schemes either require trusted third party or execution of multiround protocol, are impractical. Moreover, classic scheme requires expensive computing verification phase. In this work, we provide an outsourcing hierarchical threshold (HTSS) protocol based on reputation. scheme, participants...

10.1155/2019/6989383 article EN cc-by Security and Communication Networks 2019-10-10

Stream processor has been widely used in multimedia processing because of the high performance gained by parallelism. In order to achieve higher parallelism, stream employs large width structure VLIW (very long instruction word, VLIW) and multiple parallelizable instructions are organized into one VLIW. Because is fixed, there a number empty operations (non-operation, NOP) filled VLIW, which results serious code size expansion problem. Aiming at this issue, horizontal compression vertical...

10.1109/access.2020.2985501 article EN cc-by IEEE Access 2020-01-01

Following the extensive urbanization, more and people swarm into cities. Demands for urban infrastructure land use, therefore, will change rapidly drastically, most planning should be regulated or remade. Under new situation, location of public service facility paid attention to, while general software platform could not assist it well. Therefore, a kind traffic network system is proposed, which composed both vehicle model pedestrian model, corresponding algorithms are built rebuilt....

10.1109/igarss.2010.5648863 article EN 2010-07-01

With the significant attention to information security, mobile terminals such as smartphone always be demand for integrating cryptographic processor. In this paper, a high-efficiency reconfigurable processor is presented. Integrating small amounts of computing units designed by technology and developing instruction level parallelism different operations in block among multiple blocks, proposed architecture can improve performance algorithm under condition limited resources. The was simulated...

10.1109/icam.2016.7813592 article EN 2016-11-01

China has been going through urbanization, and foreign experiences of urbanization show that would finally lead to integrated planning development region. Difference from the process is leaping following with large-scale population flowing, which not studied especially in models. Therefore, models could do well studying for China. Using experience application systems reference, a new model on dynamic region considering interaction multi-factors proposed, based which, system developed analyze...

10.1109/rsete.2011.5964753 article EN International Conference on Remote Sensing, Environment and Transportation Engineering 2011-06-01

In order to improve the performance of block cipher, clustered processor structure is put forward. How schedule data in multiple clusters will influence directly. Based on analyzing characteristics cipher flow, we propose a scheduling scheme according width and operation mode. The final algorithm mapping experiment results show that not only meets distribution demand different algorithms, but also reduces number instructions algorithms need, thus it can enhance throughput most algorithms.

10.1016/j.procs.2017.03.124 article EN Procedia Computer Science 2017-01-01

10.7544/issn1000-1239.2017.20160670 article EN Journal of Computer Research and Development 2017-12-01

Breast cancer is the most common for females worldwide. The literature presents a comparison of four machine learning algorithms: Classification Tree, Pruned Bagging, and Random Forests on Wisconsin Diagnostic Cancer dataset by measuring test sensitivity, specificity, precision, negative predictive value, misclassification error rate. result shows that performance pruned classification tree better than normal tree; aggregated models (Bagging Forests) are only use one single decision to...

10.1109/iccasit53235.2021.9633485 article EN 2021 IEEE 3rd International Conference on Civil Aviation Safety and Information Technology (ICCASIT) 2021-10-20
Coming Soon ...