default search action
Hui Li 0006
Person information
- affiliation: Xidian University, State Key Laboratory of Integrated Network Services, Xi'an, China
- affiliation: Xidian University, School of Cyber Engineering, Xi'an, China
- not to be confused with: Hui Li 0034
Other persons with the same name
- Hui Li — disambiguation page
- Hui Li 0001 — Nankai University, College of Tourism and Service Management, Tianjin, China (and 1 more)
- Hui Li 0002 (aka: Hui Xylo Li) — Boeing (and 1 more)
- Hui Li 0003 — University of Ottawa, Canada
- Hui Li 0004 — University of Queensland, Brisbane, QLD, Australia
- Hui Li 0005 — Xidian University, School of Computer Science and Technology, Xi'an, China (and 1 more)
- Hui Li 0007 — Jilin University, China
- Hui Li 0008 — Chinese Academy of Sciences, Institute of Remote Sensing and Digital Earth, Beijing, China
- Hui Li 0009 — Lanzhou University, China
- Hui Li 0010 — Qingdao University of Science and Technology, School of Information Science and Technology, China (and 1 more)
- Hui Li 0011 — Xiamen University of Technology, Department of Spatial Information Science and Engineering, China (and 1 more)
- Hui Li 0012 — Xidian University, National Laboratory of Radar Signal Processing, Xi'an, China
- Hui Li 0013 — Nanjing University of Aeronautics and Astronautics, College of Computer Science and Technology, China
- Hui Li 0014 — Dalian Maritime University, College of Information Science and Technology, China
- Hui Li 0015 — China University of Geosciences, Department of Geography, Wuhan, China (and 1 more)
- Hui Li 0016 — Dalian University of Technology, School of Information and Communication Engineering, China (and 2 more)
- Hui Li 0017 — Heidelberg University, Institute of Computer Science, Germany
- Hui Li 0018 — Northeastern University, Information Science and Engineering, Shenyang, China
- Hui Li 0019 — Hefei University of Technology, School of Computer Science and Information Engineering, China
- Hui Li 0020 — Xi'an Jiaotong University, School of Mathematics and Statistics, China (and 2 more)
- Hui Li 0021 — Berlin Institute of Technology, Germany
- Hui Li 0022 — Peking University, Shenzhen Graduate School, Institute of Big Data Technologies, School of Electronic and Computer Engineering, China (and 1 more)
- Hui Li 0023 — Duisburg University, Germany
- Hui Li 0024 — University of Chicago, Department of Radiology, IL, USA
- Hui Li 0025 — University of Leiden, The Netherlands
- Hui Li 0026 — Chinese Academy of Sciences, Shenzhen Institutes of Advanced Technology, Research Centre for Medical Robotics and Minimally Invasive Surgical Devices, China (and 1 more)
- Hui Li 0027 — Beijing University of Chemical Technology, Department of Computer Science and Technology, China (and 1 more)
- Hui Li 0028 — Los Alamos National Laboratory, NM, USA (and 1 more)
- Hui Li 0029 — Hong Kong Polytechnic University, Department of Computing, Hong Kong
- Hui Li 0030 — Tsinghua University, Department of Energy and Power Engineering, MOE Key Laboratory for Thermal Science and Power Engineering, Beijing, China
- Hui Li 0031 — University of Adelaide, School of Computer Science, SA, Australia
- Hui Li 0032 — Howard University, Department of Systems and Computer Science, Washington, DC, USA
- Hui Li 0033 — Beijing University of Posts and Telecommunications, Beijing Laboratory of Advanced Information Network, China
- Hui Li 0034 — Xidian University, School of Telecommunications Engineering, State Key Laboratory of Integrated Services Networks, Xi'an, China (and 1 more)
- Hui Li 0035 — Harbin Institute of Technology, School of Civil Engineering, China
- Hui Li 0036 — Beijing Jiaotong University, School of Computer and Information Technology, China
- Hui Li 0037 — Jiangnan University, School of Internet of Things Engineering, Jiangsu Provincial Engineering Laboratory of Pattern Recognition and Computational Intelligence, Wuxi, China
- Hui Li 0038 — Chinese Academy of Sciences, Institute of ComputingTechnology, Bioinformatics Research Group, Advanced Computing Research Laboratory, Beijing, China
- Hui Li 0039 — Hainan University, College of Information Science and Technology, Haikou, China (and 2 more)
- Hui Li 0040 — Chongqing University, State Key Laboratory of Power Transmission Equipment & System Security and New Technology, China
- Hui Li 0041 — University of Electronic Science and Technology of China, School of Astronautics and Aeronautics, Chengdu, China
- Hui Li 0042 — Carnegie Mellon University, Tepper School of Business,Pittsburgh, PA, USA
- Hui Li 0043 — South China Normal University, National Center for International Research on Green Optoelectronics, Guangzhou, China
- Hui Li 0044 — Guangdong University of Technology, School of Civil and Transportation Engineering, Guangzhou, China
- Hui Li 0045 — Harbin Institute of Technology, Communication Research Center, China
- Hui Li 0046 — Guizhou University, College of Computer Science and Technology / Guizhou Engineer Lab of ACMIS, Guiyang, China
- Hui Li 0047 — Beijing Institute of Technology, School of Mechatronic Engineering, China
- Hui Li 0048 — Shandong University, School of Software, Research Center of Software and Data Engineering, Jinan, China
- Hui Li 0049 — Shanghai University of Electric Power, College of Automation Engineering, China
- Hui Li 0050 — Northwestern Polytechnical University, School of Electronics and Information, Xi'an, China
- Hui Li 0051 — Beihang University, School of Instrumentation Science and Opto-electronics Engineering, MoE Key Laboratory of Precision Opto-mechatronics Technology, Beijing, China
- Hui Li 0052 — Northwestern Polytechnical University, School of Marine Science and Technology, Xi'an, China
- Hui Li 0053 — Xi'an Jiaotong University, School of Information and Communications Engineering / National Engineering Laboratory for Offshore Oil Exploration, China
- Hui Li 0054 — China University of Petroleum (East China), College of Oceanography and Space Informatics, Qingdao, China
- Hui Li 0055 — Fujian Fuzhou Railway Local Railway Development Company, Ltd., Fuzhou, China
- Hui Li 0056 — Xi'an University of Technology, School of Automation and Information Engineering, China (and 1 more)
- Hui Li 0057 — Xiamen University, Department of Computer Science, School of Informatics, China (and 1 more)
- Hui Li 0058 — Tsinghua University, Department of Industrial Engineering, Beijing, China
- Hui Li 0059 — University of Nebraska-Lincoln, Department of Chemistry, NE, USA
- Hui Li 0060 — Yanshan University, School of Information Science and Engineering, Qinhuangdao, China (and 1 more)
- Hui Li 0061 — Florida State University, Center for Advanced Power Systems, Tallahassee, FL, USA (and 1 more)
- Hui Li 0062 — Lvliang University, Department of Mining Engineering, China (and 1 more)
- Hui Li 0063 — Wuhan University, Institute of Technological Sciences, School of Power and Mechanical Engineering, China (and 1 more)
- Hui Li 0064 — Henan Polytechnic University, School of Physics and Electronic Information Engineering, Jiaozuo, China (and 1 more)
- Hui Li 0065 — Dalian University of Technology, Institute of Systems Engineering, China
- Hui Li 0066 — Central China Normal University, School of Education, Wuhan, China
- Hui Li 0067 — University of Electronic Science and Technology of China, School of Information and Communication Engineering, Chengdu, China
- Hui Li 0068 — Signal Innovations Group Inc., Durham, NC, USA (and 1 more)
- Hui Li 0069 — Tianjin University, College of Intelligence and Computing, China
- Hui Li 0070 — Beijing University of Posts and Telecommunications, School of Cyberspace Security, China
- Hui Li 0071 — Xinjiang Medical University, Central Laboratory, Urumqi, China
- Hui Li 0072 — Chongqing Technology and Business University, School of Management Science and Engineering, China
- Hui Li 0073 — Huizhou University, School of Computer Science and Engineering, China
- Hui Li 0074 — Harbin Engineering University, College of Intelligent Systems Science and Engineering, China
- Hui Li 0075 — Central University of Finance and Economics, School of Information, Beijing, China (and 1 more)
- Hui Li 0076 — Beijing Institute of Technology, School of Automation, China (and 1 more)
- Hui Li 0077 — Zhejiang Chinese Medical University, Third Affiliated Hospital, Department of Rehabilitation, Hangzhou, China
- Hui Li 0078 — Guangxi University for Nationalities, School of Management, Nanning, China
- Hui Li 0079 — Macquarie University, Sydney, NSW, Australia
- Hui Li 0080 — University of Electronic Science and Technology of China, School of Information and Communication Engineering, Chengdu, China
- Hui Li 0081 — Lanzhou University of Technology, School of Computer and Communication, China
- Hui Li 0082 — Lanzhou Jiaotong University, School of Mathematics and Physics, China
- Hui Li 0084 — anghai University of Sport, School of International Education, China
- Hui Li 0085 — Xi'an Jiaotong-Liverpool University, School of Advanced Technology, Suzhou, China
- Hui Li 0086 — Shandong University, School of Control Science and Engineering, Jinan, China
- Hui Li 0087 — Harbin Institute of Technology, Department of Mathematics, China
- Hui Li 0088 — Northeast Normal University, School of Geographical Sciences, Changchun, China
- Hui Li 0089 — University of Science and Technology of China, CAS Key Laboratory of Wireless-Optical Communications, Hefei, China
- Hui Li 0090 — Qingdao University of Science and Technology, Optoelectronic Materials and Technologies Engineering Laboratory of Shandong, College of Mathematical and Physical Sciences, China (and 1 more)
- Hui Li 0091 — Guangxi University of Science and Technology, Liuzhou, China
- Hui Li 0092 — Northeast Normal University, School of Information Science and Technology, Changchun, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j267]Ye Bi, Kai Fan, Zhilin Zeng, Kan Yang, Hui Li, Yintang Yang:
Seamless group handover authentication protocol for vehicle networks: Services continuity. Comput. Networks 252: 110661 (2024) - [j266]Silv Wang, Kai Fan, Kuan Zhang, Hui Li, Yintang Yang:
Data complexity-based batch sanitization method against poison in distributed learning. Digit. Commun. Networks 10(2): 416-428 (2024) - [j265]Zhibin Wang, Jiangtao Cui, Xiyue Gao, Hui Li, Yanguo Peng, Zhuang Liu, Hui Zhang, Kankan Zhao:
Quartet: A Query Aware Database Adaptive Compilation Decision System. Expert Syst. Appl. 244: 122841 (2024) - [j264]Nan Gao, Kai Fan, Haoyang Wang, Hongyan Chen, Kuan Zhang, Hui Li, Yintang Yang:
Ciphertext Retrieval With Identity Bidirectional Authentication and Matrix Index in IoT. IEEE Internet Things J. 11(1): 889-903 (2024) - [j263]Nan Gao, Kai Fan, Haoyang Wang, Kuan Zhang, Hui Li, Yintang Yang:
Public-Key Inverted-Index Keyword Search With Designated Tester and Multiuser Key Decryption in IoT. IEEE Internet Things J. 11(1): 1065-1079 (2024) - [j262]Kai Fan, Jingtao Hong, Wenjie Li, Xingwen Zhao, Hui Li, Yintang Yang:
FLSG: A Novel Defense Strategy Against Inference Attacks in Vertical Federated Learning. IEEE Internet Things J. 11(2): 1816-1826 (2024) - [j261]Wenjie Li, Kai Fan, Kan Yang, Yintang Yang, Hui Li:
PBFL: Privacy-Preserving and Byzantine-Robust Federated-Learning-Empowered Industry 4.0. IEEE Internet Things J. 11(4): 7128-7140 (2024) - [j260]Kai Fan, Hengrui Lu, Yuhan Bai, Yu Luo, Yintang Yang, Kuan Zhang, Hui Li:
SC-Chain: An Efficient Blockchain Framework for Smart City. IEEE Internet Things J. 11(5): 7863-7877 (2024) - [j259]Guanglu Wei, Kai Fan, Kuan Zhang, Haoyang Wang, Hui Li, Yintang Yang:
Quantum-Safe Lattice-Based Certificateless Anonymous Authenticated Key Agreement for Internet of Things. IEEE Internet Things J. 11(5): 9213-9225 (2024) - [j258]Kai Fan, Yuanshuai Ren, Yuhan Bai, Guanglu Wei, Kuan Zhang, Hui Li, Yintang Yang:
Fault-Tolerant and Collusion-Resistant Lattice-Based Multidimensional Privacy-Preserving Data Aggregation in Edge-Based Smart Grid. IEEE Internet Things J. 11(6): 9487-9504 (2024) - [j257]Kai Fan, Wenhao Li, Yuhan Bai, Yintang Yang, Kan Yang, Hui Li:
EIV-BT-ABE: Efficient Attribute-Based Encryption With Black-Box Traceability Based on Encrypted Identity Vector. IEEE Internet Things J. 11(9): 15229-15240 (2024) - [j256]Yuhan Bai, Kai Fan, Kuan Zhang, Hui Li, Yintang Yang:
CR-FH-CPABE: Secure File Hierarchy Attribute-Based Encryption Scheme Supporting User Collusion Resistance in Cloud Computing. IEEE Internet Things J. 11(10): 17727-17739 (2024) - [j255]Zhenyang Guo, Jin Cao, Xinyi Wang, Yinghui Zhang, Ben Niu, Hui Li:
UAVA: Unmanned Aerial Vehicle Assisted Vehicular Authentication Scheme in Edge Computing Networks. IEEE Internet Things J. 11(12): 22091-22106 (2024) - [j254]Junpeng Zhang, Hui Zhu, Fengwei Wang, Yandong Zheng, Zhe Liu, Hui Li:
iDP-FL: A fine-grained and privacy-aware federated learning framework for deep neural networks. Inf. Sci. 679: 121035 (2024) - [j253]Fengwei Wang, Hui Zhu, Xingdong Liu, Yandong Zheng, Hui Li, Jiafeng Hua:
Achieving federated logistic regression training towards model confidentiality with semi-honest TEE. Inf. Sci. 679: 121115 (2024) - [j252]Qiao Liu, Qi Han, Guangze Luo, Jin Cao, Hui Li, Yong Wang:
Wiretap resisting and privacy preserving data exchange with physical layer security and blockchain based authentication in Internet of Vehicles. Microprocess. Microsystems 104: 104965 (2024) - [j251]Guanglu Wei, Kai Fan, Kuan Zhang, Haoyang Wang, Yirui Wang, Kan Yang, Hui Li, Yintang Yang:
Lower rounds lattice-based anonymous AKA under the seCK model for the IoT. Peer Peer Netw. Appl. 17(4): 2031-2046 (2024) - [j250]Chao Shang, Jin Cao, Tong Zhu, Yinghui Zhang, Ben Niu, Hui Li:
CADFA: A Clock Skew-Based Active Device Fingerprint Authentication Scheme for Class-1 IoT Devices. IEEE Syst. J. 18(1): 590-599 (2024) - [j249]Haonan Yan, Xiaoguang Li, Wenjing Zhang, Rui Wang, Hui Li, Xingwen Zhao, Fenghua Li, Xiaodong Lin:
Automatic Evasion of Machine Learning-Based Network Intrusion Detection Systems. IEEE Trans. Dependable Secur. Comput. 21(1): 153-167 (2024) - [j248]Yuchen Wang, Xiaoguang Li, Li Yang, Jianfeng Ma, Hui Li:
ADDITION: Detecting Adversarial Examples With Image-Dependent Noise Reduction. IEEE Trans. Dependable Secur. Comput. 21(3): 1139-1154 (2024) - [j247]Yandong Zheng, Hui Zhu, Rongxing Lu, Yunguo Guan, Songnian Zhang, Fengwei Wang, Jun Shao, Hui Li:
PHRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over High-Dimensional Data in Cloud. IEEE Trans. Dependable Secur. Comput. 21(4): 1831-1844 (2024) - [j246]Songnian Zhang, Rongxing Lu, Hui Zhu, Yandong Zheng, Yunguo Guan, Fengwei Wang, Jun Shao, Hui Li:
Performance Enhanced Secure Spatial Keyword Similarity Query With Arbitrary Spatial Ranges. IEEE Trans. Inf. Forensics Secur. 19: 5272-5285 (2024) - [j245]Yandong Zheng, Hui Zhu, Rongxing Lu, Songnian Zhang, Yunguo Guan, Fengwei Wang, Jun Shao, Hui Li:
Secure Similarity Queries Over Vertically Distributed Data via TEE-Enhanced Cloud Computing. IEEE Trans. Inf. Forensics Secur. 19: 6237-6251 (2024) - [j244]Wei Xu, Hui Zhu, Yandong Zheng, Fengwei Wang, Jiafeng Hua, Dengguo Feng, Hui Li:
ToNN: An Oblivious Neural Network Prediction Scheme With Semi-Honest TEE. IEEE Trans. Inf. Forensics Secur. 19: 7335-7348 (2024) - [j243]Chao Shang, Jin Cao, Jiajia Liu, Yinghui Zhang, Ben Niu, Hui Li:
CEAMP: A Cross-Domain Entity Authentication and Message Protection Framework for Intra-Vehicle Network. IEEE Trans. Intell. Transp. Syst. 25(7): 6780-6795 (2024) - [j242]Yunqing Sun, Jin Cao, Xiongpeng Ren, Canhui Tang, Ben Niu, Yinghui Zhang, Hui Li:
An Anonymous and Secure Data Transmission Mechanism With Trajectory Tracking for D2D Relay Communication in 3GPP 5G Networks. IEEE Trans. Intell. Transp. Syst. 25(8): 9733-9748 (2024) - [j241]Ruhui Ma, Jin Cao, Shiyang He, Yinghui Zhang, Ben Niu, Hui Li:
A UAV-Assisted UE Access Authentication Scheme for 5G/6G Network. IEEE Trans. Netw. Serv. Manag. 21(2): 2426-2444 (2024) - [j240]Wei Xu, Hui Zhu, Yandong Zheng, Fengwei Wang, Jiaqi Zhao, Zhe Liu, Hui Li:
ELXGB: An Efficient and Privacy-Preserving XGBoost for Vertical Federated Learning. IEEE Trans. Serv. Comput. 17(3): 878-892 (2024) - [j239]Jiaqi Zhao, Hui Zhu, Fengwei Wang, Yandong Zheng, Rongxing Lu, Hui Li:
Efficient and Privacy-Preserving Federated Learning Against Poisoning Adversaries. IEEE Trans. Serv. Comput. 17(5): 2320-2333 (2024) - [j238]Haoyang Wang, Kai Fan, Chong Yu, Kuan Zhang, Fenghua Li, Hui Li, Yintang Yang, Haojin Zhu:
LSPSS: Constructing Lightweight and Secure Scheme for Private Data Storage and Sharing in Aerial Computing. IEEE Trans. Serv. Comput. 17(5): 2583-2596 (2024) - [c163]Yuchen Wang, Xiaoguang Li, Li Yang, Lu Zhou, Jianfeng Ma, Hui Li:
Adaptive Oriented Adversarial Attacks on Visible and Infrared Image Fusion Models. ICME 2024: 1-6 - [c162]Yaqiang Wu, Zhen Xu, Yong Duan, Yanlai Wu, Qinghua Zheng, Hui Li, Xiaochen Hu, Lianwen Jin:
RDLNet: A Novel and Accurate Real-world Document Localization Method. ACM Multimedia 2024: 9847-9855 - [i16]Wenjie Li, Kai Fan, Jingyuan Zhang, Hui Li, Wei Yang Bryan Lim, Qiang Yang:
Enhancing Security and Privacy in Federated Learning using Update Digests and Voting-Based Defense. CoRR abs/2405.18802 (2024) - 2023
- [j237]Xianchun Zheng, Hui Li:
Identification of Malicious Encrypted Traffic Through Feature Fusion. IEEE Access 11: 80072-80080 (2023) - [j236]Yuanyuan Yang, Jin Cao, Xiongpeng Ren, Ben Niu, Yinghui Zhang, Hui Li:
LK-AKA: A lightweight location key-based authentication and key agreement protocol for S2S communication. Comput. Commun. 197: 214-229 (2023) - [j235]Gan Liu, Xiongtao Sun, Yiran Li, Hui Li, Shuchang Zhao, Zhen Guo:
An Automatic Privacy-Aware Framework for Text Data in Online Social Network Based on a Multi-Deep Learning Model. Int. J. Intell. Syst. 2023: 1-23 (2023) - [j234]Xiaoxin Du, Hui Zhu, Yandong Zheng, Rongxing Lu, Fengwei Wang, Hui Li:
A Semantic-Preserving Scheme to Trajectory Synthesis Using Differential Privacy. IEEE Internet Things J. 10(15): 13784-13797 (2023) - [j233]Yuanyuan Yang, Jin Cao, Ruhui Ma, Lifu Cheng, Lilan Chen, Ben Niu, Hui Li:
FHAP: Fast Handover Authentication Protocol for High-Speed Mobile Terminals in 5G Satellite-Terrestrial-Integrated Networks. IEEE Internet Things J. 10(15): 13959-13973 (2023) - [j232]Ye Bi, Kai Fan, Kuan Zhang, Yuhan Bai, Hui Li, Yintang Yang:
A Secure and Efficient Two-Party Protocol Enabling Ownership Transfer of RFID Objects. IEEE Internet Things J. 10(18): 16225-16237 (2023) - [j231]Jiaqi Zhao, Hui Zhu, Fengwei Wang, Rongxing Lu, Hui Li:
Efficient and privacy-preserving tree-based inference via additive homomorphic encryption. Inf. Sci. 650: 119480 (2023) - [j230]Kai Fan, Ye Bi, Yintang Yang, Kuan Zhang, Hui Li:
Secure and Efficient Lightweight Protocol for Emergency Vehicle Avoidance Based on Cloud. IEEE Netw. 37(4): 314-322 (2023) - [j229]Kai Fan, Zeyu Shi, Yicen Yang, Liyang Bai, Yintang Yang, Kan Yang, Hui Li:
Blockchain-based cloud-edge clock calibration in IoT. Peer Peer Netw. Appl. 16(3): 1432-1444 (2023) - [j228]Kai Fan, Qi Chen, Ruidan Su, Kuan Zhang, Haoyang Wang, Hui Li, Yintang Yang:
MSIAP: A Dynamic Searchable Encryption for Privacy-Protection on Smart Grid With Cloud-Edge-End. IEEE Trans. Cloud Comput. 11(2): 1170-1181 (2023) - [j227]Jiaqi Zhao, Hui Zhu, Fengwei Wang, Rongxing Lu, Ermei Wang, Linfeng Li, Hui Li:
VFLR: An Efficient and Privacy-Preserving Vertical Federated Framework for Logistic Regression. IEEE Trans. Cloud Comput. 11(4): 3326-3340 (2023) - [j226]Xiaoguang Li, Haonan Yan, Zelei Cheng, Wenhai Sun, Hui Li:
Protecting Regression Models With Personalized Local Differential Privacy. IEEE Trans. Dependable Secur. Comput. 20(2): 960-974 (2023) - [j225]Jin Cao, Tong Zhu, Ruhui Ma, Zhenyang Guo, Yinghui Zhang, Hui Li:
A Software-Based Remote Attestation Scheme for Internet of Things Devices. IEEE Trans. Dependable Secur. Comput. 20(2): 1422-1434 (2023) - [j224]Haoyang Wang, Kai Fan, Hongyan Chen, Qi Chen, Kuan Zhang, Fenghua Li, Hui Li, Yintang Yang:
Joint Biological ID : A Secure and Efficient Lightweight Biometric Authentication Scheme. IEEE Trans. Dependable Secur. Comput. 20(3): 2578-2592 (2023) - [j223]Ming Zhang, Zhe Sun, Hui Li, Ben Niu, Fenghua Li, Zixu Zhang, Yuhang Xie, Chunhao Zheng:
Go-Sharing: A Blockchain-Based Privacy-Preserving Framework for Cross-Social Network Photo Sharing. IEEE Trans. Dependable Secur. Comput. 20(5): 3572-3587 (2023) - [j222]Yandong Zheng, Rongxing Lu, Hui Zhu, Songnian Zhang, Yunguo Guan, Jun Shao, Fengwei Wang, Hui Li:
SetRkNN: Efficient and Privacy-Preserving Set Reverse kNN Query in Cloud. IEEE Trans. Inf. Forensics Secur. 18: 888-903 (2023) - [j221]Jiaqi Zhao, Hui Zhu, Wei Xu, Fengwei Wang, Rongxing Lu, Hui Li:
SGBoost: An Efficient and Privacy-Preserving Vertical Federated Tree Boosting Framework. IEEE Trans. Inf. Forensics Secur. 18: 1022-1036 (2023) - [j220]Yandong Zheng, Hui Zhu, Rongxing Lu, Yunguo Guan, Songnian Zhang, Fengwei Wang, Jun Shao, Hui Li:
PGSim: Efficient and Privacy-Preserving Graph Similarity Query Over Encrypted Data in Cloud. IEEE Trans. Inf. Forensics Secur. 18: 2030-2045 (2023) - [j219]Fengwei Wang, Hui Zhu, Guozhang He, Rongxing Lu, Yandong Zheng, Hui Li:
Efficient and Privacy-Preserving Arbitrary Polygon Range Query Scheme Over Dynamic and Time-Series Location Data. IEEE Trans. Inf. Forensics Secur. 18: 3414-3429 (2023) - [j218]Yandong Zheng, Hui Zhu, Rongxing Lu, Yunguo Guan, Songnian Zhang, Fengwei Wang, Jun Shao, Hui Li:
Efficient and Privacy-Preserving Aggregated Reverse kNN Query Over Crowd-Sensed Data. IEEE Trans. Inf. Forensics Secur. 18: 4285-4299 (2023) - [j217]Xiongpeng Ren, Jin Cao, Ruhui Ma, Yurong Luo, Jian Guan, Yinghui Zhang, Hui Li:
A Novel Access and Handover Authentication Scheme in UAV-Aided Satellite-Terrestrial Integration Networks Enabling 5G. IEEE Trans. Netw. Serv. Manag. 20(3): 3880-3899 (2023) - [c161]Ziyao Guo, Haonan Yan, Hui Li, Xiaodong Lin:
Class Attention Transfer Based Knowledge Distillation. CVPR 2023: 11868-11877 - [c160]Peining Li, Yandong Zheng, Hui Zhu, Qi Xu, Zhe Liu, Hui Li:
Efficient and Private Edit Distance Based Range Query over Encrypted String Sequences. GLOBECOM 2023: 3306-3311 - [c159]Jiaqi Zhao, Hui Zhu, Fengwei Wang, Rongxing Lu, Hui Li:
Efficient and Privacy-Preserving Logistic Regression Prediction over Vertically Partitioned Data. GLOBECOM 2023: 4253-4258 - [c158]Jiahui Wang, Yulong Fu, Mengru Liu, Jin Cao, Hui Li, Zheng Yan:
Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft Biometrics. ISPEC 2023: 52-73 - [c157]Haonan Yan, Wenjing Zhang, Qian Chen, Xiaoguang Li, Wenhai Sun, Hui Li, Xiaodong Lin:
RECESS Vaccine for Federated Learning: Proactive Defense Against Model Poisoning Attacks. NeurIPS 2023 - [c156]Xiaoguang Li, Ninghui Li, Wenhai Sun, Neil Zhenqiang Gong, Hui Li:
Fine-grained Poisoning Attack to Local Differential Privacy Protocols for Mean and Variance Estimation. USENIX Security Symposium 2023: 1739-1756 - [i15]Ziyao Guo, Haonan Yan, Hui Li, Xiaodong Lin:
Class Attention Transfer Based Knowledge Distillation. CoRR abs/2304.12777 (2023) - [i14]Haonan Yan, Wenjing Zhang, Qian Chen, Xiaoguang Li, Wenhai Sun, Hui Li, Xiaodong Lin:
RECESS Vaccine for Federated Learning: Proactive Defense Against Model Poisoning Attacks. CoRR abs/2310.05431 (2023) - 2022
- [j216]Jiaqi Zhao, Hui Zhu, Fengwei Wang, Rongxing Lu, Hui Li, Zhongmin Zhou, Haitao Wan:
ACCEL: an efficient and privacy-preserving federated logistic regression scheme over vertically partitioned data. Sci. China Inf. Sci. 65(7): 1-2 (2022) - [j215]Xingmiao Wang, Kai Fan, Kan Yang, Xiaochun Cheng, Qingkuan Dong, Hui Li, Yintang Yang:
A new RFID ultra-lightweight authentication protocol for medical privacy protection in smart living. Comput. Commun. 186: 121-132 (2022) - [j214]Xiongpeng Ren, Jin Cao, Maode Ma, Hui Li, Yinghui Zhang:
A Novel PUF-Based Group Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks. IEEE Internet Things J. 9(5): 3642-3656 (2022) - [j213]Haoyang Wang, Kai Fan, Kuan Zhang, Zilong Wang, Hui Li, Yintang Yang:
Encrypted Data Retrieval and Sharing Scheme in Space-Air-Ground-Integrated Vehicular Networks. IEEE Internet Things J. 9(8): 5957-5970 (2022) - [j212]Jiezhen Tang, Hui Zhu, Rongxing Lu, Xiaodong Lin, Hui Li, Fengwei Wang:
DLP: Achieve Customizable Location Privacy With Deceptive Dummy Techniques in LBS Applications. IEEE Internet Things J. 9(9): 6969-6984 (2022) - [j211]Haonan Yan, Xiaoguang Li, Rui Dai, Hui Li, Xingwen Zhao, Fenghua Li:
MARS: Automated Protocol Analysis Framework for Internet of Things. IEEE Internet Things J. 9(19): 18333-18345 (2022) - [j210]Jin Cao, Sheng Li, Ruhui Ma, Yuxi Han, Yueyu Zhang, Hui Li:
RPRIA: Reputation and PUF-Based Remote Identity Attestation Protocol for Massive IoT Devices. IEEE Internet Things J. 9(19): 19174-19187 (2022) - [j209]Qi Xu, Hui Zhu, Yandong Zheng, Jiaqi Zhao, Rongxing Lu, Hui Li:
An Efficient and Privacy-Preserving Route Matching Scheme for Carpooling Services. IEEE Internet Things J. 9(20): 19890-19902 (2022) - [j208]Haoyang Wang, Kai Fan, Kuan Zhang, Zilong Wang, Hui Li, Yintang Yang:
Secure and Efficient Data-Privacy-Preserving Scheme for Mobile Cyber-Physical Systems. IEEE Internet Things J. 9(22): 22375-22388 (2022) - [j207]Jiaqi Zhao, Hui Zhu, Fengwei Wang, Rongxing Lu, Hui Li, Jingwei Tu, Jie Shen:
CORK: A privacy-preserving and lossless federated learning scheme for deep neural network. Inf. Sci. 603: 190-209 (2022) - [j206]Ruhui Ma, Jin Cao, Dengguo Feng, Hui Li, Xiaowei Li, Yang Xu:
A robust authentication scheme for remote diagnosis and maintenance in 5G V2N. J. Netw. Comput. Appl. 198: 103281 (2022) - [j205]Kai Fan, Zeyu Shi, Ruidan Su, Yuhan Bai, Pei Huang, Kuan Zhang, Hui Li, Yintang Yang:
Blockchain-based trust management for verifiable time synchronization service in IoT. Peer-to-Peer Netw. Appl. 15(2): 1152-1162 (2022) - [j204]Yunqing Sun, Jin Cao, Maode Ma, Yinghui Zhang, Hui Li, Ben Niu:
EAP-DDBA: Efficient Anonymity Proximity Device Discovery and Batch Authentication Mechanism for Massive D2D Communication Devices in 3GPP 5G HetNet. IEEE Trans. Dependable Secur. Comput. 19(1): 370-387 (2022) - [j203]Fengwei Wang, Hui Zhu, Rongxing Lu, Yandong Zheng, Hui Li:
Achieve Efficient and Privacy-Preserving Disease Risk Assessment Over Multi-Outsourced Vertical Datasets. IEEE Trans. Dependable Secur. Comput. 19(3): 1492-1504 (2022) - [j202]Haonan Yan, Xiaoguang Li, Hui Li, Jiamin Li, Wenhai Sun, Fenghua Li:
Monitoring-Based Differential Privacy Mechanism Against Query Flooding-Based Model Extraction Attack. IEEE Trans. Dependable Secur. Comput. 19(4): 2680-2694 (2022) - [j201]Jiaqi Zhao, Hui Zhu, Fengwei Wang, Rongxing Lu, Zhe Liu, Hui Li:
PVD-FL: A Privacy-Preserving and Verifiable Decentralized Federated Learning Framework. IEEE Trans. Inf. Forensics Secur. 17: 2059-2073 (2022) - [j200]Ruhui Ma, Jin Cao, Yinghui Zhang, Chao Shang, Lihui Xiong, Hui Li:
A Group-Based Multicast Service Authentication and Data Transmission Scheme for 5G-V2X. IEEE Trans. Intell. Transp. Syst. 23(12): 23976-23992 (2022) - [j199]Ben Niu, Yahong Chen, Zhibo Wang, Fenghua Li, Boyang Wang, Hui Li:
Eclipse: Preserving Differential Location Privacy Against Long-Term Observation Attacks. IEEE Trans. Mob. Comput. 21(1): 125-138 (2022) - [j198]Ben Niu, Qinghua Li, Hanyi Wang, Guohong Cao, Fenghua Li, Hui Li:
A Framework for Personalized Location Privacy. IEEE Trans. Mob. Comput. 21(9): 3071-3083 (2022) - [j197]Liang Li, Dian Shi, Xinyue Zhang, Ronghui Hou, Hao Yue, Hui Li, Miao Pan:
Privacy Preserving Participant Recruitment for Coverage Maximization in Location Aware Mobile Crowdsensing. IEEE Trans. Mob. Comput. 21(9): 3250-3262 (2022) - [c155]Linlin Li, Hui Zhu, Yandong Zheng, Fengwei Wang, Rongxing Lu, Hui Li:
Efficient and Privacy-Preserving Fusion Based Multi-Biometric Recognition. GLOBECOM 2022: 4860-4865 - [c154]Haonan Yan, Xiaoguang Li, Ziyao Guo, Hui Li, Fenghua Li, Xiaodong Lin:
ARCANE: An Efficient Architecture for Exact Machine Unlearning. IJCAI 2022: 4006-4013 - [c153]Ming Zhang, Zhe Sun, Hui Li, Ben Niu, Fenghua Li, Yuhang Xie, Chunhao Zheng:
A blockchain-based Privacy-Preserving Framework for Cross-Social Network Photo Sharing. INFOCOM Workshops 2022: 1-6 - [c152]Longlong Sun, Hui Li, Shiwen Yu, Xindi Ma, Yanguo Peng, Jiangtao Cui:
HeHe: Balancing the Privacy and Efficiency in Training CNNs over the Semi-honest Cloud. ISC 2022: 422-442 - [c151]Yao Wang, Tao Gu, Yu Zhang, Minjie Lyu, Tom H. Luan, Hui Li:
Enabling secure touch-to-access device pairing based on human body's electrical response. MobiCom 2022: 556-569 - [c150]Yao Wang, Tao Gu, Yu Zhang, Minjie Lyu, Tom H. Luan, Hui Li:
BiTouch: enabling secure touch-to-access device pairing based on human body's electrical response. MobiCom 2022: 889-891 - [i13]Xiaoguang Li, Neil Zhenqiang Gong, Ninghui Li, Wenhai Sun, Hui Li:
Fine-grained Poisoning Attacks to Local Differential Privacy Protocols for Mean and Variance Estimation. CoRR abs/2205.11782 (2022) - 2021
- [j196]Junbin Kang, Kai Fan, Kuan Zhang, Xiaochun Cheng, Hui Li, Yintang Yang:
An ultra light weight and secure RFID batch authentication scheme for IoMT. Comput. Commun. 167: 48-54 (2021) - [j195]Rongna Xie, Hui Li, Guozhen Shi, Yunchuan Guo, Ben Niu, Mang Su:
Provenance-based data flow control mechanism for Internet of things. Trans. Emerg. Telecommun. Technol. 32(5) (2021) - [j194]Zhipeng Yu, Hui Zhu, Rui Xiao, Chao Song, Jian Dong, Hui Li:
Detection and defense against network isolation attacks in software-defined networks. Trans. Emerg. Telecommun. Technol. 32(5) (2021) - [j193]Quanlong Zhu, Chao Yang, Yu Zheng, Jianfeng Ma, Hui Li, Junwei Zhang, Jiajie Shao:
Smart home: Keeping privacy based on Air-Padding. IET Inf. Secur. 15(2): 156-168 (2021) - [j192]Fawad Khan, Hui Li, Yinghui Zhang, Haider Abbas, Tahreem Yaqoob:
Efficient attribute-based encryption with repeated attributes optimization. Int. J. Inf. Sec. 20(3): 431-444 (2021) - [j191]Liang Li, Dian Shi, Ronghui Hou, Xuanheng Li, Jie Wang, Hui Li, Miao Pan:
Data-Driven Optimization for Cooperative Edge Service Provisioning With Demand Uncertainty. IEEE Internet Things J. 8(6): 4317-4328 (2021) - [j190]Hui Li, Tinglong Tang, Jake Luo, Meng Zhao, Baole Zheng, Yirong Wu:
An anomaly detection method based on double encoder-decoder generative adversarial networks. Ind. Robot 48(5): 643-648 (2021) - [j189]Fengwei Wang, Hui Zhu, Rongxing Lu, Yandong Zheng, Hui Li:
A privacy-preserving and non-interactive federated learning scheme for regression training with gradient descent. Inf. Sci. 552: 183-200 (2021) - [j188]Kai Fan, Wei Jiang, Qi Luo, Hui Li, Yintang Yang:
Cloud-based RFID mutual authentication scheme for efficient privacy preserving in IoV. J. Frankl. Inst. 358(1): 193-209 (2021) - [j187]Liyang Bai, Kai Fan, Yuhan Bai, Xiaochun Cheng, Hui Li, Yintang Yang:
Cross-domain access control based on trusted third-party and attribute mapping center. J. Syst. Archit. 116: 101957 (2021) - [j186]Jianxing Liu, Kai Fan, Hui Li, Yintang Yang:
A blockchain-based privacy preservation scheme in multimedia network. Multim. Tools Appl. 80(20): 30691-30705 (2021) - [j185]Xiaopeng Yang, Hui Zhu, Fengwei Wang, Songnian Zhang, Rongxing Lu, Hui Li:
MASK: Efficient and privacy-preserving m-tree based biometric identification over cloud. Peer-to-Peer Netw. Appl. 14(4): 2171-2186 (2021) - [j184]Yurong Luo, Hui Li, Ruhui Ma, Zhenyang Guo:
A Composable Multifactor Identity Authentication and Authorization Scheme for 5G Services. Secur. Commun. Networks 2021: 6697155:1-6697155:18 (2021) - [j183]Hanzhe Yang, Ruidan Su, Pei Huang, Yuhan Bai, Kai Fan, Kan Yang, Hui Li, Yintang Yang:
PMAB: A Public Mutual Audit Blockchain for Outsourced Data in Cloud Storage. Secur. Commun. Networks 2021: 9993855:1-9993855:11 (2021) - [j182]Hui Zhu, Qing Wei, Xiaopeng Yang, Rongxing Lu, Hui Li:
Efficient and Privacy-Preserving Online Fingerprint Authentication Scheme over Outsourced Data. IEEE Trans. Cloud Comput. 9(2): 576-586 (2021) - [j181]Jin Cao, Maode Ma, Yulong Fu, Hui Li, Yinghui Zhang:
CPPHA: Capability-Based Privacy-Protection Handover Authentication Mechanism for SDN-Based 5G HetNets. IEEE Trans. Dependable Secur. Comput. 18(3): 1182-1195 (2021) - [j180]Bin Zhao, Kai Fan, Kan Yang, Zilong Wang, Hui Li, Yintang Yang:
Anonymous and Privacy-Preserving Federated Learning With Industrial Big Data. IEEE Trans. Ind. Informatics 17(9): 6314-6323 (2021) - [j179]Zhao Li, Jun Li, Yinghou Liu, Xiujuan Liang, Kang G. Shin, Zheng Yan, Hui Li:
Exploiting Interactions of Multiple Interference for Cooperative Interference Alignment. IEEE Trans. Wirel. Commun. 20(11): 7072-7085 (2021) - [c149]Xudong Zhu, Hui Li:
Privacy-preserving Decentralized Federated Deep Learning. ACM TUR-C 2021: 33-38 - [c148]Liang Li, Dian Shi, Ronghui Hou, Hui Li, Miao Pan, Zhu Han:
To Talk or to Work: Flexible Communication Compression for Energy Efficient Federated Learning over Heterogeneous Mobile Edge Devices. INFOCOM 2021: 1-10 - [c147]Xudong Zhu, Hui Li:
Privacy-Preserving and Auditable Federated Deep Reinforcement Learning for Robotic Manipulation. NSS 2021: 314-325 - 2020
- [j178]Pei Huang, Kai Fan, Hanzhe Yang, Kuan Zhang, Hui Li, Yintang Yang:
A Collaborative Auditing Blockchain for Trustworthy Data Integrity in Cloud Storage System. IEEE Access 8: 94780-94794 (2020) - [j177]Juan Huan, Hui Li, Mingbao Li, Bo Chen:
Prediction of dissolved oxygen in aquaculture based on gradient boosting decision tree and long short-term memory network: A study of Chang Zhou fishery demonstration base, China. Comput. Electron. Agric. 175: 105530 (2020) - [j176]Qi Chen, Kai Fan, Kuan Zhang, Haoyang Wang, Hui Li, Yingtang Yang:
Privacy-preserving searchable encryption in the intelligent edge computing. Comput. Commun. 164: 31-41 (2020) - [j175]Wenjing Zhang, Bo Jiang, Ming Li, Ravi Tandon, Qiao Liu, Hui Li:
Aggregation-based location privacy: An information theoretic approach. Comput. Secur. 97: 101953 (2020) - [j174]Jin Cao, Maode Ma, Hui Li, Ruhui Ma, Yunqing Sun, Pu Yu, Lihui Xiong:
A Survey on Security Aspects for 3GPP 5G Networks. IEEE Commun. Surv. Tutorials 22(1): 170-195 (2020) - [j173]Weihao Li, Ben Niu, Jin Cao, Yurong Luo, Hui Li:
A personalized range-sensitive privacy-preserving scheme in LBSs. Concurr. Comput. Pract. Exp. 32(5) (2020) - [j172]Hui Li, Zhe Li, Sizhe Peng, Jingjing Li, Chia Emmanuel Tungom:
Mining the frequency of time-constrained serial episodes over massive data sequences and streams. Future Gener. Comput. Syst. 110: 849-863 (2020) - [j171]Ruhui Ma, Jin Cao, Dengguo Feng, Hui Li:
LAA: Lattice-Based Access Authentication Scheme for IoT in Space Information Networks. IEEE Internet Things J. 7(4): 2791-2805 (2020) - [j170]Jin Cao, Zheng Yan, Ruhui Ma, Yinghui Zhang, Yulong Fu, Hui Li:
LSAA: A Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks. IEEE Internet Things J. 7(6): 5329-5344 (2020) - [j169]Dan Zhu, Hui Zhu, Ximeng Liu, Hui Li, Fengwei Wang, Hao Li, Dengguo Feng:
CREDO: Efficient and privacy-preserving multi-level medical pre-diagnosis based on ML-kNN. Inf. Sci. 514: 244-262 (2020) - [j168]Fenghua Li, Xinyu Wang, Ben Niu, Hui Li, Chao Li, Lihua Chen:
Exploiting location-related behaviors without the GPS data on smartphones. Inf. Sci. 527: 444-459 (2020) - [j167]Yulong Fu, Hanlu Chen, Qinghua Zheng, Zheng Yan, Raimo Kantola, Xuyang Jing, Jin Cao, Hui Li:
An Adaptive Security Data Collection and Composition Recognition method for security measurement over LTE/LTE-A networks. J. Netw. Comput. Appl. 155: 102549 (2020) - [j166]Kai Fan, Tingting Liu, Kuan Zhang, Hui Li, Yintang Yang:
A secure and efficient outsourced computation on data sharing scheme for privacy computing. J. Parallel Distributed Comput. 135: 169-176 (2020) - [j165]Xianghai Cao, Meiru Ren, Jing Zhao, Hui Li, Licheng Jiao:
Hyperspectral Imagery Classification Based on Compressed Convolutional Neural Network. IEEE Geosci. Remote. Sens. Lett. 17(9): 1583-1587 (2020) - [j164]Haoyang Wang, Kai Fan, Hui Li, Yintang Yang:
A dynamic and verifiable multi-keyword ranked search scheme in the P2P networking environment. Peer-to-Peer Netw. Appl. 13(6): 2342-2355 (2020) - [j163]Qiao Liu, Wenjing Zhang, Sheng Ding, Hui Li, Yong Wang:
Novel Secure Group Data Exchange Protocol in Smart Home with Physical Layer Network Coding. Sensors 20(4): 1138 (2020) - [j162]Ruhui Ma, Jin Cao, Dengguo Feng, Hui Li, Shiyang He:
FTGPHA: Fixed-Trajectory Group Pre-Handover Authentication Mechanism for Mobile Relays in 5G High-Speed Rail Networks. IEEE Trans. Veh. Technol. 69(2): 2126-2140 (2020) - [j161]Kai Fan, Qiang Pan, Kuan Zhang, Yuhan Bai, Shili Sun, Hui Li, Yintang Yang:
A Secure and Verifiable Data Sharing Scheme Based on Blockchain in Vehicular Social Networks. IEEE Trans. Veh. Technol. 69(6): 5826-5835 (2020) - [j160]Zhao Li, Yujiao Bai, Kang G. Shin, Zheng Yan, Hui Li:
Inside-Out Precoding to Manage Multiple Interferences From the Same Source. IEEE Trans. Veh. Technol. 69(7): 7583-7595 (2020) - [j159]Fenghua Li, Peijie Yin, Yahong Chen, Ben Niu, Hui Li:
Achieving Fine-Grained QoS for Privacy-Aware Users in LBSs. IEEE Wirel. Commun. 27(3): 31-37 (2020) - [c146]Yongxin Ji, Ronghui Hou, King-Shan Lui, Hui Li:
A Blockchain-Based Vehicle Platoon Leader Updating Scheme. ICC 2020: 1-6 - [c145]Bin Zhao, Kai Fan, Wei You, Kan Yang, Zilong Wang, Hui Li:
A Weight-based k-prototypes Algorithm for Anomaly Detection in Smart Grid. ICC 2020: 1-6 - [c144]Wenbin Dong, Xinhong Mao, Ronghui Hou, Xixiang Lv, Hui Li:
An Enhanced Handover Scheme for Cellular-Connected UAVs. ICCC 2020: 418-423 - [c143]Jinli Wu, Xinhong Mao, Ronghui Hou, Xixiang Lv, Hui Li:
Beam Management for Cellular-Connected UAVs: A Fast Link Recovery Approach. ICCC 2020: 758-763 - [c142]Hui Li, Hui Li, Sourav S. Bhowmick:
BRUNCH: Branching Structure Inference of Hybrid Multivariate Hawkes Processes with Application to Social Media. PAKDD (1) 2020: 553-566 - [c141]Hui Li, Hui Li, Sourav S. Bhowmick:
CHASSIS: Conformity Meets Online Information Diffusion. SIGMOD Conference 2020: 1829-1840 - [c140]Qiao Liu, Hui Li, Sheng Ding, Yong Wang:
Lightweight Secure Data Exchange in Decentralized VANETs with Physical Layer Security. VTC Fall 2020: 1-5 - [c139]Ruhui Ma, Jin Cao, Dengguo Feng, Hui Li, Ben Niu, Fenghua Li, Lihua Yin:
A Secure Authentication Scheme for Remote Diagnosis and Maintenance in Internet of Vehicles. WCNC 2020: 1-7 - [i12]Haonan Yan, Xiaoguang Li, Hui Li, Jiamin Li, Wenhai Sun, Fenghua Li:
Monitoring-based Differential Privacy Mechanism Against Query-Flooding Parameter Duplication Attack. CoRR abs/2011.00418 (2020) - [i11]Liang Li, Dian Shi, Ronghui Hou, Hui Li, Miao Pan, Zhu Han:
To Talk or to Work: Flexible Communication Compression for Energy Efficient Federated Learning over Heterogeneous Mobile Edge Devices. CoRR abs/2012.11804 (2020)
2010 – 2019
- 2019
- [j158]Sheng Ding, Jin Cao, Chen Li, Kai Fan, Hui Li:
A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT. IEEE Access 7: 38431-38441 (2019) - [j157]Fengwei Wang, Hui Zhu, Ximeng Liu, Rongxing Lu, Jiafeng Hua, Hui Li, Hao Li:
Privacy-Preserving Collaborative Model Learning Scheme for E-Healthcare. IEEE Access 7: 166054-166065 (2019) - [j156]Jianying Qiu, Kai Fan, Kuan Zhang, Qiang Pan, Hui Li, Yintang Yang:
An Efficient Multi-Message and Multi-Receiver Signcryption Scheme for Heterogeneous Smart Mobile IoT. IEEE Access 7: 180205-180217 (2019) - [j155]Ruhui Ma, Jin Cao, Dengguo Feng, Hui Li, Yinghui Zhang, Xixiang Lv:
PPSHA: Privacy preserving secure handover authentication scheme for all application scenarios in LTE-A networks. Ad Hoc Networks 87: 49-60 (2019) - [j154]Zhen Guo, Hui Li, Chunjie Cao, Zhengxi Wei:
Verifiable algorithm for outsourced database with updating. Clust. Comput. 22(Supplement): 5185-5193 (2019) - [j153]Hui Li, Jiangtao Cui, Xue Meng, Jianfeng Ma:
IHP: improving the utility in differential private histogram publication. Distributed Parallel Databases 37(4): 721-750 (2019) - [j152]Qiao Liu, Hui Li, Yong Wang:
General Secure Information Exchange Protocol for a Multiuser MIMO Relay Channel. Entropy 21(11): 1054 (2019) - [j151]Jiaping Lin, Jianwei Niu, Hui Li, Mohammed Atiquzzaman:
A Secure and Efficient Location-based Service Scheme for Smart Transportation. Future Gener. Comput. Syst. 92: 694-704 (2019) - [j150]Kai Fan, Huiyue Xu, Longxiang Gao, Hui Li, Yintang Yang:
Efficient and privacy preserving access control scheme for fog-enabled IoT. Future Gener. Comput. Syst. 99: 134-142 (2019) - [j149]Kai Fan, Shili Sun, Zheng Yan, Qiang Pan, Hui Li, Yintang Yang:
A blockchain-based clock synchronization Scheme in IoT. Future Gener. Comput. Syst. 101: 524-533 (2019) - [j148]Runyun Miao, Changchun Chai, Yuqian Liu, Hui Li, Yintang Yang:
Light-load efficiency improving boost converter with the hybrid modulation of hysteresis current mode and burst mode. IEICE Electron. Express 16(11): 20190108 (2019) - [j147]Jin Cao, Maode Ma, Hui Li:
LPPA: Lightweight privacy-preservation access authentication scheme for massive devices in fifth Generation (5G) cellular networks. Int. J. Commun. Syst. 32(3) (2019) - [j146]Fangfang Shan, Hui Li, Fenghua Li, Yunchuan Guo, Jinbo Xiong:
An Attribute-Based Assured Deletion Scheme in Cloud Computing. Int. J. Inf. Technol. Web Eng. 14(2): 74-91 (2019) - [j145]Fenghua Li, Hui Li, Cong Wang, Kui Ren, Elisa Bertino:
Guest Editorial Special Issue on Security and Privacy Protection for Big Data and IoT. IEEE Internet Things J. 6(2): 1446-1449 (2019) - [j144]Kai Fan, Shangyang Wang, Yanhui Ren, Kan Yang, Zheng Yan, Hui Li, Yintang Yang:
Blockchain-Based Secure Time Protection Scheme in IoT. IEEE Internet Things J. 6(3): 4671-4679 (2019) - [j143]Jin Cao, Pu Yu, Xinyin Xiang, Maode Ma, Hui Li:
Anti-Quantum Fast Authentication and Data Transmission Scheme for Massive Devices in 5G NB-IoT System. IEEE Internet Things J. 6(6): 9794-9805 (2019) - [j142]Xiaoguang Li, Hui Li, Hui Zhu, Muyang Huang:
The optimal upper bound of the number of queries for Laplace mechanism under differential privacy. Inf. Sci. 503: 219-237 (2019) - [j141]Hui Li, Sizhe Peng, Jian Li, Jingjing Li, Jiangtao Cui, Jianfeng Ma:
Counting the frequency of time-constrained serial episodes in a streaming sequence. Inf. Sci. 505: 422-439 (2019) - [j140]Hui Li, Bin Zhao:
On distributivity equations of implications over overlap functions and contrapositive symmetry equations of implications. J. Intell. Fuzzy Syst. 36(1): 283-294 (2019) - [j139]Kai Fan, Shanshan Zhu, Kuan Zhang, Hui Li, Yintang Yang:
A Lightweight Authentication Scheme for Cloud-Based RFID Healthcare Systems. IEEE Netw. 33(2): 44-49 (2019) - [j138]Xiaoqin Feng, Jianfeng Ma, Yinbin Miao, Qian Meng, Ximeng Liu, Qi Jiang, Hui Li:
Pruneable sharding-based blockchain protocol. Peer-to-Peer Netw. Appl. 12(4): 934-950 (2019) - [j137]Kai Fan, Junbin Kang, Shanshan Zhu, Hui Li, Yintang Yang:
Permutation Matrix Encryption Based Ultralightweight Secure RFID Scheme in Internet of Vehicles. Sensors 19(1): 152 (2019) - [j136]Wenjing Zhang, Ming Li, Ravi Tandon, Hui Li:
Online Location Trace Privacy: An Information Theoretic Approach. IEEE Trans. Inf. Forensics Secur. 14(1): 235-250 (2019) - [j135]Yinbin Miao, Jianfeng Ma, Ximeng Liu, Jian Weng, Hongwei Li, Hui Li:
Lightweight Fine-Grained Search Over Encrypted Data in Fog Computing. IEEE Trans. Serv. Comput. 12(5): 772-785 (2019) - [c138]Yan Li, Zilong Wang, Yingjiu Li, Robert H. Deng, Binbin Chen, Weizhi Meng, Hui Li:
A Closer Look Tells More: A Facial Distortion Based Liveness Detection for Face Authentication. AsiaCCS 2019: 241-246 - [c137]Wenbin Dong, Yang Li, Ronghui Hou, Xixiang Lv, Hui Li, Bo Sun:
A Blockchain-Based Hierarchical Reputation Management Scheme in Vehicular Network. GLOBECOM 2019: 1-6 - [c136]Liang Li, Ronghui Hou, Ruoguang Li, Hui Li, Miao Pan, Zhu Han:
Delay-Aware Adaptive Wireless Video Streaming in Edge Computing Assisted Ultra-Dense Networks. GLOBECOM 2019: 1-6 - [c135]Liang Li, Xinyue Zhang, Ronghui Hou, Hao Yue, Hui Li, Miao Pan:
Participant Recruitment for Coverage-Aware Mobile Crowdsensing with Location Differential Privacy. GLOBECOM 2019: 1-6 - [c134]Jinli Wu, Ronghui Hou, Xixiang Lv, King-Shan Lui, Hui Li, Bo Sun:
Physical Layer Security of OFDM Communication Using Artificial Pilot Noise. GLOBECOM 2019: 1-6 - [c133]Haonan Yan, Hui Li, Mingchi Xiao, Rui Dai, Xianchun Zheng, Xingwen Zhao, Fenghua Li:
PGSM-DPI: Precisely Guided Signature Matching of Deep Packet Inspection for Traffic Analysis. GLOBECOM 2019: 1-6 - [c132]Kai Fan, Yuhan Bai, Huiyue Xu, Qiang Pan, Hui Li, Yintang Yang:
A Secure Cross-Domain Access Control Scheme in Social Networks. ICC 2019: 1-6 - [c131]Qi Li, Hui Zhu, Ziling Zhang, Rongxing Lu, Fengwei Wang, Hui Li:
Spoofing Attacks on Speaker Verification Systems Based Generated Voice using Genetic Algorithm. ICC 2019: 1-6 - [c130]Fenghua Li, Zhe Sun, Ben Niu, Jin Cao, Hui Li:
An Extended Control Framework for Privacy-Preserving Photo Sharing across Different Social Networks. ICNC 2019: 390-394 - [c129]Yurong Luo, Jin Cao, Maode Ma, Hui Li, Ben Niu, Fenghua Li:
DIAM: Diversified Identity Authentication Mechanism for 5G Multi-Service System. ICNC 2019: 418-424 - [c128]Yunqing Sun, Jin Cao, Maode Ma, Hui Li, Ben Niu, Fenghua Li:
Privacy-Preserving Device Discovery and Authentication Scheme for D2D Communication in 3GPP 5G HetNet. ICNC 2019: 425-431 - [c127]Fenghua Li, Zhe Sun, Ang Li, Ben Niu, Hui Li, Guohong Cao:
HideMe: Privacy-Preserving Photo Sharing on Social Networks. INFOCOM 2019: 154-162 - [c126]Yulong Fu, Xinyi Yuan, Ke Wang, Zheng Yan, Hui Li:
A Security Formal Model for Multiple Channels Communication. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1425-1430 - [c125]Yulong Fu, Guoquan Li, Mohammed Atiquzzaman, Zheng Yan, Jin Cao, Hui Li:
A Study and Enhancement to the Security of MANET AODV Protocol Against Black Hole Attacks. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1431-1436 - [c124]Pu Yu, Jin Cao, Maode Ma, Hui Li, Ben Niu, Fenghua Li:
Quantum-Resistance Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks. WCNC 2019: 1-7 - 2018
- [j134]Sheng Ding, Chen Li, Hui Li:
A Novel Efficient Pairing-Free CP-ABE Based on Elliptic Curve Cryptography for IoT. IEEE Access 6: 27336-27345 (2018) - [j133]Kai Zhang, Hui Li, Jianfeng Ma, Ximeng Liu:
Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability. Sci. China Inf. Sci. 61(3): 32102 (2018) - [j132]Gang Han, Hui Li, Baodong Qin, Dong Zheng:
Chameleon all-but-one extractable hash proof and its applications. Sci. China Inf. Sci. 61(9): 099103:1-099103:3 (2018) - [j131]XinDi Ma, Jianfeng Ma, Hui Li, Qi Jiang, Sheng Gao:
ARMOR: A trust-based privacy-preserving framework for decentralized friend recommendation in online social networks. Future Gener. Comput. Syst. 79: 82-94 (2018) - [j130]Qi Han, Yinghui Zhang, Hui Li:
Efficient and robust attribute-based encryption supporting access policy hiding in Internet of Things. Future Gener. Comput. Syst. 83: 269-277 (2018) - [j129]Kai Fan, Yanhui Ren, Yue Wang, Hui Li, Yingtang Yang:
Blockchain-based efficient privacy preserving and data sharing scheme of content-centric network in 5G. IET Commun. 12(5): 527-532 (2018) - [j128]Lanjun Dang, Jie Xu, Xuefei Cao, Hui Li, Jie Chen, Yueyu Zhang, Xiaotong Fu:
Efficient identity-based authenticated key agreement protocol with provable security for vehicular ad hoc networks. Int. J. Distributed Sens. Networks 14(4) (2018) - [j127]Hui Zhu, Fengwei Wang, Rongxing Lu, Fen Liu, Gang Fu, Hui Li:
Efficient and Privacy-Preserving Proximity Detection Schemes for Social Applications. IEEE Internet Things J. 5(4): 2947-2957 (2018) - [j126]Yinbin Miao, Jianfeng Ma, Ximeng Liu, Xinghua Li, Zhiquan Liu, Hui Li:
Practical Attribute-Based Multi-Keyword Search Scheme in Mobile Crowdsourcing. IEEE Internet Things J. 5(4): 3008-3018 (2018) - [j125]Kai Fan, Shangyang Wang, Yanhui Ren, Hui Li, Yintang Yang:
MedBlock: Efficient and Secure Medical Data Sharing Via Blockchain. J. Medical Syst. 42(8): 136:1-136:11 (2018) - [j124]Jin Cao, Maode Ma, Hui Li, Yulong Fu, Xuefeng Liu:
EGHR: Efficient group-based handover authentication protocols for mMTC in 5G wireless networks. J. Netw. Comput. Appl. 102: 1-16 (2018) - [j123]Kai Fan, Xin Wang, Katsuya Suto, Hui Li, Yintang Yang:
Secure and Efficient Privacy-Preserving Ciphertext Retrieval in Connected Vehicular Cloud Computing. IEEE Netw. 32(3): 52-57 (2018) - [j122]Xiaoxia Liu, Hui Zhu, Rongxing Lu, Hui Li:
Efficient privacy-preserving online medical primary diagnosis scheme on naive bayesian classification. Peer-to-Peer Netw. Appl. 11(2): 334-347 (2018) - [j121]XinDi Ma, Jianfeng Ma, Hui Li, Qi Jiang, Sheng Gao:
AGENT: an adaptive geo-indistinguishable mechanism for continuous location-based service. Peer-to-Peer Netw. Appl. 11(3): 473-485 (2018) - [j120]Kai Fan, Wei Wang, Wei Jiang, Hui Li, Yintang Yang:
Secure ultra-lightweight RFID mutual authentication protocol based on transparent computing for IoV. Peer-to-Peer Netw. Appl. 11(4): 723-734 (2018) - [j119]Kai Fan, Junxiong Wang, Xin Wang, Hui Li, Yintang Yang:
Secure, efficient and revocable data sharing scheme for vehicular fogs. Peer-to-Peer Netw. Appl. 11(4): 766-777 (2018) - [j118]Kai Fan, Shuyang Lou, Ruidan Su, Hui Li, Yintang Yang:
Secure and private key management scheme in big data networking. Peer-to-Peer Netw. Appl. 11(5): 992-999 (2018) - [j117]Jin Cao, Hui Li, Maode Ma, Fenghua Li:
UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks. Secur. Commun. Networks 2018: 6854612:1-6854612:16 (2018) - [j116]Fangfang Shan, Hui Li, Fenghua Li, Yunchuan Guo, Ben Niu:
HAC: Hybrid Access Control for Online Social Networks. Secur. Commun. Networks 2018: 7384194:1-7384194:11 (2018) - [j115]Kai Fan, Jie Yin, Kuan Zhang, Hui Li, Yintang Yang:
EARS-DM: Efficient Auto Correction Retrieval Scheme for Data Management in Edge Computing. Sensors 18(11): 3616 (2018) - [j114]Kai Fan, Wei Jiang, Hui Li, Yintang Yang:
Lightweight RFID Protocol for Medical Privacy Protection in IoT. IEEE Trans. Ind. Informatics 14(4): 1656-1665 (2018) - [j113]Fengwei Wang, Hui Zhu, Ximeng Liu, Rongxing Lu, Fenghua Li, Hui Li, Songnian Zhang:
Efficient and Privacy-Preserving Dynamic Spatial Query Scheme for Ride-Hailing Services. IEEE Trans. Veh. Technol. 67(11): 11084-11097 (2018) - [c123]Xudong Zhu, Hui Li, Yang Yu:
Blockchain-Based Privacy Preserving Deep Learning. Inscrypt 2018: 370-383 - [c122]Kai Fan, Qiang Pan, Junxiong Wang, Tingting Liu, Hui Li, Yintang Yang:
Cross-Domain Based Data Sharing Scheme in Cooperative Edge Computing. EDGE 2018: 87-92 - [c121]Yang Li, Ronghui Hou, King-Shan Lui, Hui Li:
An MEC-Based DoS Attack Detection Mechanism for C-V2X Networks. GLOBECOM 2018: 1-6 - [c120]Rui Xiao, Hui Zhu, Chao Song, Ximeng Liu, Jian Dong, Hui Li:
Attacking Network Isolation in Software-Defined Networks: New Attacks and Countermeasures. ICCCN 2018: 1-9 - [c119]Dan Zhu, Hui Zhu, Ximeng Liu, Hui Li, Fengwei Wang, Hao Li:
Achieve Efficient and Privacy-Preserving Medical Primary Diagnosis Based on kNN. ICCCN 2018: 1-9 - [c118]Xiaopeng Yang, Hui Zhu, Rongxing Lu, Ximeng Liu, Hui Li:
Efficient and Privacy-Preserving Online Face Recognition Over Encrypted Outsourced Data. iThings/GreenCom/CPSCom/SmartData 2018: 366-373 - [c117]Kai Fan, Yanhui Ren, Zheng Yan, Shangyang Wang, Hui Li, Yintang Yang:
Secure Time Synchronization Scheme in IoT Based on Blockchain. iThings/GreenCom/CPSCom/SmartData 2018: 1063-1068 - [i10]Hui Li, Sizhe Peng, Jian Li, Jingjing Li, Jiangtao Cui, Jianfeng Ma:
ONCE and ONCE+: Counting the Frequency of Time-constrained Serial Episodes in a Streaming Sequence. CoRR abs/1801.09639 (2018) - [i9]Fenghua Li, Hui Li, Ben Niu, Jinjun Chen:
Privacy Computing: Concept, Computing Framework And Future Development Trends. IACR Cryptol. ePrint Arch. 2018: 1145 (2018) - 2017
- [j112]Yanguo Peng, Hui Li, Jiangtao Cui, Junwei Zhang, Jianfeng Ma, Changgen Peng:
hOPE: improved order preserving encryption with the power to homomorphic operations of ciphertexts. Sci. China Inf. Sci. 60(6): 62101 (2017) - [j111]XinDi Ma, Hui Li, Jianfeng Ma, Qi Jiang, Sheng Gao, Ning Xi, Di Lu:
APPLET: a privacy-preserving framework for location-aware recommender system. Sci. China Inf. Sci. 60(9): 92101 (2017) - [j110]Yulong Fu, Zheng Yan, Hui Li, Xiao-Long Xin, Jin Cao:
A secure SDN based multi-RANs architecture for future 5G networks. Comput. Secur. 70: 648-662 (2017) - [j109]Gang Han, Yu Yu, Xiangxue Li, Kefei Chen, Hui Li:
Characterizing the semantics of passwords: The role of Pinyin for Chinese Netizens. Comput. Stand. Interfaces 54: 20-28 (2017) - [j108]Xuefei Cao, Hui Li, Lanjun Dang, Yin Lin:
A two-party privacy preserving set intersection protocol against malicious users in cloud computing. Comput. Stand. Interfaces 54: 41-45 (2017) - [j107]Hui Zhu, Fen Liu, Hui Li:
Efficient and Privacy-Preserving Polygons Spatial Query Framework for Location-Based Services. IEEE Internet Things J. 4(2): 536-545 (2017) - [j106]Kan Yang, Qi Han, Hui Li, Kan Zheng, Zhou Su, Xuemin Shen:
An Efficient and Fine-Grained Big Data Access Control Scheme With Privacy-Preserving Policy. IEEE Internet Things J. 4(2): 563-571 (2017) - [j105]Yinghui Zhang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Hui Li, Ilsun You:
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inf. Sci. 379: 42-61 (2017) - [j104]Fenghua Li, Yuanyuan He, Ben Niu, Hui Li:
Small-world: Secure friend matching over physical world and social networks. Inf. Sci. 387: 205-220 (2017) - [j103]Xue Meng, Hui Li, Jiangtao Cui:
Different strategies for differentially private histogram publication. J. Commun. Inf. Networks 2(3): 68-77 (2017) - [j102]Qiao Liu, Yong Wang, Wenjing Zhang, Hui Li:
Secret Data Transmission in Wireless Sensor Network with Physical Layer Network Coding. J. Inf. Sci. Eng. 33(4): 1055-1067 (2017) - [j101]Qiao Liu, Guang Gong, Yong Wang, Hui Li:
A Novel Secure Transmission Scheme in MIMO Two-Way Relay Channels with Physical Layer Approach. Mob. Inf. Syst. 2017: 7843843:1-7843843:12 (2017) - [j100]Kai Fan, Nan Ge, Yuanyuan Gong, Hui Li, Ruidan Su, Yintang Yang:
An ultra-lightweight RFID authentication scheme for mobile commerce. Peer-to-Peer Netw. Appl. 10(2): 368-376 (2017) - [j99]Yinghui Zhang, Jin Li, Dong Zheng, Xiaofeng Chen, Hui Li:
Towards privacy protection and malicious behavior traceability in smart health. Pers. Ubiquitous Comput. 21(5): 815-830 (2017) - [j98]Lu Zhou, Qiao Liu, Yong Wang, Hui Li:
Secure group information exchange scheme for vehicular ad hoc networks. Pers. Ubiquitous Comput. 21(5): 903-910 (2017) - [j97]Kai Fan, Panfei Song, Zhao Du, Haojin Zhu, Hui Li, Yintang Yang, Xinghua Li, Chao Yang:
NFC Secure Payment and Verification Scheme with CS E-Ticket. Secur. Commun. Networks 2017: 4796373:1-4796373:9 (2017) - [j96]Gang Han, Yu Yu, Xiangxue Li, Qifeng Zhou, Dong Zheng, Hui Li:
1-Resilient Boolean Functions on Even Variables with Almost Perfect Algebraic Immunity. Secur. Commun. Networks 2017: 6268230:1-6268230:9 (2017) - [j95]Kai Fan, Junxiong Wang, Xin Wang, Hui Li, Yintang Yang:
A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing. Sensors 17(7): 1695 (2017) - [j94]Hui Zhu, Xiaoxia Liu, Rongxing Lu, Hui Li:
Efficient and Privacy-Preserving Online Medical Prediagnosis Framework Using Nonlinear SVM. IEEE J. Biomed. Health Informatics 21(3): 838-850 (2017) - [j93]Chengzhe Lai, Kuan Zhang, Nan Cheng, Hui Li, Xuemin Shen:
SIRC: A Secure Incentive Scheme for Reliable Cooperative Downloading in Highway VANETs. IEEE Trans. Intell. Transp. Syst. 18(6): 1559-1574 (2017) - [j92]Xuefeng Liu, Wenhai Sun, Hanyu Quan, Wenjing Lou, Yuqing Zhang, Hui Li:
Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys. IEEE Trans. Serv. Comput. 10(5): 826-838 (2017) - [j91]Jin Cao, Maode Ma, Hui Li:
G2RHA: Group-to-Route Handover Authentication Scheme for Mobile Relays in LTE-A High-Speed Rail Networks. IEEE Trans. Veh. Technol. 66(11): 9689-9701 (2017) - [c116]Kai Fan, Hui Li, Wei Jiang, Chengsheng Xiao, Yintang Yang:
U2F based secure mutual authentication protocol for mobile payment. ACM TUR-C 2017: 27:1-27:6 - [c115]Jiaping Lin, Xingwen Zhao, Hui Li:
Target: category-based android malware detection revisited. ACSW 2017: 74:1-74:9 - [c114]Xingwen Zhao, Hui Li:
Privacy Preserving Authenticating and Billing Scheme for Video Streaming Service. CSS 2017: 396-410 - [c113]Fawad Khan, Hui Li, Liangxuan Zhang, Jian Shen:
An Expressive Hidden Access Policy CP-ABE. DSC 2017: 178-186 - [c112]Kai Fan, Qi Luo, Hui Li, Yintang Yang:
Cloud-Based Lightweight RFID Mutual Authentication Protocol. DSC 2017: 333-338 - [c111]Liangxuan Zhang, Hui Li, Yinghui Zhang, Fawad Khan:
Privacy-Preserving Attribute-Based Encryption Supporting Expressive Access Structures. DSC 2017: 475-482 - [c110]Weihao Li, Ben Niu, Hui Li:
Privacy Preservation Strategy in Time-Sensitive LBSs. DSC 2017: 488-493 - [c109]Kai Fan, Jie Yin, Junxiong Wang, Hui Li, Yintang Yang:
Multi-Keyword Fuzzy and Sortable Ciphertext Retrieval Scheme for Big Data. GLOBECOM 2017: 1-6 - [c108]Fenghua Li, Xinyu Wang, Ben Niu, Hui Li, Chao Li, Lihua Chen:
TrackU: Exploiting User's Mobility Behavior via WiFi List. GLOBECOM 2017: 1-6 - [c107]Jin Cao, Maode Ma, Hui Li, Yulong Fu, Ben Niu, Fenghua Li:
Trajectory prediction-based handover authentication mechanism for mobile relays in LTE-A high-speed rail networks. ICC 2017: 1-6 - [c106]Yuanyuan He, Kuan Zhang, Hanyi Wang, Fenghua Li, Ben Niu, Hui Li:
Impact factor-based group recommendation scheme with privacy preservation in MSNs. ICC 2017: 1-6 - [c105]Qing Wei, Hui Zhu, Rongxing Lu, Hui Li:
Achieve efficient and privacy-preserving online fingerprint authentication over encrypted outsourced data. ICC 2017: 1-6 - [c104]Hai Liu, Xinghua Li, Hui Li, Jianfeng Ma, XinDi Ma:
Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services. INFOCOM 2017: 1-9 - [c103]Liangxuan Zhang, Hui Li, Yinghui Zhang, Fawad Khan:
Efficient privacy-preserving decentralized ABE supporting expressive access structures. INFOCOM Workshops 2017: 547-552 - [c102]Jiaping Lin, Jianwei Niu, Hui Li:
PCD: A privacy-preserving predictive clinical decision scheme with E-health big data based on RNN. INFOCOM Workshops 2017: 808-813 - [c101]Dongxu Ma, Zilong Wang, Guang Gong, Hui Li:
A new method to construct golay complementary set and near-complementary set by paraunitary matrices. IWSDA 2017: 9-13 - [c100]Fengwei Wang, Hui Zhu, Rongxing Lu, Fen Liu, Cheng Huang, Hui Li:
Achieve Efficient and Privacy-Preserving Proximity Detection Scheme for Social Applications. SecureComm 2017: 339-355 - [c99]Fenghua Li, Jiawen Liu, Liang Fang, Ben Niu, Kui Geng, Hui Li:
Pricing Privacy Leakage in Location-Based Services. WASA 2017: 406-418 - 2016
- [j90]Kai Zhang, Jianfeng Ma, Jiajia Liu, Hui Li:
Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption. Sci. China Inf. Sci. 59(9): 99105 (2016) - [j89]Chengzhe Lai, Rongxing Lu, Dong Zheng, Hui Li, Xuemin (Sherman) Shen:
GLARM: Group-based lightweight authentication scheme for resource-constrained machine to machine communications. Comput. Networks 99: 66-81 (2016) - [j88]Yong Wang, Sufang Ma, Qiao Liu, Yanling Liu, Hui Li:
MIMO relay channel signal transmission in transformed signal subspace. Digit. Signal Process. 57: 46-55 (2016) - [j87]Dongxu Ma, Zilong Wang, Hui Li:
A Generalized Construction of Non-Square M-QAM Sequences with Low PMEPR for OFDM Systems. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(6): 1222-1227 (2016) - [j86]Kai Fan, Zhao Du, Yuanyuan Gong, Yue Wang, Tongjiang Yan, Hui Li, Yintang Yang:
A Secure RFID Application Revocation Scheme for IoT. IEICE Trans. Inf. Syst. 99-D(8): 2027-2035 (2016) - [j85]Hui Zhu, Xiaoying He, Ximeng Liu, Hui Li:
PTFA: a secure and privacy-preserving traffic flow analysis scheme for intelligent transportation system. Int. J. Embed. Syst. 8(1): 78-86 (2016) - [j84]Xiuguang Li, Yuanyuan He, Ben Niu, Kai Yang, Hui Li:
An Exact and Efficient Privacy-Preserving Spatiotemporal Matching in Mobile Social Networks. Int. J. Technol. Hum. Interact. 12(2): 36-47 (2016) - [j83]Xinyin Xiang, Hui Li, Mingyu Wang, Xingwen Zhao:
Efficient multi-party concurrent signature from lattices. Inf. Process. Lett. 116(8): 497-502 (2016) - [j82]Yinghui Zhang, Dong Zheng, Xiaofeng Chen, Jin Li, Hui Li:
Efficient attribute-based data sharing in mobile clouds. Pervasive Mob. Comput. 28: 135-149 (2016) - [j81]Hui Zhu, Xiaoxia Liu, Rongxing Lu, Hui Li:
EPCS: an efficient and privacy-preserving classification service query framework for SVM. Secur. Commun. Networks 9(11): 1309-1320 (2016) - [j80]Yinghui Zhang, Jin Li, Xiaofeng Chen, Hui Li:
Anonymous attribute-based proxy re-encryption for access control in cloud computing. Secur. Commun. Networks 9(14): 2397-2411 (2016) - [j79]Kai Fan, Yuanyuan Gong, Chen Liang, Hui Li, Yintang Yang:
Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G. Secur. Commun. Networks 9(16): 3095-3104 (2016) - [j78]Yinghui Zhang, Dong Zheng, Qi Li, Jin Li, Hui Li:
Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing. Secur. Commun. Networks 9(16): 3688-3702 (2016) - [j77]Hui Zhu, Lijuan Gao, Hui Li:
Secure and Privacy-Preserving Body Sensor Data Collection and Query Scheme. Sensors 16(2): 179 (2016) - [j76]Wenhai Sun, Shucheng Yu, Wenjing Lou, Y. Thomas Hou, Hui Li:
Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud. IEEE Trans. Parallel Distributed Syst. 27(4): 1187-1198 (2016) - [j75]Hui Zhu, Rongxing Lu, Cheng Huang, Le Chen, Hui Li:
An Efficient Privacy-Preserving Location-Based Services Query Scheme in Outsourced Cloud. IEEE Trans. Veh. Technol. 65(9): 7729-7739 (2016) - [j74]Chengzhe Lai, Rongxing Lu, Hui Li, Dong Zheng, Xuemin (Sherman) Shen:
Secure machine-type communications in LTE networks. Wirel. Commun. Mob. Comput. 16(12): 1495-1509 (2016) - [c98]Yinghui Zhang, Jin Li, Dong Zheng, Xiaofeng Chen, Hui Li:
Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures. ACISP (1) 2016: 509-524 - [c97]Kai Fan, Wei Wang, Yue Wang, Hui Li, Yintang Yang:
Cloud-Based Lightweight RFID Healthcare Privacy Protection Protocol. GLOBECOM 2016: 1-6 - [c96]Kai Fan, Qiong Tian, Nana Huang, Yue Wang, Hui Li, Yintang Yang:
Privacy protection based access control scheme in cloud-based services. ICCC 2016: 1-5 - [c95]Fenghua Li, Yuanyuan He, Ben Niu, Hui Li, Hanyi Wang:
Match-MORE: An efficient private matching scheme using friends-of-friends' recommendation. ICNC 2016: 1-6 - [c94]Ben Niu, Sheng Gao, Fenghua Li, Hui Li, Zongqing Lu:
Protection of location privacy in continuous LBSs against adversaries with background information. ICNC 2016: 1-6 - [c93]Kai Fan, Panfei Song, Zhao Du, Haojin Zhu, Hui Li, Yintang Yang, Xinghua Li, Chao Yang:
NFC Secure Payment and Verification Scheme for Mobile Payment. WASA 2016: 116-125 - [c92]Fenghua Li, Hanyi Wang, Ben Niu, Yuanyuan He, Jiafeng Hua, Hui Li:
A practical group matching scheme for privacy-aware users in mobile social networks. WCNC 2016: 1-6 - [c91]Fenghua Li, Sheng Wan, Ben Niu, Hui Li, Yuanyuan He:
Time obfuscation-based privacy-preserving scheme for location-based services. WCNC 2016: 1-6 - [c90]Fenghua Li, Sheng Wan, Ben Niu, Hui Li, Yuanyuan He:
Time obfuscation-based privacy-preserving scheme for Location-Based Services. WCNC Workshops 2016: 465-470 - 2015
- [j73]Hui Zhu, Cheng Huang, Hui Li:
Information Diffusion Model Based on Privacy Setting in Online Social Networking Services. Comput. J. 58(4): 536-548 (2015) - [j72]Chengzhe Lai, Rongxing Lu, Dong Zheng, Hui Li, Xuemin (Sherman) Shen:
Toward secure large-scale machine-to-machine comm unications in 3GPP networks: chall enges and solutions. IEEE Commun. Mag. 53(12): 12-19 (2015) - [j71]Chengzhe Lai, Hui Li, Xiaoqing Li, Jin Cao:
A novel group access authentication and key agreement protocol for machine-type communication. Trans. Emerg. Telecommun. Technol. 26(3): 414-431 (2015) - [j70]Ben Niu, Xiaoyan Zhu, Qinghua Li, Jie Chen, Hui Li:
A novel attack to spatial cloaking schemes in location-based services. Future Gener. Comput. Syst. 49: 125-132 (2015) - [j69]Xixiang Lv, Yi Mu, Hui Li:
Key management for Smart Grid based on asymmetric key-wrapping. Int. J. Comput. Math. 92(3): 498-512 (2015) - [j68]Kai Fan, Wei Wang, Hui Li, Yintang Yang:
Adaptive Sensing Private Property Protection Protocol Based on Cloud. Int. J. Distributed Sens. Networks 11: 743580:1-743580:9 (2015) - [j67]Hui Zhu, Fen Liu, Yan Rong, Hui Li:
PAS: An Efficient Privacy-Preserving Multidimensional Aggregation Scheme for Smart Grid. Int. J. Distributed Sens. Networks 11: 915795:1-915795:12 (2015) - [j66]Xiaoqing Li, Jicheng Liu, Xuejun Li, Hui Li:
A reputation-based secure scheme in vehicular ad hoc networks. Int. J. Grid Util. Comput. 6(2): 83-90 (2015) - [j65]Yong Wang, Hao Wu, Liyang Tang, Hui Li:
The Solution for Cooperative Beamforming Design in MIMO Multi-way Relay Networks. KSII Trans. Internet Inf. Syst. 9(3): 956-970 (2015) - [j64]Hui Zhu, Yingfang Xue, Xiaofeng Chen, Qiang Li, Hui Li:
V-MGSM: A Multilevel and Grouping Security Virtualization Model for Mobile Internet Service. Mob. Inf. Syst. 2015: 841292:1-841292:9 (2015) - [j63]Chen Li, Rongxing Lu, Hui Li, Le Chen, Jie Chen:
PDA: a privacy-preserving dual-functional aggregation scheme for smart grid communications. Secur. Commun. Networks 8(15): 2494-2506 (2015) - [j62]Jin Cao, Maode Ma, Hui Li:
GBAAM: group-based access authentication for MTC in LTE networks. Secur. Commun. Networks 8(17): 3282-3299 (2015) - [j61]Chen Li, Le Chen, Rongxing Lu, Hui Li:
Comment on "An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding". IEEE Trans. Computers 64(3): 882-883 (2015) - [j60]Xixiang Lv, Yi Mu, Hui Li:
Loss-Tolerant Bundle Fragment Authentication for Space-Based DTNs. IEEE Trans. Dependable Secur. Comput. 12(6): 615-625 (2015) - [j59]Boyang Wang, Baochun Li, Hui Li:
Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud. IEEE Trans. Serv. Comput. 8(1): 92-106 (2015) - [j58]Yong Yu, Jianbing Ni, Man Ho Au, Yi Mu, Boyang Wang, Hui Li:
Comments on a Public Auditing Mechanism for Shared Cloud Data Service. IEEE Trans. Serv. Comput. 8(6): 998-999 (2015) - [c89]Boyang Wang, Ming Li, Haitao Wang, Hui Li:
Circular range search on encrypted spatial data. CNS 2015: 182-190 - [c88]Kai Fan, Nana Huang, Yue Wang, Hui Li, Yintang Yang:
Secure and Efficient Personal Health Record Scheme Using Attribute-Based Encryption. CSCloud 2015: 111-114 - [c87]Kai Fan, Hai Deng, Lang Wang, Hui Li, Yintang Yang:
Ciphertext Retrieval in Super-Peer P2P Network. GLOBECOM 2015: 1-6 - [c86]Qiao Liu, Guang Gong, Yong Wang, Hui Li:
A Novel Physical Layer Security Scheme for MIMO Two-Way Relay Channels. GLOBECOM Workshops 2015: 1-6 - [c85]Jin Cao, Hui Li, Maode Ma:
GAHAP: A group-based anonymity handover authentication protocol for MTC in LTE-A networks. ICC 2015: 3020-3025 - [c84]Jin Cao, Hui Li, Maode Ma, Fenghua Li:
UGHA: Uniform group-based handover authentication for MTC within E-UTRAN in LTE-A networks. ICC 2015: 7246-7251 - [c83]Shunrong Jiang, Xiaoyan Zhu, Ripei Hao, Haotian Chi, Hui Li, Liangmin Wang:
Lightweight and privacy-preserving agent data transmission for mobile Healthcare. ICC 2015: 7322-7327 - [c82]Weihao Li, Ben Niu, Hui Li, Fenghua Li:
Privacy-preserving strategies in service quality aware Location-Based Services. ICC 2015: 7328-7334 - [c81]Ben Niu, Xiaoyan Zhu, Weihao Li, Hui Li, Yingjuan Wang, Zongqing Lu:
A personalized two-tier cloaking scheme for privacy-aware location-based services. ICNC 2015: 94-98 - [c80]Boyang Wang, Ming Li, Haitao Wang, Hui Li:
Circular Range Search on Encrypted Spatial Data. ICDCS 2015: 794-795 - [c79]Xiuguang Li, Kai Yang, Hui Li:
Fine-Grained Privacy-Preserving Spatiotemporal Matching in Mobile Social Networks. INCoS 2015: 374-378 - [c78]Ben Niu, Qinghua Li, Xiaoyan Zhu, Guohong Cao, Hui Li:
Enhancing privacy through caching in location-based services. INFOCOM 2015: 1017-1025 - [c77]Wenhai Sun, Xuefeng Liu, Wenjing Lou, Y. Thomas Hou, Hui Li:
Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. INFOCOM 2015: 2110-2118 - [c76]Ben Niu, Yuanyuan He, Fenghua Li, Hui Li:
Achieving secure friend discovery in social strength-aware PMSNs. MILCOM 2015: 947-953 - [c75]Kai Fan, Yuanyuan Gong, Zhao Du, Hui Li, Yintang Yang:
RFID Secure Application Revocation for IoT in 5G. TrustCom/BigDataSE/ISPA (1) 2015: 175-181 - [c74]Kai Fan, Nan Ge, Yuanyuan Gong, Hui Li, Ruidan Su, Yintang Yang:
ULRAS: Ultra-Lightweight RFID Authentication Scheme for Mobile Device. WASA 2015: 114-122 - 2014
- [j57]Yinghui Zhang, Xiaofeng Chen, Jin Li, Hui Li:
Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks. Comput. Networks 75: 192-211 (2014) - [j56]Jin Cao, Maode Ma, Hui Li, Yueyu Zhang, Zhenxing Luo:
A Survey on Security Aspects for LTE and LTE-A Networks. IEEE Commun. Surv. Tutorials 16(1): 283-302 (2014) - [j55]Kai Fan, Jie Li, Hui Li, Xiaohui Liang, Xuemin (Sherman) Shen, Yintang Yang:
RSEL: revocable secure efficient lightweight RFID authentication scheme. Concurr. Comput. Pract. Exp. 26(5): 1084-1096 (2014) - [j54]Qi Han, Yinghui Zhang, Xiaofeng Chen, Hui Li, Jiaxiang Quan:
Efficient and robust identity-based handoff authentication for EAP-based wireless networks. Concurr. Comput. Pract. Exp. 26(8): 1561-1573 (2014) - [j53]Xixiang Lv, Hui Li:
Error- and loss-tolerant bundle fragment authentication for space DTNs. Frontiers Comput. Sci. 8(6): 1012-1023 (2014) - [j52]Chen Li, Rongxing Lu, Hui Li, Le Chen, Xiaoqing Li:
Comment on "A Novel Homomorphic MAC Scheme for Authentication in Network Coding". IEEE Commun. Lett. 18(12): 2129-2132 (2014) - [j51]Yong Wang, Hui Li:
Complex signal transmission for multi-user multiple-input multiple-output relay. IET Commun. 8(14): 2584-2589 (2014) - [j50]Xixiang Lv, Hui Li, Baocang Wang:
Authenticated asymmetric group key agreement based on certificateless cryptosystem. Int. J. Comput. Math. 91(3): 447-460 (2014) - [j49]Yuan Chen, Xiaofeng Chen, Hui Li:
More DCCA-secure public-key encryptions from KEM + DEM style hybrid paradigms and some observations on the 'inner-outer' structure. Int. J. Grid Util. Comput. 5(1): 60-70 (2014) - [j48]Yueyu Zhang, Jie Chen, Hui Li, Jin Cao, Chengzhe Lai:
Group-based authentication and key agreement for machine-type communication. Int. J. Grid Util. Comput. 5(2): 87-95 (2014) - [j47]Yong Wang, Aixiang Guo, Hong He, Hui Li, Fengrong Li:
Signalling scheme for achieving dynamic degrees of freedom in MIMO Y channel. Int. J. Grid Util. Comput. 5(3): 149-155 (2014) - [j46]Chengzhe Lai, Hui Li, Xiaohui Liang, Rongxing Lu, Kuan Zhang, Xuemin Shen:
CPAL: A Conditional Privacy-Preserving Authentication With Access Linkability for Roaming Service. IEEE Internet Things J. 1(1): 46-57 (2014) - [j45]Yinghui Zhang, Xiaofeng Chen, Jin Li, Hui Li, Fenghua Li:
Attribute-Based Data Sharing with Flexible and Direct Revocation in Cloud Computing. KSII Trans. Internet Inf. Syst. 8(11): 4028-4049 (2014) - [j44]Boyang Wang, Hui Li, Xuefeng Liu, Fenghua Li, Xiaoqing Li:
Efficient public verification on the integrity of multi-owner data in the cloud. J. Commun. Networks 16(6): 592-599 (2014) - [j43]Xixiang Lv, Yi Mu, Hui Li:
Loss-tolerant authentication with digital signatures. Secur. Commun. Networks 7(11): 2054-2062 (2014) - [j42]Boyang Wang, Hui Li, Xuefeng Liu, Xiaoqing Li, Fenghua Li:
Preserving identity privacy on multi-owner cloud data during public verification. Secur. Commun. Networks 7(11): 2104-2113 (2014) - [j41]Xingwen Zhao, Hui Li:
Achieving dynamic privileges in secure data sharing on cloud storage. Secur. Commun. Networks 7(11): 2211-2224 (2014) - [j40]Jin Cao, Maode Ma, Hui Li:
Access Authentication of Mass Device Connections for MTC in LTE Networks. Smart Comput. Rev. 4(4): 262-277 (2014) - [j39]Boyang Wang, Baochun Li, Hui Li:
Oruta: Privacy-Preserving Public Auditingfor Shared Data in the Cloud. IEEE Trans. Cloud Comput. 2(1): 43-56 (2014) - [j38]Xixiang Lv, Yi Mu, Hui Li:
Non-Interactive Key Establishment for Bundle Security Protocol of Space DTNs. IEEE Trans. Inf. Forensics Secur. 9(1): 5-13 (2014) - [j37]Wenhai Sun, Bing Wang, Ning Cao, Ming Li, Wenjing Lou, Y. Thomas Hou, Hui Li:
Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking. IEEE Trans. Parallel Distributed Syst. 25(11): 3025-3035 (2014) - [j36]Xiaoyan Zhu, Shunrong Jiang, Liangmin Wang, Hui Li:
Efficient Privacy-Preserving Authentication for Vehicular Ad Hoc Networks. IEEE Trans. Veh. Technol. 63(2): 907-919 (2014) - [j35]Ben Niu, Xiaoyan Zhu, Haotian Chi, Hui Li:
Privacy and Authentication Protocol for Mobile RFID Systems. Wirel. Pers. Commun. 77(3): 1713-1731 (2014) - [c73]Kai Fan, Chen Liang, Hui Li, Yintang Yang:
LRMAPC: A Lightweight RFID Mutual Authentication Protocol with Cache in the Reader for IoT. CIT 2014: 276-280 - [c72]Jieying Li, Yueyu Zhang, Jie Chen, Hui Li, Wujun Zhang:
Group Key Agreement in Multimedia Service for Machine Type Communication. APSCC 2014: 141-146 - [c71]Boyang Wang, Yantian Hou, Ming Li, Haitao Wang, Hui Li:
Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index. AsiaCCS 2014: 111-122 - [c70]Boyang Wang, Ming Li, Sherman S. M. Chow, Hui Li:
A tale of two clouds: Computing on data encrypted under multiple keys. CNS 2014: 337-345 - [c69]Hui Zhu, Cheng Huang, Hui Li:
MPPM: Malware propagation and prevention model in online SNS. ICC Workshops 2014: 682-687 - [c68]Hui Zhu, Rong Huang, Ximeng Liu, Hui Li:
SPEMR: A new secure personal electronic medical record scheme with privilege separation. ICC Workshops 2014: 700-705 - [c67]Ben Niu, Zhengyan Zhang, Xiaoqing Li, Hui Li:
Privacy-area aware dummy generation algorithms for Location-Based Services. ICC 2014: 957-962 - [c66]Chengzhe Lai, Hui Li, Rongxing Lu, Rong Jiang, Xuemin Shen:
SEGR: A secure and efficient group roaming scheme for machine to machine communications between 3GPP and WiMAX networks. ICC 2014: 1011-1016 - [c65]Xiaoyan Zhu, Haotian Chi, Shunrong Jiang, Xiaosan Lei, Hui Li:
Using dynamic pseudo-IDs to protect privacy in location-based services. ICC 2014: 2307-2312 - [c64]Xiaoyan Zhu, Jie Liu, Shunrong Jiang, Zengbao Chen, Hui Li:
Efficient Weight-based Private Matching for proximity-based mobile social networks. ICC 2014: 4114-4119 - [c63]Ben Niu, Qinghua Li, Xiaoyan Zhu, Hui Li:
A fine-grained spatial cloaking scheme for privacy-aware users in Location-Based Services. ICCCN 2014: 1-8 - [c62]Wenhai Sun, Shucheng Yu, Wenjing Lou, Y. Thomas Hou, Hui Li:
Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. INFOCOM 2014: 226-234 - [c61]Ben Niu, Qinghua Li, Xiaoyan Zhu, Guohong Cao, Hui Li:
Achieving k-anonymity in privacy-aware location-based services. INFOCOM 2014: 754-762 - [c60]Ben Niu, Xiaoyan Zhu, Weihao Li, Hui Li:
EPcloak: An Efficient and Privacy-Preserving Spatial Cloaking Scheme for LBSs. MASS 2014: 398-406 - [c59]Yinghui Zhang, Dong Zheng, Xiaofeng Chen, Jin Li, Hui Li:
Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts. ProvSec 2014: 259-273 - [c58]Ben Niu, Xiuguang Li, Xiaoyan Zhu, Xiaoqing Li, Hui Li:
Are You Really My Friend? Exactly Spatiotemporal Matching Scheme in Privacy-Aware Mobile Social Networks. SecureComm (2) 2014: 33-40 - [c57]Boyang Wang, Yantian Hou, Ming Li, Haitao Wang, Hui Li, Fenghua Li:
Tree-Based Multi-dimensional Range Search on Encrypted Data with Enhanced Privacy. SecureComm (1) 2014: 374-394 - [p2]Wenhai Sun, Wenjing Lou, Y. Thomas Hou, Hui Li:
Privacy-Preserving Keyword Search Over Encrypted Data in Cloud Computing. Secure Cloud Computing 2014: 189-212 - [i8]Ben Niu, Tanran Zhang, Xiaoyan Zhu, Hui Li, Zongqing Lu:
Priority-Aware Private Matching Schemes for Proximity-Based Mobile Social Networks. CoRR abs/1401.8064 (2014) - 2013
- [j34]Yuhua Sun, Zilong Wang, Hui Li, Tongjiang Yan:
The cross-correlation distribution of a p-ary m-sequence of period p2k-1 and its decimated sequence by ( (pk+1)2 / 2(pe+1) ). Adv. Math. Commun. 7(4): 409-424 (2013) - [j33]Yinghui Zhang, Xiaofeng Chen, Hui Li:
Key-Evolving Hierarchical ID-Based Signcryption. Comput. J. 56(10): 1228-1248 (2013) - [j32]Wujun Zhang, Yueyu Zhang, Jie Chen, Hui Li, Yumin Wang:
End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture. Clust. Comput. 16(4): 861-871 (2013) - [j31]Hui Zhu, Tingting Liu, Guanghui Wei, Hui Li:
PPAS: privacy protection authentication scheme for VANET. Clust. Comput. 16(4): 873-886 (2013) - [j30]Chengzhe Lai, Hui Li, Rongxing Lu, Xuemin (Sherman) Shen:
SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks. Comput. Networks 57(17): 3492-3510 (2013) - [j29]Yuhua Sun, Tongjiang Yan, Hui Li:
The Linear Complexity of a Class of Binary Sequences with Three-Level Autocorrelation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(7): 1586-1592 (2013) - [j28]Xixiang Lv, Hui Li:
Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks. IET Inf. Secur. 7(2) (2013) - [j27]Yong Wang, Liu Yang, Yun Ai, Hui Li, Yueyu Zhang, Fengrong Li:
Interference management strategy for multiuser two-way relay networks. Int. J. Embed. Syst. 5(3): 175-180 (2013) - [j26]Xudong Zhu, Hui Li, Fenghua Li:
Privacy-preserving logistic regression outsourcing in cloud computing. Int. J. Grid Util. Comput. 4(2/3): 144-150 (2013) - [j25]Xudong Zhu, Hui Li:
Activity clustering for anomaly detection. Int. J. Intell. Inf. Database Syst. 7(5): 441-453 (2013) - [j24]Xixiang Lv, Yi Mu, Hui Li:
Key distribution for heterogeneous public-key cryptosystems. J. Commun. Networks 15(5): 464-468 (2013) - [j23]Chao Lv, Maode Ma, Hui Li, Jianfeng Ma, Yaoyu Zhang:
An novel three-party authenticated key exchange protocol using one-time key. J. Netw. Comput. Appl. 36(1): 498-503 (2013) - [j22]Xixiang Lv, Hui Li, Baocang Wang:
Virtual private key generator based escrow-free certificateless public key cryptosystem for mobile ad hoc networks. Secur. Commun. Networks 6(1): 49-57 (2013) - [c56]Wenhai Sun, Bing Wang, Ning Cao, Ming Li, Wenjing Lou, Y. Thomas Hou, Hui Li:
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. AsiaCCS 2013: 71-82 - [c55]Yinghui Zhang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Hui Li:
Anonymous attribute-based encryption supporting efficient decryption test. AsiaCCS 2013: 511-516 - [c54]Boyang Wang, Baochun Li, Hui Li, Fenghua Li:
Certificateless public auditing for data integrity in the cloud. CNS 2013: 136-144 - [c53]Boyang Wang, Ming Li, Sherman S. M. Chow, Hui Li:
Computing encrypted cloud data efficiently under multiple keys. CNS 2013: 504-513 - [c52]Xiaoyan Zhu, Haotian Chi, Ben Niu, Weidong Zhang, Zan Li, Hui Li:
MobiCache: When k-anonymity meets cache. GLOBECOM 2013: 820-825 - [c51]Chengzhe Lai, Hui Li, Rongxing Lu, Rong Jiang, Xuemin Shen:
LGTH: A lightweight group authentication protocol for machine-type communication in LTE networks. GLOBECOM 2013: 832-837 - [c50]Ben Niu, Xiaoyan Zhu, Xiaosan Lei, Weidong Zhang, Hui Li:
EPS: Encounter-Based Privacy-Preserving Scheme for Location-Based Services. GLOBECOM 2013: 2139-2144 - [c49]Ben Niu, Xiaoyan Zhu, Jie Liu, Zan Li, Hui Li:
Weight-aware private matching scheme for Proximity-based Mobile Social Networks. GLOBECOM 2013: 3170-3175 - [c48]Boyang Wang, Hui Li, Ming Li:
Privacy-preserving public auditing for shared cloud data supporting group dynamics. ICC 2013: 1946-1950 - [c47]Boyang Wang, Sherman S. M. Chow, Ming Li, Hui Li:
Storing Shared Data on the Cloud via Security-Mediator. ICDCS 2013: 124-133 - [c46]Yuchao She, Hui Li, Hui Zhu:
UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors. ICT-EurAsia 2013: 300-305 - [c45]Yinghui Zhang, Hui Li, Xiaoqing Li, Hui Zhu:
Provably Secure and Subliminal-Free Variant of Schnorr Signature. ICT-EurAsia 2013: 383-391 - [c44]Hui Zhu, Tingting Liu, Guanghui Wei, Beishui Liu, Hui Li:
CSP-Based General Detection Model of Network Covert Storage Channels. ICT-EurAsia 2013: 459-468 - [c43]Hui Zhu, Yingfang Xue, Yun Zhang, Xiaofeng Chen, Hui Li, Ximeng Liu:
V-MLR: A Multilevel Security Model for Virtualization. INCoS 2013: 9-16 - [c42]Hui Zhu, Siyu Chen, Lexiang Zhu, Hui Li, Xiaofeng Chen:
RangeTree: A Feature Selection Algorithm for C4.5 Decision Tree. INCoS 2013: 17-22 - [c41]Kai Fan, Dayang Zhang, Hui Li, Yintang Yang:
An Adaptive Feedback Load Balancing Algorithm in HDFS. INCoS 2013: 23-29 - [c40]Yinghui Zhang, Xiaofeng Chen, Jin Li, Hui Li, Fenghua Li:
FDR-ABE: Attribute-Based Encryption with Flexible and Direct Revocation. INCoS 2013: 38-45 - [c39]Boyang Wang, Baochun Li, Hui Li:
Public auditing for shared data with efficient user revocation in the cloud. INFOCOM 2013: 2904-2912 - [c38]Ben Niu, Xiaoyan Zhu, Tanran Zhang, Haotian Chi, Hui Li:
P-Match: Priority-Aware Friend Discovery for Proximity-Based Mobile Social Networks. MASS 2013: 351-355 - [c37]Ben Niu, Xiaoyan Zhu, Hui Li:
An ultralightweight and privacy-preserving authentication protocol for mobile RFID systems. WCNC 2013: 1864-1869 - [c36]Ben Niu, Xiaoyan Zhu, Haotian Chi, Hui Li:
3PLUS: Privacy-preserving pseudo-location updating system in location-based services. WCNC 2013: 4564-4569 - [i7]Yuhua Sun, Tongjiang Yan, Hui Li:
Cyclic code from the first class Whiteman's generalized cyclotomic sequence with order 4. CoRR abs/1303.6378 (2013) - 2012
- [j21]Jin Cao, Hui Li, Maode Ma, Yueyu Zhang, Chengzhe Lai:
A simple and robust handover authentication between HeNB and eNB in LTE networks. Comput. Networks 56(8): 2119-2131 (2012) - [j20]Chao Lv, Hui Li, Jianfeng Ma, Yaoyu Zhang:
Vulnerability analysis of elliptic curve cryptography-based RFID authentication protocols. Trans. Emerg. Telecommun. Technol. 23(7): 618-624 (2012) - [j19]Boyang Wang, Hui Li, Jin Cao:
An efficient MAC scheme for secure network coding with probabilistic detection. Frontiers Comput. Sci. 6(4): 429-441 (2012) - [j18]Kai Fan, Yue Wang, Hui Li:
A new proxy blind signature scheme. Int. J. Grid Util. Comput. 3(1): 38-42 (2012) - [j17]Zhitu Su, Chunhui Sun, Hui Li, Jianfeng Ma:
A method for efficient parallel computation of Tate pairing. Int. J. Grid Util. Comput. 3(1): 43-52 (2012) - [j16]Kai Fan, Yue Wang, Hui Li:
Fairness electronic payment protocol. Int. J. Grid Util. Comput. 3(1): 53-58 (2012) - [j15]Jianying Zhou, Xuejia Lai, Hui Li:
Message from the Guest Editors. Int. J. Inf. Sec. 11(5): 291-292 (2012) - [j14]Chao Lv, Hui Li, Jianfeng Ma, Ben Niu:
Vulnerability analysis of lightweight secure search protocols for low-cost RFID systems. Int. J. Radio Freq. Identif. Technol. Appl. 4(1): 3-12 (2012) - [j13]Chengzhe Lai, Hui Li, Yueyu Zhang, Jin Cao:
Security Issues on Machine to Machine Communications. KSII Trans. Internet Inf. Syst. 6(2): 198-514 (2012) - [j12]Xixiang Lv, Hui Li:
Group Key Agreement From Signcryption. KSII Trans. Internet Inf. Syst. 6(12): 3338-3351 (2012) - [j11]Xixiang Lv, Hui Li, Baocang Wang:
Group key agreement for secure group communication in dynamic peer systems. J. Parallel Distributed Comput. 72(10): 1195-1200 (2012) - [j10]Chao Lv, Maode Ma, Hui Li, Jianfeng Ma, Ben Niu:
A security enhanced authentication and key distribution protocol for wireless networks. Secur. Commun. Networks 5(4): 343-352 (2012) - [j9]Chao Lv, Maode Ma, Hui Li, Jianfeng Ma, Ben Niu:
Security enhancement of the communication-efficient AUTHMAC_DH protocols. Secur. Commun. Networks 5(6): 674-680 (2012) - [j8]Jin Cao, Maode Ma, Hui Li:
An Uniform Handover Authentication between E-UTRAN and Non-3GPP Access Networks. IEEE Trans. Wirel. Commun. 11(10): 3644-3650 (2012) - [c35]Boyang Wang, Baochun Li, Hui Li:
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud. IEEE CLOUD 2012: 295-302 - [c34]Boyang Wang, Baochun Li, Hui Li:
Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud. ACNS 2012: 507-525 - [c33]Boyang Wang, Baochun Li, Hui Li:
Gmatch: Secure and privacy-preserving group matching in social networks. GLOBECOM 2012: 726-731 - [c32]Jin Cao, Maode Ma, Hui Li:
A group-based authentication and key agreement for MTC in LTE networks. GLOBECOM 2012: 1017-1022 - [c31]Jin Cao, Maode Ma, Hui Li:
Unified handover authentication between heterogeneous access systems in LTE networks. GLOBECOM 2012: 5308-5313 - [c30]Kai Fan, Libin Zhao, Xuemin (Sherman) Shen, Hui Li, Yintang Yang:
Smart-blocking file storage method in cloud computing. ICCC 2012: 57-62 - [c29]Yong Wang, Aixiang Guo, Hong He, Hui Li:
Optimization Transmission for Improving Degrees of Freedom in MIMO Y Channel. INCoS 2012: 121-125 - [c28]Hui Zhu, Wenhai Pan, Beishui Liu, Hui Li:
A Lightweight Anonymous Authentication Scheme for VANET Based on Bilinear Pairing. INCoS 2012: 222-228 - [c27]Yuan Chen, Xiaofeng Chen, Hui Li:
DCCA-Secure Public-Key Encryptions from Hybrid Paradigms. INCoS 2012: 264-269 - [c26]Kai Fan, Jie Li, Hui Li, Xiaohui Liang, Xuemin (Sherman) Shen, Yintang Yang:
ESLRAS: A Lightweight RFID Authentication Scheme with High Efficiency and Strong Security for Internet of Things. INCoS 2012: 323-328 - [c25]Yueyu Zhang, Jie Chen, Hui Li, Wujun Zhang, Jin Cao, Chengzhe Lai:
Dynamic Group Based Authentication Protocol for Machine Type Communications. INCoS 2012: 334-341 - [c24]Xudong Zhu, Hui Li:
Unsupervised Human Action Categorization Using Latent Dirichlet Markov Clustering. INCoS 2012: 347-352 - [c23]Wujun Zhang, Yueyu Zhang, Jie Chen, Hui Li, Yumin Wang:
End-to-End Security Scheme for Machine Type Communication Based on Generic Authentication Architecture. INCoS 2012: 353-359 - [c22]Yong Wang, Liu Yang, Yun Ai, Hui Li, Weidong Zhang:
Joint Signal Space Alignment and Precoding in Two-Way Relay Multi-user Networks. INCoS 2012: 385-389 - [c21]Qi Han, Yinghui Zhang, Xiaofeng Chen, Hui Li, Jiaxiang Quan:
Efficient and Robust Identity-Based Handoff Authentication in Wireless Networks. NSS 2012: 180-191 - [c20]Xingwen Zhao, Hui Li:
Codes Based Tracing and Revoking Scheme with Constant Ciphertext. ProvSec 2012: 318-335 - 2011
- [j7]Chao Lv, Hui Li, Jianfeng Ma, Meng Zhao:
Security analysis of two recently proposed RFID authentication protocols. Frontiers Comput. Sci. China 5(3): 335-340 (2011) - [j6]Xixiang Lv, Hui Li, Baocang Wang:
Identity-based key distribution for mobile Ad Hoc networks. Frontiers Comput. Sci. China 5(4): 442-447 (2011) - [j5]Yong Wang, Hui Li, Xiyuan Wang:
Robustness of Weighting Receive Antenna Selection Algorithm. Wirel. Pers. Commun. 61(1): 59-67 (2011) - [c19]Ben Niu, Hui Li, Xiaoyan Zhu, Chao Lv:
Security Analysis of Some Recent Authentication Protocols for RFID. CIS 2011: 665-669 - [c18]Zhitu Su, Chunhui Sun, Hui Li, Jianfeng Ma, Kai Fan:
Fast Parallel Computation of Tate Pairing. INCoS 2011: 178-183 - [c17]Kai Fan, Yue Wang, Hui Li:
Forward Secure Proxy Blind Signature Scheme. INCoS 2011: 263-267 - [c16]Kai Fan, Yue Wang, Hui Li:
Abuse-freeness Electronic Payment Protocol. INCoS 2011: 275-278 - [c15]Yuhua Sun, Zilong Wang, Hui Li, Tongjiang Yan:
On the cross-correlation of a ternary m-sequence of period 34k - 1 and its decimated sequence by (32k+1)2/20. IWSDA 2011: 48-51 - [p1]Maode Ma, Chao Lu, Hui Li:
Delay Tolerant Networking. Delay Tolerant Networks 2011: 1-30 - [e1]Xuejia Lai, Jianying Zhou, Hui Li:
Information Security, 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings. Lecture Notes in Computer Science 7001, Springer 2011, ISBN 978-3-642-24860-3 [contents] - [i6]Yuhua Sun, Hui Li, Zilong Wang, Tongjiang Yan:
$p$-ary sequences with six-valued cross-correlation function: a new decimation of Niho type. CoRR abs/1105.2783 (2011) - [i5]Yuhua Sun, Zilong Wang, Hui Li:
On the Cross-Correlation of a Ternary m-sequence of Period 34k-1 and Its Decimated Sequence by (32k+1)2 / 20. CoRR abs/1105.2786 (2011) - [i4]Yuhua Sun, Hui Li, Zilong Wang:
The cross-correlation distribution of a p-ary m-sequence of period p2m-1 and its decimation by (pm+1)2 / 2(pe+1). CoRR abs/1111.3477 (2011) - 2010
- [j4]Xixiang Lv, Hui Li:
ID-based authenticated group key agreement from bilinear maps. Frontiers Comput. Sci. China 4(2): 302-307 (2010) - [j3]Bin Zhao, Weidong Kou, Hui Li, Lanjun Dang, Jun Zhang:
Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol. Inf. Sci. 180(23): 4672-4684 (2010) - [j2]Lanjun Dang, Weidong Kou, Hui Li, Junwei Zhang, Xuefei Cao, Bin Zhao, Kai Fan:
Efficient ID-based registration protocol featured with user anonymity in mobile IP networks. IEEE Trans. Wirel. Commun. 9(2): 594-604 (2010) - [c14]Lanjun Dang, Jie Xu, Hui Li, Nan Dang:
DASR: Distributed Anonymous Secure Routing with Good Scalability for Mobile Ad Hoc Networks. APSCC 2010: 454-461 - [c13]Xudong Zhu, Hui Li, Zhijing Liu:
Behavior Clustering for Anomaly Detection. e-Forensics 2010: 14-27 - [c12]Can Mo, Hui Li, Hui Zhu:
A Stream Pattern Matching Method for Traffic Analysis. e-Forensics 2010: 131-140 - [c11]Yong Wang, Hui Li, Xiyuan Wang:
Performance analysis of optimal antenna scheme in transmit diversity systems. ICNC 2010: 2793-2797
2000 – 2009
- 2009
- [c10]Chao Lv, Hui Li, Jianfeng Ma:
Analysis the Properties of TLS Based on Temporal Logic of Knowledge. IAS 2009: 19-22 - [c9]Xiaoqing Li, Hui Li, Jianfeng Ma, Weidong Zhang:
An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Networks. IAS 2009: 287-290 - [c8]Kai Fan, Hui Li, Yue Wang:
Security Analysis of the Kerberos Protocol Using BAN Logic. IAS 2009: 467-470 - [c7]Kai Fan, Yue Wang, Hui Li:
A New Abuse-Free Fair Electronic Payment Protocol. IAS 2009: 633-636 - [c6]Hui Zhu, Hui Li, Yumin Wang:
An Efficient Fast Authentication Protocol. CIS (2) 2009: 222-225 - [c5]Yejun Zhou, Hui Li, Jianfeng Ma:
Secure Error-Correction Network Coding in a Randomized Setting. ISA 2009: 570-577 - 2008
- [c4]Ying Wang, Xinjun Du, Hui Li, Yumin Wang:
The Design of Optimal Period Interleaver. AINA Workshops 2008: 413-415 - [i3]Yejun Zhou, Hui Li, Jianfeng Ma:
Secure Network Coding Against the Contamination and Eavesdropping Adversaries. CoRR abs/0805.2286 (2008) - [i2]Zhitu Su, Hui Li, Jianfeng Ma:
Factoring Polynomials for Constructing Pairing-friendly Elliptic Curves. IACR Cryptol. ePrint Arch. 2008: 8 (2008) - [i1]Zhitu Su, Hui Li, Jianfeng Ma:
Polynomials for Ate Pairing and Atei Pairing. IACR Cryptol. ePrint Arch. 2008: 202 (2008) - 2007
- [j1]Lanjun Dang, Weidong Kou, Nan Dang, Hui Li, Bin Zhao, Kai Fan:
Mobile ip registration in certificateless public key infrastructure. IET Inf. Secur. 1(4): 167-173 (2007) - 2005
- [c3]Hui Li, Ting Shen:
A Token-Based Single Sign-On Protocol. CIS (2) 2005: 180-185 - [c2]Meng Wang, Hui Li, Zhijing Liu:
Efficient Identity Based Proxy-Signcryption Schemes with Forward Security and Public Verifiability. ICCNMC 2005: 982-991 - 2004
- [c1]Qinghua Zheng, Hui Li, Yun Xiao:
A Classified Method Based on Support Vector Machine for Grid Computing Intrusion Detection. GCC 2004: 875-878
Coauthor Index
aka: Xuemin (Sherman) Shen
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint