Follow
Fan Li
Fan Li
Lousiana Tech University
Verified email at latech.edu
Title
Cited by
Cited by
Year
Wireless MapReduce distributed computing
F Li, J Chen, Z Wang
IEEE Transactions on Information Theory 65 (10), 6101-6114, 2019
712019
Reversible data hiding scheme based on the Haar discrete wavelet transform and interleaving prediction method
F Li, Q Mao, CC Chang
Multimedia Tools and Applications 77, 5149-5168, 2018
272018
A Reversible Data Hiding Scheme Based on IWT and the Sudoku Method.
F Li, Q Mao, CC Chang
Int. J. Netw. Secur. 18 (3), 410-419, 2016
272016
Reversible data hiding with oriented and minimized distortions using cascading trellis coding
Q Mao, F Li, CC Chang
Information Sciences 317, 170-180, 2015
232015
Bi-stretch reversible data hiding algorithm for absolute moment block truncation coding compressed images
F Li, K Bharanitharan, CC Chang, Q Mao
Multimedia Tools and Applications 75, 16153-16171, 2016
142016
Adding a helper can totally remove the secrecy constraints in a two-user interference channel
J Chen, F Li
IEEE Transactions on Information Forensics and Security 14 (12), 3126-3139, 2019
122019
On distributed computing with heterogeneous communication constraints
N Shakya, F Li, J Chen
2018 52nd Asilomar Conference on Signals, Systems, and Computers, 1795-1799, 2018
82018
Distributed computing with heterogeneous communication constraints: The worst-case computation load and proof by contradiction
N Shakya, F Li, J Chen
arXiv preprint arXiv:1802.00413, 2018
82018
A Meaningful Scheme for Sharing Secret Images Using Mosaic Images.
S Zhai, F Li, CC Chang, Q Mao
Int. J. Netw. Secur. 17 (5), 643-649, 2015
72015
On distributed computing with heterogeneous communication constraints
N Shakya, F Li, J Chen
IEEE/ACM Transactions on Networking 30 (6), 2776-2787, 2022
62022
Deep learning for predicting the thermomechanical behavior of shape memory polymers
DS Ibarra, J Mathews, F Li, H Lu, G Li, J Chen
Polymer 261, 125395, 2022
52022
Communication-efficient signature-free asynchronous byzantine agreement
F Li, J Chen
2021 IEEE International Symposium on Information Theory (ISIT), 2864-2869, 2021
42021
Adding common randomness can remove the secrecy constraints in communication networks
F Li, J Chen
arXiv preprint arXiv:1907.04599, 2019
32019
How to break the limits of secrecy constraints in communication networks?
F Li, J Chen
2019 IEEE International Symposium on Information Theory (ISIT), 2743-2747, 2019
32019
Adding a helper can totally remove the secrecy constraints in interference channel
J Chen, F Li
arXiv preprint arXiv:1812.00550, 2018
22018
Communication-Efficient and Error-Free Gradecast with Optimal Resilience
J Zhu, F Li, J Chen
2023 IEEE International Symposium on Information Theory (ISIT), 108-113, 2023
12023
Adding common randomness can remove the secrecy penalty in GDoF
F Li, J Chen
IEEE Transactions on Information Theory 67 (4), 2308-2333, 2020
12020
A Survey of Blockchain, Artificial Intelligence, and Edge Computing for Web 3.0
J Zhu, F Li, J Chen
arXiv preprint arXiv:2311.13731, 2023
2023
Secure Communications with Limited Common Randomness at Transmitters
F Li, J Chen
2020 IEEE International Symposium on Information Theory (ISIT), 1552-1557, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–19