BibTeX records: Hui Li 0006

download as .bib file

@article{DBLP:journals/iotj/GaoFWCZLY24,
  author       = {Nan Gao and
                  Kai Fan and
                  Haoyang Wang and
                  Hongyan Chen and
                  Kuan Zhang and
                  Hui Li and
                  Yintang Yang},
  title        = {Ciphertext Retrieval With Identity Bidirectional Authentication and
                  Matrix Index in IoT},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {1},
  pages        = {889--903},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3288131},
  doi          = {10.1109/JIOT.2023.3288131},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/GaoFWCZLY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/GaoFWZLY24,
  author       = {Nan Gao and
                  Kai Fan and
                  Haoyang Wang and
                  Kuan Zhang and
                  Hui Li and
                  Yintang Yang},
  title        = {Public-Key Inverted-Index Keyword Search With Designated Tester and
                  Multiuser Key Decryption in IoT},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {1},
  pages        = {1065--1079},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3288119},
  doi          = {10.1109/JIOT.2023.3288119},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/GaoFWZLY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/FanHLZLY24,
  author       = {Kai Fan and
                  Jingtao Hong and
                  Wenjie Li and
                  Xingwen Zhao and
                  Hui Li and
                  Yintang Yang},
  title        = {{FLSG:} {A} Novel Defense Strategy Against Inference Attacks in Vertical
                  Federated Learning},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {2},
  pages        = {1816--1826},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3302792},
  doi          = {10.1109/JIOT.2023.3302792},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/FanHLZLY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiFYYL24,
  author       = {Wenjie Li and
                  Kai Fan and
                  Kan Yang and
                  Yintang Yang and
                  Hui Li},
  title        = {{PBFL:} Privacy-Preserving and Byzantine-Robust Federated-Learning-Empowered
                  Industry 4.0},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {4},
  pages        = {7128--7140},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3315226},
  doi          = {10.1109/JIOT.2023.3315226},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/LiFYYL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/0001LBLYZ024,
  author       = {Kai Fan and
                  Hengrui Lu and
                  Yuhan Bai and
                  Yu Luo and
                  Yintang Yang and
                  Kuan Zhang and
                  Hui Li},
  title        = {SC-Chain: An Efficient Blockchain Framework for Smart City},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {5},
  pages        = {7863--7877},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3317451},
  doi          = {10.1109/JIOT.2023.3317451},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/0001LBLYZ024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/Wei0Z00Y24,
  author       = {Guanglu Wei and
                  Kai Fan and
                  Kuan Zhang and
                  Haoyang Wang and
                  Hui Li and
                  Yintang Yang},
  title        = {Quantum-Safe Lattice-Based Certificateless Anonymous Authenticated
                  Key Agreement for Internet of Things},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {5},
  pages        = {9213--9225},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3323275},
  doi          = {10.1109/JIOT.2023.3323275},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/Wei0Z00Y24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/FanRBWZLY24,
  author       = {Kai Fan and
                  Yuanshuai Ren and
                  Yuhan Bai and
                  Guanglu Wei and
                  Kuan Zhang and
                  Hui Li and
                  Yintang Yang},
  title        = {Fault-Tolerant and Collusion-Resistant Lattice-Based Multidimensional
                  Privacy-Preserving Data Aggregation in Edge-Based Smart Grid},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {6},
  pages        = {9487--9504},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3323542},
  doi          = {10.1109/JIOT.2023.3323542},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/FanRBWZLY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/0002HLC0W24,
  author       = {Qiao Liu and
                  Qi Han and
                  Guangze Luo and
                  Jin Cao and
                  Hui Li and
                  Yong Wang},
  title        = {Wiretap resisting and privacy preserving data exchange with physical
                  layer security and blockchain based authentication in Internet of
                  Vehicles},
  journal      = {Microprocess. Microsystems},
  volume       = {104},
  pages        = {104965},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.micpro.2023.104965},
  doi          = {10.1016/J.MICPRO.2023.104965},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mam/0002HLC0W24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/ShangCZZNL24,
  author       = {Chao Shang and
                  Jin Cao and
                  Tong Zhu and
                  Yinghui Zhang and
                  Ben Niu and
                  Hui Li},
  title        = {{CADFA:} {A} Clock Skew-Based Active Device Fingerprint Authentication
                  Scheme for Class-1 IoT Devices},
  journal      = {{IEEE} Syst. J.},
  volume       = {18},
  number       = {1},
  pages        = {590--599},
  year         = {2024},
  url          = {https://doi.org/10.1109/JSYST.2024.3351222},
  doi          = {10.1109/JSYST.2024.3351222},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/ShangCZZNL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhengL23,
  author       = {Xianchun Zheng and
                  Hui Li},
  title        = {Identification of Malicious Encrypted Traffic Through Feature Fusion},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {80072--80080},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3279120},
  doi          = {10.1109/ACCESS.2023.3279120},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhengL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/YangCRNZL23,
  author       = {Yuanyuan Yang and
                  Jin Cao and
                  Xiongpeng Ren and
                  Ben Niu and
                  Yinghui Zhang and
                  Hui Li},
  title        = {{LK-AKA:} {A} lightweight location key-based authentication and key
                  agreement protocol for {S2S} communication},
  journal      = {Comput. Commun.},
  volume       = {197},
  pages        = {214--229},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comcom.2022.10.028},
  doi          = {10.1016/J.COMCOM.2022.10.028},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/YangCRNZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/DuZZLWL23,
  author       = {Xiaoxin Du and
                  Hui Zhu and
                  Yandong Zheng and
                  Rongxing Lu and
                  Fengwei Wang and
                  Hui Li},
  title        = {A Semantic-Preserving Scheme to Trajectory Synthesis Using Differential
                  Privacy},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {15},
  pages        = {13784--13797},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2023.3262964},
  doi          = {10.1109/JIOT.2023.3262964},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/DuZZLWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/YangCMCCNL23,
  author       = {Yuanyuan Yang and
                  Jin Cao and
                  Ruhui Ma and
                  Lifu Cheng and
                  Lilan Chen and
                  Ben Niu and
                  Hui Li},
  title        = {{FHAP:} Fast Handover Authentication Protocol for High-Speed Mobile
                  Terminals in 5G Satellite-Terrestrial-Integrated Networks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {15},
  pages        = {13959--13973},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2023.3262933},
  doi          = {10.1109/JIOT.2023.3262933},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/YangCMCCNL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/BiFZBLY23,
  author       = {Ye Bi and
                  Kai Fan and
                  Kuan Zhang and
                  Yuhan Bai and
                  Hui Li and
                  Yintang Yang},
  title        = {A Secure and Efficient Two-Party Protocol Enabling Ownership Transfer
                  of {RFID} Objects},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {18},
  pages        = {16225--16237},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2023.3267501},
  doi          = {10.1109/JIOT.2023.3267501},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/BiFZBLY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ZhaoZWLL23,
  author       = {Jiaqi Zhao and
                  Hui Zhu and
                  Fengwei Wang and
                  Rongxing Lu and
                  Hui Li},
  title        = {Efficient and privacy-preserving tree-based inference via additive
                  homomorphic encryption},
  journal      = {Inf. Sci.},
  volume       = {650},
  pages        = {119480},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ins.2023.119480},
  doi          = {10.1016/J.INS.2023.119480},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ZhaoZWLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/FanBYZL23,
  author       = {Kai Fan and
                  Ye Bi and
                  Yintang Yang and
                  Kuan Zhang and
                  Hui Li},
  title        = {Secure and Efficient Lightweight Protocol for Emergency Vehicle Avoidance
                  Based on Cloud},
  journal      = {{IEEE} Netw.},
  volume       = {37},
  number       = {4},
  pages        = {314--322},
  year         = {2023},
  url          = {https://doi.org/10.1109/MNET.002.2300009},
  doi          = {10.1109/MNET.002.2300009},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/network/FanBYZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/FanSYBYYL23,
  author       = {Kai Fan and
                  Zeyu Shi and
                  Yicen Yang and
                  Liyang Bai and
                  Yintang Yang and
                  Kan Yang and
                  Hui Li},
  title        = {Blockchain-based cloud-edge clock calibration in IoT},
  journal      = {Peer Peer Netw. Appl.},
  volume       = {16},
  number       = {3},
  pages        = {1432--1444},
  year         = {2023},
  url          = {https://doi.org/10.1007/s12083-023-01475-z},
  doi          = {10.1007/S12083-023-01475-Z},
  timestamp    = {Thu, 22 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/FanSYBYYL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/FanCSZWLY23,
  author       = {Kai Fan and
                  Qi Chen and
                  Ruidan Su and
                  Kuan Zhang and
                  Haoyang Wang and
                  Hui Li and
                  Yintang Yang},
  title        = {{MSIAP:} {A} Dynamic Searchable Encryption for Privacy-Protection
                  on Smart Grid With Cloud-Edge-End},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {11},
  number       = {2},
  pages        = {1170--1181},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCC.2021.3134015},
  doi          = {10.1109/TCC.2021.3134015},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcc/FanCSZWLY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/ZhaoZWLWLL23,
  author       = {Jiaqi Zhao and
                  Hui Zhu and
                  Fengwei Wang and
                  Rongxing Lu and
                  Ermei Wang and
                  Linfeng Li and
                  Hui Li},
  title        = {{VFLR:} An Efficient and Privacy-Preserving Vertical Federated Framework
                  for Logistic Regression},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {11},
  number       = {4},
  pages        = {3326--3340},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCC.2023.3247870},
  doi          = {10.1109/TCC.2023.3247870},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcc/ZhaoZWLWLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiYCSL23,
  author       = {Xiaoguang Li and
                  Haonan Yan and
                  Zelei Cheng and
                  Wenhai Sun and
                  Hui Li},
  title        = {Protecting Regression Models With Personalized Local Differential
                  Privacy},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {2},
  pages        = {960--974},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3144690},
  doi          = {10.1109/TDSC.2022.3144690},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiYCSL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CaoZMGZL23,
  author       = {Jin Cao and
                  Tong Zhu and
                  Ruhui Ma and
                  Zhenyang Guo and
                  Yinghui Zhang and
                  Hui Li},
  title        = {A Software-Based Remote Attestation Scheme for Internet of Things
                  Devices},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {2},
  pages        = {1422--1434},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3154887},
  doi          = {10.1109/TDSC.2022.3154887},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/CaoZMGZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangFCCZLLY23,
  author       = {Haoyang Wang and
                  Kai Fan and
                  Hongyan Chen and
                  Qi Chen and
                  Kuan Zhang and
                  Fenghua Li and
                  Hui Li and
                  Yintang Yang},
  title        = {Joint Biological {ID} : {A} Secure and Efficient Lightweight Biometric
                  Authentication Scheme},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {3},
  pages        = {2578--2592},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3186999},
  doi          = {10.1109/TDSC.2022.3186999},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/WangFCCZLLY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangSLNLZXZ23,
  author       = {Ming Zhang and
                  Zhe Sun and
                  Hui Li and
                  Ben Niu and
                  Fenghua Li and
                  Zixu Zhang and
                  Yuhang Xie and
                  Chunhao Zheng},
  title        = {Go-Sharing: {A} Blockchain-Based Privacy-Preserving Framework for
                  Cross-Social Network Photo Sharing},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {5},
  pages        = {3572--3587},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3208934},
  doi          = {10.1109/TDSC.2022.3208934},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhangSLNLZXZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhengLZZGSWL23,
  author       = {Yandong Zheng and
                  Rongxing Lu and
                  Hui Zhu and
                  Songnian Zhang and
                  Yunguo Guan and
                  Jun Shao and
                  Fengwei Wang and
                  Hui Li},
  title        = {SetRkNN: Efficient and Privacy-Preserving Set Reverse kNN Query in
                  Cloud},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {888--903},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2022.3231785},
  doi          = {10.1109/TIFS.2022.3231785},
  timestamp    = {Tue, 02 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhengLZZGSWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhaoZXWLL23,
  author       = {Jiaqi Zhao and
                  Hui Zhu and
                  Wei Xu and
                  Fengwei Wang and
                  Rongxing Lu and
                  Hui Li},
  title        = {SGBoost: An Efficient and Privacy-Preserving Vertical Federated Tree
                  Boosting Framework},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {1022--1036},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2022.3232955},
  doi          = {10.1109/TIFS.2022.3232955},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhaoZXWLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhengZLGZWSL23,
  author       = {Yandong Zheng and
                  Hui Zhu and
                  Rongxing Lu and
                  Yunguo Guan and
                  Songnian Zhang and
                  Fengwei Wang and
                  Jun Shao and
                  Hui Li},
  title        = {PGSim: Efficient and Privacy-Preserving Graph Similarity Query Over
                  Encrypted Data in Cloud},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {2030--2045},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3262147},
  doi          = {10.1109/TIFS.2023.3262147},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhengZLGZWSL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangZHLZL23,
  author       = {Fengwei Wang and
                  Hui Zhu and
                  Guozhang He and
                  Rongxing Lu and
                  Yandong Zheng and
                  Hui Li},
  title        = {Efficient and Privacy-Preserving Arbitrary Polygon Range Query Scheme
                  Over Dynamic and Time-Series Location Data},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {3414--3429},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3282133},
  doi          = {10.1109/TIFS.2023.3282133},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangZHLZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhengZLGZWSL23a,
  author       = {Yandong Zheng and
                  Hui Zhu and
                  Rongxing Lu and
                  Yunguo Guan and
                  Songnian Zhang and
                  Fengwei Wang and
                  Jun Shao and
                  Hui Li},
  title        = {Efficient and Privacy-Preserving Aggregated Reverse kNN Query Over
                  Crowd-Sensed Data},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {4285--4299},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3293416},
  doi          = {10.1109/TIFS.2023.3293416},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhengZLGZWSL23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/RenCMLGZL23,
  author       = {Xiongpeng Ren and
                  Jin Cao and
                  Ruhui Ma and
                  Yurong Luo and
                  Jian Guan and
                  Yinghui Zhang and
                  Hui Li},
  title        = {A Novel Access and Handover Authentication Scheme in UAV-Aided Satellite-Terrestrial
                  Integration Networks Enabling 5G},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {20},
  number       = {3},
  pages        = {3880--3899},
  year         = {2023},
  url          = {https://doi.org/10.1109/TNSM.2023.3246732},
  doi          = {10.1109/TNSM.2023.3246732},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/RenCMLGZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/GuoYL023,
  author       = {Ziyao Guo and
                  Haonan Yan and
                  Hui Li and
                  Xiaodong Lin},
  title        = {Class Attention Transfer Based Knowledge Distillation},
  booktitle    = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition,
                  {CVPR} 2023, Vancouver, BC, Canada, June 17-24, 2023},
  pages        = {11868--11877},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CVPR52729.2023.01142},
  doi          = {10.1109/CVPR52729.2023.01142},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cvpr/GuoYL023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/LiZZXLL23,
  author       = {Peining Li and
                  Yandong Zheng and
                  Hui Zhu and
                  Qi Xu and
                  Zhe Liu and
                  Hui Li},
  title        = {Efficient and Private Edit Distance Based Range Query over Encrypted
                  String Sequences},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2023, Kuala Lumpur,
                  Malaysia, December 4-8, 2023},
  pages        = {3306--3311},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/GLOBECOM54140.2023.10437476},
  doi          = {10.1109/GLOBECOM54140.2023.10437476},
  timestamp    = {Sun, 10 Mar 2024 10:39:12 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/LiZZXLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/ZhaoZWLL23,
  author       = {Jiaqi Zhao and
                  Hui Zhu and
                  Fengwei Wang and
                  Rongxing Lu and
                  Hui Li},
  title        = {Efficient and Privacy-Preserving Logistic Regression Prediction over
                  Vertically Partitioned Data},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2023, Kuala Lumpur,
                  Malaysia, December 4-8, 2023},
  pages        = {4253--4258},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/GLOBECOM54140.2023.10437155},
  doi          = {10.1109/GLOBECOM54140.2023.10437155},
  timestamp    = {Sun, 10 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/ZhaoZWLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/WangFLCLY23,
  author       = {Jiahui Wang and
                  Yulong Fu and
                  Mengru Liu and
                  Jin Cao and
                  Hui Li and
                  Zheng Yan},
  editor       = {Weizhi Meng and
                  Zheng Yan and
                  Vincenzo Piuri},
  title        = {Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with
                  Soft Biometrics},
  booktitle    = {Information Security Practice and Experience - 18th International
                  Conference, {ISPEC} 2023, Copenhagen, Denmark, August 24-25, 2023,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14341},
  pages        = {52--73},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-7032-2\_4},
  doi          = {10.1007/978-981-99-7032-2\_4},
  timestamp    = {Wed, 15 Nov 2023 10:18:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/WangFLCLY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/YanZCLS0023,
  author       = {Haonan Yan and
                  Wenjing Zhang and
                  Qian Chen and
                  Xiaoguang Li and
                  Wenhai Sun and
                  Hui Li and
                  Xiaodong Lin},
  editor       = {Alice Oh and
                  Tristan Naumann and
                  Amir Globerson and
                  Kate Saenko and
                  Moritz Hardt and
                  Sergey Levine},
  title        = {{RECESS} Vaccine for Federated Learning: Proactive Defense Against
                  Model Poisoning Attacks},
  booktitle    = {Advances in Neural Information Processing Systems 36: Annual Conference
                  on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans,
                  LA, USA, December 10 - 16, 2023},
  year         = {2023},
  url          = {http://papers.nips.cc/paper\_files/paper/2023/hash/1b80fe066fdbceb3a2960117bac33917-Abstract-Conference.html},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/YanZCLS0023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LiLSG023,
  author       = {Xiaoguang Li and
                  Ninghui Li and
                  Wenhai Sun and
                  Neil Zhenqiang Gong and
                  Hui Li},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Fine-grained Poisoning Attack to Local Differential Privacy Protocols
                  for Mean and Variance Estimation},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {1739--1756},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/li-xiaoguang},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/LiLSG023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-12777,
  author       = {Ziyao Guo and
                  Haonan Yan and
                  Hui Li and
                  Xiaodong Lin},
  title        = {Class Attention Transfer Based Knowledge Distillation},
  journal      = {CoRR},
  volume       = {abs/2304.12777},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.12777},
  doi          = {10.48550/ARXIV.2304.12777},
  eprinttype    = {arXiv},
  eprint       = {2304.12777},
  timestamp    = {Wed, 03 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-12777.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ZhaoZWLLZW22,
  author       = {Jiaqi Zhao and
                  Hui Zhu and
                  Fengwei Wang and
                  Rongxing Lu and
                  Hui Li and
                  Zhongmin Zhou and
                  Haitao Wan},
  title        = {{ACCEL:} an efficient and privacy-preserving federated logistic regression
                  scheme over vertically partitioned data},
  journal      = {Sci. China Inf. Sci.},
  volume       = {65},
  number       = {7},
  pages        = {1--2},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11432-021-3415-1},
  doi          = {10.1007/S11432-021-3415-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/ZhaoZWLLZW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/WangFYCDLY22,
  author       = {Xingmiao Wang and
                  Kai Fan and
                  Kan Yang and
                  Xiaochun Cheng and
                  Qingkuan Dong and
                  Hui Li and
                  Yintang Yang},
  title        = {A new {RFID} ultra-lightweight authentication protocol for medical
                  privacy protection in smart living},
  journal      = {Comput. Commun.},
  volume       = {186},
  pages        = {121--132},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.comcom.2022.01.014},
  doi          = {10.1016/J.COMCOM.2022.01.014},
  timestamp    = {Tue, 20 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/WangFYCDLY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/RenCMLZ22,
  author       = {Xiongpeng Ren and
                  Jin Cao and
                  Maode Ma and
                  Hui Li and
                  Yinghui Zhang},
  title        = {A Novel PUF-Based Group Authentication and Data Transmission Scheme
                  for NB-IoT in 3GPP 5G Networks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {5},
  pages        = {3642--3656},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2021.3098224},
  doi          = {10.1109/JIOT.2021.3098224},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/RenCMLZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/WangFZWLY22,
  author       = {Haoyang Wang and
                  Kai Fan and
                  Kuan Zhang and
                  Zilong Wang and
                  Hui Li and
                  Yintang Yang},
  title        = {Encrypted Data Retrieval and Sharing Scheme in Space-Air-Ground-Integrated
                  Vehicular Networks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {8},
  pages        = {5957--5970},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2021.3062626},
  doi          = {10.1109/JIOT.2021.3062626},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/WangFZWLY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/TangZLLLW22,
  author       = {Jiezhen Tang and
                  Hui Zhu and
                  Rongxing Lu and
                  Xiaodong Lin and
                  Hui Li and
                  Fengwei Wang},
  title        = {{DLP:} Achieve Customizable Location Privacy With Deceptive Dummy
                  Techniques in {LBS} Applications},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {9},
  pages        = {6969--6984},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2021.3115849},
  doi          = {10.1109/JIOT.2021.3115849},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/TangZLLLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/YanLDLZL22,
  author       = {Haonan Yan and
                  Xiaoguang Li and
                  Rui Dai and
                  Hui Li and
                  Xingwen Zhao and
                  Fenghua Li},
  title        = {{MARS:} Automated Protocol Analysis Framework for Internet of Things},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {19},
  pages        = {18333--18345},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2022.3160296},
  doi          = {10.1109/JIOT.2022.3160296},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/YanLDLZL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/CaoLMHZL22,
  author       = {Jin Cao and
                  Sheng Li and
                  Ruhui Ma and
                  Yuxi Han and
                  Yueyu Zhang and
                  Hui Li},
  title        = {{RPRIA:} Reputation and PUF-Based Remote Identity Attestation Protocol
                  for Massive IoT Devices},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {19},
  pages        = {19174--19187},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2022.3164174},
  doi          = {10.1109/JIOT.2022.3164174},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/CaoLMHZL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/XuZZZLL22,
  author       = {Qi Xu and
                  Hui Zhu and
                  Yandong Zheng and
                  Jiaqi Zhao and
                  Rongxing Lu and
                  Hui Li},
  title        = {An Efficient and Privacy-Preserving Route Matching Scheme for Carpooling
                  Services},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {20},
  pages        = {19890--19902},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2022.3168661},
  doi          = {10.1109/JIOT.2022.3168661},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/XuZZZLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/WangFZWLY22a,
  author       = {Haoyang Wang and
                  Kai Fan and
                  Kuan Zhang and
                  Zilong Wang and
                  Hui Li and
                  Yintang Yang},
  title        = {Secure and Efficient Data-Privacy-Preserving Scheme for Mobile Cyber-Physical
                  Systems},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {22},
  pages        = {22375--22388},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2021.3081456},
  doi          = {10.1109/JIOT.2021.3081456},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/WangFZWLY22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ZhaoZWLLTS22,
  author       = {Jiaqi Zhao and
                  Hui Zhu and
                  Fengwei Wang and
                  Rongxing Lu and
                  Hui Li and
                  Jingwei Tu and
                  Jie Shen},
  title        = {{CORK:} {A} privacy-preserving and lossless federated learning scheme
                  for deep neural network},
  journal      = {Inf. Sci.},
  volume       = {603},
  pages        = {190--209},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ins.2022.04.052},
  doi          = {10.1016/J.INS.2022.04.052},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ZhaoZWLLTS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/MaCFLLX22,
  author       = {Ruhui Ma and
                  Jin Cao and
                  Dengguo Feng and
                  Hui Li and
                  Xiaowei Li and
                  Yang Xu},
  title        = {A robust authentication scheme for remote diagnosis and maintenance
                  in 5G {V2N}},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {198},
  pages        = {103281},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jnca.2021.103281},
  doi          = {10.1016/J.JNCA.2021.103281},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/MaCFLLX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/FanSSBHZLY22,
  author       = {Kai Fan and
                  Zeyu Shi and
                  Ruidan Su and
                  Yuhan Bai and
                  Pei Huang and
                  Kuan Zhang and
                  Hui Li and
                  Yintang Yang},
  title        = {Blockchain-based trust management for verifiable time synchronization
                  service in IoT},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {15},
  number       = {2},
  pages        = {1152--1162},
  year         = {2022},
  url          = {https://doi.org/10.1007/s12083-021-01276-2},
  doi          = {10.1007/S12083-021-01276-2},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ppna/FanSSBHZLY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SunCMZLN22,
  author       = {Yunqing Sun and
                  Jin Cao and
                  Maode Ma and
                  Yinghui Zhang and
                  Hui Li and
                  Ben Niu},
  title        = {{EAP-DDBA:} Efficient Anonymity Proximity Device Discovery and Batch
                  Authentication Mechanism for Massive {D2D} Communication Devices in
                  3GPP 5G HetNet},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {1},
  pages        = {370--387},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2020.2989784},
  doi          = {10.1109/TDSC.2020.2989784},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/SunCMZLN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangZLZL22,
  author       = {Fengwei Wang and
                  Hui Zhu and
                  Rongxing Lu and
                  Yandong Zheng and
                  Hui Li},
  title        = {Achieve Efficient and Privacy-Preserving Disease Risk Assessment Over
                  Multi-Outsourced Vertical Datasets},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {3},
  pages        = {1492--1504},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2020.3026631},
  doi          = {10.1109/TDSC.2020.3026631},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/WangZLZL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YanL0LSL22,
  author       = {Haonan Yan and
                  Xiaoguang Li and
                  Hui Li and
                  Jiamin Li and
                  Wenhai Sun and
                  Fenghua Li},
  title        = {Monitoring-Based Differential Privacy Mechanism Against Query Flooding-Based
                  Model Extraction Attack},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {4},
