2022 - Research.com Rising Star of Science Award
Her primary scientific interests are in Encryption, Cloud computing, Computer security, Server and Access control. Her Encryption research is multidisciplinary, relying on both Computer security model and Database. Her research integrates issues of Computer network, Information privacy and Distributed computing in her study of Cloud computing.
Her Computer security course of study focuses on Revocation and Computational Diffie–Hellman assumption, Random oracle and Authentication. Her Server research incorporates themes from Edit distance, Usability and Fuzzy logic. In her work, Merkle tree, Dynamic data, Backup, Storage security and Upload is strongly intertwined with Data integrity, which is a subfield of Cloud computing security.
Jin Li mostly deals with Computer security, Encryption, Cloud computing, Access control and Theoretical computer science. Jin Li regularly ties together related areas like Service provider in her Computer security studies. Her biological study spans a wide range of topics, including Cryptography and Database.
Jin Li has included themes like Distributed computing and Server in her Cloud computing study. The various areas that Jin Li examines in her Server study include Computer security model and Upload. Her work deals with themes such as Data security, Overhead and Revocation, which intersect with Access control.
Her scientific interests lie mostly in Computer security, Encryption, Artificial intelligence, Computer network and Theoretical computer science. Jin Li focuses mostly in the field of Computer security, narrowing it down to topics relating to Protocol and, in certain cases, Computation. Her Encryption study integrates concerns from other disciplines, such as Cryptography, Construct, Cloud computing, Bloom filter and Information privacy.
Her work on Edge computing as part of general Cloud computing research is frequently linked to Outsourcing, thereby connecting diverse disciplines of science. Her work on Deep learning, Artificial neural network and Adversarial system as part of general Artificial intelligence research is frequently linked to Facial recognition system, bridging the gap between disciplines. In her study, which falls under the umbrella issue of Theoretical computer science, Homomorphic encryption is strongly linked to Key.
Jin Li mainly investigates Computer security, Encryption, Cloud computing, Information privacy and Computer network. Her work in the fields of Computer security, such as Public-key cryptography and Intrusion detection system, intersects with other areas such as Computer communication networks and Trustworthiness. Her research in Encryption intersects with topics in Multimedia and Iterative reconstruction.
Her research integrates issues of Random oracle, Software deployment and Keyword search in her study of Cloud computing. The concepts of her Information privacy study are interwoven with issues in Probabilistic logic, Deep learning, Artificial intelligence and Symmetric-key algorithm. Her Server and Client-side study in the realm of Computer network interacts with subjects such as Relay.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
Qian Wang;Cong Wang;Kui Ren;Wenjing Lou.
IEEE Transactions on Parallel and Distributed Systems (2011)
Enabling public verifiability and data dynamics for storage security in cloud computing
Qian Wang;Cong Wang;Jin Li;Kui Ren.
european symposium on research in computer security (2009)
Fuzzy Keyword Search over Encrypted Data in Cloud Computing
Jin Li;Qian Wang;Cong Wang;Ning Cao.
international conference on computer communications (2010)
Secure Ranked Keyword Search over Encrypted Cloud Data
Cong Wang;Ning Cao;Jin Li;Kui Ren.
international conference on distributed computing systems (2010)
Secure Deduplication with Efficient and Reliable Convergent Key Management
Jin Li;Xiaofeng Chen;Mingqiang Li;Jingwei Li.
IEEE Transactions on Parallel and Distributed Systems (2014)
Toward publicly auditable secure cloud data storage services
Cong Wang;Kui Ren;Wenjing Lou;Jin Li.
IEEE Network (2010)
A Hybrid Cloud Approach for Secure Authorized Deduplication
Jin Li;Yan Kit Li;Xiaofeng Chen;Patrick P.C. Lee.
IEEE Transactions on Parallel and Distributed Systems (2015)
New Algorithms for Secure Outsourcing of Modular Exponentiations
Xiaofeng Chen;Jin Li;Jianfeng Ma;Qiang Tang.
IEEE Transactions on Parallel and Distributed Systems (2014)
Securely Outsourcing Attribute-Based Encryption with Checkability
Jin Li;Xinyi Huang;Jingwei Li;Xiaofeng Chen.
IEEE Transactions on Parallel and Distributed Systems (2014)
Secure attribute-based data sharing for resource-limited users in cloud computing
Jin Li;Yinghui Zhang;Xiaofeng Chen;Yang Xiang;Yang Xiang.
Computers & Security (2018)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Xidian University
Virginia Tech
Zhejiang University
Xidian University
City University of Hong Kong
Swinburne University of Technology
City University of Hong Kong
Xidian University
City University of Hong Kong
Wuhan University
Indiana University
PSL University
University of Wisconsin–Madison
Oakland University
Zhejiang University
Institut Pasteur
Agriculture and Agriculture-Food Canada
Hong Kong Baptist University
University of Bordeaux
Stockholm University
University of California, Davis
Environment and Climate Change Canada
Freie Universität Berlin
Northwestern University
Pennsylvania State University
William Alanson White Institute