  pages        = {2680--2694},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3069258},
  doi          = {10.1109/TDSC.2021.3069258},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/YanL0LSL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhaoZWLLL22,
  author       = {Jiaqi Zhao and
                  Hui Zhu and
                  Fengwei Wang and
                  Rongxing Lu and
                  Zhe Liu and
                  Hui Li},
  title        = {{PVD-FL:} {A} Privacy-Preserving and Verifiable Decentralized Federated
                  Learning Framework},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {17},
  pages        = {2059--2073},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIFS.2022.3176191},
  doi          = {10.1109/TIFS.2022.3176191},
  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhaoZWLLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/MaCZSXL22,
  author       = {Ruhui Ma and
                  Jin Cao and
                  Yinghui Zhang and
                  Chao Shang and
                  Lihui Xiong and
                  Hui Li},
  title        = {A Group-Based Multicast Service Authentication and Data Transmission
                  Scheme for 5G-V2X},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {23},
  number       = {12},
  pages        = {23976--23992},
  year         = {2022},
  url          = {https://doi.org/10.1109/TITS.2022.3197767},
  doi          = {10.1109/TITS.2022.3197767},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/MaCZSXL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/NiuCWLWL22,
  author       = {Ben Niu and
                  Yahong Chen and
                  Zhibo Wang and
                  Fenghua Li and
                  Boyang Wang and
                  Hui Li},
  title        = {Eclipse: Preserving Differential Location Privacy Against Long-Term
                  Observation Attacks},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {125--138},
  year         = {2022},
  url          = {https://doi.org/10.1109/TMC.2020.3000730},
  doi          = {10.1109/TMC.2020.3000730},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/NiuCWLWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/NiuLWCLL22,
  author       = {Ben Niu and
                  Qinghua Li and
                  Hanyi Wang and
                  Guohong Cao and
                  Fenghua Li and
                  Hui Li},
  title        = {A Framework for Personalized Location Privacy},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {21},
  number       = {9},
  pages        = {3071--3083},
  year         = {2022},
  url          = {https://doi.org/10.1109/TMC.2021.3055865},
  doi          = {10.1109/TMC.2021.3055865},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/NiuLWCLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/LiSZHYLP22,
  author       = {Liang Li and
                  Dian Shi and
                  Xinyue Zhang and
                  Ronghui Hou and
                  Hao Yue and
                  Hui Li and
                  Miao Pan},
  title        = {Privacy Preserving Participant Recruitment for Coverage Maximization
                  in Location Aware Mobile Crowdsensing},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {21},
  number       = {9},
  pages        = {3250--3262},
  year         = {2022},
  url          = {https://doi.org/10.1109/TMC.2021.3050147},
  doi          = {10.1109/TMC.2021.3050147},
  timestamp    = {Tue, 13 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/LiSZHYLP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/LiZZWL022,
  author       = {Linlin Li and
                  Hui Zhu and
                  Yandong Zheng and
                  Fengwei Wang and
                  Rongxing Lu and
                  Hui Li},
  title        = {Efficient and Privacy-Preserving Fusion Based Multi-Biometric Recognition},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2022, Rio de Janeiro,
                  Brazil, December 4-8, 2022},
  pages        = {4860--4865},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/GLOBECOM48099.2022.10000971},
  doi          = {10.1109/GLOBECOM48099.2022.10000971},
  timestamp    = {Wed, 18 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/LiZZWL022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/YanLG0L022,
  author       = {Haonan Yan and
                  Xiaoguang Li and
                  Ziyao Guo and
                  Hui Li and
                  Fenghua Li and
                  Xiaodong Lin},
  editor       = {Luc De Raedt},
  title        = {{ARCANE:} An Efficient Architecture for Exact Machine Unlearning},
  booktitle    = {Proceedings of the Thirty-First International Joint Conference on
                  Artificial Intelligence, {IJCAI} 2022, Vienna, Austria, 23-29 July
                  2022},
  pages        = {4006--4013},
  publisher    = {ijcai.org},
  year         = {2022},
  url          = {https://doi.org/10.24963/ijcai.2022/556},
  doi          = {10.24963/IJCAI.2022/556},
  timestamp    = {Wed, 27 Jul 2022 16:43:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/YanLG0L022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ZhangSLNLXZ22,
  author       = {Ming Zhang and
                  Zhe Sun and
                  Hui Li and
                  Ben Niu and
                  Fenghua Li and
                  Yuhang Xie and
                  Chunhao Zheng},
  title        = {A blockchain-based Privacy-Preserving Framework for Cross-Social Network
                  Photo Sharing},
  booktitle    = {{IEEE} {INFOCOM} 2022 - {IEEE} Conference on Computer Communications
                  Workshops, {INFOCOM} 2022 - Workshops, New York, NY, USA, May 2-5,
                  2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/INFOCOMWKSHPS54753.2022.9798330},
  doi          = {10.1109/INFOCOMWKSHPS54753.2022.9798330},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/ZhangSLNLXZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/SunLYMPC22,
  author       = {Longlong Sun and
                  Hui Li and
                  Shiwen Yu and
                  Xindi Ma and
                  Yanguo Peng and
                  Jiangtao Cui},
  editor       = {Willy Susilo and
                  Xiaofeng Chen and
                  Fuchun Guo and
                  Yudi Zhang and
                  Rolly Intan},
  title        = {HeHe: Balancing the Privacy and Efficiency in Training CNNs over the
                  Semi-honest Cloud},
  booktitle    = {Information Security - 25th International Conference, {ISC} 2022,
                  Bali, Indonesia, December 18-22, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13640},
  pages        = {422--442},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22390-7\_25},
  doi          = {10.1007/978-3-031-22390-7\_25},
  timestamp    = {Mon, 06 Nov 2023 13:38:03 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/SunLYMPC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobicom/WangGZLLL22,
  author       = {Yao Wang and
                  Tao Gu and
                  Yu Zhang and
                  Minjie Lyu and
                  Tom H. Luan and
                  Hui Li},
  title        = {Enabling secure touch-to-access device pairing based on human body's
                  electrical response},
  booktitle    = {{ACM} MobiCom '22: The 28th Annual International Conference on Mobile
                  Computing and Networking, Sydney, NSW, Australia, October 17 - 21,
                  2022},
  pages        = {556--569},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3495243.3564146},
  doi          = {10.1145/3495243.3564146},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobicom/WangGZLLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobicom/WangGZLLL22a,
  author       = {Yao Wang and
                  Tao Gu and
                  Yu Zhang and
                  Minjie Lyu and
                  Tom H. Luan and
                  Hui Li},
  title        = {BiTouch: enabling secure touch-to-access device pairing based on human
                  body's electrical response},
  booktitle    = {{ACM} MobiCom '22: The 28th Annual International Conference on Mobile
                  Computing and Networking, Sydney, NSW, Australia, October 17 - 21,
                  2022},
  pages        = {889--891},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3495243.3558273},
  doi          = {10.1145/3495243.3558273},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobicom/WangGZLLL22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-11782,
  author       = {Xiaoguang Li and
                  Neil Zhenqiang Gong and
                  Ninghui Li and
                  Wenhai Sun and
                  Hui Li},
  title        = {Fine-grained Poisoning Attacks to Local Differential Privacy Protocols
                  for Mean and Variance Estimation},
  journal      = {CoRR},
  volume       = {abs/2205.11782},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.11782},
  doi          = {10.48550/ARXIV.2205.11782},
  eprinttype    = {arXiv},
  eprint       = {2205.11782},
  timestamp    = {Mon, 30 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-11782.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/KangFZCLY21,
  author       = {Junbin Kang and
                  Kai Fan and
                  Kuan Zhang and
                  Xiaochun Cheng and
                  Hui Li and
                  Yintang Yang},
  title        = {An ultra light weight and secure {RFID} batch authentication scheme
                  for IoMT},
  journal      = {Comput. Commun.},
  volume       = {167},
  pages        = {48--54},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.comcom.2020.12.004},
  doi          = {10.1016/J.COMCOM.2020.12.004},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/KangFZCLY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/XieLSGNS21,
  author       = {Rongna Xie and
                  Hui Li and
                  Guozhen Shi and
                  Yunchuan Guo and
                  Ben Niu and
                  Mang Su},
  title        = {Provenance-based data flow control mechanism for Internet of things},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {32},
  number       = {5},
  year         = {2021},
  url          = {https://doi.org/10.1002/ett.3934},
  doi          = {10.1002/ETT.3934},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/XieLSGNS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/YuZXSDL21,
  author       = {Zhipeng Yu and
                  Hui Zhu and
                  Rui Xiao and
                  Chao Song and
                  Jian Dong and
                  Hui Li},
  title        = {Detection and defense against network isolation attacks in software-defined
                  networks},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {32},
  number       = {5},
  year         = {2021},
  url          = {https://doi.org/10.1002/ett.3895},
  doi          = {10.1002/ETT.3895},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/YuZXSDL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/Zhu00000S21,
  author       = {Quanlong Zhu and
                  Chao Yang and
                  Yu Zheng and
                  Jianfeng Ma and
                  Hui Li and
                  Junwei Zhang and
                  Jiajie Shao},
  title        = {Smart home: Keeping privacy based on Air-Padding},
  journal      = {{IET} Inf. Secur.},
  volume       = {15},
  number       = {2},
  pages        = {156--168},
  year         = {2021},
  url          = {https://doi.org/10.1049/ise2.12015},
  doi          = {10.1049/ISE2.12015},
  timestamp    = {Tue, 25 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/Zhu00000S21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/KhanLZAY21,
  author       = {Fawad Khan and
                  Hui Li and
                  Yinghui Zhang and
                  Haider Abbas and
                  Tahreem Yaqoob},
  title        = {Efficient attribute-based encryption with repeated attributes optimization},
  journal      = {Int. J. Inf. Sec.},
  volume       = {20},
  number       = {3},
  pages        = {431--444},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10207-020-00505-8},
  doi          = {10.1007/S10207-020-00505-8},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/KhanLZAY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiSHLWLP21,
  author       = {Liang Li and
                  Dian Shi and
                  Ronghui Hou and
                  Xuanheng Li and
                  Jie Wang and
                  Hui Li and
                  Miao Pan},
  title        = {Data-Driven Optimization for Cooperative Edge Service Provisioning
                  With Demand Uncertainty},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {6},
  pages        = {4317--4328},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2020.3028242},
  doi          = {10.1109/JIOT.2020.3028242},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/LiSHLWLP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/irob/LiTLZZW21,
  author       = {Hui Li and
                  Tinglong Tang and
                  Jake Luo and
                  Meng Zhao and
                  Baole Zheng and
                  Yirong Wu},
  title        = {An anomaly detection method based on double encoder-decoder generative
                  adversarial networks},
  journal      = {Ind. Robot},
  volume       = {48},
  number       = {5},
  pages        = {643--648},
  year         = {2021},
  url          = {https://doi.org/10.1108/IR-09-2020-0200},
  doi          = {10.1108/IR-09-2020-0200},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/irob/LiTLZZW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WangZLZL21,
  author       = {Fengwei Wang and
                  Hui Zhu and
                  Rongxing Lu and
                  Yandong Zheng and
                  Hui Li},
  title        = {A privacy-preserving and non-interactive federated learning scheme
                  for regression training with gradient descent},
  journal      = {Inf. Sci.},
  volume       = {552},
  pages        = {183--200},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ins.2020.12.007},
  doi          = {10.1016/J.INS.2020.12.007},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/WangZLZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jfi/FanJLLY21,
  author       = {Kai Fan and
                  Wei Jiang and
                  Qi Luo and
                  Hui Li and
                  Yintang Yang},
  title        = {Cloud-based {RFID} mutual authentication scheme for efficient privacy
                  preserving in IoV},
  journal      = {J. Frankl. Inst.},
  volume       = {358},
  number       = {1},
  pages        = {193--209},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jfranklin.2019.02.023},
  doi          = {10.1016/J.JFRANKLIN.2019.02.023},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jfi/FanJLLY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/BaiFBCLY21,
  author       = {Liyang Bai and
                  Kai Fan and
                  Yuhan Bai and
                  Xiaochun Cheng and
                  Hui Li and
                  Yintang Yang},
  title        = {Cross-domain access control based on trusted third-party and attribute
                  mapping center},
  journal      = {J. Syst. Archit.},
  volume       = {116},
  pages        = {101957},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.sysarc.2020.101957},
  doi          = {10.1016/J.SYSARC.2020.101957},
  timestamp    = {Tue, 20 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsa/BaiFBCLY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LiuFLY21,
  author       = {Jianxing Liu and
                  Kai Fan and
                  Hui Li and
                  Yintang Yang},
  title        = {A blockchain-based privacy preservation scheme in multimedia network},
  journal      = {Multim. Tools Appl.},
  volume       = {80},
  number       = {20},
  pages        = {30691--30705},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11042-021-10513-y},
  doi          = {10.1007/S11042-021-10513-Y},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/LiuFLY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/YangZWZLL21,
  author       = {Xiaopeng Yang and
                  Hui Zhu and
                  Fengwei Wang and
                  Songnian Zhang and
                  Rongxing Lu and
                  Hui Li},
  title        = {{MASK:} Efficient and privacy-preserving m-tree based biometric identification
                  over cloud},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {14},
  number       = {4},
  pages        = {2171--2186},
  year         = {2021},
  url          = {https://doi.org/10.1007/s12083-021-01120-7},
  doi          = {10.1007/S12083-021-01120-7},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/YangZWZLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LuoLMG21,
  author       = {Yurong Luo and
                  Hui Li and
                  Ruhui Ma and
                  Zhenyang Guo},
  title        = {A Composable Multifactor Identity Authentication and Authorization
                  Scheme for 5G Services},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {6697155:1--6697155:18},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/6697155},
  doi          = {10.1155/2021/6697155},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LuoLMG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YangSHBFYLY21,
  author       = {Hanzhe Yang and
                  Ruidan Su and
                  Pei Huang and
                  Yuhan Bai and
                  Kai Fan and
                  Kan Yang and
                  Hui Li and
                  Yintang Yang},
  title        = {{PMAB:} {A} Public Mutual Audit Blockchain for Outsourced Data in
                  Cloud Storage},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {9993855:1--9993855:11},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/9993855},
  doi          = {10.1155/2021/9993855},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YangSHBFYLY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/ZhuWYLL21,
  author       = {Hui Zhu and
                  Qing Wei and
                  Xiaopeng Yang and
                  Rongxing Lu and
                  Hui Li},
  title        = {Efficient and Privacy-Preserving Online Fingerprint Authentication
                  Scheme over Outsourced Data},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {9},
  number       = {2},
  pages        = {576--586},
  year         = {2021},
  url          = {https://doi.org/10.1109/TCC.2018.2866405},
  doi          = {10.1109/TCC.2018.2866405},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/ZhuWYLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CaoMFLZ21,
  author       = {Jin Cao and
                  Maode Ma and
                  Yulong Fu and
                  Hui Li and
                  Yinghui Zhang},
  title        = {{CPPHA:} Capability-Based Privacy-Protection Handover Authentication
                  Mechanism for SDN-Based 5G HetNets},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {3},
  pages        = {1182--1195},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2019.2916593},
  doi          = {10.1109/TDSC.2019.2916593},
  timestamp    = {Fri, 17 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/CaoMFLZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/ZhaoFYWLY21,
  author       = {Bin Zhao and
                  Kai Fan and
                  Kan Yang and
                  Zilong Wang and
                  Hui Li and
                  Yintang Yang},
  title        = {Anonymous and Privacy-Preserving Federated Learning With Industrial
                  Big Data},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {17},
  number       = {9},
  pages        = {6314--6323},
  year         = {2021},
  url          = {https://doi.org/10.1109/TII.2021.3052183},
  doi          = {10.1109/TII.2021.3052183},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/ZhaoFYWLY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/LiLLLSYL21,
  author       = {Zhao Li and
                  Jun Li and
                  Yinghou Liu and
                  Xiujuan Liang and
                  Kang G. Shin and
                  Zheng Yan and
                  Hui Li},
  title        = {Exploiting Interactions of Multiple Interference for Cooperative Interference
                  Alignment},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {20},
  number       = {11},
  pages        = {7072--7085},
  year         = {2021},
  url          = {https://doi.org/10.1109/TWC.2021.3080584},
  doi          = {10.1109/TWC.2021.3080584},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/LiLLLSYL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acmturc/ZhuL21,
  author       = {Xudong Zhu and
                  Hui Li},
  title        = {Privacy-preserving Decentralized Federated Deep Learning},
  booktitle    = {{ACM} {TURC} 2021: {ACM} Turing Award Celebration Conference - Hefei,
                  China, 30 July 2021 - 1 August 2021},
  pages        = {33--38},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3472634.3472642},
  doi          = {10.1145/3472634.3472642},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acmturc/ZhuL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/LiSHLPH21,
  author       = {Liang Li and
                  Dian Shi and
                  Ronghui Hou and
                  Hui Li and
                  Miao Pan and
                  Zhu Han},
  title        = {To Talk or to Work: Flexible Communication Compression for Energy
                  Efficient Federated Learning over Heterogeneous Mobile Edge Devices},
  booktitle    = {40th {IEEE} Conference on Computer Communications, {INFOCOM} 2021,
                  Vancouver, BC, Canada, May 10-13, 2021},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/INFOCOM42981.2021.9488839},
  doi          = {10.1109/INFOCOM42981.2021.9488839},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/LiSHLPH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/ZhuL21,
  author       = {Xudong Zhu and
                  Hui Li},
  editor       = {Min Yang and
                  Chao Chen and
                  Yang Liu},
  title        = {Privacy-Preserving and Auditable Federated Deep Reinforcement Learning
                  for Robotic Manipulation},
  booktitle    = {Network and System Security - 15th International Conference, {NSS}
                  2021, Tianjin, China, October 23, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13041},
  pages        = {314--325},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92708-0\_20},
  doi          = {10.1007/978-3-030-92708-0\_20},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/ZhuL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HuangFYZLY20,
  author       = {Pei Huang and
                  Kai Fan and
                  Hanzhe Yang and
                  Kuan Zhang and
                  Hui Li and
                  Yintang Yang},
  title        = {A Collaborative Auditing Blockchain for Trustworthy Data Integrity
                  in Cloud Storage System},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {94780--94794},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2993606},
  doi          = {10.1109/ACCESS.2020.2993606},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/HuangFYZLY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cea/HuanLLC20,
  author       = {Juan Huan and
                  Hui Li and
                  Mingbao Li and
                  Bo Chen},
  title        = {Prediction of dissolved oxygen in aquaculture based on gradient boosting
                  decision tree and long short-term memory network: {A} study of Chang
                  Zhou fishery demonstration base, China},
  journal      = {Comput. Electron. Agric.},
  volume       = {175},
  pages        = {105530},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.compag.2020.105530},
  doi          = {10.1016/J.COMPAG.2020.105530},
  timestamp    = {Tue, 11 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cea/HuanLLC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ChenFZWLY20,
  author       = {Qi Chen and
                  Kai Fan and
                  Kuan Zhang and
                  Haoyang Wang and
                  Hui Li and
                  Yingtang Yang},
  title        = {Privacy-preserving searchable encryption in the intelligent edge computing},
  journal      = {Comput. Commun.},
  volume       = {164},
  pages        = {31--41},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.comcom.2020.09.012},
  doi          = {10.1016/J.COMCOM.2020.09.012},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/ChenFZWLY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhangJLTLL20,
  author       = {Wenjing Zhang and
                  Bo Jiang and
                  Ming Li and
                  Ravi Tandon and
                  Qiao Liu and
                  Hui Li},
  title        = {Aggregation-based location privacy: An information theoretic approach},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101953},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101953},
  doi          = {10.1016/J.COSE.2020.101953},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhangJLTLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/CaoMLMSYX20,
  author       = {Jin Cao and
                  Maode Ma and
                  Hui Li and
                  Ruhui Ma and
                  Yunqing Sun and
                  Pu Yu and
                  Lihui Xiong},
  title        = {A Survey on Security Aspects for 3GPP 5G Networks},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {22},
  number       = {1},
  pages        = {170--195},
  year         = {2020},
  url          = {https://doi.org/10.1109/COMST.2019.2951818},
  doi          = {10.1109/COMST.2019.2951818},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/CaoMLMSYX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/LiNCLL20,
  author       = {Weihao Li and
                  Ben Niu and
                  Jin Cao and
                  Yurong Luo and
                  Hui Li},
  title        = {A personalized range-sensitive privacy-preserving scheme in LBSs},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {32},
  number       = {5},
  year         = {2020},
  url          = {https://doi.org/10.1002/cpe.5462},
  doi          = {10.1002/CPE.5462},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/LiNCLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/LiLPLT20,
  author       = {Hui Li and
                  Zhe Li and
                  Sizhe Peng and
                  Jingjing Li and
                  Chia Emmanuel Tungom},
  title        = {Mining the frequency of time-constrained serial episodes over massive
                  data sequences and streams},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {110},
  pages        = {849--863},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.future.2019.11.008},
  doi          = {10.1016/J.FUTURE.2019.11.008},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/LiLPLT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/MaCFL20,
  author       = {Ruhui Ma and
                  Jin Cao and
                  Dengguo Feng and
                  Hui Li},
  title        = {{LAA:} Lattice-Based Access Authentication Scheme for IoT in Space
                  Information Networks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {4},
  pages        = {2791--2805},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2019.2962553},
  doi          = {10.1109/JIOT.2019.2962553},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/MaCFL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/CaoYMZFL20,
  author       = {Jin Cao and
                  Zheng Yan and
                  Ruhui Ma and
                  Yinghui Zhang and
                  Yulong Fu and
                  Hui Li},
  title        = {{LSAA:} {A} Lightweight and Secure Access Authentication Scheme for
                  Both {UE} and mMTC Devices in 5G Networks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {6},
  pages        = {5329--5344},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2020.2976740},
  doi          = {10.1109/JIOT.2020.2976740},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/CaoYMZFL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ZhuZLLWLF20,
  author       = {Dan Zhu and
                  Hui Zhu and
                  Ximeng Liu and
                  Hui Li and
                  Fengwei Wang and
                  Hao Li and
                  Dengguo Feng},
  title        = {{CREDO:} Efficient and privacy-preserving multi-level medical pre-diagnosis
                  based on ML-\emph{kNN}},
  journal      = {Inf. Sci.},
  volume       = {514},
  pages        = {244--262},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ins.2019.11.041},
  doi          = {10.1016/J.INS.2019.11.041},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/ZhuZLLWLF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LiWNLLC20,
  author       = {Fenghua Li and
                  Xinyu Wang and
                  Ben Niu and
                  Hui Li and
                  Chao Li and
                  Lihua Chen},
  title        = {Exploiting location-related behaviors without the {GPS} data on smartphones},
  journal      = {Inf. Sci.},
  volume       = {527},
  pages        = {444--459},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ins.2019.05.052},
  doi          = {10.1016/J.INS.2019.05.052},
  timestamp    = {Wed, 20 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/LiWNLLC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/FuCZYKJCL20,
  author       = {Yulong Fu and
                  Hanlu Chen and
                  Qinghua Zheng and
                  Zheng Yan and
                  Raimo Kantola and
                  Xuyang Jing and
                  Jin Cao and
                  Hui Li},
  title        = {An Adaptive Security Data Collection and Composition Recognition method
                  for security measurement over {LTE/LTE-A} networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {155},
  pages        = {102549},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jnca.2020.102549},
  doi          = {10.1016/J.JNCA.2020.102549},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/FuCZYKJCL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/FanLZLY20,
  author       = {Kai Fan and
                  Tingting Liu and
                  Kuan Zhang and
                  Hui Li and
                  Yintang Yang},
  title        = {A secure and efficient outsourced computation on data sharing scheme
                  for privacy computing},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {135},
  pages        = {169--176},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jpdc.2019.09.008},
  doi          = {10.1016/J.JPDC.2019.09.008},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpdc/FanLZLY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/lgrs/CaoRZLJ20,
  author       = {Xianghai Cao and
                  Meiru Ren and
                  Jing Zhao and
                  Hui Li and
                  Licheng Jiao},
  title        = {Hyperspectral Imagery Classification Based on Compressed Convolutional
                  Neural Network},
  journal      = {{IEEE} Geosci. Remote. Sens. Lett.},
  volume       = {17},
  number       = {9},
  pages        = {1583--1587},
  year         = {2020},
  url          = {https://doi.org/10.1109/LGRS.2019.2951372},
  doi          = {10.1109/LGRS.2019.2951372},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/lgrs/CaoRZLJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/WangFLY20,
  author       = {Haoyang Wang and
                  Kai Fan and
                  Hui Li and
                  Yintang Yang},
  title        = {A dynamic and verifiable multi-keyword ranked search scheme in the
                  {P2P} networking environment},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {13},
  number       = {6},
  pages        = {2342--2355},
  year         = {2020},
  url          = {https://doi.org/10.1007/s12083-020-00912-7},
  doi          = {10.1007/S12083-020-00912-7},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/WangFLY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/LiuZDLW20,
  author       = {Qiao Liu and
                  Wenjing Zhang and
                  Sheng Ding and
                  Hui Li and
                  Yong Wang},
  title        = {Novel Secure Group Data Exchange Protocol in Smart Home with Physical
                  Layer Network Coding},
  journal      = {Sensors},
  volume       = {20},
  number       = {4},
  pages        = {1138},
  year         = {2020},
  url          = {https://doi.org/10.3390/s20041138},
  doi          = {10.3390/S20041138},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/LiuZDLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/MaCFLH20,
  author       = {Ruhui Ma and
                  Jin Cao and
                  Dengguo Feng and
                  Hui Li and
                  Shiyang He},
  title        = {{FTGPHA:} Fixed-Trajectory Group Pre-Handover Authentication Mechanism
                  for Mobile Relays in 5G High-Speed Rail Networks},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {69},
  number       = {2},
  pages        = {2126--2140},
  year         = {2020},
  url          = {https://doi.org/10.1109/TVT.2019.2960313},
  doi          = {10.1109/TVT.2019.2960313},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/MaCFLH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/FanPZBSLY20,
  author       = {Kai Fan and
                  Qiang Pan and
                  Kuan Zhang and
                  Yuhan Bai and
                  Shili Sun and
                  Hui Li and
                  Yintang Yang},
  title        = {A Secure and Verifiable Data Sharing Scheme Based on Blockchain in
                  Vehicular Social Networks},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {69},
  number       = {6},
  pages        = {5826--5835},
  year         = {2020},
  url          = {https://doi.org/10.1109/TVT.2020.2968094},
  doi          = {10.1109/TVT.2020.2968094},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvt/FanPZBSLY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/0005BS0020,
  author       = {Zhao Li and
                  Yujiao Bai and
                  Kang G. Shin and
                  Zheng Yan and
                  Hui Li},
  title        = {Inside-Out Precoding to Manage Multiple Interferences From the Same
                  Source},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {69},
  number       = {7},
  pages        = {7583--7595},
  year         = {2020},
  url          = {https://doi.org/10.1109/TVT.2020.2994332},
  doi          = {10.1109/TVT.2020.2994332},
  timestamp    = {Fri, 31 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/0005BS0020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wc/LiYCNL20,
  author       = {Fenghua Li and
                  Peijie Yin and
                  Yahong Chen and
                  Ben Niu and
                  Hui Li},
  title        = {Achieving Fine-Grained QoS for Privacy-Aware Users in LBSs},
  journal      = {{IEEE} Wirel. Commun.},
  volume       = {27},
  number       = {3},
  pages        = {31--37},
  year         = {2020},
  url          = {https://doi.org/10.1109/MWC.001.1900469},
  doi          = {10.1109/MWC.001.1900469},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wc/LiYCNL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/JiHLL20,
  author       = {Yongxin Ji and
                  Ronghui Hou and
                  King{-}Shan Lui and
                  Hui Li},
  title        = {A Blockchain-Based Vehicle Platoon Leader Updating Scheme},
  booktitle    = {2020 {IEEE} International Conference on Communications, {ICC} 2020,
                  Dublin, Ireland, June 7-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICC40277.2020.9149388},
  doi          = {10.1109/ICC40277.2020.9149388},
  timestamp    = {Sat, 11 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/JiHLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ZhaoFY0WL20,
  author       = {Bin Zhao and
                  Kai Fan and
                  Wei You and
                  Kan Yang and
                  Zilong Wang and
                  Hui Li},
  title        = {A Weight-based k-prototypes Algorithm for Anomaly Detection in Smart
                  Grid},
  booktitle    = {2020 {IEEE} International Conference on Communications, {ICC} 2020,
                  Dublin, Ireland, June 7-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICC40277.2020.9148623},
  doi          = {10.1109/ICC40277.2020.9148623},
  timestamp    = {Sat, 22 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/ZhaoFY0WL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccchina/DongMHLL20,
  author       = {Wenbin Dong and
                  Xinhong Mao and
                  Ronghui Hou and
                  Xixiang Lv and
                  Hui Li},
  title        = {An Enhanced Handover Scheme for Cellular-Connected UAVs},
  booktitle    = {9th {IEEE/CIC} International Conference on Communications in China,
                  {ICCC} 2020, Chongqing, China, August 9-11, 2020},
  pages        = {418--423},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICCC49849.2020.9238986},
  doi          = {10.1109/ICCC49849.2020.9238986},
  timestamp    = {Sat, 11 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccchina/DongMHLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccchina/WuMHLL20,
  author       = {Jinli Wu and
                  Xinhong Mao and
                  Ronghui Hou and
                  Xixiang Lv and
                  Hui Li},
  title        = {Beam Management for Cellular-Connected UAVs: {A} Fast Link Recovery
                  Approach},
  booktitle    = {9th {IEEE/CIC} International Conference on Communications in China,
                  {ICCC} 2020, Chongqing, China, August 9-11, 2020},
  pages        = {758--763},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICCC49849.2020.9238835},
  doi          = {10.1109/ICCC49849.2020.9238835},
  timestamp    = {Sat, 11 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccchina/WuMHLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pakdd/LiLB20,
  author       = {Hui Li and
                  Hui Li and
                  Sourav S. Bhowmick},
  editor       = {Hady W. Lauw and
                  Raymond Chi{-}Wing Wong and
                  Alexandros Ntoulas and
                  Ee{-}Peng Lim and
                  See{-}Kiong Ng and
                  Sinno Jialin Pan},
  title        = {{BRUNCH:} Branching Structure Inference of Hybrid Multivariate Hawkes
                  Processes with Application to Social Media},
  booktitle    = {Advances in Knowledge Discovery and Data Mining - 24th Pacific-Asia
                  Conference, {PAKDD} 2020, Singapore, May 11-14, 2020, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12084},
  pages        = {553--566},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-47426-3\_43},
  doi          = {10.1007/978-3-030-47426-3\_43},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pakdd/LiLB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmod/LiLB20,
  author       = {Hui Li and
                  Hui Li and
                  Sourav S. Bhowmick},
  editor       = {David Maier and
                  Rachel Pottinger and
                  AnHai Doan and
                  Wang{-}Chiew Tan and
                  Abdussalam Alawini and
                  Hung Q. Ngo},
  title        = {{CHASSIS:} Conformity Meets Online Information Diffusion},
  booktitle    = {Proceedings of the 2020 International Conference on Management of
                  Data, {SIGMOD} Conference 2020, online conference [Portland, OR, USA],
                  June 14-19, 2020},
  pages        = {1829--1840},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3318464.3389780},
  doi          = {10.1145/3318464.3389780},
  timestamp    = {Wed, 04 May 2022 13:02:28 +0200},
  biburl       = {https://dblp.org/rec/conf/sigmod/LiLB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/LiuLD020,
  author       = {Qiao Liu and
                  Hui Li and
                  Sheng Ding and
                  Yong Wang},
  title        = {Lightweight Secure Data Exchange in Decentralized VANETs with Physical
                  Layer Security},
  booktitle    = {92nd {IEEE} Vehicular Technology Conference, {VTC} Fall 2020, Victoria,
                  BC, Canada, November 18 - December 16, 2020},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/VTC2020-Fall49728.2020.9348470},
  doi          = {10.1109/VTC2020-FALL49728.2020.9348470},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vtc/LiuLD020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/MaCF0NLY20,
  author       = {Ruhui Ma and
                  Jin Cao and
                  Dengguo Feng and
                  Hui Li and
                  Ben Niu and
                  Fenghua Li and
                  Lihua Yin},
  title        = {A Secure Authentication Scheme for Remote Diagnosis and Maintenance
                  in Internet of Vehicles},
  booktitle    = {2020 {IEEE} Wireless Communications and Networking Conference, {WCNC}
                  2020, Seoul, Korea (South), May 25-28, 2020},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/WCNC45663.2020.9120719},
  doi          = {10.1109/WCNC45663.2020.9120719},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcnc/MaCF0NLY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-00418,
  author       = {Haonan Yan and
                  Xiaoguang Li and
                  Hui Li and
                  Jiamin Li and
                  Wenhai Sun and
                  Fenghua Li},
  title        = {Monitoring-based Differential Privacy Mechanism Against Query-Flooding
                  Parameter Duplication Attack},
  journal      = {CoRR},
  volume       = {abs/2011.00418},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.00418},
  eprinttype    = {arXiv},
  eprint       = {2011.00418},
  timestamp    = {Mon, 30 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-00418.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-11804,
  author       = {Liang Li and
                  Dian Shi and
                  Ronghui Hou and
                  Hui Li and
                  Miao Pan and
                  Zhu Han},
  title        = {To Talk or to Work: Flexible Communication Compression for Energy
                  Efficient Federated Learning over Heterogeneous Mobile Edge Devices},
  journal      = {CoRR},
  volume       = {abs/2012.11804},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.11804},
  eprinttype    = {arXiv},
  eprint       = {2012.11804},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-11804.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/DingCLFL19,
  author       = {Sheng Ding and
                  Jin Cao and
                  Chen Li and
                  Kai Fan and
                  Hui Li},
  title        = {A Novel Attribute-Based Access Control Scheme Using Blockchain for
                  IoT},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {38431--38441},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2905846},
  doi          = {10.1109/ACCESS.2019.2905846},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/DingCLFL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WangZLLHLL19,
  author       = {Fengwei Wang and
                  Hui Zhu and
                  Ximeng Liu and
                  Rongxing Lu and
                  Jiafeng Hua and
                  Hui Li and
                  Hao Li},
  title        = {Privacy-Preserving Collaborative Model Learning Scheme for E-Healthcare},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {166054--166065},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2953495},
  doi          = {10.1109/ACCESS.2019.2953495},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/WangZLLHLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/QiuFZPLY19,
  author       = {Jianying Qiu and
                  Kai Fan and
                  Kuan Zhang and
                  Qiang Pan and
                  Hui Li and
                  Yintang Yang},
  title        = {An Efficient Multi-Message and Multi-Receiver Signcryption Scheme
                  for Heterogeneous Smart Mobile IoT},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {180205--180217},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2958089},
  doi          = {10.1109/ACCESS.2019.2958089},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/QiuFZPLY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/MaCFLZL19,
  author       = {Ruhui Ma and
                  Jin Cao and
                  Dengguo Feng and
                  Hui Li and
                  Yinghui Zhang and
                  Xixiang Lv},
  title        = {{PPSHA:} Privacy preserving secure handover authentication scheme
                  for all application scenarios in {LTE-A} networks},
  journal      = {Ad Hoc Networks},
  volume       = {87},
  pages        = {49--60},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.adhoc.2018.11.012},
  doi          = {10.1016/J.ADHOC.2018.11.012},
  timestamp    = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/adhoc/MaCFLZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/GuoLCW19,
  author       = {Zhen Guo and
                  Hui Li and
                  Chunjie Cao and
                  Zhengxi Wei},
  title        = {Verifiable algorithm for outsourced database with updating},
  journal      = {Clust. Comput.},
  volume       = {22},
  number       = {Supplement},
  pages        = {5185--5193},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10586-017-1133-8},
  doi          = {10.1007/S10586-017-1133-8},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cluster/GuoLCW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dpd/LiCMM19,
  author       = {Hui Li and
                  Jiangtao Cui and
                  Xue Meng and
                  Jianfeng Ma},
  title        = {{IHP:} improving the utility in differential private histogram publication},
  journal      = {Distributed Parallel Databases},
  volume       = {37},
  number       = {4},
  pages        = {721--750},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10619-018-07255-6},
  doi          = {10.1007/S10619-018-07255-6},
  timestamp    = {Sat, 29 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dpd/LiCMM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/LiuLW19,
  author       = {Qiao Liu and
                  Hui Li and
                  Yong Wang},
  title        = {General Secure Information Exchange Protocol for a Multiuser {MIMO}
                  Relay Channel},
  journal      = {Entropy},
  volume       = {21},
  number       = {11},
  pages        = {1054},
  year         = {2019},
  url          = {https://doi.org/10.3390/e21111054},
  doi          = {10.3390/E21111054},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entropy/LiuLW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/LinNLA19,
  author       = {Jiaping Lin and
                  Jianwei Niu and
                  Hui Li and
                  Mohammed Atiquzzaman},
  title        = {A Secure and Efficient Location-based Service Scheme for Smart Transportation},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {92},
  pages        = {694--704},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.future.2017.11.030},
  doi          = {10.1016/J.FUTURE.2017.11.030},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/LinNLA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/FanXGLY19,
  author       = {Kai Fan and
                  Huiyue Xu and
                  Longxiang Gao and
                  Hui Li and
                  Yintang Yang},
  title        = {Efficient and privacy preserving access control scheme for fog-enabled
                  IoT},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {99},
  pages        = {134--142},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.future.2019.04.003},
  doi          = {10.1016/J.FUTURE.2019.04.003},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/FanXGLY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/FanSYPLY19,
  author       = {Kai Fan and
                  Shili Sun and
                  Zheng Yan and
                  Qiang Pan and
                  Hui Li and
                  Yintang Yang},
  title        = {A blockchain-based clock synchronization Scheme in IoT},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {101},
  pages        = {524--533},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.future.2019.06.007},
  doi          = {10.1016/J.FUTURE.2019.06.007},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/FanSYPLY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceee/MiaoCLLY19,
  author       = {Runyun Miao and
                  Changchun Chai and
                  Yuqian Liu and
                  Hui Li and
                  Yintang Yang},
  title        = {Light-load efficiency improving boost converter with the hybrid modulation
                  of hysteresis current mode and burst mode},
  journal      = {{IEICE} Electron. Express},
  volume       = {16},
  number       = {11},
  pages        = {20190108},
  year         = {2019},
  url          = {https://doi.org/10.1587/elex.16.20190108},
  doi          = {10.1587/ELEX.16.20190108},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieiceee/MiaoCLLY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/CaoML19,
  author       = {Jin Cao and
                  Maode Ma and
                  Hui Li},
  title        = {{LPPA:} Lightweight privacy-preservation access authentication scheme
                  for massive devices in fifth Generation {(5G)} cellular networks},
  journal      = {Int. J. Commun. Syst.},
  volume       = {32},
  number       = {3},
  year         = {2019},
  url          = {https://doi.org/10.1002/dac.3860},
  doi          = {10.1002/DAC.3860},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/CaoML19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijitwe/ShanLLGX19,
  author       = {Fangfang Shan and
                  Hui Li and
                  Fenghua Li and
                  Yunchuan Guo and
                  Jinbo Xiong},
  title        = {An Attribute-Based Assured Deletion Scheme in Cloud Computing},
  journal      = {Int. J. Inf. Technol. Web Eng.},
  volume       = {14},
  number       = {2},
  pages        = {74--91},
  year         = {2019},
  url          = {https://doi.org/10.4018/IJITWE.2019040105},
  doi          = {10.4018/IJITWE.2019040105},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijitwe/ShanLLGX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiLWRB19,
  author       = {Fenghua Li and
                  Hui Li and
                  Cong Wang and
                  Kui Ren and
                  Elisa Bertino},
  title        = {Guest Editorial Special Issue on Security and Privacy Protection for
                  Big Data and IoT},
  journal      = {{IEEE} Internet Things J.},
  volume       = {6},
  number       = {2},
  pages        = {1446--1449},
  year         = {2019},
  url          = {https://doi.org/10.1109/JIOT.2019.2908460},
  doi          = {10.1109/JIOT.2019.2908460},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/LiLWRB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/FanWRYYLY19,
  author       = {Kai Fan and
                  Shangyang Wang and
                  Yanhui Ren and
                  Kan Yang and
                  Zheng Yan and
                  Hui Li and
                  Yintang Yang},
  title        = {Blockchain-Based Secure Time Protection Scheme in IoT},
  journal      = {{IEEE} Internet Things J.},
  volume       = {6},
  number       = {3},
  pages        = {4671--4679},
  year         = {2019},
  url          = {https://doi.org/10.1109/JIOT.2018.2874222},
  doi          = {10.1109/JIOT.2018.2874222},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/FanWRYYLY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/CaoYXML19,
  author       = {Jin Cao and
                  Pu Yu and
                  Xinyin Xiang and
                  Maode Ma and
                  Hui Li},
  title        = {Anti-Quantum Fast Authentication and Data Transmission Scheme for
                  Massive Devices in 5G NB-IoT System},
  journal      = {{IEEE} Internet Things J.},
  volume       = {6},
  number       = {6},
  pages        = {9794--9805},
  year         = {2019},
  url          = {https://doi.org/10.1109/JIOT.2019.2931724},
  doi          = {10.1109/JIOT.2019.2931724},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/CaoYXML19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LiLZH19,
  author       = {Xiaoguang Li and
                  Hui Li and
                  Hui Zhu and
                  Muyang Huang},
  title        = {The optimal upper bound of the number of queries for Laplace mechanism
                  under differential privacy},
  journal      = {Inf. Sci.},
  volume       = {503},
  pages        = {219--237},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ins.2019.07.001},
  doi          = {10.1016/J.INS.2019.07.001},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/LiLZH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LiPLLCM19,
  author       = {Hui Li and
                  Sizhe Peng and
                  Jian Li and
                  Jingjing Li and
                  Jiangtao Cui and
                  Jianfeng Ma},
  title        = {Counting the frequency of time-constrained serial episodes in a streaming
                  sequence},
  journal      = {Inf. Sci.},
  volume       = {505},
  pages        = {422--439},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ins.2019.07.098},
  doi          = {10.1016/J.INS.2019.07.098},
  timestamp    = {Sat, 29 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/LiPLLCM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/LiZ19,
  author       = {Hui Li and
                  Bin Zhao},
  title        = {On distributivity equations of implications over overlap functions
                  and contrapositive symmetry equations of implications},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {36},
  number       = {1},
  pages        = {283--294},
  year         = {2019},
  url          = {https://doi.org/10.3233/JIFS-181279},
  doi          = {10.3233/JIFS-181279},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jifs/LiZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/FanZZ0Y19,
  author       = {Kai Fan and
                  Shanshan Zhu and
                  Kuan Zhang and
                  Hui Li and
                  Yintang Yang},
  title        = {A Lightweight Authentication Scheme for Cloud-Based {RFID} Healthcare
                  Systems},
  journal      = {{IEEE} Netw.},
  volume       = {33},
  number       = {2},
  pages        = {44--49},
  year         = {2019},
  url          = {https://doi.org/10.1109/MNET.2019.1800225},
  doi          = {10.1109/MNET.2019.1800225},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/network/FanZZ0Y19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/FengMMML0019,
  author       = {Xiaoqin Feng and
                  Jianfeng Ma and
                  Yinbin Miao and
                  Qian Meng and
                  Ximeng Liu and
                  Qi Jiang and
                  Hui Li},
  title        = {Pruneable sharding-based blockchain protocol},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {12},
  number       = {4},
  pages        = {934--950},
  year         = {2019},
  url          = {https://doi.org/10.1007/s12083-018-0685-6},
  doi          = {10.1007/S12083-018-0685-6},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/FengMMML0019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/FanKZLY19,
  author       = {Kai Fan and
                  Junbin Kang and
                  Shanshan Zhu and
                  Hui Li and
                  Yintang Yang},
  title        = {Permutation Matrix Encryption Based Ultralightweight Secure {RFID}
                  Scheme in Internet of Vehicles},
  journal      = {Sensors},
  volume       = {19},
  number       = {1},
  pages        = {152},
  year         = {2019},
  url          = {https://doi.org/10.3390/s19010152},
  doi          = {10.3390/S19010152},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/FanKZLY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangLTL19,
  author       = {Wenjing Zhang and
                  Ming Li and
                  Ravi Tandon and
                  Hui Li},
  title        = {Online Location Trace Privacy: An Information Theoretic Approach},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {14},
  number       = {1},
  pages        = {235--250},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIFS.2018.2848659},
  doi          = {10.1109/TIFS.2018.2848659},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangLTL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/MiaoMLWLL19,
  author       = {Yinbin Miao and
                  Jianfeng Ma and
                  Ximeng Liu and
                  Jian Weng and
                  Hongwei Li and
                  Hui Li},
  title        = {Lightweight Fine-Grained Search Over Encrypted Data in Fog Computing},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {12},
  number       = {5},
  pages        = {772--785},
  year         = {2019},
  url          = {https://doi.org/10.1109/TSC.2018.2823309},
  doi          = {10.1109/TSC.2018.2823309},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsc/MiaoMLWLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiWLDCML19,
  author       = {Yan Li and
                  Zilong Wang and
                  Yingjiu Li and
                  Robert H. Deng and
                  Binbin Chen and
                  Weizhi Meng and
                  Hui Li},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {A Closer Look Tells More: {A} Facial Distortion Based Liveness Detection
                  for Face Authentication},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {241--246},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329850},
  doi          = {10.1145/3321705.3329850},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LiWLDCML19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/DongLHLLS19,
  author       = {Wenbin Dong and
                  Yang Li and
                  Ronghui Hou and
                  Xixiang Lv and
                  Hui Li and
                  Bo Sun},
  title        = {A Blockchain-Based Hierarchical Reputation Management Scheme in Vehicular
                  Network},
  booktitle    = {2019 {IEEE} Global Communications Conference, {GLOBECOM} 2019, Waikoloa,
                  HI, USA, December 9-13, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/GLOBECOM38437.2019.9013631},
  doi          = {10.1109/GLOBECOM38437.2019.9013631},
  timestamp    = {Sat, 11 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/DongLHLLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/LiHLLPH19,
  author       = {Liang Li and
                  Ronghui Hou and
                  Ruoguang Li and
                  Hui Li and
                  Miao Pan and
                  Zhu Han},
  title        = {Delay-Aware Adaptive Wireless Video Streaming in Edge Computing Assisted
                  Ultra-Dense Networks},
  booktitle    = {2019 {IEEE} Global Communications Conference, {GLOBECOM} 2019, Waikoloa,
                  HI, USA, December 9-13, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/GLOBECOM38437.2019.9014000},
  doi          = {10.1109/GLOBECOM38437.2019.9014000},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/LiHLLPH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/LiZHYLP19,
  author       = {Liang Li and
                  Xinyue Zhang and
                  Ronghui Hou and
                  Hao Yue and
                  Hui Li and
                  Miao Pan},
  title        = {Participant Recruitment for Coverage-Aware Mobile Crowdsensing with
                  Location Differential Privacy},
  booktitle    = {2019 {IEEE} Global Communications Conference, {GLOBECOM} 2019, Waikoloa,
                  HI, USA, December 9-13, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/GLOBECOM38437.2019.9013831},
  doi          = {10.1109/GLOBECOM38437.2019.9013831},
  timestamp    = {Tue, 13 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/LiZHYLP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/WuHLLLS19,
  author       = {Jinli Wu and
                  Ronghui Hou and
                  Xixiang Lv and
                  King{-}Shan Lui and
                  Hui Li and
                  Bo Sun},
  title        = {Physical Layer Security of {OFDM} Communication Using Artificial Pilot
                  Noise},
  booktitle    = {2019 {IEEE} Global Communications Conference, {GLOBECOM} 2019, Waikoloa,
                  HI, USA, December 9-13, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/GLOBECOM38437.2019.9013183},
  doi          = {10.1109/GLOBECOM38437.2019.9013183},
  timestamp    = {Sat, 11 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/WuHLLLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/YanLXDZZL19,
  author       = {Haonan Yan and
                  Hui Li and
                  Mingchi Xiao and
                  Rui Dai and
                  Xianchun Zheng and
                  Xingwen Zhao and
                  Fenghua Li},
  title        = {{PGSM-DPI:} Precisely Guided Signature Matching of Deep Packet Inspection
                  for Traffic Analysis},
  booktitle    = {2019 {IEEE} Global Communications Conference, {GLOBECOM} 2019, Waikoloa,
                  HI, USA, December 9-13, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/GLOBECOM38437.2019.9013941},
  doi          = {10.1109/GLOBECOM38437.2019.9013941},
  timestamp    = {Wed, 20 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/YanLXDZZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/FanBXPLY19,
  author       = {Kai Fan and
                  Yuhan Bai and
                  Huiyue Xu and
                  Qiang Pan and
                  Hui Li and
                  Yintang Yang},
  title        = {A Secure Cross-Domain Access Control Scheme in Social Networks},
  booktitle    = {2019 {IEEE} International Conference on Communications, {ICC} 2019,
                  Shanghai, China, May 20-24, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICC.2019.8761745},
  doi          = {10.1109/ICC.2019.8761745},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/FanBXPLY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/LiZZLWL19,
  author       = {Qi Li and
                  Hui Zhu and
                  Ziling Zhang and
                  Rongxing Lu and
                  Fengwei Wang and
                  Hui Li},
  title        = {Spoofing Attacks on Speaker Verification Systems Based Generated Voice
                  using Genetic Algorithm},
  booktitle    = {2019 {IEEE} International Conference on Communications, {ICC} 2019,
                  Shanghai, China, May 20-24, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICC.2019.8761244},
  doi          = {10.1109/ICC.2019.8761244},
  timestamp    = {Wed, 27 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/LiZZLWL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccnc/LiS0CL19,
  author       = {Fenghua Li and
                  Zhe Sun and
                  Ben Niu and
                  Jin Cao and
                  Hui Li},
  title        = {An Extended Control Framework for Privacy-Preserving Photo Sharing
                  across Different Social Networks},
  booktitle    = {International Conference on Computing, Networking and Communications,
                  {ICNC} 2019, Honolulu, HI, USA, February 18-21, 2019},
  pages        = {390--394},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICCNC.2019.8685488},
  doi          = {10.1109/ICCNC.2019.8685488},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccnc/LiS0CL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccnc/LuoCMLNL19,
  author       = {Yurong Luo and
                  Jin Cao and
                  Maode Ma and
                  Hui Li and
                  Ben Niu and
                  Fenghua Li},
  title        = {{DIAM:} Diversified Identity Authentication Mechanism for 5G Multi-Service
                  System},
  booktitle    = {International Conference on Computing, Networking and Communications,
                  {ICNC} 2019, Honolulu, HI, USA, February 18-21, 2019},
  pages        = {418--424},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICCNC.2019.8685543},
  doi          = {10.1109/ICCNC.2019.8685543},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccnc/LuoCMLNL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccnc/SunCMLNL19,
  author       = {Yunqing Sun and
                  Jin Cao and
                  Maode Ma and
                  Hui Li and
                  Ben Niu and
                  Fenghua Li},
  title        = {Privacy-Preserving Device Discovery and Authentication Scheme for
                  {D2D} Communication in 3GPP 5G HetNet},
  booktitle    = {International Conference on Computing, Networking and Communications,
                  {ICNC} 2019, Honolulu, HI, USA, February 18-21, 2019},
  pages        = {425--431},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICCNC.2019.8685499},
  doi          = {10.1109/ICCNC.2019.8685499},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccnc/SunCMLNL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/LiSL0LC19,
  author       = {Fenghua Li and
                  Zhe Sun and
                  Ang Li and
                  Ben Niu and
                  Hui Li and
                  Guohong Cao},
  title        = {HideMe: Privacy-Preserving Photo Sharing on Social Networks},
  booktitle    = {2019 {IEEE} Conference on Computer Communications, {INFOCOM} 2019,
                  Paris, France, April 29 - May 2, 2019},
  pages        = {154--162},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/INFOCOM.2019.8737466},
  doi          = {10.1109/INFOCOM.2019.8737466},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/LiSL0LC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/FuYWYL19,
  author       = {Yulong Fu and
                  Xinyi Yuan and
                  Ke Wang and
                  Zheng Yan and
                  Hui Li},
  title        = {A Security Formal Model for Multiple Channels Communication},
  booktitle    = {2019 {IEEE} SmartWorld, Ubiquitous Intelligence {\&} Computing,
                  Advanced {\&} Trusted Computing, Scalable Computing {\&} Communications,
                  Cloud {\&} Big Data Computing, Internet of People and Smart City
                  Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019, Leicester,
                  United Kingdom, August 19-23, 2019},
  pages        = {1425--1430},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00258},
  doi          = {10.1109/SMARTWORLD-UIC-ATC-SCALCOM-IOP-SCI.2019.00258},
  timestamp    = {Wed, 16 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uic/FuYWYL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/FuLA0CL19,
  author       = {Yulong Fu and
                  Guoquan Li and
                  Mohammed Atiquzzaman and
                  Zheng Yan and
                  Jin Cao and
                  Hui Li},
  title        = {A Study and Enhancement to the Security of {MANET} {AODV} Protocol
                  Against Black Hole Attacks},
  booktitle    = {2019 {IEEE} SmartWorld, Ubiquitous Intelligence {\&} Computing,
                  Advanced {\&} Trusted Computing, Scalable Computing {\&} Communications,
                  Cloud {\&} Big Data Computing, Internet of People and Smart City
                  Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019, Leicester,
                  United Kingdom, August 19-23, 2019},
  pages        = {1431--1436},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00259},
  doi          = {10.1109/SMARTWORLD-UIC-ATC-SCALCOM-IOP-SCI.2019.00259},
  timestamp    = {Wed, 16 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uic/FuLA0CL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/YuCM0NL19,
  author       = {Pu Yu and
                  Jin Cao and
                  Maode Ma and
                  Hui Li and
                  Ben Niu and
                  Fenghua Li},
  title        = {Quantum-Resistance Authentication and Data Transmission Scheme for
                  NB-IoT in 3GPP 5G Networks},
  booktitle    = {2019 {IEEE} Wireless Communications and Networking Conference, {WCNC}
                  2019, Marrakesh, Morocco, April 15-18, 2019},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WCNC.2019.8885686},
  doi          = {10.1109/WCNC.2019.8885686},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcnc/YuCM0NL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ZhangLML18,
  author       = {Kai Zhang and
                  Hui Li and
                  Jianfeng Ma and
                  Ximeng Liu},
  title        = {Efficient large-universe multi-authority ciphertext-policy attribute-based
                  encryption with white-box traceability},
  journal      = {Sci. China Inf. Sci.},
  volume       = {61},
  number       = {3},
  pages        = {32102},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11432-016-9019-8},
  doi          = {10.1007/S11432-016-9019-8},
  timestamp    = {Fri, 28 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/ZhangLML18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/MaMLJG18,
  author       = {XinDi Ma and
                  Jianfeng Ma and
                  Hui Li and
                  Qi Jiang and
                  Sheng Gao},
  title        = {{ARMOR:} {A} trust-based privacy-preserving framework for decentralized
                  friend recommendation in online social networks},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {79},
  pages        = {82--94},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2017.09.060},
  doi          = {10.1016/J.FUTURE.2017.09.060},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/MaMLJG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/HanZL18,
  author       = {Qi Han and
                  Yinghui Zhang and
                  Hui Li},
  title        = {Efficient and robust attribute-based encryption supporting access
                  policy hiding in Internet of Things},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {83},
  pages        = {269--277},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2018.01.019},
  doi          = {10.1016/J.FUTURE.2018.01.019},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/HanZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-com/FanRWLY18,
  author       = {Kai Fan and
                  Yanhui Ren and
                  Yue Wang and
                  Hui Li and
                  Yingtang Yang},
  title        = {Blockchain-based efficient privacy preserving and data sharing scheme
                  of content-centric network in 5G},
  journal      = {{IET} Commun.},
  volume       = {12},
  number       = {5},
  pages        = {527--532},
  year         = {2018},
  url          = {https://doi.org/10.1049/iet-com.2017.0619},
  doi          = {10.1049/IET-COM.2017.0619},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-com/FanRWLY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/DangXC0CZF18,
  author       = {Lanjun Dang and
                  Jie Xu and
                  Xuefei Cao and
                  Hui Li and
                  Jie Chen and
                  Yueyu Zhang and
                  Xiaotong Fu},
  title        = {Efficient identity-based authenticated key agreement protocol with
                  provable security for vehicular ad hoc networks},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {14},
  number       = {4},
  year         = {2018},
  url          = {https://doi.org/10.1177/1550147718772545},
  doi          = {10.1177/1550147718772545},
  timestamp    = {Wed, 09 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/DangXC0CZF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ZhuWLLFL18,
  author       = {Hui Zhu and
                  Fengwei Wang and
                  Rongxing Lu and
                  Fen Liu and
                  Gang Fu and
                  Hui Li},
  title        = {Efficient and Privacy-Preserving Proximity Detection Schemes for Social
                  Applications},
  journal      = {{IEEE} Internet Things J.},
  volume       = {5},
  number       = {4},
  pages        = {2947--2957},
  year         = {2018},
  url          = {https://doi.org/10.1109/JIOT.2017.2766701},
  doi          = {10.1109/JIOT.2017.2766701},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/ZhuWLLFL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/MiaoMLLLL18,
  author       = {Yinbin Miao and
                  Jianfeng Ma and
                  Ximeng Liu and
                  Xinghua Li and
                  Zhiquan Liu and
                  Hui Li},
  title        = {Practical Attribute-Based Multi-Keyword Search Scheme in Mobile Crowdsourcing},
  journal      = {{IEEE} Internet Things J.},
  volume       = {5},
  number       = {4},
  pages        = {3008--3018},
  year         = {2018},
  url          = {https://doi.org/10.1109/JIOT.2017.2779124},
  doi          = {10.1109/JIOT.2017.2779124},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/MiaoMLLLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/FanWRLY18,
  author       = {Kai Fan and
                  Shangyang Wang and
                  Yanhui Ren and
                  Hui Li and
                  Yintang Yang},
  title        = {MedBlock: Efficient and Secure Medical Data Sharing Via Blockchain},
  journal      = {J. Medical Syst.},
  volume       = {42},
  number       = {8},
  pages        = {136:1--136:11},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10916-018-0993-7},
  doi          = {10.1007/S10916-018-0993-7},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jms/FanWRLY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/CaoMLFL18,
  author       = {Jin Cao and
                  Maode Ma and
                  Hui Li and
                  Yulong Fu and
                  Xuefeng Liu},
  title        = {{EGHR:} Efficient group-based handover authentication protocols for
                  mMTC in 5G wireless networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {102},
  pages        = {1--16},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jnca.2017.11.009},
  doi          = {10.1016/J.JNCA.2017.11.009},
  timestamp    = {Fri, 28 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/CaoMLFL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/FanWSLY18,
  author       = {Kai Fan and
                  Xin Wang and
                  Katsuya Suto and
                  Hui Li and
                  Yintang Yang},
  title        = {Secure and Efficient Privacy-Preserving Ciphertext Retrieval in Connected
                  Vehicular Cloud Computing},
  journal      = {{IEEE} Netw.},
  volume       = {32},
  number       = {3},
  pages        = {52--57},
  year         = {2018},
  url          = {https://doi.org/10.1109/MNET.2018.1700327},
  doi          = {10.1109/MNET.2018.1700327},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/FanWSLY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/LiuZLL18,
  author       = {Xiaoxia Liu and
                  Hui Zhu and
                  Rongxing Lu and
                  Hui Li},
  title        = {Efficient privacy-preserving online medical primary diagnosis scheme
                  on naive bayesian classification},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {11},
  number       = {2},
  pages        = {334--347},
  year         = {2018},
  url          = {https://doi.org/10.1007/s12083-016-0506-8},
  doi          = {10.1007/S12083-016-0506-8},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/LiuZLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/MaMLJG18,
  author       = {XinDi Ma and
                  Jianfeng Ma and
                  Hui Li and
                  Qi Jiang and
                  Sheng Gao},
  title        = {{AGENT:} an adaptive geo-indistinguishable mechanism for continuous
                  location-based service},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {11},
  number       = {3},
  pages        = {473--485},
  year         = {2018},
  url          = {https://doi.org/10.1007/s12083-017-0545-9},
  doi          = {10.1007/S12083-017-0545-9},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/MaMLJG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/FanWJLY18,
  author       = {Kai Fan and
                  Wei Wang and
                  Wei Jiang and
                  Hui Li and
                  Yintang Yang},
  title        = {Secure ultra-lightweight {RFID} mutual authentication protocol based
                  on transparent computing for IoV},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {11},
  number       = {4},
  pages        = {723--734},
  year         = {2018},
  url          = {https://doi.org/10.1007/s12083-017-0553-9},
  doi          = {10.1007/S12083-017-0553-9},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/FanWJLY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/FanWWLY18,
  author       = {Kai Fan and
                  Junxiong Wang and
                  Xin Wang and
                  Hui Li and
                  Yintang Yang},
  title        = {Secure, efficient and revocable data sharing scheme for vehicular
                  fogs},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {11},
  number       = {4},
  pages        = {766--777},
  year         = {2018},
  url          = {https://doi.org/10.1007/s12083-017-0562-8},
  doi          = {10.1007/S12083-017-0562-8},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/FanWWLY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/FanLSLY18,
  author       = {Kai Fan and
                  Shuyang Lou and
                  Ruidan Su and
                  Hui Li and
                  Yintang Yang},
  title        = {Secure and private key management scheme in big data networking},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {11},
  number       = {5},
  pages        = {992--999},
  year         = {2018},
  url          = {https://doi.org/10.1007/s12083-017-0579-z},
  doi          = {10.1007/S12083-017-0579-Z},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/FanLSLY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/CaoLML18,
  author       = {Jin Cao and
                  Hui Li and
                  Maode Ma and
                  Fenghua Li},
  title        = {{UPPGHA:} Uniform Privacy Preservation Group Handover Authentication
                  Mechanism for mMTC in {LTE-A} Networks},
  journal      = {Secur. Commun. Networks},
  volume       = {2018},
  pages        = {6854612:1--6854612:16},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/6854612},
  doi          = {10.1155/2018/6854612},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/CaoLML18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ShanLLGN18,
  author       = {Fangfang Shan and
                  Hui Li and
                  Fenghua Li and
                  Yunchuan Guo and
                  Ben Niu},
  title        = {{HAC:} Hybrid Access Control for Online Social Networks},
  journal      = {Secur. Commun. Networks},
  volume       = {2018},
  pages        = {7384194:1--7384194:11},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/7384194},
  doi          = {10.1155/2018/7384194},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/ShanLLGN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/FanYZLY18,
  author       = {Kai Fan and
                  Jie Yin and
                  Kuan Zhang and
                  Hui Li and
                  Yintang Yang},
  title        = {{EARS-DM:} Efficient Auto Correction Retrieval Scheme for Data Management
                  in Edge Computing},
  journal      = {Sensors},
  volume       = {18},
  number       = {11},
  pages        = {3616},
  year         = {2018},
  url          = {https://doi.org/10.3390/s18113616},
  doi          = {10.3390/S18113616},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/FanYZLY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/FanJ0Y18,
  author       = {Kai Fan and
                  Wei Jiang and
                  Hui Li and
                  Yintang Yang},
  title        = {Lightweight {RFID} Protocol for Medical Privacy Protection in IoT},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {14},
  number       = {4},
  pages        = {1656--1665},
  year         = {2018},
  url          = {https://doi.org/10.1109/TII.2018.2794996},
  doi          = {10.1109/TII.2018.2794996},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/FanJ0Y18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/WangZLLLLZ18,
  author       = {Fengwei Wang and
                  Hui Zhu and
                  Ximeng Liu and
                  Rongxing Lu and
                  Fenghua Li and
                  Hui Li and
                  Songnian Zhang},
  title        = {Efficient and Privacy-Preserving Dynamic Spatial Query Scheme for
                  Ride-Hailing Services},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {67},
  number       = {11},
  pages        = {11084--11097},
  year         = {2018},
  url          = {https://doi.org/10.1109/TVT.2018.2868869},
  doi          = {10.1109/TVT.2018.2868869},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvt/WangZLLLLZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/Zhu0Y18,
  author       = {Xudong Zhu and
                  Hui Li and
                  Yang Yu},
  editor       = {Fuchun Guo and
                  Xinyi Huang and
                  Moti Yung},
  title        = {Blockchain-Based Privacy Preserving Deep Learning},
  booktitle    = {Information Security and Cryptology - 14th International Conference,
                  Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11449},
  pages        = {370--383},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-14234-6\_20},
  doi          = {10.1007/978-3-030-14234-6\_20},
  timestamp    = {Thu, 14 Jul 2022 16:21:07 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/Zhu0Y18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edge/FanPWL0Y18,
  author       = {Kai Fan and
                  Qiang Pan and
                  Junxiong Wang and
                  Tingting Liu and
                  Hui Li and
                  Yintang Yang},
  title        = {Cross-Domain Based Data Sharing Scheme in Cooperative Edge Computing},
  booktitle    = {2018 {IEEE} International Conference on Edge Computing, {EDGE} 2018,
                  San Francisco, CA, USA, July 2-7, 2018},
  pages        = {87--92},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/EDGE.2018.00019},
  doi          = {10.1109/EDGE.2018.00019},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edge/FanPWL0Y18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/LiHLL18,
  author       = {Yang Li and
                  Ronghui Hou and
                  King{-}Shan Lui and
                  Hui Li},
  title        = {An MEC-Based DoS Attack Detection Mechanism for {C-V2X} Networks},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2018, Abu Dhabi,
                  United Arab Emirates, December 9-13, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/GLOCOM.2018.8647323},
  doi          = {10.1109/GLOCOM.2018.8647323},
  timestamp    = {Sat, 11 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/LiHLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/XiaoZSLDL18,
  author       = {Rui Xiao and
                  Hui Zhu and
                  Chao Song and
                  Ximeng Liu and
                  Jian Dong and
                  Hui Li},
  title        = {Attacking Network Isolation in Software-Defined Networks: New Attacks
                  and Countermeasures},
  booktitle    = {27th International Conference on Computer Communication and Networks,
                  {ICCCN} 2018, Hangzhou, China, July 30 - August 2, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICCCN.2018.8487340},
  doi          = {10.1109/ICCCN.2018.8487340},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccn/XiaoZSLDL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/ZhuZLLWL18,
  author       = {Dan Zhu and
                  Hui Zhu and
                  Ximeng Liu and
                  Hui Li and
                  Fengwei Wang and
                  Hao Li},
  title        = {Achieve Efficient and Privacy-Preserving Medical Primary Diagnosis
                  Based on kNN},
  booktitle    = {27th International Conference on Computer Communication and Networks,
                  {ICCCN} 2018, Hangzhou, China, July 30 - August 2, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICCCN.2018.8487422},
  doi          = {10.1109/ICCCN.2018.8487422},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccn/ZhuZLLWL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ithings/YangZLLL18,
  author       = {Xiaopeng Yang and
                  Hui Zhu and
                  Rongxing Lu and
                  Ximeng Liu and
                  Hui Li},
  title        = {Efficient and Privacy-Preserving Online Face Recognition Over Encrypted
                  Outsourced Data},
  booktitle    = {{IEEE} International Conference on Internet of Things (iThings) and
                  {IEEE} Green Computing and Communications (GreenCom) and {IEEE} Cyber,
                  Physical and Social Computing (CPSCom) and {IEEE} Smart Data (SmartData),
                  iThings/GreenCom/CPSCom/SmartData 2018, Halifax, NS, Canada, July
                  30 - August 3, 2018},
  pages        = {366--373},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/Cybermatics\_2018.2018.00089},
  doi          = {10.1109/CYBERMATICS\_2018.2018.00089},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ithings/YangZLLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ithings/FanRYWLY18,
  author       = {Kai Fan and
                  Yanhui Ren and
                  Zheng Yan and
                  Shangyang Wang and
                  Hui Li and
                  Yintang Yang},
  title        = {Secure Time Synchronization Scheme in IoT Based on Blockchain},
  booktitle    = {{IEEE} International Conference on Internet of Things (iThings) and
                  {IEEE} Green Computing and Communications (GreenCom) and {IEEE} Cyber,
                  Physical and Social Computing (CPSCom) and {IEEE} Smart Data (SmartData),
                  iThings/GreenCom/CPSCom/SmartData 2018, Halifax, NS, Canada, July
                  30 - August 3, 2018},
  pages        = {1063--1068},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/Cybermatics\_2018.2018.00196},
  doi          = {10.1109/CYBERMATICS\_2018.2018.00196},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ithings/FanRYWLY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-09639,
  author       = {Hui Li and
                  Sizhe Peng and
                  Jian Li and
                  Jingjing Li and
                  Jiangtao Cui and
                  Jianfeng Ma},
  title        = {{ONCE} and {ONCE+:} Counting the Frequency of Time-constrained Serial
                  Episodes in a Streaming Sequence},
  journal      = {CoRR},
  volume       = {abs/1801.09639},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.09639},
  eprinttype    = {arXiv},
  eprint       = {1801.09639},
  timestamp    = {Sat, 29 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-09639.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiLNC18,
  author       = {Fenghua Li and
                  Hui Li and
                  Ben Niu and
                  Jinjun Chen},
  title        = {Privacy Computing: Concept, Computing Framework And Future Development
                  Trends},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1145},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1145},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiLNC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/Peng0CZMP17,
  author       = {Yanguo Peng and
                  Hui Li and
                  Jiangtao Cui and
                  Junwei Zhang and
                  Jianfeng Ma and
                  Changgen Peng},
  title        = {hOPE: improved order preserving encryption with the power to homomorphic
                  operations of ciphertexts},
  journal      = {Sci. China Inf. Sci.},
  volume       = {60},
  number       = {6},
  pages        = {62101},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11432-016-0242-7},
  doi          = {10.1007/S11432-016-0242-7},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/Peng0CZMP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/Ma0M0GXL17,
  author       = {XinDi Ma and
                  Hui Li and
                  Jianfeng Ma and
                  Qi Jiang and
                  Sheng Gao and
                  Ning Xi and
                  Di Lu},
  title        = {{APPLET:} a privacy-preserving framework for location-aware recommender
                  system},
  journal      = {Sci. China Inf. Sci.},
  volume       = {60},
  number       = {9},
  pages        = {92101},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11432-015-0981-4},
  doi          = {10.1007/S11432-015-0981-4},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/Ma0M0GXL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FuYLXC17,
  author       = {Yulong Fu and
                  Zheng Yan and
                  Hui Li and
                  Xiao{-}Long Xin and
                  Jin Cao},
  title        = {A secure {SDN} based multi-RANs architecture for future 5G networks},
  journal      = {Comput. Secur.},
  volume       = {70},
  pages        = {648--662},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.cose.2017.08.013},
  doi          = {10.1016/J.COSE.2017.08.013},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FuYLXC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/Cao0DL17,
  author       = {Xuefei Cao and
                  Hui Li and
                  Lanjun Dang and
                  Yin Lin},
  title        = {A two-party privacy preserving set intersection protocol against malicious
                  users in cloud computing},
  journal      = {Comput. Stand. Interfaces},
  volume       = {54},
  pages        = {41--45},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.csi.2016.08.004},
  doi          = {10.1016/J.CSI.2016.08.004},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/Cao0DL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ZhuLL17,
  author       = {Hui Zhu and
                  Fen Liu and
                  Hui Li},
  title        = {Efficient and Privacy-Preserving Polygons Spatial Query Framework
                  for Location-Based Services},
  journal      = {{IEEE} Internet Things J.},
  volume       = {4},
  number       = {2},
  pages        = {536--545},
  year         = {2017},
  url          = {https://doi.org/10.1109/JIOT.2016.2553083},
  doi          = {10.1109/JIOT.2016.2553083},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/ZhuLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/YangHLZSS17,
  author       = {Kan Yang and
                  Qi Han and
                  Hui Li and
                  Kan Zheng and
                  Zhou Su and
                  Xuemin Shen},
  title        = {An Efficient and Fine-Grained Big Data Access Control Scheme With
                  Privacy-Preserving Policy},
  journal      = {{IEEE} Internet Things J.},
  volume       = {4},
  number       = {2},
  pages        = {563--571},
  year         = {2017},
  url          = {https://doi.org/10.1109/JIOT.2016.2571718},
  doi          = {10.1109/JIOT.2016.2571718},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/YangHLZSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ZhangCLWLY17,
  author       = {Yinghui Zhang and
                  Xiaofeng Chen and
                  Jin Li and
                  Duncan S. Wong and
                  Hui Li and
                  Ilsun You},
  title        = {Ensuring attribute privacy protection and fast decryption for outsourced
                  data security in mobile cloud computing},
  journal      = {Inf. Sci.},
  volume       = {379},
  pages        = {42--61},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ins.2016.04.015},
  doi          = {10.1016/J.INS.2016.04.015},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ZhangCLWLY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LiHNL17,
  author       = {Fenghua Li and
                  Yuanyuan He and
                  Ben Niu and
                  Hui Li},
  title        = {Small-world: Secure friend matching over physical world and social
                  networks},
  journal      = {Inf. Sci.},
  volume       = {387},
  pages        = {205--220},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ins.2016.09.057},
  doi          = {10.1016/J.INS.2016.09.057},
  timestamp    = {Wed, 29 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/LiHNL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcin/MengLC17,
  author       = {Xue Meng and
                  Hui Li and
                  Jiangtao Cui},
  title        = {Different strategies for differentially private histogram publication},
  journal      = {J. Commun. Inf. Networks},
  volume       = {2},
  number       = {3},
  pages        = {68--77},
  year         = {2017},
  url          = {https://doi.org/10.1007/s41650-017-0014-x},
  doi          = {10.1007/S41650-017-0014-X},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcin/MengLC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/LiuWZL17,
  author       = {Qiao Liu and
                  Yong Wang and
                  Wenjing Zhang and
                  Hui Li},
  title        = {Secret Data Transmission in Wireless Sensor Network with Physical
                  Layer Network Coding},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {33},
  number       = {4},
  pages        = {1055--1067},
  year         = {2017},
  url          = {https://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=157\_2056},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/LiuWZL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mis/LiuGWL17,
  author       = {Qiao Liu and
                  Guang Gong and
                  Yong Wang and
                  Hui Li},
  title        = {A Novel Secure Transmission Scheme in {MIMO} Two-Way Relay Channels
                  with Physical Layer Approach},
  journal      = {Mob. Inf. Syst.},
  volume       = {2017},
  pages        = {7843843:1--7843843:12},
  year         = {2017},
  url          = {https://doi.org/10.1155/2017/7843843},
  doi          = {10.1155/2017/7843843},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mis/LiuGWL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/FanGGLSY17,
  author       = {Kai Fan and
                  Nan Ge and
                  Yuanyuan Gong and
                  Hui Li and
                  Ruidan Su and
                  Yintang Yang},
  title        = {An ultra-lightweight {RFID} authentication scheme for mobile commerce},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {10},
  number       = {2},
  pages        = {368--376},
  year         = {2017},
  url          = {https://doi.org/10.1007/s12083-016-0443-6},
  doi          = {10.1007/S12083-016-0443-6},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/FanGGLSY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/puc/ZhangLZCL17,
  author       = {Yinghui Zhang and
                  Jin Li and
                  Dong Zheng and
                  Xiaofeng Chen and
                  Hui Li},
  title        = {Towards privacy protection and malicious behavior traceability in
                  smart health},
  journal      = {Pers. Ubiquitous Comput.},
  volume       = {21},
  number       = {5},
  pages        = {815--830},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00779-017-1047-8},
  doi          = {10.1007/S00779-017-1047-8},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/puc/ZhangLZCL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/puc/ZhouLWL17,
  author       = {Lu Zhou and
                  Qiao Liu and
                  Yong Wang and
                  Hui Li},
  title        = {Secure group information exchange scheme for vehicular ad hoc networks},
  journal      = {Pers. Ubiquitous Comput.},
  volume       = {21},
  number       = {5},
  pages        = {903--910},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00779-017-1049-6},
  doi          = {10.1007/S00779-017-1049-6},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/puc/ZhouLWL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/FanSDZLYLY17,
  author       = {Kai Fan and
                  Panfei Song and
                  Zhao Du and
                  Haojin Zhu and
                  Hui Li and
                  Yintang Yang and
                  Xinghua Li and
                  Chao Yang},
  title        = {{NFC} Secure Payment and Verification Scheme with {CS} E-Ticket},
  journal      = {Secur. Commun. Networks},
  volume       = {2017},
  pages        = {4796373:1--4796373:9},
  year         = {2017},
  url          = {https://doi.org/10.1155/2017/4796373},
  doi          = {10.1155/2017/4796373},
  timestamp    = {Thu, 08 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/FanSDZLYLY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/FanWWLY17,
  author       = {Kai Fan and
                  Junxiong Wang and
                  Xin Wang and
                  Hui Li and
                  Yintang Yang},
  title        = {A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud
                  Computing},
  journal      = {Sensors},
  volume       = {17},
  number       = {7},
  pages        = {1695},
  year         = {2017},
  url          = {https://doi.org/10.3390/s17071695},
  doi          = {10.3390/S17071695},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/FanWWLY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/titb/ZhuLL017,
  author       = {Hui Zhu and
                  Xiaoxia Liu and
                  Rongxing Lu and
                  Hui Li},
  title        = {Efficient and Privacy-Preserving Online Medical Prediagnosis Framework
                  Using Nonlinear {SVM}},
  journal      = {{IEEE} J. Biomed. Health Informatics},
  volume       = {21},
  number       = {3},
  pages        = {838--850},
  year         = {2017},
  url          = {https://doi.org/10.1109/JBHI.2016.2548248},
  doi          = {10.1109/JBHI.2016.2548248},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/titb/ZhuLL017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/LaiZC0S17,
  author       = {Chengzhe Lai and
                  Kuan Zhang and
                  Nan Cheng and
                  Hui Li and
                  Xuemin Shen},
  title        = {{SIRC:} {A} Secure Incentive Scheme for Reliable Cooperative Downloading
                  in Highway VANETs},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {18},
  number       = {6},
  pages        = {1559--1574},
  year         = {2017},
  url          = {https://doi.org/10.1109/TITS.2016.2612233},
  doi          = {10.1109/TITS.2016.2612233},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/LaiZC0S17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/LiuSQLZL17,
  author       = {Xuefeng Liu and
                  Wenhai Sun and
                  Hanyu Quan and
                  Wenjing Lou and
                  Yuqing Zhang and
                  Hui Li},
  title        = {Publicly Verifiable Inner Product Evaluation over Outsourced Data
                  Streams under Multiple Keys},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {10},
  number       = {5},
  pages        = {826--838},
  year         = {2017},
  url          = {https://doi.org/10.1109/TSC.2016.2531665},
  doi          = {10.1109/TSC.2016.2531665},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/LiuSQLZL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/CaoML17,
  author       = {Jin Cao and
                  Maode Ma and
                  Hui Li},
  title        = {{G2RHA:} Group-to-Route Handover Authentication Scheme for Mobile
                  Relays in {LTE-A} High-Speed Rail Networks},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {66},
  number       = {11},
  pages        = {9689--9701},
  year         = {2017},
  url          = {https://doi.org/10.1109/TVT.2017.2750219},
  doi          = {10.1109/TVT.2017.2750219},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/CaoML17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acm/FanLJXY17,
  author       = {Kai Fan and
                  Hui Li and
                  Wei Jiang and
                  Chengsheng Xiao and
                  Yintang Yang},
  editor       = {John C. S. Lui and
                  Xinbing Wang and
                  Alexander Wolf and
                  Yunhao Liu and
                  Chuanping Hu},
  title        = {{U2F} based secure mutual authentication protocol for mobile payment},
  booktitle    = {Proceedings of the {ACM} Turing 50th Celebration Conference - China,
                  {TUR-C} 2017, Shanghai, China, May 12-14, 2017},
  pages        = {27:1--27:6},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3063955.3063982},
  doi          = {10.1145/3063955.3063982},
  timestamp    = {Tue, 20 Dec 2022 21:20:01 +0100},
  biburl       = {https://dblp.org/rec/conf/acm/FanLJXY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsw/LinZL17,
  author       = {Jiaping Lin and
                  Xingwen Zhao and
                  Hui Li},
  title        = {Target: category-based android malware detection revisited},
  booktitle    = {Proceedings of the Australasian Computer Science Week Multiconference,
                  {ACSW} 2017, Geelong, Australia, January 31 - February 3, 2017},
  pages        = {74:1--74:9},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3014812.3014888},
  doi          = {10.1145/3014812.3014888},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsw/LinZL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/css/ZhaoL17,
  author       = {Xingwen Zhao and
                  Hui Li},
  editor       = {Sheng Wen and
                  Wei Wu and
                  Aniello Castiglione},
  title        = {Privacy Preserving Authenticating and Billing Scheme for Video Streaming
                  Service},
  booktitle    = {Cyberspace Safety and Security - 9th International Symposium, {CSS}
                  2017, Xi'an, China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10581},
  pages        = {396--410},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69471-9\_29},
  doi          = {10.1007/978-3-319-69471-9\_29},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/css/ZhaoL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/KhanLZS17,
  author       = {Fawad Khan and
                  Hui Li and
                  Liangxuan Zhang and
                  Jian Shen},
  title        = {An Expressive Hidden Access Policy {CP-ABE}},
  booktitle    = {Second {IEEE} International Conference on Data Science in Cyberspace,
                  {DSC} 2017, Shenzhen, China, June 26-29, 2017},
  pages        = {178--186},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/DSC.2017.29},
  doi          = {10.1109/DSC.2017.29},
  timestamp    = {Wed, 25 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dsc/KhanLZS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/FanLLY17,
  author       = {Kai Fan and
                  Qi Luo and
                  Hui Li and
                  Yintang Yang},
  title        = {Cloud-Based Lightweight {RFID} Mutual Authentication Protocol},
  booktitle    = {Second {IEEE} International Conference on Data Science in Cyberspace,
                  {DSC} 2017, Shenzhen, China, June 26-29, 2017},
  pages        = {333--338},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/DSC.2017.41},
  doi          = {10.1109/DSC.2017.41},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsc/FanLLY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/ZhangLZK17,
  author       = {Liangxuan Zhang and
                  Hui Li and
                  Yinghui Zhang and
                  Fawad Khan},
  title        = {Privacy-Preserving Attribute-Based Encryption Supporting Expressive
                  Access Structures},
  booktitle    = {Second {IEEE} International Conference on Data Science in Cyberspace,
                  {DSC} 2017, Shenzhen, China, June 26-29, 2017},
  pages        = {475--482},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/DSC.2017.61},
  doi          = {10.1109/DSC.2017.61},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsc/ZhangLZK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/LiNL17,
  author       = {Weihao Li and
                  Ben Niu and
                  Hui Li},
  title        = {Privacy Preservation Strategy in Time-Sensitive LBSs},
  booktitle    = {Second {IEEE} International Conference on Data Science in Cyberspace,
                  {DSC} 2017, Shenzhen, China, June 26-29, 2017},
  pages        = {488--493},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/DSC.2017.12},
  doi          = {10.1109/DSC.2017.12},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsc/LiNL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/FanYWLY17,
  author       = {Kai Fan and
                  Jie Yin and
                  Junxiong Wang and
                  Hui Li and
                  Yintang Yang},
  title        = {Multi-Keyword Fuzzy and Sortable Ciphertext Retrieval Scheme for Big
                  Data},
  booktitle    = {2017 {IEEE} Global Communications Conference, {GLOBECOM} 2017, Singapore,
                  December 4-8, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/GLOCOM.2017.8254990},
  doi          = {10.1109/GLOCOM.2017.8254990},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/FanYWLY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/LiWNLLC17,
  author       = {Fenghua Li and
                  Xinyu Wang and
                  Ben Niu and
                  Hui Li and
                  Chao Li and
                  Lihua Chen},
  title        = {TrackU: Exploiting User's Mobility Behavior via WiFi List},
  booktitle    = {2017 {IEEE} Global Communications Conference, {GLOBECOM} 2017, Singapore,
                  December 4-8, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/GLOCOM.2017.8254030},
  doi          = {10.1109/GLOCOM.2017.8254030},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/LiWNLLC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/CaoMLFNL17,
  author       = {Jin Cao and
                  Maode Ma and
                  Hui Li and
                  Yulong Fu and
                  Ben Niu and
                  Fenghua Li},
  title        = {Trajectory prediction-based handover authentication mechanism for
                  mobile relays in {LTE-A} high-speed rail networks},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2017, Paris,
                  France, May 21-25, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICC.2017.7997254},
  doi          = {10.1109/ICC.2017.7997254},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/CaoMLFNL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/HeZWLNL17,
  author       = {Yuanyuan He and
                  Kuan Zhang and
                  Hanyi Wang and
                  Fenghua Li and
                  Ben Niu and
                  Hui Li},
  title        = {Impact factor-based group recommendation scheme with privacy preservation
                  in MSNs},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2017, Paris,
                  France, May 21-25, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICC.2017.7996987},
  doi          = {10.1109/ICC.2017.7996987},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/HeZWLNL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/WeiZLL17,
  author       = {Qing Wei and
                  Hui Zhu and
                  Rongxing Lu and
                  Hui Li},
  title        = {Achieve efficient and privacy-preserving online fingerprint authentication
                  over encrypted outsourced data},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2017, Paris,
                  France, May 21-25, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICC.2017.7997112},
  doi          = {10.1109/ICC.2017.7997112},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/WeiZLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/LiuLLMM17,
  author       = {Hai Liu and
                  Xinghua Li and
                  Hui Li and
                  Jianfeng Ma and
                  XinDi Ma},
  title        = {Spatiotemporal correlation-aware dummy-based privacy protection scheme
                  for location-based services},
  booktitle    = {2017 {IEEE} Conference on Computer Communications, {INFOCOM} 2017,
                  Atlanta, GA, USA, May 1-4, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/INFOCOM.2017.8056978},
  doi          = {10.1109/INFOCOM.2017.8056978},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/LiuLLMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ZhangLZK17,
  author       = {Liangxuan Zhang and
                  Hui Li and
                  Yinghui Zhang and
                  Fawad Khan},
  title        = {Efficient privacy-preserving decentralized {ABE} supporting expressive
                  access structures},
  booktitle    = {2017 {IEEE} Conference on Computer Communications Workshops, {INFOCOM}
                  Workshops, Atlanta, GA, USA, May 1-4, 2017},
  pages        = {547--552},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/INFCOMW.2017.8116436},
  doi          = {10.1109/INFCOMW.2017.8116436},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/ZhangLZK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsda/MaWG017,
  author       = {Dongxu Ma and
                  Zilong Wang and
                  Guang Gong and
                  Hui Li},
  title        = {A new method to construct golay complementary set and near-complementary
                  set by paraunitary matrices},
  booktitle    = {Eighth International Workshop on Signal Design and Its Applications
                  in Communications, {IWSDA} 2017, Sapporo, Japan, September 24-28,
                  2017},
  pages        = {9--13},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/IWSDA.2017.8095726},
  doi          = {10.1109/IWSDA.2017.8095726},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsda/MaWG017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/WangZLLH017,
  author       = {Fengwei Wang and
                  Hui Zhu and
                  Rongxing Lu and
                  Fen Liu and
                  Cheng Huang and
                  Hui Li},
  editor       = {Xiaodong Lin and
                  Ali A. Ghorbani and
                  Kui Ren and
                  Sencun Zhu and
                  Aiqing Zhang},
  title        = {Achieve Efficient and Privacy-Preserving Proximity Detection Scheme
                  for Social Applications},
  booktitle    = {Security and Privacy in Communication Networks - 13th International
                  Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22-25,
                  2017, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {238},
  pages        = {339--355},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-78813-5\_17},
  doi          = {10.1007/978-3-319-78813-5\_17},
  timestamp    = {Wed, 22 Dec 2021 13:40:59 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/WangZLLH017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wasa/LiLFNG017,
  author       = {Fenghua Li and
                  Jiawen Liu and
                  Liang Fang and
                  Ben Niu and
                  Kui Geng and
                  Hui Li},
  editor       = {Liran Ma and
                  Abdallah Khreishah and
                  Yan Zhang and
                  Mingyuan Yan},
  title        = {Pricing Privacy Leakage in Location-Based Services},
  booktitle    = {Wireless Algorithms, Systems, and Applications - 12th International
                  Conference, {WASA} 2017, Guilin, China, June 19-21, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10251},
  pages        = {406--418},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60033-8\_36},
  doi          = {10.1007/978-3-319-60033-8\_36},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wasa/LiLFNG017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/LaiLZLS16,
  author       = {Chengzhe Lai and
                  Rongxing Lu and
                  Dong Zheng and
                  Hui Li and
                  Xuemin (Sherman) Shen},
  title        = {{GLARM:} Group-based lightweight authentication scheme for resource-constrained
                  machine to machine communications},
  journal      = {Comput. Networks},
  volume       = {99},
  pages        = {66--81},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.comnet.2016.02.007},
  doi          = {10.1016/J.COMNET.2016.02.007},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/LaiLZLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dsp/WangMLLL16,
  author       = {Yong Wang and
                  Sufang Ma and
                  Qiao Liu and
                  Yanling Liu and
                  Hui Li},
  title        = {{MIMO} relay channel signal transmission in transformed signal subspace},
  journal      = {Digit. Signal Process.},
  volume       = {57},
  pages        = {46--55},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.dsp.2016.06.011},
  doi          = {10.1016/J.DSP.2016.06.011},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dsp/WangMLLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/MaW016,
  author       = {Dongxu Ma and
                  Zilong Wang and
                  Hui Li},
  title        = {A Generalized Construction of Non-Square {M-QAM} Sequences with Low
                  {PMEPR} for {OFDM} Systems},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {99-A},
  number       = {6},
  pages        = {1222--1227},
  year         = {2016},
  url          = {https://doi.org/10.1587/transfun.E99.A.1222},
  doi          = {10.1587/TRANSFUN.E99.A.1222},
  timestamp    = {Sat, 22 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/MaW016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/FanDGWYLY16,
  author       = {Kai Fan and
                  Zhao Du and
                  Yuanyuan Gong and
                  Yue Wang and
                  Tongjiang Yan and
                  Hui Li and
                  Yintang Yang},
  title        = {A Secure {RFID} Application Revocation Scheme for IoT},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {99-D},
  number       = {8},
  pages        = {2027--2035},
  year         = {2016},
  url          = {https://doi.org/10.1587/transinf.2015INP0008},
  doi          = {10.1587/TRANSINF.2015INP0008},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/FanDGWYLY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/ZhuHL016,
  author       = {Hui Zhu and
                  Xiaoying He and
                  Ximeng Liu and
                  Hui Li},
  title        = {{PTFA:} a secure and privacy-preserving traffic flow analysis scheme
                  for intelligent transportation system},
  journal      = {Int. J. Embed. Syst.},
  volume       = {8},
  number       = {1},
  pages        = {78--86},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJES.2016.073749},
  doi          = {10.1504/IJES.2016.073749},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijes/ZhuHL016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijthi/LiHNYL16,
  author       = {Xiuguang Li and
                  Yuanyuan He and
                  Ben Niu and
                  Kai Yang and
                  Hui Li},
  title        = {An Exact and Efficient Privacy-Preserving Spatiotemporal Matching
                  in Mobile Social Networks},
  journal      = {Int. J. Technol. Hum. Interact.},
  volume       = {12},
  number       = {2},
  pages        = {36--47},
  year         = {2016},
  url          = {https://doi.org/10.4018/IJTHI.2016040103},
  doi          = {10.4018/IJTHI.2016040103},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijthi/LiHNYL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/XiangLWZ16,
  author       = {Xinyin Xiang and
                  Hui Li and
                  Mingyu Wang and
                  Xingwen Zhao},
  title        = {Efficient multi-party concurrent signature from lattices},
  journal      = {Inf. Process. Lett.},
  volume       = {116},
  number       = {8},
  pages        = {497--502},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ipl.2016.02.007},
  doi          = {10.1016/J.IPL.2016.02.007},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ipl/XiangLWZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/ZhangZ0LL16,
  author       = {Yinghui Zhang and
                  Dong Zheng and
                  Xiaofeng Chen and
                  Jin Li and
                  Hui Li},
  title        = {Efficient attribute-based data sharing in mobile clouds},
  journal      = {Pervasive Mob. Comput.},
  volume       = {28},
  pages        = {135--149},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.pmcj.2015.06.009},
  doi          = {10.1016/J.PMCJ.2015.06.009},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/percom/ZhangZ0LL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhuLLL16,
  author       = {Hui Zhu and
                  Xiaoxia Liu and
                  Rongxing Lu and
                  Hui Li},
  title        = {{EPCS:} an efficient and privacy-preserving classification service
                  query framework for {SVM}},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {11},
  pages        = {1309--1320},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1416},
  doi          = {10.1002/SEC.1416},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/ZhuLLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Zhang00L16,
  author       = {Yinghui Zhang and
                  Jin Li and
                  Xiaofeng Chen and
                  Hui Li},
  title        = {Anonymous attribute-based proxy re-encryption for access control in
                  cloud computing},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {14},
  pages        = {2397--2411},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1509},
  doi          = {10.1002/SEC.1509},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Zhang00L16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/FanGLLY16,
  author       = {Kai Fan and
                  Yuanyuan Gong and
                  Chen Liang and
                  Hui Li and
                  Yintang Yang},
  title        = {Lightweight and ultralightweight {RFID} mutual authentication protocol
                  with cache in the reader for IoT in 5G},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {16},
  pages        = {3095--3104},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1314},
  doi          = {10.1002/SEC.1314},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/FanGLLY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangZLLL16,
  author       = {Yinghui Zhang and
                  Dong Zheng and
                  Qi Li and
                  Jin Li and
                  Hui Li},
  title        = {Online/offline unbounded multi-authority attribute-based encryption
                  for data sharing in mobile cloud computing},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {16},
  pages        = {3688--3702},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1574},
  doi          = {10.1002/SEC.1574},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangZLLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/ZhuG016,
  author       = {Hui Zhu and
                  Lijuan Gao and
                  Hui Li},
  title        = {Secure and Privacy-Preserving Body Sensor Data Collection and Query
                  Scheme},
  journal      = {Sensors},
  volume       = {16},
  number       = {2},
  pages        = {179},
  year         = {2016},
  url          = {https://doi.org/10.3390/s16020179},
  doi          = {10.3390/S16020179},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/ZhuG016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/SunYLH016,
  author       = {Wenhai Sun and
                  Shucheng Yu and
                  Wenjing Lou and
                  Y. Thomas Hou and
                  Hui Li},
  title        = {Protecting Your Right: Verifiable Attribute-Based Keyword Search with
                  Fine-Grained Owner-Enforced Search Authorization in the Cloud},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {27},
  number       = {4},
  pages        = {1187--1198},
  year         = {2016},
  url          = {https://doi.org/10.1109/TPDS.2014.2355202},
  doi          = {10.1109/TPDS.2014.2355202},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/SunYLH016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/ZhuLHCL16,
  author       = {Hui Zhu and
                  Rongxing Lu and
                  Cheng Huang and
                  Le Chen and
                  Hui Li},
  title        = {An Efficient Privacy-Preserving Location-Based Services Query Scheme
                  in Outsourced Cloud},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {65},
  number       = {9},
  pages        = {7729--7739},
  year         = {2016},
  url          = {https://doi.org/10.1109/TVT.2015.2499791},
  doi          = {10.1109/TVT.2015.2499791},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvt/ZhuLHCL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/LaiLLZS16,
  author       = {Chengzhe Lai and
                  Rongxing Lu and
                  Hui Li and
                  Dong Zheng and
                  Xuemin (Sherman) Shen},
  title        = {Secure machine-type communications in {LTE} networks},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {16},
  number       = {12},
  pages        = {1495--1509},
  year         = {2016},
  url          = {https://doi.org/10.1002/wcm.2612},
  doi          = {10.1002/WCM.2612},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wicomm/LaiLLZS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangLZ0016,
  author       = {Yinghui Zhang and
                  Jin Li and
                  Dong Zheng and
                  Xiaofeng Chen and
                  Hui Li},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Accountable Large-Universe Attribute-Based Encryption Supporting Any
                  Monotone Access Structures},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  pages        = {509--524},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6\_31},
  doi          = {10.1007/978-3-319-40253-6\_31},
  timestamp    = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangLZ0016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/FanWWLY16,
  author       = {Kai Fan and
                  Wei Wang and
                  Yue Wang and
                  Hui Li and
                  Yintang Yang},
  title        = {Cloud-Based Lightweight {RFID} Healthcare Privacy Protection Protocol},
  booktitle    = {2016 {IEEE} Global Communications Conference, {GLOBECOM} 2016, Washington,
                  DC, USA, December 4-8, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/GLOCOM.2016.7841663},
  doi          = {10.1109/GLOCOM.2016.7841663},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/FanWWLY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccchina/FanTHWLY16,
  author       = {Kai Fan and
                  Qiong Tian and
                  Nana Huang and
                  Yue Wang and
                  Hui Li and
                  Yintang Yang},
  title        = {Privacy protection based access control scheme in cloud-based services},
  booktitle    = {2016 {IEEE/CIC} International Conference on Communications in China,
                  {ICCC} 2016, Chengdu, China, July 27-29, 2016},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICCChina.2016.7636861},
  doi          = {10.1109/ICCCHINA.2016.7636861},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccchina/FanTHWLY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccnc/LiHNLW16,
  author       = {Fenghua Li and
                  Yuanyuan He and
                  Ben Niu and
                  Hui Li and
                  Hanyi Wang},
  title        = {Match-MORE: An efficient private matching scheme using friends-of-friends'
                  recommendation},
  booktitle    = {2016 International Conference on Computing, Networking and Communications,
                  {ICNC} 2016, Kauai, HI, USA, February 15-18, 2016},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICCNC.2016.7440630},
  doi          = {10.1109/ICCNC.2016.7440630},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccnc/LiHNLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccnc/NiuGLLL16,
  author       = {Ben Niu and
                  Sheng Gao and
                  Fenghua Li and
                  Hui Li and
                  Zongqing Lu},
  title        = {Protection of location privacy in continuous LBSs against adversaries
                  with background information},
  booktitle    = {2016 International Conference on Computing, Networking and Communications,
                  {ICNC} 2016, Kauai, HI, USA, February 15-18, 2016},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICCNC.2016.7440649},
  doi          = {10.1109/ICCNC.2016.7440649},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccnc/NiuGLLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wasa/FanSDZ0YLY16,
  author       = {Kai Fan and
                  Panfei Song and
                  Zhao Du and
                  Haojin Zhu and
                  Hui Li and
                  Yintang Yang and
                  Xinghua Li and
                  Chao Yang},
  editor       = {Qing Yang and
                  Wei Yu and
                  Yacine Challal},
  title        = {{NFC} Secure Payment and Verification Scheme for Mobile Payment},
  booktitle    = {Wireless Algorithms, Systems, and Applications - 11th International
                  Conference, {WASA} 2016, Bozeman, MT, USA, August 8-10, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9798},
  pages        = {116--125},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-42836-9\_11},
  doi          = {10.1007/978-3-319-42836-9\_11},
  timestamp    = {Mon, 30 Jan 2023 09:32:36 +0100},
  biburl       = {https://dblp.org/rec/conf/wasa/FanSDZ0YLY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/LiWNHHL16,
  author       = {Fenghua Li and
                  Hanyi Wang and
                  Ben Niu and
                  Yuanyuan He and
                  Jiafeng Hua and
                  Hui Li},
  title        = {A practical group matching scheme for privacy-aware users in mobile
                  social networks},
  booktitle    = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2016,
                  Doha, Qatar, April 3-6, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WCNC.2016.7564968},
  doi          = {10.1109/WCNC.2016.7564968},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcnc/LiWNHHL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/LiWNLH16a,
  author       = {Fenghua Li and
                  Sheng Wan and
                  Ben Niu and
                  Hui Li and
                  Yuanyuan He},
  title        = {Time obfuscation-based privacy-preserving scheme for location-based
                  services},
  booktitle    = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2016,
                  Doha, Qatar, April 3-6, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WCNC.2016.7564715},
  doi          = {10.1109/WCNC.2016.7564715},
  timestamp    = {Wed, 29 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcnc/LiWNLH16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/LiWNLH16,
  author       = {Fenghua Li and
                  Sheng Wan and
                  Ben Niu and
                  Hui Li and
                  Yuanyuan He},
  title        = {Time obfuscation-based privacy-preserving scheme for Location-Based
                  Services},
  booktitle    = {{IEEE} Wireless Communications and Networking Conference Workshops,
                  {WCNC} Workshops 2016, Doha, Qatar, April 3-6, 2016},
  pages        = {465--470},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WCNCW.2016.7552744},
  doi          = {10.1109/WCNCW.2016.7552744},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcnc/LiWNLH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ZhuHL15,
  author       = {Hui Zhu and
                  Cheng Huang and
                  Hui Li},
  title        = {Information Diffusion Model Based on Privacy Setting in Online Social
                  Networking Services},
  journal      = {Comput. J.},
  volume       = {58},
  number       = {4},
  pages        = {536--548},
  year         = {2015},
  url          = {https://doi.org/10.1093/comjnl/bxu062},
  doi          = {10.1093/COMJNL/BXU062},
  timestamp    = {Thu, 21 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/ZhuHL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/LaiLZ0S15,
  author       = {Chengzhe Lai and
                  Rongxing Lu and
                  Dong Zheng and
                  Hui Li and
                  Xuemin (Sherman) Shen},
  title        = {Toward secure large-scale machine-to-machine comm unications in 3GPP
                  networks: chall enges and solutions},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {53},
  number       = {12},
  pages        = {12--19},
  year         = {2015},
  url          = {https://doi.org/10.1109/MCOM.2015.7355579},
  doi          = {10.1109/MCOM.2015.7355579},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cm/LaiLZ0S15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/LaiLLC15,
  author       = {Chengzhe Lai and
                  Hui Li and
                  Xiaoqing Li and
                  Jin Cao},
  title        = {A novel group access authentication and key agreement protocol for
                  machine-type communication},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {26},
  number       = {3},
  pages        = {414--431},
  year         = {2015},
  url          = {https://doi.org/10.1002/ett.2635},
  doi          = {10.1002/ETT.2635},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ett/LaiLLC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/NiuZLC015,
  author       = {Ben Niu and
                  Xiaoyan Zhu and
                  Qinghua Li and
                  Jie Chen and
                  Hui Li},
  title        = {A novel attack to spatial cloaking schemes in location-based services},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {49},
  pages        = {125--132},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.future.2014.10.026},
  doi          = {10.1016/J.FUTURE.2014.10.026},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/NiuZLC015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcm/LvM015,
  author       = {Xixiang Lv and
                  Yi Mu and
                  Hui Li},
  title        = {Key management for Smart Grid based on asymmetric key-wrapping},
  journal      = {Int. J. Comput. Math.},
  volume       = {92},
  number       = {3},
  pages        = {498--512},
  year         = {2015},
  url          = {https://doi.org/10.1080/00207160.2014.917178},
  doi          = {10.1080/00207160.2014.917178},
  timestamp    = {Mon, 24 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcm/LvM015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/FanW0Y15,
  author       = {Kai Fan and
                  Wei Wang and
                  Hui Li and
                  Yintang Yang},
  title        = {Adaptive Sensing Private Property Protection Protocol Based on Cloud},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {11},
  pages        = {743580:1--743580:9},
  year         = {2015},
  url          = {https://doi.org/10.1155/2015/743580},
  doi          = {10.1155/2015/743580},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/FanW0Y15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/ZhuLRL15,
  author       = {Hui Zhu and
                  Fen Liu and
                  Yan Rong and
                  Hui Li},
  title        = {{PAS:} An Efficient Privacy-Preserving Multidimensional Aggregation
                  Scheme for Smart Grid},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {11},
  pages        = {915795:1--915795:12},
  year         = {2015},
  url          = {https://doi.org/10.1155/2015/915795},
  doi          = {10.1155/2015/915795},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdsn/ZhuLRL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijguc/LiLLL15,
  author       = {Xiaoqing Li and
                  Jicheng Liu and
                  Xuejun Li and
                  Hui Li},
  title        = {A reputation-based secure scheme in vehicular ad hoc networks},
  journal      = {Int. J. Grid Util. Comput.},
  volume       = {6},
  number       = {2},
  pages        = {83--90},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJGUC.2015.068823},
  doi          = {10.1504/IJGUC.2015.068823},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijguc/LiLLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/WangWTL15,
  author       = {Yong Wang and
                  Hao Wu and
                  Liyang Tang and
                  Hui Li},
  title        = {The Solution for Cooperative Beamforming Design in {MIMO} Multi-way
                  Relay Networks},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {9},
  number       = {3},
  pages        = {956--970},
  year         = {2015},
  url          = {https://doi.org/10.3837/tiis.2015.03.007},
  doi          = {10.3837/TIIS.2015.03.007},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/WangWTL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mis/ZhuX0LL15,
  author       = {Hui Zhu and
                  Yingfang Xue and
                  Xiaofeng Chen and
                  Qiang Li and
                  Hui Li},
  title        = {{V-MGSM:} {A} Multilevel and Grouping Security Virtualization Model
                  for Mobile Internet Service},
  journal      = {Mob. Inf. Syst.},
  volume       = {2015},
  pages        = {841292:1--841292:9},
  year         = {2015},
  url          = {https://doi.org/10.1155/2015/841292},
  doi          = {10.1155/2015/841292},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mis/ZhuX0LL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/0019L0CC15,
  author       = {Chen Li and
                  Rongxing Lu and
                  Hui Li and
                  Le Chen and
                  Jie Chen},
  title        = {{PDA:} a privacy-preserving dual-functional aggregation scheme for
                  smart grid communications},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {15},
  pages        = {2494--2506},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1191},
  doi          = {10.1002/SEC.1191},
  timestamp    = {Mon, 18 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/0019L0CC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/CaoML15,
  author       = {Jin Cao and
                  Maode Ma and
                  Hui Li},
  title        = {{GBAAM:} group-based access authentication for {MTC} in {LTE} networks},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {17},
  pages        = {3282--3299},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1252},
  doi          = {10.1002/SEC.1252},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/CaoML15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/LiCLL15,
  author       = {Chen Li and
                  Le Chen and
                  Rongxing Lu and
                  Hui Li},
  title        = {Comment on "An Efficient Homomorphic {MAC} with Small Key Size
                  for Authentication in Network Coding"},
  journal      = {{IEEE} Trans. Computers},
  volume       = {64},
  number       = {3},
  pages        = {882--883},
  year         = {2015},
  url          = {https://doi.org/10.1109/TC.2015.2389800},
  doi          = {10.1109/TC.2015.2389800},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/LiCLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LvM015,
  author       = {Xixiang Lv and
                  Yi Mu and
                  Hui Li},
  title        = {Loss-Tolerant Bundle Fragment Authentication for Space-Based DTNs},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {12},
  number       = {6},
  pages        = {615--625},
  year         = {2015},
  url          = {https://doi.org/10.1109/TDSC.2014.2382601},
  doi          = {10.1109/TDSC.2014.2382601},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LvM015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/WangLL15,
  author       = {Boyang Wang and
                  Baochun Li and
                  Hui Li},
  title        = {Panda: Public Auditing for Shared Data with Efficient User Revocation
                  in the Cloud},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {8},
  number       = {1},
  pages        = {92--106},
  year         = {2015},
  url          = {https://doi.org/10.1109/TSC.2013.2295611},
  doi          = {10.1109/TSC.2013.2295611},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/WangLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/YuNAMWL15,
  author       = {Yong Yu and
                  Jianbing Ni and
                  Man Ho Au and
                  Yi Mu and
                  Boyang Wang and
                  Hui Li},
  title        = {Comments on a Public Auditing Mechanism for Shared Cloud Data Service},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {8},
  number       = {6},
  pages        = {998--999},
  year         = {2015},
  url          = {https://doi.org/10.1109/TSC.2014.2355201},
  doi          = {10.1109/TSC.2014.2355201},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsc/YuNAMWL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WangLWL15,
  author       = {Boyang Wang and
                  Ming Li and
                  Haitao Wang and
                  Hui Li},
  title        = {Circular range search on encrypted spatial data},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {182--190},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346827},
  doi          = {10.1109/CNS.2015.7346827},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/WangLWL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscloud/FanHWLY15,
  author       = {Kai Fan and
                  Nana Huang and
                  Yue Wang and
                  Hui Li and
                  Yintang Yang},
  title        = {Secure and Efficient Personal Health Record Scheme Using Attribute-Based
                  Encryption},
  booktitle    = {{IEEE} 2nd International Conference on Cyber Security and Cloud Computing,
                  CSCloud 2015, New York, NY, USA, November 3-5, 2015},
  pages        = {111--114},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CSCloud.2015.40},
  doi          = {10.1109/CSCLOUD.2015.40},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cscloud/FanHWLY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/FanDWLY15,
  author       = {Kai Fan and
                  Hai Deng and
                  Lang Wang and
                  Hui Li and
                  Yintang Yang},
  title        = {Ciphertext Retrieval in Super-Peer {P2P} Network},
  booktitle    = {2015 {IEEE} Global Communications Conference, {GLOBECOM} 2015, San
                  Diego, CA, USA, December 6-10, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/GLOCOM.2014.7417717},
  doi          = {10.1109/GLOCOM.2014.7417717},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/FanDWLY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/LiuGWL15,
  author       = {Qiao Liu and
                  Guang Gong and
                  Yong Wang and
                  Hui Li},
  title        = {A Novel Physical Layer Security Scheme for {MIMO} Two-Way Relay Channels},
  booktitle    = {2015 {IEEE} Globecom Workshops, San Diego, CA, USA, December 6-10,
                  2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/GLOCOMW.2015.7414118},
  doi          = {10.1109/GLOCOMW.2015.7414118},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/LiuGWL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/CaoLM15,
  author       = {Jin Cao and
                  Hui Li and
                  Maode Ma},
  title        = {{GAHAP:} {A} group-based anonymity handover authentication protocol
                  for {MTC} in {LTE-A} networks},
  booktitle    = {2015 {IEEE} International Conference on Communications, {ICC} 2015,
                  London, United Kingdom, June 8-12, 2015},
  pages        = {3020--3025},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICC.2015.7248787},
  doi          = {10.1109/ICC.2015.7248787},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/CaoLM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/CaoLML15,
  author       = {Jin Cao and
                  Hui Li and
                  Maode Ma and
                  Fenghua Li},
  title        = {{UGHA:} Uniform group-based handover authentication for {MTC} within
                  {E-UTRAN} in {LTE-A} networks},
  booktitle    = {2015 {IEEE} International Conference on Communications, {ICC} 2015,
                  London, United Kingdom, June 8-12, 2015},
  pages        = {7246--7251},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICC.2015.7249483},
  doi          = {10.1109/ICC.2015.7249483},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/CaoLML15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/JiangZHCLW15,
  author       = {Shunrong Jiang and
                  Xiaoyan Zhu and
                  Ripei Hao and
                  Haotian Chi and
                  Hui Li and
                  Liangmin Wang},
  title        = {Lightweight and privacy-preserving agent data transmission for mobile
                  Healthcare},
  booktitle    = {2015 {IEEE} International Conference on Communications, {ICC} 2015,
                  London, United Kingdom, June 8-12, 2015},
  pages        = {7322--7327},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICC.2015.7249496},
  doi          = {10.1109/ICC.2015.7249496},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/JiangZHCLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/LiNLL15,
  author       = {Weihao Li and
                  Ben Niu and
                  Hui Li and
                  Fenghua Li},
  title        = {Privacy-preserving strategies in service quality aware Location-Based
                  Services},
  booktitle    = {2015 {IEEE} International Conference on Communications, {ICC} 2015,
                  London, United Kingdom, June 8-12, 2015},
  pages        = {7328--7334},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICC.2015.7249497},
  doi          = {10.1109/ICC.2015.7249497},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/LiNLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccnc/NiuZLLWL15,
  author       = {Ben Niu and
                  Xiaoyan Zhu and
                  Weihao Li and
                  Hui Li and
                  Yingjuan Wang and
                  Zongqing Lu},
  title        = {A personalized two-tier cloaking scheme for privacy-aware location-based
                  services},
  booktitle    = {International Conference on Computing, Networking and Communications,
                  {ICNC} 2015, Garden Grove, CA, USA, February 16-19, 2015},
  pages        = {94--98},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICCNC.2015.7069322},
  doi          = {10.1109/ICCNC.2015.7069322},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccnc/NiuZLLWL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/WangLWL15,
  author       = {Boyang Wang and
                  Ming Li and
                  Haitao Wang and
                  Hui Li},
  title        = {Circular Range Search on Encrypted Spatial Data},
  booktitle    = {35th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2015, Columbus, OH, USA, June 29 - July 2, 2015},
  pages        = {794--795},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICDCS.2015.113},
  doi          = {10.1109/ICDCS.2015.113},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/WangLWL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/LiYL15,
  author       = {Xiuguang Li and
                  Kai Yang and
                  Hui Li},
  editor       = {Fatos Xhafa and
                  Leonard Barolli},
  title        = {Fine-Grained Privacy-Preserving Spatiotemporal Matching in Mobile
                  Social Networks},
  booktitle    = {2015 International Conference on Intelligent Networking and Collaborative
                  Systems, INCoS 2015, Taipei, Taiwan, September 2-4, 2015},
  pages        = {374--378},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/INCoS.2015.73},
  doi          = {10.1109/INCOS.2015.73},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/incos/LiYL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/NiuLZC015,
  author       = {Ben Niu and
                  Qinghua Li and
                  Xiaoyan Zhu and
                  Guohong Cao and
                  Hui Li},
  title        = {Enhancing privacy through caching in location-based services},
  booktitle    = {2015 {IEEE} Conference on Computer Communications, {INFOCOM} 2015,
                  Kowloon, Hong Kong, April 26 - May 1, 2015},
  pages        = {1017--1025},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/INFOCOM.2015.7218474},
  doi          = {10.1109/INFOCOM.2015.7218474},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/NiuLZC015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/SunLLH015,
  author       = {Wenhai Sun and
                  Xuefeng Liu and
                  Wenjing Lou and
                  Y. Thomas Hou and
                  Hui Li},
  title        = {Catch you if you lie to me: Efficient verifiable conjunctive keyword
                  search over large dynamic encrypted cloud data},
  booktitle    = {2015 {IEEE} Conference on Computer Communications, {INFOCOM} 2015,
                  Kowloon, Hong Kong, April 26 - May 1, 2015},
  pages        = {2110--2118},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/INFOCOM.2015.7218596},
  doi          = {10.1109/INFOCOM.2015.7218596},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/SunLLH015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/NiuHLL15,
  author       = {Ben Niu and
                  Yuanyuan He and
                  Fenghua Li and
                  Hui Li},
  editor       = {Qinqing Zhang and
                  Jerry Brand and
                  Thomas G. MacDonald and
                  Bharat T. Doshi and
                  Bonnie L. Gorsic},
  title        = {Achieving secure friend discovery in social strength-aware PMSNs},
  booktitle    = {34th {IEEE} Military Communications Conference, {MILCOM} 2015, Tampa,
                  FL, USA, October 26-28, 2015},
  pages        = {947--953},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/MILCOM.2015.7357567},
  doi          = {10.1109/MILCOM.2015.7357567},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/milcom/NiuHLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FanGDLY15,
  author       = {Kai Fan and
                  Yuanyuan Gong and
                  Zhao Du and
                  Hui Li and
                  Yintang Yang},
  title        = {{RFID} Secure Application Revocation for IoT in 5G},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {175--181},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.372},
  doi          = {10.1109/TRUSTCOM.2015.372},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FanGDLY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wasa/FanGGLSY15,
  author       = {Kai Fan and
                  Nan Ge and
                  Yuanyuan Gong and
                  Hui Li and
                  Ruidan Su and
                  Yintang Yang},
  editor       = {Kuai Xu and
                  Haojin Zhu},
  title        = {{ULRAS:} Ultra-Lightweight {RFID} Authentication Scheme for Mobile
                  Device},
  booktitle    = {Wireless Algorithms, Systems, and Applications - 10th International
                  Conference, {WASA} 2015, Qufu, China, August 10-12, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9204},
  pages        = {114--122},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-21837-3\_12},
  doi          = {10.1007/978-3-319-21837-3\_12},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wasa/FanGGLSY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/Zhang0LL14,
  author       = {Yinghui Zhang and
                  Xiaofeng Chen and
                  Jin Li and
                  Hui Li},
  title        = {Generic construction for secure and efficient handoff authentication
                  schemes in EAP-based wireless networks},
  journal      = {Comput. Networks},
  volume       = {75},
  pages        = {192--211},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.comnet.2014.10.009},
  doi          = {10.1016/J.COMNET.2014.10.009},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/Zhang0LL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/CaoMLZL14,
  author       = {Jin Cao and
                  Maode Ma and
                  Hui Li and
                  Yueyu Zhang and
                  Zhenxing Luo},
  title        = {A Survey on Security Aspects for {LTE} and {LTE-A} Networks},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {16},
  number       = {1},
  pages        = {283--302},
  year         = {2014},
  url          = {https://doi.org/10.1109/SURV.2013.041513.00174},
  doi          = {10.1109/SURV.2013.041513.00174},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/CaoMLZL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/FanLLLSY14,
  author       = {Kai Fan and
                  Jie Li and
                  Hui Li and
                  Xiaohui Liang and
                  Xuemin (Sherman) Shen and
                  Yintang Yang},
  title        = {{RSEL:} revocable secure efficient lightweight {RFID} authentication
                  scheme},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {26},
  number       = {5},
  pages        = {1084--1096},
  year         = {2014},
  url          = {https://doi.org/10.1002/cpe.3065},
  doi          = {10.1002/CPE.3065},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/FanLLLSY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/HanZ0LQ14,
  author       = {Qi Han and
                  Yinghui Zhang and
                  Xiaofeng Chen and
                  Hui Li and
                  Jiaxiang Quan},
  title        = {Efficient and robust identity-based handoff authentication for EAP-based
                  wireless networks},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {26},
  number       = {8},
  pages        = {1561--1573},
  year         = {2014},
  url          = {https://doi.org/10.1002/cpe.3024},
  doi          = {10.1002/CPE.3024},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/HanZ0LQ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/Lv014,
  author       = {Xixiang Lv and
                  Hui Li},
  title        = {Error- and loss-tolerant bundle fragment authentication for space
                  DTNs},
  journal      = {Frontiers Comput. Sci.},
  volume       = {8},
  number       = {6},
  pages        = {1012--1023},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11704-014-3365-6},
  doi          = {10.1007/S11704-014-3365-6},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/Lv014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/LiLLCL14,
  author       = {Chen Li and
                  Rongxing Lu and
                  Hui Li and
                  Le Chen and
                  Xiaoqing Li},
  title        = {Comment on "A Novel Homomorphic {MAC} Scheme for Authentication
                  in Network Coding"},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {18},
  number       = {12},
  pages        = {2129--2132},
  year         = {2014},
  url          = {https://doi.org/10.1109/LCOMM.2014.2361805},
  doi          = {10.1109/LCOMM.2014.2361805},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/LiLLCL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-com/WangL14,
  author       = {Yong Wang and
                  Hui Li},
  title        = {Complex signal transmission for multi-user multiple-input multiple-output
                  relay},
  journal      = {{IET} Commun.},
  volume       = {8},
  number       = {14},
  pages        = {2584--2589},
  year         = {2014},
  url          = {https://doi.org/10.1049/iet-com.2014.0058},
  doi          = {10.1049/IET-COM.2014.0058},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-com/WangL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcm/LvLW14,
  author       = {Xixiang Lv and
                  Hui Li and
                  Baocang Wang},
  title        = {Authenticated asymmetric group key agreement based on certificateless
                  cryptosystem},
  journal      = {Int. J. Comput. Math.},
  volume       = {91},
  number       = {3},
  pages        = {447--460},
  year         = {2014},
  url          = {https://doi.org/10.1080/00207160.2013.806653},
  doi          = {10.1080/00207160.2013.806653},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcm/LvLW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijguc/ChenCL14,
  author       = {Yuan Chen and
                  Xiaofeng Chen and
                  Hui Li},
  title        = {More DCCA-secure public-key encryptions from {KEM} + {DEM} style hybrid
                  paradigms and some observations on the 'inner-outer' structure},
  journal      = {Int. J. Grid Util. Comput.},
  volume       = {5},
  number       = {1},
  pages        = {60--70},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJGUC.2014.058246},
  doi          = {10.1504/IJGUC.2014.058246},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijguc/ChenCL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijguc/ZhangCLCL14,
  author       = {Yueyu Zhang and
                  Jie Chen and
                  Hui Li and
                  Jin Cao and
                  Chengzhe Lai},
  title        = {Group-based authentication and key agreement for machine-type communication},
  journal      = {Int. J. Grid Util. Comput.},
  volume       = {5},
  number       = {2},
  pages        = {87--95},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJGUC.2014.060189},
  doi          = {10.1504/IJGUC.2014.060189},
  timestamp    = {Wed, 09 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijguc/ZhangCLCL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijguc/WangGHLL14,
  author       = {Yong Wang and
                  Aixiang Guo and
                  Hong He and
                  Hui Li and
                  Fengrong Li},
  title        = {Signalling scheme for achieving dynamic degrees of freedom in {MIMO}
                  {Y} channel},
  journal      = {Int. J. Grid Util. Comput.},
  volume       = {5},
  number       = {3},
  pages        = {149--155},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJGUC.2014.062904},
  doi          = {10.1504/IJGUC.2014.062904},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijguc/WangGHLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/Lai0LLZS14,
  author       = {Chengzhe Lai and
                  Hui Li and
                  Xiaohui Liang and
                  Rongxing Lu and
                  Kuan Zhang and
                  Xuemin Shen},
  title        = {{CPAL:} {A} Conditional Privacy-Preserving Authentication With Access
                  Linkability for Roaming Service},
  journal      = {{IEEE} Internet Things J.},
  volume       = {1},
  number       = {1},
  pages        = {46--57},
  year         = {2014},
  url          = {https://doi.org/10.1109/JIOT.2014.2306673},
  doi          = {10.1109/JIOT.2014.2306673},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/Lai0LLZS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/Zhang000L14,
  author       = {Yinghui Zhang and
                  Xiaofeng Chen and
                  Jin Li and
                  Hui Li and
                  Fenghua Li},
  title        = {Attribute-Based Data Sharing with Flexible and Direct Revocation in
                  Cloud Computing},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {8},
  number       = {11},
  pages        = {4028--4049},
  year         = {2014},
  url          = {https://doi.org/10.3837/tiis.2014.11.021},
  doi          = {10.3837/TIIS.2014.11.021},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/Zhang000L14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcn/WangLLLL14,
  author       = {Boyang Wang and
                  Hui Li and
                  Xuefeng Liu and
                  Fenghua Li and
                  Xiaoqing Li},
  title        = {Efficient public verification on the integrity of multi-owner data
                  in the cloud},
  journal      = {J. Commun. Networks},
  volume       = {16},
  number       = {6},
  pages        = {592--599},
  year         = {2014},
  url          = {https://doi.org/10.1109/JCN.2014.000105},
  doi          = {10.1109/JCN.2014.000105},
  timestamp    = {Fri, 28 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcn/WangLLLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LvM014,
  author       = {Xixiang Lv and
                  Yi Mu and
                  Hui Li},
  title        = {Loss-tolerant authentication with digital signatures},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {11},
  pages        = {2054--2062},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.917},
  doi          = {10.1002/SEC.917},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LvM014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangLLLL14,
  author       = {Boyang Wang and
                  Hui Li and
                  Xuefeng Liu and
                  Xiaoqing Li and
                  Fenghua Li},
  title        = {Preserving identity privacy on multi-owner cloud data during public
                  verification},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {11},
  pages        = {2104--2113},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.922},
  doi          = {10.1002/SEC.922},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangLLLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Zhao014,
  author       = {Xingwen Zhao and
                  Hui Li},
  title        = {Achieving dynamic privileges in secure data sharing on cloud storage},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {11},
  pages        = {2211--2224},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.739},
  doi          = {10.1002/SEC.739},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Zhao014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/smartcr/CaoM014,
  author       = {Jin Cao and
                  Maode Ma and
                  Hui Li},
  title        = {Access Authentication of Mass Device Connections for {MTC} in {LTE}
                  Networks},
  journal      = {Smart Comput. Rev.},
  volume       = {4},
  number       = {4},
  pages        = {262--277},
  year         = {2014},
  url          = {https://doi.org/10.6029/smartcr.2014.04.003},
  doi          = {10.6029/SMARTCR.2014.04.003},
  timestamp    = {Fri, 23 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/smartcr/CaoM014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/WangLL14,
  author       = {Boyang Wang and
                  Baochun Li and
                  Hui Li},
  title        = {Oruta: Privacy-Preserving Public Auditingfor Shared Data in the Cloud},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {2},
  number       = {1},
  pages        = {43--56},
  year         = {2014},
  url          = {https://doi.org/10.1109/TCC.2014.2299807},
  doi          = {10.1109/TCC.2014.2299807},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/WangLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LvML14,
  author       = {Xixiang Lv and
                  Yi Mu and
                  Hui Li},
  title        = {Non-Interactive Key Establishment for Bundle Security Protocol of
                  Space DTNs},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {9},
  number       = {1},
  pages        = {5--13},
  year         = {2014},
  url          = {https://doi.org/10.1109/TIFS.2013.2289993},
  doi          = {10.1109/TIFS.2013.2289993},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LvML14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/SunWCLLHL14,
  author       = {Wenhai Sun and
                  Bing Wang and
                  Ning Cao and
                  Ming Li and
                  Wenjing Lou and
                  Y. Thomas Hou and
                  Hui Li},
  title        = {Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud
                  Supporting Similarity-Based Ranking},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {25},
  number       = {11},
  pages        = {3025--3035},
  year         = {2014},
  url          = {https://doi.org/10.1109/TPDS.2013.282},
  doi          = {10.1109/TPDS.2013.282},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/SunWCLLHL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/ZhuJWL14,
  author       = {Xiaoyan Zhu and
                  Shunrong Jiang and
                  Liangmin Wang and
                  Hui Li},
  title        = {Efficient Privacy-Preserving Authentication for Vehicular Ad Hoc Networks},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {63},
  number       = {2},
  pages        = {907--919},
  year         = {2014},
  url          = {https://doi.org/10.1109/TVT.2013.2294032},
  doi          = {10.1109/TVT.2013.2294032},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvt/ZhuJWL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/NiuZCL14,
  author       = {Ben Niu and
                  Xiaoyan Zhu and
                  Haotian Chi and
                  Hui Li},
  title        = {Privacy and Authentication Protocol for Mobile {RFID} Systems},
  journal      = {Wirel. Pers. Commun.},
  volume       = {77},
  number       = {3},
  pages        = {1713--1731},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11277-014-1605-6},
  doi          = {10.1007/S11277-014-1605-6},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wpc/NiuZCL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/FanLLY14,
  author       = {Kai Fan and
                  Chen Liang and
                  Hui Li and
                  Yintang Yang},
  title        = {{LRMAPC:} {A} Lightweight {RFID} Mutual Authentication Protocol with
                  Cache in the Reader for IoT},
  booktitle    = {14th {IEEE} International Conference on Computer and Information Technology,
                  {CIT} 2014, Xi'an, China, September 11-13, 2014},
  pages        = {276--280},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIT.2014.80},
  doi          = {10.1109/CIT.2014.80},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/FanLLY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apscc/LiZCLZ14,
  author       = {Jieying Li and
                  Yueyu Zhang and
                  Jie Chen and
                  Hui Li and
                  Wujun Zhang},
  title        = {Group Key Agreement in Multimedia Service for Machine Type Communication},
  booktitle    = {2014 Asia-Pacific Services Computing Conference, {APSCC} 2014, Fuzhou,
                  Fu Jian, China, December 4-6, 2014},
  pages        = {141--146},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/APSCC.2014.31},
  doi          = {10.1109/APSCC.2014.31},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/apscc/LiZCLZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangHLWL14,
  author       = {Boyang Wang and
                  Yantian Hou and
                  Ming Li and
                  Haitao Wang and
                  Hui Li},
  editor       = {Shiho Moriai and
                  Trent Jaeger and
                  Kouichi Sakurai},
  title        = {Maple: scalable multi-dimensional range search over encrypted cloud
                  data with tree-based index},
  booktitle    = {9th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014},
  pages        = {111--122},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2590296.2590305},
  doi          = {10.1145/2590296.2590305},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WangHLWL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WangLC014,
  author       = {Boyang Wang and
                  Ming Li and
                  Sherman S. M. Chow and
                  Hui Li},
  title        = {A tale of two clouds: Computing on data encrypted under multiple keys},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {337--345},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997502},
  doi          = {10.1109/CNS.2014.6997502},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/WangLC014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ZhuHL14,
  author       = {Hui Zhu and
                  Cheng Huang and
                  Hui Li},
  title        = {{MPPM:} Malware propagation and prevention model in online {SNS}},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2014, Sydney,
                  Australia, June 10-14, 2014, Workshops Proceedings},
  pages        = {682--687},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICCW.2014.6881278},
  doi          = {10.1109/ICCW.2014.6881278},
  timestamp    = {Thu, 21 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/ZhuHL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ZhuHLL14,
  author       = {Hui Zhu and
                  Rong Huang and
                  Ximeng Liu and
                  Hui Li},
  title        = {{SPEMR:} {A} new secure personal electronic medical record scheme
                  with privilege separation},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2014, Sydney,
                  Australia, June 10-14, 2014, Workshops Proceedings},
  pages        = {700--705},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICCW.2014.6881281},
  doi          = {10.1109/ICCW.2014.6881281},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/ZhuHLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/NiuZLL14,
  author       = {Ben Niu and
                  Zhengyan Zhang and
                  Xiaoqing Li and
                  Hui Li},
  title        = {Privacy-area aware dummy generation algorithms for Location-Based
                  Services},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2014, Sydney,
                  Australia, June 10-14, 2014},
  pages        = {957--962},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICC.2014.6883443},
  doi          = {10.1109/ICC.2014.6883443},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/NiuZLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/LaiLLJS14,
  author       = {Chengzhe Lai and
                  Hui Li and
                  Rongxing Lu and
                  Rong Jiang and
                  Xuemin Shen},
  title        = {{SEGR:} {A} secure and efficient group roaming scheme for machine
                  to machine communications between 3GPP and WiMAX networks},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2014, Sydney,
                  Australia, June 10-14, 2014},
  pages        = {1011--1016},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICC.2014.6883452},
  doi          = {10.1109/ICC.2014.6883452},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/LaiLLJS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ZhuCJLL14,
  author       = {Xiaoyan Zhu and
                  Haotian Chi and
                  Shunrong Jiang and
                  Xiaosan Lei and
                  Hui Li},
  title        = {Using dynamic pseudo-IDs to protect privacy in location-based services},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2014, Sydney,
                  Australia, June 10-14, 2014},
  pages        = {2307--2312},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICC.2014.6883667},
  doi          = {10.1109/ICC.2014.6883667},
  timestamp    = {Tue, 03 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/ZhuCJLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ZhuLJCL14,
  author       = {Xiaoyan Zhu and
                  Jie Liu and
                  Shunrong Jiang and
                  Zengbao Chen and
                  Hui Li},
  title        = {Efficient Weight-based Private Matching for proximity-based mobile
                  social networks},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2014, Sydney,
                  Australia, June 10-14, 2014},
  pages        = {4114--4119},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICC.2014.6883965},
  doi          = {10.1109/ICC.2014.6883965},
  timestamp    = {Mon, 21 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/ZhuLJCL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/NiuLZL14,
  author       = {Ben Niu and
                  Qinghua Li and
                  Xiaoyan Zhu and
                  Hui Li},
  title        = {A fine-grained spatial cloaking scheme for privacy-aware users in
                  Location-Based Services},
  booktitle    = {23rd International Conference on Computer Communication and Networks,
                  {ICCCN} 2014, Shanghai, China, August 4-7, 2014},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICCCN.2014.6911813},
  doi          = {10.1109/ICCCN.2014.6911813},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccn/NiuLZL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/SunYLHL14,
  author       = {Wenhai Sun and
                  Shucheng Yu and
                  Wenjing Lou and
                  Y. Thomas Hou and
                  Hui Li},
  title        = {Protecting your right: Attribute-based keyword search with fine-grained
                  owner-enforced search authorization in the cloud},
  booktitle    = {2014 {IEEE} Conference on Computer Communications, {INFOCOM} 2014,
                  Toronto, Canada, April 27 - May 2, 2014},
  pages        = {226--234},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/INFOCOM.2014.6847943},
  doi          = {10.1109/INFOCOM.2014.6847943},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/SunYLHL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/NiuLZCL14,
  author       = {Ben Niu and
                  Qinghua Li and
                  Xiaoyan Zhu and
                  Guohong Cao and
                  Hui Li},
  title        = {Achieving k-anonymity in privacy-aware location-based services},
  booktitle    = {2014 {IEEE} Conference on Computer Communications, {INFOCOM} 2014,
                  Toronto, Canada, April 27 - May 2, 2014},
  pages        = {754--762},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/INFOCOM.2014.6848002},
  doi          = {10.1109/INFOCOM.2014.6848002},
  timestamp    = {Mon, 21 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/NiuLZCL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/NiuZLL14,
  author       = {Ben Niu and
                  Xiaoyan Zhu and
                  Weihao Li and
                  Hui Li},
  title        = {EPcloak: An Efficient and Privacy-Preserving Spatial Cloaking Scheme
                  for LBSs},
  booktitle    = {11th {IEEE} International Conference on Mobile Ad Hoc and Sensor Systems,
                  {MASS} 2014, Philadelphia, PA, USA, October 28-30, 2014},
  pages        = {398--406},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/MASS.2014.53},
  doi          = {10.1109/MASS.2014.53},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mass/NiuZLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/ZhangZCLL14,
  author       = {Yinghui Zhang and
                  Dong Zheng and
                  Xiaofeng Chen and
                  Jin Li and
                  Hui Li},
  editor       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Computationally Efficient Ciphertext-Policy Attribute-Based Encryption
                  with Constant-Size Ciphertexts},
  booktitle    = {Provable Security - 8th International Conference, ProvSec 2014, Hong
                  Kong, China, October 9-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8782},
  pages        = {259--273},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12475-9\_18},
  doi          = {10.1007/978-3-319-12475-9\_18},
  timestamp    = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/ZhangZCLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/NiuLZLL14,
  author       = {Ben Niu and
                  Xiuguang Li and
                  Xiaoyan Zhu and
                  Xiaoqing Li and
                  Hui Li},
  editor       = {Jing Tian and
                  Jiwu Jing and
                  Mudhakar Srivatsa},
  title        = {Are You Really My Friend? Exactly Spatiotemporal Matching Scheme in
                  Privacy-Aware Mobile Social Networks},
  booktitle    = {International Conference on Security and Privacy in Communication
                  Networks - 10th International {ICST} Conference, SecureComm 2014,
                  Beijing, China, September 24-26, 2014, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {153},
  pages        = {33--40},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-23802-9\_5},
  doi          = {10.1007/978-3-319-23802-9\_5},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/NiuLZLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/WangHLWLL14,
  author       = {Boyang Wang and
                  Yantian Hou and
                  Ming Li and
                  Haitao Wang and
                  Hui Li and
                  Fenghua Li},
  editor       = {Jing Tian and
                  Jiwu Jing and
                  Mudhakar Srivatsa},
  title        = {Tree-Based Multi-dimensional Range Search on Encrypted Data with Enhanced
                  Privacy},
  booktitle    = {International Conference on Security and Privacy in Communication
                  Networks - 10th International {ICST} Conference, SecureComm 2014,
                  Beijing, China, September 24-26, 2014, Revised Selected Papers, Part
                  {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {152},
  pages        = {374--394},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-23829-6\_26},
  doi          = {10.1007/978-3-319-23829-6\_26},
  timestamp    = {Wed, 10 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/WangHLWLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/securecloud14/SunLHL14,
  author       = {Wenhai Sun and
                  Wenjing Lou and
                  Y. Thomas Hou and
                  Hui Li},
  editor       = {Sushil Jajodia and
                  Krishna Kant and
                  Pierangela Samarati and
                  Anoop Singhal and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Privacy-Preserving Keyword Search Over Encrypted Data in Cloud Computing},
  booktitle    = {Secure Cloud Computing},
  pages        = {189--212},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-1-4614-9278-8\_9},
  doi          = {10.1007/978-1-4614-9278-8\_9},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/securecloud14/SunLHL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/NiuZZLL14,
  author       = {Ben Niu and
                  Tanran Zhang and
                  Xiaoyan Zhu and
                  Hui Li and
                  Zongqing Lu},
  title        = {Priority-Aware Private Matching Schemes for Proximity-Based Mobile
                  Social Networks},
  journal      = {CoRR},
  volume       = {abs/1401.8064},
  year         = {2014},
  url          = {http://arxiv.org/abs/1401.8064},
  eprinttype    = {arXiv},
  eprint       = {1401.8064},
  timestamp    = {Mon, 21 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/NiuZZLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/SunWLY13,
  author       = {Yuhua Sun and
                  Zilong Wang and
                  Hui Li and
                  Tongjiang Yan},
  title        = {The cross-correlation distribution of a p-ary m-sequence of period
                  p\({}^{\mbox{2k}}\)-1 and its decimated sequence by {(} (p\({}^{\mbox{k}}\)+1)\({}^{\mbox{2}}\)
                  / 2(p\({}^{\mbox{e}}\)+1) {)}},
  journal      = {Adv. Math. Commun.},
  volume       = {7},
  number       = {4},
  pages        = {409--424},
  year         = {2013},
  url          = {https://doi.org/10.3934/amc.2013.7.409},
  doi          = {10.3934/AMC.2013.7.409},
  timestamp    = {Sat, 22 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amco/SunWLY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/Zhang0L13,
  author       = {Yinghui Zhang and
                  Xiaofeng Chen and
                  Hui Li},
  title        = {Key-Evolving Hierarchical ID-Based Signcryption},
  journal      = {Comput. J.},
  volume       = {56},
  number       = {10},
  pages        = {1228--1248},
  year         = {2013},
  url          = {https://doi.org/10.1093/comjnl/bxs154},
  doi          = {10.1093/COMJNL/BXS154},
  timestamp    = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/Zhang0L13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/ZhangZCLW13,
  author       = {Wujun Zhang and
                  Yueyu Zhang and
                  Jie Chen and
                  Hui Li and
                  Yumin Wang},
  title        = {End-to-end security scheme for Machine Type Communication based on
                  Generic Authentication Architecture},
  journal      = {Clust. Comput.},
  volume       = {16},
  number       = {4},
  pages        = {861--871},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10586-013-0259-6},
  doi          = {10.1007/S10586-013-0259-6},
  timestamp    = {Wed, 09 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/ZhangZCLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/ZhuLWL13,
  author       = {Hui Zhu and
                  Tingting Liu and
                  Guanghui Wei and
                  Hui Li},
  title        = {{PPAS:} privacy protection authentication scheme for {VANET}},
  journal      = {Clust. Comput.},
  volume       = {16},
  number       = {4},
  pages        = {873--886},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10586-013-0260-0},
  doi          = {10.1007/S10586-013-0260-0},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cluster/ZhuLWL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/LaiLLS13,
  author       = {Chengzhe Lai and
                  Hui Li and
                  Rongxing Lu and
                  Xuemin (Sherman) Shen},
  title        = {{SE-AKA:} {A} secure and efficient group authentication and key agreement
                  protocol for {LTE} networks},
  journal      = {Comput. Networks},
  volume       = {57},
  number       = {17},
  pages        = {3492--3510},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.comnet.2013.08.003},
  doi          = {10.1016/J.COMNET.2013.08.003},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/LaiLLS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SunYL13,
  author       = {Yuhua Sun and
                  Tongjiang Yan and
                  Hui Li},
  title        = {The Linear Complexity of a Class of Binary Sequences with Three-Level
                  Autocorrelation},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {96-A},
  number       = {7},
  pages        = {1586--1592},
  year         = {2013},
  url          = {https://doi.org/10.1587/transfun.E96.A.1586},
  doi          = {10.1587/TRANSFUN.E96.A.1586},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/SunYL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/LvL13,
  author       = {Xixiang Lv and
                  Hui Li},
  title        = {Secure group communication with both confidentiality and non-repudiation
                  for mobile ad-hoc networks},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {2},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2010.0314},
  doi          = {10.1049/IET-IFS.2010.0314},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/LvL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/WangYALZL13,
  author       = {Yong Wang and
                  Liu Yang and
                  Yun Ai and
                  Hui Li and
                  Yueyu Zhang and
                  Fengrong Li},
  title        = {Interference management strategy for multiuser two-way relay networks},
  journal      = {Int. J. Embed. Syst.},
  volume       = {5},
  number       = {3},
  pages        = {175--180},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJES.2013.057081},
  doi          = {10.1504/IJES.2013.057081},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/WangYALZL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijguc/ZhuLL13,
  author       = {Xudong Zhu and
                  Hui Li and
                  Fenghua Li},
  title        = {Privacy-preserving logistic regression outsourcing in cloud computing},
  journal      = {Int. J. Grid Util. Comput.},
  volume       = {4},
  number       = {2/3},
  pages        = {144--150},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJGUC.2013.056250},
  doi          = {10.1504/IJGUC.2013.056250},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijguc/ZhuLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijiids/ZhuL13,
  author       = {Xudong Zhu and
                  Hui Li},
  title        = {Activity clustering for anomaly detection},
  journal      = {Int. J. Intell. Inf. Database Syst.},
  volume       = {7},
  number       = {5},
  pages        = {441--453},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJIIDS.2013.056389},
  doi          = {10.1504/IJIIDS.2013.056389},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijiids/ZhuL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcn/LvML13,
  author       = {Xixiang Lv and
                  Yi Mu and
                  Hui Li},
  title        = {Key distribution for heterogeneous public-key cryptosystems},
  journal      = {J. Commun. Networks},
  volume       = {15},
  number       = {5},
  pages        = {464--468},
  year         = {2013},
  url          = {https://doi.org/10.1109/JCN.2013.000085},
  doi          = {10.1109/JCN.2013.000085},
  timestamp    = {Fri, 03 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcn/LvML13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LvMLMZ13,
  author       = {Chao Lv and
                  Maode Ma and
                  Hui Li and
                  Jianfeng Ma and
                  Yaoyu Zhang},
  title        = {An novel three-party authenticated key exchange protocol using one-time
                  key},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {498--503},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.04.006},
  doi          = {10.1016/J.JNCA.2012.04.006},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/LvMLMZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LvLW13,
  author       = {Xixiang Lv and
                  Hui Li and
                  Baocang Wang},
  title        = {Virtual private key generator based escrow-free certificateless public
                  key cryptosystem for mobile ad hoc networks},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {1},
  pages        = {49--57},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.529},
  doi          = {10.1002/SEC.529},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LvLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SunWCLLHL13,
  author       = {Wenhai Sun and
                  Bing Wang and
                  Ning Cao and
                  Ming Li and
                  Wenjing Lou and
                  Y. Thomas Hou and
                  Hui Li},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Ninghui Li and
                  Wen{-}Guey Tzeng},
  title        = {Privacy-preserving multi-keyword text search in the cloud supporting
                  similarity-based ranking},
  booktitle    = {8th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  pages        = {71--82},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484313.2484322},
  doi          = {10.1145/2484313.2484322},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/SunWCLLHL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangCLWL13,
  author       = {Yinghui Zhang and
                  Xiaofeng Chen and
                  Jin Li and
                  Duncan S. Wong and
                  Hui Li},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Ninghui Li and
                  Wen{-}Guey Tzeng},
  title        = {Anonymous attribute-based encryption supporting efficient decryption
                  test},
  booktitle    = {8th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  pages        = {511--516},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484313.2484381},
  doi          = {10.1145/2484313.2484381},
  timestamp    = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangCLWL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WangLLL13,
  author       = {Boyang Wang and
                  Baochun Li and
                  Hui Li and
                  Fenghua Li},
  title        = {Certificateless public auditing for data integrity in the cloud},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {136--144},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682701},
  doi          = {10.1109/CNS.2013.6682701},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/WangLLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WangLCL13,
  author       = {Boyang Wang and
                  Ming Li and
                  Sherman S. M. Chow and
                  Hui Li},
  title        = {Computing encrypted cloud data efficiently under multiple keys},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {504--513},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682768},
  doi          = {10.1109/CNS.2013.6682768},
  timestamp    = {Wed, 19 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/WangLCL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/ZhuCNZLL13,
  author       = {Xiaoyan Zhu and
                  Haotian Chi and
                  Ben Niu and
                  Weidong Zhang and
                  Zan Li and
                  Hui Li},
  title        = {MobiCache: When k-anonymity meets cache},
  booktitle    = {2013 {IEEE} Global Communications Conference, {GLOBECOM} 2013, Atlanta,
                  GA, USA, December 9-13, 2013},
  pages        = {820--825},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/GLOCOM.2013.6831174},
  doi          = {10.1109/GLOCOM.2013.6831174},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/ZhuCNZLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/LaiLLJS13,
  author       = {Chengzhe Lai and
                  Hui Li and
                  Rongxing Lu and
                  Rong Jiang and
                  Xuemin Shen},
  title        = {{LGTH:} {A} lightweight group authentication protocol for machine-type
                  communication in {LTE} networks},
  booktitle    = {2013 {IEEE} Global Communications Conference, {GLOBECOM} 2013, Atlanta,
                  GA, USA, December 9-13, 2013},
  pages        = {832--837},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/GLOCOM.2013.6831176},
  doi          = {10.1109/GLOCOM.2013.6831176},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/LaiLLJS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/NiuZLZL13,
  author       = {Ben Niu and
                  Xiaoyan Zhu and
                  Xiaosan Lei and
                  Weidong Zhang and
                  Hui Li},
  title        = {{EPS:} Encounter-Based Privacy-Preserving Scheme for Location-Based
                  Services},
  booktitle    = {2013 {IEEE} Global Communications Conference, {GLOBECOM} 2013, Atlanta,
                  GA, USA, December 9-13, 2013},
  pages        = {2139--2144},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/GLOCOM.2013.6831391},
  doi          = {10.1109/GLOCOM.2013.6831391},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/NiuZLZL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/NiuZLLL13,
  author       = {Ben Niu and
                  Xiaoyan Zhu and
                  Jie Liu and
                  Zan Li and
                  Hui Li},
  title        = {Weight-aware private matching scheme for Proximity-based Mobile Social
                  Networks},
  booktitle    = {2013 {IEEE} Global Communications Conference, {GLOBECOM} 2013, Atlanta,
                  GA, USA, December 9-13, 2013},
  pages        = {3170--3175},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/GLOCOM.2013.6831559},
  doi          = {10.1109/GLOCOM.2013.6831559},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/NiuZLLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/WangLL13,
  author       = {Boyang Wang and
                  Hui Li and
                  Ming Li},
  title        = {Privacy-preserving public auditing for shared cloud data supporting
                  group dynamics},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2013, Budapest, Hungary, June 9-13, 2013},
  pages        = {1946--1950},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICC.2013.6654808},
  doi          = {10.1109/ICC.2013.6654808},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/WangLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/WangCLL13,
  author       = {Boyang Wang and
                  Sherman S. M. Chow and
                  Ming Li and
                  Hui Li},
  title        = {Storing Shared Data on the Cloud via Security-Mediator},
  booktitle    = {{IEEE} 33rd International Conference on Distributed Computing Systems,
                  {ICDCS} 2013, 8-11 July, 2013, Philadelphia, Pennsylvania, {USA}},
  pages        = {124--133},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICDCS.2013.60},
  doi          = {10.1109/ICDCS.2013.60},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/WangCLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict-eurasia/SheLZ13,
  author       = {Yuchao She and
                  Hui Li and
                  Hui Zhu},
  editor       = {Khabib Mustofa and
                  Erich J. Neuhold and
                  A Min Tjoa and
                  Edgar R. Weippl and
                  Ilsun You},
  title        = {{UVHM:} Model Checking Based Formal Analysis Scheme for Hypervisors},
  booktitle    = {Information and Communicatiaon Technology - International Conference,
                  ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7804},
  pages        = {300--305},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36818-9\_31},
  doi          = {10.1007/978-3-642-36818-9\_31},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ict-eurasia/SheLZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict-eurasia/ZhangLLZ13,
  author       = {Yinghui Zhang and
                  Hui Li and
                  Xiaoqing Li and
                  Hui Zhu},
  editor       = {Khabib Mustofa and
                  Erich J. Neuhold and
                  A Min Tjoa and
                  Edgar R. Weippl and
                  Ilsun You},
  title        = {Provably Secure and Subliminal-Free Variant of Schnorr Signature},
  booktitle    = {Information and Communicatiaon Technology - International Conference,
                  ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7804},
  pages        = {383--391},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36818-9\_42},
  doi          = {10.1007/978-3-642-36818-9\_42},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ict-eurasia/ZhangLLZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict-eurasia/ZhuLWLL13,
  author       = {Hui Zhu and
                  Tingting Liu and
                  Guanghui Wei and
                  Beishui Liu and
                  Hui Li},
  editor       = {Khabib Mustofa and
                  Erich J. Neuhold and
                  A Min Tjoa and
                  Edgar R. Weippl and
                  Ilsun You},
  title        = {CSP-Based General Detection Model of Network Covert Storage Channels},
  booktitle    = {Information and Communicatiaon Technology - International Conference,
                  ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7804},
  pages        = {459--468},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36818-9\_51},
  doi          = {10.1007/978-3-642-36818-9\_51},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ict-eurasia/ZhuLWLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/ZhuXZ0LL13,
  author       = {Hui Zhu and
                  Yingfang Xue and
                  Yun Zhang and
                  Xiaofeng Chen and
                  Hui Li and
                  Ximeng Liu},
  title        = {{V-MLR:} {A} Multilevel Security Model for Virtualization},
  booktitle    = {2013 5th International Conference on Intelligent Networking and Collaborative
                  Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013},
  pages        = {9--16},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/INCoS.2013.12},
  doi          = {10.1109/INCOS.2013.12},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/incos/ZhuXZ0LL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/ZhuCZLC13,
  author       = {Hui Zhu and
                  Siyu Chen and
                  Lexiang Zhu and
                  Hui Li and
                  Xiaofeng Chen},
  title        = {RangeTree: {A} Feature Selection Algorithm for {C4.5} Decision Tree},
  booktitle    = {2013 5th International Conference on Intelligent Networking and Collaborative
                  Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013},
  pages        = {17--22},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/INCoS.2013.13},
  doi          = {10.1109/INCOS.2013.13},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/incos/ZhuCZLC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/FanZLY13,
  author       = {Kai Fan and
                  Dayang Zhang and
                  Hui Li and
                  Yintang Yang},
  title        = {An Adaptive Feedback Load Balancing Algorithm in {HDFS}},
  booktitle    = {2013 5th International Conference on Intelligent Networking and Collaborative
                  Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013},
  pages        = {23--29},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/INCoS.2013.14},
  doi          = {10.1109/INCOS.2013.14},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/incos/FanZLY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/ZhangCLLL13,
  author       = {Yinghui Zhang and
                  Xiaofeng Chen and
                  Jin Li and
                  Hui Li and
                  Fenghua Li},
  title        = {{FDR-ABE:} Attribute-Based Encryption with Flexible and Direct Revocation},
  booktitle    = {2013 5th International Conference on Intelligent Networking and Collaborative
                  Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013},
  pages        = {38--45},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/INCoS.2013.16},
  doi          = {10.1109/INCOS.2013.16},
  timestamp    = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/incos/ZhangCLLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/WangLL13,
  author       = {Boyang Wang and
                  Baochun Li and
                  Hui Li},
  title        = {Public auditing for shared data with efficient user revocation in
                  the cloud},
  booktitle    = {Proceedings of the {IEEE} {INFOCOM} 2013, Turin, Italy, April 14-19,
                  2013},
  pages        = {2904--2912},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/INFCOM.2013.6567101},
  doi          = {10.1109/INFCOM.2013.6567101},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/WangLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/NiuZZCL13,
  author       = {Ben Niu and
                  Xiaoyan Zhu and
                  Tanran Zhang and
                  Haotian Chi and
                  Hui Li},
  title        = {P-Match: Priority-Aware Friend Discovery for Proximity-Based Mobile
                  Social Networks},
  booktitle    = {{IEEE} 10th International Conference on Mobile Ad-Hoc and Sensor Systems,
                  {MASS} 2013, Hangzhou, China, October 14-16, 2013},
  pages        = {351--355},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/MASS.2013.70},
  doi          = {10.1109/MASS.2013.70},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mass/NiuZZCL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/NiuZL13,
  author       = {Ben Niu and
                  Xiaoyan Zhu and
                  Hui Li},
  title        = {An ultralightweight and privacy-preserving authentication protocol
                  for mobile {RFID} systems},
  booktitle    = {2013 {IEEE} Wireless Communications and Networking Conference (WCNC),
                  Shanghai, Shanghai, China, April 7-10, 2013},
  pages        = {1864--1869},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WCNC.2013.6554848},
  doi          = {10.1109/WCNC.2013.6554848},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcnc/NiuZL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/NiuZCL13,
  author       = {Ben Niu and
                  Xiaoyan Zhu and
                  Haotian Chi and
                  Hui Li},
  title        = {3PLUS: Privacy-preserving pseudo-location updating system in location-based
                  services},
  booktitle    = {2013 {IEEE} Wireless Communications and Networking Conference (WCNC),
                  Shanghai, Shanghai, China, April 7-10, 2013},
  pages        = {4564--4569},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WCNC.2013.6555314},
  doi          = {10.1109/WCNC.2013.6555314},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcnc/NiuZCL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1303-6378,
  author       = {Yuhua Sun and
                  Tongjiang Yan and
                  Hui Li},
  title        = {Cyclic code from the first class Whiteman's generalized cyclotomic
                  sequence with order 4},
  journal      = {CoRR},
  volume       = {abs/1303.6378},
  year         = {2013},
  url          = {http://arxiv.org/abs/1303.6378},
  eprinttype    = {arXiv},
  eprint       = {1303.6378},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1303-6378.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/CaoLMZL12,
  author       = {Jin Cao and
                  Hui Li and
                  Maode Ma and
                  Yueyu Zhang and
                  Chengzhe Lai},
  title        = {A simple and robust handover authentication between HeNB and eNB in
                  {LTE} networks},
  journal      = {Comput. Networks},
  volume       = {56},
  number       = {8},
  pages        = {2119--2131},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.comnet.2012.02.012},
  doi          = {10.1016/J.COMNET.2012.02.012},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/CaoLMZL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/LvLMZ12,
  author       = {Chao Lv and
                  Hui Li and
                  Jianfeng Ma and
                  Yaoyu Zhang},
  title        = {Vulnerability analysis of elliptic curve cryptography-based {RFID}
                  authentication protocols},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {23},
  number       = {7},
  pages        = {618--624},
  year         = {2012},
  url          = {https://doi.org/10.1002/ett.2514},
  doi          = {10.1002/ETT.2514},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ett/LvLMZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/WangLC12,
  author       = {Boyang Wang and
                  Hui Li and
                  Jin Cao},
  title        = {An efficient {MAC} scheme for secure network coding with probabilistic
                  detection},
  journal      = {Frontiers Comput. Sci.},
  volume       = {6},
  number       = {4},
  pages        = {429--441},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11704-012-1068-4},
  doi          = {10.1007/S11704-012-1068-4},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/WangLC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijguc/FanWL12,
  author       = {Kai Fan and
                  Yue Wang and
                  Hui Li},
  title        = {A new proxy blind signature scheme},
  journal      = {Int. J. Grid Util. Comput.},
  volume       = {3},
  number       = {1},
  pages        = {38--42},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJGUC.2012.045709},
  doi          = {10.1504/IJGUC.2012.045709},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijguc/FanWL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijguc/SuSLM12,
  author       = {Zhitu Su and
                  Chunhui Sun and
                  Hui Li and
                  Jianfeng Ma},
  title        = {A method for efficient parallel computation of Tate pairing},
  journal      = {Int. J. Grid Util. Comput.},
  volume       = {3},
  number       = {1},
  pages        = {43--52},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJGUC.2012.045698},
  doi          = {10.1504/IJGUC.2012.045698},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijguc/SuSLM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijguc/FanWL12a,
  author       = {Kai Fan and
                  Yue Wang and
                  Hui Li},
  title        = {Fairness electronic payment protocol},
  journal      = {Int. J. Grid Util. Comput.},
  volume       = {3},
  number       = {1},
  pages        = {53--58},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJGUC.2012.045708},
  doi          = {10.1504/IJGUC.2012.045708},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijguc/FanWL12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ZhouLL12,
  author       = {Jianying Zhou and
                  Xuejia Lai and
                  Hui Li},
  title        = {Message from the Guest Editors},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {5},
  pages        = {291--292},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-012-0172-7},
  doi          = {10.1007/S10207-012-0172-7},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/ZhouLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijrfita/LvLMN12,
  author       = {Chao Lv and
                  Hui Li and
                  Jianfeng Ma and
                  Ben Niu},
  title        = {Vulnerability analysis of lightweight secure search protocols for
                  low-cost {RFID} systems},
  journal      = {Int. J. Radio Freq. Identif. Technol. Appl.},
  volume       = {4},
  number       = {1},
  pages        = {3--12},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJRFITA.2012.044646},
  doi          = {10.1504/IJRFITA.2012.044646},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijrfita/LvLMN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/LaiLZC12,
  author       = {Chengzhe Lai and
                  Hui Li and
                  Yueyu Zhang and
                  Jin Cao},
  title        = {Security Issues on Machine to Machine Communications},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {6},
  number       = {2},
  pages        = {198--514},
  year         = {2012},
  url          = {https://doi.org/10.3837/tiis.2012.02.003},
  doi          = {10.3837/TIIS.2012.02.003},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/LaiLZC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/LvL12,
  author       = {Xixiang Lv and
                  Hui Li},
  title        = {Group Key Agreement From Signcryption},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {6},
  number       = {12},
  pages        = {3338--3351},
  year         = {2012},
  url          = {https://doi.org/10.3837/tiis.2012.12.017},
  doi          = {10.3837/TIIS.2012.12.017},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/LvL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/LvLW12,
  author       = {Xixiang Lv and
                  Hui Li and
                  Baocang Wang},
  title        = {Group key agreement for secure group communication in dynamic peer
                  systems},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {72},
  number       = {10},
  pages        = {1195--1200},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.jpdc.2012.06.004},
  doi          = {10.1016/J.JPDC.2012.06.004},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpdc/LvLW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LvMLMN12,
  author       = {Chao Lv and
                  Maode Ma and
                  Hui Li and
                  Jianfeng Ma and
                  Ben Niu},
  title        = {A security enhanced authentication and key distribution protocol for
                  wireless networks},
  journal      = {Secur. Commun. Networks},
  volume       = {5},
  number       = {4},
  pages        = {343--352},
  year         = {2012},
  url          = {https://doi.org/10.1002/sec.312},
  doi          = {10.1002/SEC.312},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/LvMLMN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LvMLMN12a,
  author       = {Chao Lv and
                  Maode Ma and
                  Hui Li and
                  Jianfeng Ma and
                  Ben Niu},
  title        = {Security enhancement of the communication-efficient AUTHMAC{\_}DH
                  protocols},
  journal      = {Secur. Commun. Networks},
  volume       = {5},
  number       = {6},
  pages        = {674--680},
  year         = {2012},
  url          = {https://doi.org/10.1002/sec.361},
  doi          = {10.1002/SEC.361},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/LvMLMN12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/CaoML12,
  author       = {Jin Cao and
                  Maode Ma and
                  Hui Li},
  title        = {An Uniform Handover Authentication between {E-UTRAN} and Non-3GPP
                  Access Networks},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {11},
  number       = {10},
  pages        = {3644--3650},
  year         = {2012},
  url          = {https://doi.org/10.1109/TWC.2012.081612.112070},
  doi          = {10.1109/TWC.2012.081612.112070},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/CaoML12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/WangLL12,
  author       = {Boyang Wang and
                  Baochun Li and
                  Hui Li},
  editor       = {Rong Chang},
  title        = {Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud},
  booktitle    = {2012 {IEEE} Fifth International Conference on Cloud Computing, Honolulu,
                  HI, USA, June 24-29, 2012},
  pages        = {295--302},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CLOUD.2012.46},
  doi          = {10.1109/CLOUD.2012.46},
  timestamp    = {Wed, 09 Aug 2023 12:14:21 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/WangLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/WangLL12,
  author       = {Boyang Wang and
                  Baochun Li and
                  Hui Li},
  editor       = {Feng Bao and
                  Pierangela Samarati and
                  Jianying Zhou},
  title        = {Knox: Privacy-Preserving Auditing for Shared Data with Large Groups
                  in the Cloud},
  booktitle    = {Applied Cryptography and Network Security - 10th International Conference,
                  {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7341},
  pages        = {507--525},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31284-7\_30},
  doi          = {10.1007/978-3-642-31284-7\_30},
  timestamp    = {Fri, 09 Apr 2021 18:46:11 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/WangLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/WangLL12,
  author       = {Boyang Wang and
                  Baochun Li and
                  Hui Li},
  title        = {Gmatch: Secure and privacy-preserving group matching in social networks},
  booktitle    = {2012 {IEEE} Global Communications Conference, {GLOBECOM} 2012, Anaheim,
                  CA, USA, December 3-7, 2012},
  pages        = {726--731},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/GLOCOM.2012.6503199},
  doi          = {10.1109/GLOCOM.2012.6503199},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/WangLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/CaoML12,
  author       = {Jin Cao and
                  Maode Ma and
                  Hui Li},
  title        = {A group-based authentication and key agreement for {MTC} in {LTE}
                  networks},
  booktitle    = {2012 {IEEE} Global Communications Conference, {GLOBECOM} 2012, Anaheim,
                  CA, USA, December 3-7, 2012},
  pages        = {1017--1022},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/GLOCOM.2012.6503246},
  doi          = {10.1109/GLOCOM.2012.6503246},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/CaoML12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/CaoML12a,
  author       = {Jin Cao and
                  Maode Ma and
                  Hui Li},
  title        = {Unified handover authentication between heterogeneous access systems
                  in {LTE} networks},
  booktitle    = {2012 {IEEE} Global Communications Conference, {GLOBECOM} 2012, Anaheim,
                  CA, USA, December 3-7, 2012},
  pages        = {5308--5313},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/GLOCOM.2012.6503964},
  doi          = {10.1109/GLOCOM.2012.6503964},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/CaoML12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccchina/FanZSLY12,
  author       = {Kai Fan and
                  Libin Zhao and
                  Xuemin (Sherman) Shen and
                  Hui Li and
                  Yintang Yang},
  title        = {Smart-blocking file storage method in cloud computing},
  booktitle    = {2012 1st {IEEE} International Conference on Communications in China
                  (ICCC), Beijing, China, August 15-17, 2012},
  pages        = {57--62},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICCChina.2012.6356951},
  doi          = {10.1109/ICCCHINA.2012.6356951},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccchina/FanZSLY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/WangGHL12,
  author       = {Yong Wang and
                  Aixiang Guo and
                  Hong He and
                  Hui Li},
  editor       = {Fatos Xhafa and
                  Leonard Barolli and
                  Florin Pop and
                  Xiaofeng Chen and
                  Valentin Cristea},
  title        = {Optimization Transmission for Improving Degrees of Freedom in {MIMO}
                  {Y} Channel},
  booktitle    = {2012 Fourth International Conference on Intelligent Networking and
                  Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19-21,
                  2012},
  pages        = {121--125},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/iNCoS.2012.56},
  doi          = {10.1109/INCOS.2012.56},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/incos/WangGHL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/ZhuPLL12,
  author       = {Hui Zhu and
                  Wenhai Pan and
                  Beishui Liu and
                  Hui Li},
  editor       = {Fatos Xhafa and
                  Leonard Barolli and
                  Florin Pop and
                  Xiaofeng Chen and
                  Valentin Cristea},
  title        = {A Lightweight Anonymous Authentication Scheme for {VANET} Based on
                  Bilinear Pairing},
  booktitle    = {2012 Fourth International Conference on Intelligent Networking and
                  Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19-21,
                  2012},
  pages        = {222--228},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/iNCoS.2012.63},
  doi          = {10.1109/INCOS.2012.63},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/incos/ZhuPLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/Chen0L12,
  author       = {Yuan Chen and
                  Xiaofeng Chen and
                  Hui Li},
  editor       = {Fatos Xhafa and
                  Leonard Barolli and
                  Florin Pop and
                  Xiaofeng Chen and
                  Valentin Cristea},
  title        = {DCCA-Secure Public-Key Encryptions from Hybrid Paradigms},
  booktitle    = {2012 Fourth International Conference on Intelligent Networking and
                  Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19-21,
                  2012},
  pages        = {264--269},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/iNCoS.2012.29},
  doi          = {10.1109/INCOS.2012.29},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/incos/Chen0L12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/FanLLLSY12,
  author       = {Kai Fan and
                  Jie Li and
                  Hui Li and
                  Xiaohui Liang and
                  Xuemin (Sherman) Shen and
                  Yintang Yang},
  editor       = {Fatos Xhafa and
                  Leonard Barolli and
                  Florin Pop and
                  Xiaofeng Chen and
                  Valentin Cristea},
  title        = {{ESLRAS:} {A} Lightweight {RFID} Authentication Scheme with High Efficiency
                  and Strong Security for Internet of Things},
  booktitle    = {2012 Fourth International Conference on Intelligent Networking and
                  Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19-21,
                  2012},
  pages        = {323--328},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/iNCoS.2012.48},
  doi          = {10.1109/INCOS.2012.48},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/incos/FanLLLSY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/ZhangCLZCL12,
  author       = {Yueyu Zhang and
                  Jie Chen and
                  Hui Li and
                  Wujun Zhang and
                  Jin Cao and
                  Chengzhe Lai},
  editor       = {Fatos Xhafa and
                  Leonard Barolli and
                  Florin Pop and
                  Xiaofeng Chen and
                  Valentin Cristea},
  title        = {Dynamic Group Based Authentication Protocol for Machine Type Communications},
  booktitle    = {2012 Fourth International Conference on Intelligent Networking and
                  Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19-21,
                  2012},
  pages        = {334--341},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/iNCoS.2012.86},
  doi          = {10.1109/INCOS.2012.86},
  timestamp    = {Wed, 09 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/incos/ZhangCLZCL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/ZhuL12,
  author       = {Xudong Zhu and
                  Hui Li},
  editor       = {Fatos Xhafa and
                  Leonard Barolli and
                  Florin Pop and
                  Xiaofeng Chen and
                  Valentin Cristea},
  title        = {Unsupervised Human Action Categorization Using Latent Dirichlet Markov
                  Clustering},
  booktitle    = {2012 Fourth International Conference on Intelligent Networking and
                  Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19-21,
                  2012},
  pages        = {347--352},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/iNCoS.2012.114},
  doi          = {10.1109/INCOS.2012.114},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/incos/ZhuL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/ZhangZCLW12,
  author       = {Wujun Zhang and
                  Yueyu Zhang and
                  Jie Chen and
                  Hui Li and
                  Yumin Wang},
  editor       = {Fatos Xhafa and
                  Leonard Barolli and
                  Florin Pop and
                  Xiaofeng Chen and
                  Valentin Cristea},
  title        = {End-to-End Security Scheme for Machine Type Communication Based on
                  Generic Authentication Architecture},
  booktitle    = {2012 Fourth International Conference on Intelligent Networking and
                  Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19-21,
                  2012},
  pages        = {353--359},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/iNCoS.2012.79},
  doi          = {10.1109/INCOS.2012.79},
  timestamp    = {Wed, 09 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/incos/ZhangZCLW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/WangYALZ12,
  author       = {Yong Wang and
                  Liu Yang and
                  Yun Ai and
                  Hui Li and
                  Weidong Zhang},
  editor       = {Fatos Xhafa and
                  Leonard Barolli and
                  Florin Pop and
                  Xiaofeng Chen and
                  Valentin Cristea},
  title        = {Joint Signal Space Alignment and Precoding in Two-Way Relay Multi-user
                  Networks},
  booktitle    = {2012 Fourth International Conference on Intelligent Networking and
                  Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19-21,
                  2012},
  pages        = {385--389},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/iNCoS.2012.55},
  doi          = {10.1109/INCOS.2012.55},
  timestamp    = {Mon, 25 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/incos/WangYALZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/HanZ0LQ12,
  author       = {Qi Han and
                  Yinghui Zhang and
                  Xiaofeng Chen and
                  Hui Li and
                  Jiaxiang Quan},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {Efficient and Robust Identity-Based Handoff Authentication in Wireless
                  Networks},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {180--191},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_14},
  doi          = {10.1007/978-3-642-34601-9\_14},
  timestamp    = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/HanZ0LQ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/ZhaoL12,
  author       = {Xingwen Zhao and
                  Hui Li},
  editor       = {Tsuyoshi Takagi and
                  Guilin Wang and
                  Zhiguang Qin and
                  Shaoquan Jiang and
                  Yong Yu},
  title        = {Codes Based Tracing and Revoking Scheme with Constant Ciphertext},
  booktitle    = {Provable Security - 6th International Conference, ProvSec 2012, Chengdu,
                  China, September 26-28, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7496},
  pages        = {318--335},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33272-2\_21},
  doi          = {10.1007/978-3-642-33272-2\_21},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/ZhaoL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/LvLMZ11,
  author       = {Chao Lv and
                  Hui Li and
                  Jianfeng Ma and
                  Meng Zhao},
  title        = {Security analysis of two recently proposed {RFID} authentication protocols},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {3},
  pages        = {335--340},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-011-0153-4},
  doi          = {10.1007/S11704-011-0153-4},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/LvLMZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/LvLW11,
  author       = {Xixiang Lv and
                  Hui Li and
                  Baocang Wang},
  title        = {Identity-based key distribution for mobile Ad Hoc networks},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {4},
  pages        = {442--447},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-011-0197-5},
  doi          = {10.1007/S11704-011-0197-5},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/LvLW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/WangLW11,
  author       = {Yong Wang and
                  Hui Li and
                  Xiyuan Wang},
  title        = {Robustness of Weighting Receive Antenna Selection Algorithm},
  journal      = {Wirel. Pers. Commun.},
  volume       = {61},
  number       = {1},
  pages        = {59--67},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11277-010-9998-3},
  doi          = {10.1007/S11277-010-9998-3},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/WangLW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/NiuLZL11,
  author       = {Ben Niu and
                  Hui Li and
                  Xiaoyan Zhu and
                  Chao Lv},
  editor       = {Yuping Wang and
                  Yiu{-}ming Cheung and
                  Ping Guo and
                  Yingbin Wei},
  title        = {Security Analysis of Some Recent Authentication Protocols for {RFID}},
  booktitle    = {Seventh International Conference on Computational Intelligence and
                  Security, {CIS} 2011, Sanya, Hainan, China, December 3-4, 2011},
  pages        = {665--669},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/CIS.2011.152},
  doi          = {10.1109/CIS.2011.152},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/NiuLZL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/SuSLMF11,
  author       = {Zhitu Su and
                  Chunhui Sun and
                  Hui Li and
                  Jianfeng Ma and
                  Kai Fan},
  editor       = {Fatos Xhafa and
                  Leonard Barolli and
                  Mario K{\"{o}}ppen},
  title        = {Fast Parallel Computation of Tate Pairing},
  booktitle    = {2011 Third International Conference on Intelligent Networking and
                  Collaborative Systems (INCoS), Fukuoka, Japan, November 30 - Dec.
                  2, 2011},
  pages        = {178--183},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/INCoS.2011.93},
  doi          = {10.1109/INCOS.2011.93},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/incos/SuSLMF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/FanWL11,
  author       = {Kai Fan and
                  Yue Wang and
                  Hui Li},
  editor       = {Fatos Xhafa and
                  Leonard Barolli and
                  Mario K{\"{o}}ppen},
  title        = {Forward Secure Proxy Blind Signature Scheme},
  booktitle    = {2011 Third International Conference on Intelligent Networking and
                  Collaborative Systems (INCoS), Fukuoka, Japan, November 30 - Dec.
                  2, 2011},
  pages        = {263--267},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/INCoS.2011.95},
  doi          = {10.1109/INCOS.2011.95},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/incos/FanWL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/FanWL11a,
  author       = {Kai Fan and
                  Yue Wang and
                  Hui Li},
  editor       = {Fatos Xhafa and
                  Leonard Barolli and
                  Mario K{\"{o}}ppen},
  title        = {Abuse-freeness Electronic Payment Protocol},
  booktitle    = {2011 Third International Conference on Intelligent Networking and
                  Collaborative Systems (INCoS), Fukuoka, Japan, November 30 - Dec.
                  2, 2011},
  pages        = {275--278},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/INCoS.2011.45},
  doi          = {10.1109/INCOS.2011.45},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/incos/FanWL11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsda/SunW0Y11,
  author       = {Yuhua Sun and
                  Zilong Wang and
                  Hui Li and
                  Tongjiang Yan},
  title        = {On the cross-correlation of a ternary m-sequence of period 3\({}^{\mbox{4k}}\)
                  - 1 and its decimated sequence by (3\({}^{\mbox{2k}}\)+1)\({}^{\mbox{2}}\)/20},
  booktitle    = {Fifth International Workshop on Signal Design and its Applications
                  in Communications, {IWSDA} 2011, Guilin, China, October 10-14, 2011},
  pages        = {48--51},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/IWSDA.2011.6159436},
  doi          = {10.1109/IWSDA.2011.6159436},
  timestamp    = {Sat, 22 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsda/SunW0Y11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/crc/11/MaL011,
  author       = {Maode Ma and
                  Chao Lu and
                  Hui Li},
  editor       = {Athanasios V. Vasilakos and
                  Yan Zhang and
                  Thrasyvoulos Spyropoulos},
  title        = {Delay Tolerant Networking},
  booktitle    = {Delay Tolerant Networks - Protocols and Applications},
  series       = {Wireless Networks and Mobile Communications Series},
  pages        = {1--30},
  publisher    = {{CRC} Press},
  year         = {2011},
  timestamp    = {Wed, 10 Jun 2020 16:07:48 +0200},
  biburl       = {https://dblp.org/rec/books/crc/11/MaL011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1105-2783,
  author       = {Yuhua Sun and
                  Hui Li and
                  Zilong Wang and
                  Tongjiang Yan},
  title        = {{\textdollar}p{\textdollar}-ary sequences with six-valued cross-correlation
                  function: a new decimation of Niho type},
  journal      = {CoRR},
  volume       = {abs/1105.2783},
  year         = {2011},
  url          = {http://arxiv.org/abs/1105.2783},
  eprinttype    = {arXiv},
  eprint       = {1105.2783},
  timestamp    = {Sat, 22 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1105-2783.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1105-2786,
  author       = {Yuhua Sun and
                  Zilong Wang and
                  Hui Li},
  title        = {On the Cross-Correlation of a Ternary m-sequence of Period 3\({}^{\mbox{4k}}\)-1
                  and Its Decimated Sequence by (3\({}^{\mbox{2k}}\)+1)\({}^{\mbox{2}}\)
                  / 20},
  journal      = {CoRR},
  volume       = {abs/1105.2786},
  year         = {2011},
  url          = {http://arxiv.org/abs/1105.2786},
  eprinttype    = {arXiv},
  eprint       = {1105.2786},
  timestamp    = {Sat, 22 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1105-2786.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1111-3477,
  author       = {Yuhua Sun and
                  Hui Li and
                  Zilong Wang},
  title        = {The cross-correlation distribution of a p-ary m-sequence of period
                  p\({}^{\mbox{2m}}\)-1 and its decimation by (p\({}^{\mbox{m}}\)+1)\({}^{\mbox{2}}\)
                  / 2(p\({}^{\mbox{e}}\)+1)},
  journal      = {CoRR},
  volume       = {abs/1111.3477},
  year         = {2011},
  url          = {http://arxiv.org/abs/1111.3477},
  eprinttype    = {arXiv},
  eprint       = {1111.3477},
  timestamp    = {Sat, 22 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1111-3477.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/LvL10,
  author       = {Xixiang Lv and
                  Hui Li},
  title        = {ID-based authenticated group key agreement from bilinear maps},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {4},
  number       = {2},
  pages        = {302--307},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11704-009-0063-x},
  doi          = {10.1007/S11704-009-0063-X},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/LvL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ZhaoKLDZ10,
  author       = {Bin Zhao and
                  Weidong Kou and
                  Hui Li and
                  Lanjun Dang and
                  Jun Zhang},
  title        = {Effective watermarking scheme in the encrypted domain for buyer-seller
                  watermarking protocol},
  journal      = {Inf. Sci.},
  volume       = {180},
  number       = {23},
  pages        = {4672--4684},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.ins.2010.08.003},
  doi          = {10.1016/J.INS.2010.08.003},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ZhaoKLDZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/DangKLZCZF10,
  author       = {Lanjun Dang and
                  Weidong Kou and
                  Hui Li and
                  Junwei Zhang and
                  Xuefei Cao and
                  Bin Zhao and
                  Kai Fan},
  title        = {Efficient ID-based registration protocol featured with user anonymity
                  in mobile {IP} networks},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {9},
  number       = {2},
  pages        = {594--604},
  year         = {2010},
  url          = {https://doi.org/10.1109/TWC.2010.02.060445},
  doi          = {10.1109/TWC.2010.02.060445},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/DangKLZCZF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apscc/DangXLD10,
  author       = {Lanjun Dang and
                  Jie Xu and
                  Hui Li and
                  Nan Dang},
  title        = {{DASR:} Distributed Anonymous Secure Routing with Good Scalability
                  for Mobile Ad Hoc Networks},
  booktitle    = {5th {IEEE} Asia-Pacific Services Computing Conference, {APSCC} 2010,
                  6-10 December 2010, Hangzhou, China, Proceedings},
  pages        = {454--461},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/APSCC.2010.16},
  doi          = {10.1109/APSCC.2010.16},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/apscc/DangXLD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/ZhuLL10,
  author       = {Xudong Zhu and
                  Hui Li and
                  Zhijing Liu},
  editor       = {Xuejia Lai and
                  Dawu Gu and
                  Bo Jin and
                  Yongquan Wang and
                  Hui Li},
  title        = {Behavior Clustering for Anomaly Detection},
  booktitle    = {Forensics in Telecommunications, Information, and Multimedia - Third
                  International {ICST} Conference, e-Forensics 2010, Shanghai, China,
                  November 11-12, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {56},
  pages        = {14--27},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-23602-0\_2},
  doi          = {10.1007/978-3-642-23602-0\_2},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/ZhuLL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/MoLZ10,
  author       = {Can Mo and
                  Hui Li and
                  Hui Zhu},
  editor       = {Xuejia Lai and
                  Dawu Gu and
                  Bo Jin and
                  Yongquan Wang and
                  Hui Li},
  title        = {A Stream Pattern Matching Method for Traffic Analysis},
  booktitle    = {Forensics in Telecommunications, Information, and Multimedia - Third
                  International {ICST} Conference, e-Forensics 2010, Shanghai, China,
                  November 11-12, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {56},
  pages        = {131--140},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-23602-0\_12},
  doi          = {10.1007/978-3-642-23602-0\_12},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eforensics/MoLZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnc/WangLW10,
  author       = {Yong Wang and
                  Hui Li and
                  Xiyuan Wang},
  title        = {Performance analysis of optimal antenna scheme in transmit diversity
                  systems},
  booktitle    = {Sixth International Conference on Natural Computation, {ICNC} 2010,
                  Yantai, Shandong, China, 10-12 August 2010},
  pages        = {2793--2797},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICNC.2010.5583365},
  doi          = {10.1109/ICNC.2010.5583365},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/icnc/WangLW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ChaoHJ09,
  author       = {Chao Lv and
                  Hui Li and
                  Jianfeng Ma},
  title        = {Analysis the Properties of {TLS} Based on Temporal Logic of Knowledge},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {19--22},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.49},
  doi          = {10.1109/IAS.2009.49},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ChaoHJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LiLMZ09,
  author       = {Xiaoqing Li and
                  Hui Li and
                  Jianfeng Ma and
                  Weidong Zhang},
  title        = {An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Networks},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {287--290},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.267},
  doi          = {10.1109/IAS.2009.267},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LiLMZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/FanLW09,
  author       = {Kai Fan and
                  Hui Li and
                  Yue Wang},
  title        = {Security Analysis of the Kerberos Protocol Using {BAN} Logic},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {467--470},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.320},
  doi          = {10.1109/IAS.2009.320},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/FanLW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/FanWL09,
  author       = {Kai Fan and
                  Yue Wang and
                  Hui Li},
  title        = {A New Abuse-Free Fair Electronic Payment Protocol},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {633--636},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.319},
  doi          = {10.1109/IAS.2009.319},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/FanWL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhuLW09,
  author       = {Hui Zhu and
                  Hui Li and
                  Yumin Wang},
  title        = {An Efficient Fast Authentication Protocol},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 2 - Workshop
                  Papers},
  pages        = {222--225},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.226},
  doi          = {10.1109/CIS.2009.226},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhuLW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/ZhouLM09,
  author       = {Yejun Zhou and
                  Hui Li and
                  Jianfeng Ma},
  editor       = {Jong Hyuk Park and
                  Hsiao{-}Hwa Chen and
                  Mohammed Atiquzzaman and
                  Changhoon Lee and
                  Tai{-}Hoon Kim and
                  Sang{-}Soo Yeo},
  title        = {Secure Error-Correction Network Coding in a Randomized Setting},
  booktitle    = {Advances in Information Security and Assurance, Third International
                  Conference and Workshops, {ISA} 2009, Seoul, Korea, June 25-27, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5576},
  pages        = {570--577},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02617-1\_58},
  doi          = {10.1007/978-3-642-02617-1\_58},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/ZhouLM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/WangDLW08,
  author       = {Ying Wang and
                  Xinjun Du and
                  Hui Li and
                  Yumin Wang},
  title        = {The Design of Optimal Period Interleaver},
  booktitle    = {22nd International Conference on Advanced Information Networking and
                  Applications, {AINA} 2008, Workshops Proceedings, GinoWan, Okinawa,
                  Japan, March 25-28, 2008},
  pages        = {413--415},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/WAINA.2008.276},
  doi          = {10.1109/WAINA.2008.276},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/WangDLW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0805-2286,
  author       = {Yejun Zhou and
                  Hui Li and
                  Jianfeng Ma},
  title        = {Secure Network Coding Against the Contamination and Eavesdropping
                  Adversaries},
  journal      = {CoRR},
  volume       = {abs/0805.2286},
  year         = {2008},
  url          = {http://arxiv.org/abs/0805.2286},
  eprinttype    = {arXiv},
  eprint       = {0805.2286},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0805-2286.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/suLM08,
  author       = {Zhitu Su and
                  Hui Li and
                  Jianfeng Ma},
  title        = {Factoring Polynomials for Constructing Pairing-friendly Elliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {8},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/008},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/suLM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SuLM08,
  author       = {Zhitu Su and
                  Hui Li and
                  Jianfeng Ma},
  title        = {Polynomials for Ate Pairing and Ate\({}_{\mbox{i}}\) Pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {202},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/202},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SuLM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/DangKDLZF07,
  author       = {Lanjun Dang and
                  Weidong Kou and
                  Nan Dang and
                  Hui Li and
                  Bin Zhao and
                  Kai Fan},
  title        = {Mobile ip registration in certificateless public key infrastructure},
  journal      = {{IET} Inf. Secur.},
  volume       = {1},
  number       = {4},
  pages        = {167--173},
  year         = {2007},
  url          = {https://doi.org/10.1049/iet-ifs:20070010},
  doi          = {10.1049/IET-IFS:20070010},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/DangKDLZF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/HuiT05,
  author       = {Hui Li and
                  Ting Shen},
  editor       = {Yue Hao and
                  Jiming Liu and
                  Yu{-}Ping Wang and
                  Yiu{-}ming Cheung and
                  Hujun Yin and
                  Licheng Jiao and
                  Jianfeng Ma and
                  Yong{-}Chang Jiao},
  title        = {A Token-Based Single Sign-On Protocol},
  booktitle    = {Computational Intelligence and Security, International Conference,
                  {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3802},
  pages        = {180--185},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11596981\_27},
  doi          = {10.1007/11596981\_27},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/HuiT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccnmc/WangLL05,
  author       = {Meng Wang and
                  Hui Li and
                  Zhijing Liu},
  editor       = {Xicheng Lu and
                  Wei Zhao},
  title        = {Efficient Identity Based Proxy-Signcryption Schemes with Forward Security
                  and Public Verifiability},
  booktitle    = {Networking and Mobile Computing, Third International Conference, {ICCNMC}
                  2005, Zhangjiajie, China, August 2-4, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3619},
  pages        = {982--991},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11534310\_103},
  doi          = {10.1007/11534310\_103},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccnmc/WangLL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics