Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Hui Li 0006
@article{DBLP:journals/iotj/GaoFWCZLY24, author = {Nan Gao and Kai Fan and Haoyang Wang and Hongyan Chen and Kuan Zhang and Hui Li and Yintang Yang}, title = {Ciphertext Retrieval With Identity Bidirectional Authentication and Matrix Index in IoT}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {1}, pages = {889--903}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3288131}, doi = {10.1109/JIOT.2023.3288131}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/GaoFWCZLY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/GaoFWZLY24, author = {Nan Gao and Kai Fan and Haoyang Wang and Kuan Zhang and Hui Li and Yintang Yang}, title = {Public-Key Inverted-Index Keyword Search With Designated Tester and Multiuser Key Decryption in IoT}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {1}, pages = {1065--1079}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3288119}, doi = {10.1109/JIOT.2023.3288119}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/GaoFWZLY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/FanHLZLY24, author = {Kai Fan and Jingtao Hong and Wenjie Li and Xingwen Zhao and Hui Li and Yintang Yang}, title = {{FLSG:} {A} Novel Defense Strategy Against Inference Attacks in Vertical Federated Learning}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {2}, pages = {1816--1826}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3302792}, doi = {10.1109/JIOT.2023.3302792}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/FanHLZLY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LiFYYL24, author = {Wenjie Li and Kai Fan and Kan Yang and Yintang Yang and Hui Li}, title = {{PBFL:} Privacy-Preserving and Byzantine-Robust Federated-Learning-Empowered Industry 4.0}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {4}, pages = {7128--7140}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3315226}, doi = {10.1109/JIOT.2023.3315226}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/LiFYYL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/0001LBLYZ024, author = {Kai Fan and Hengrui Lu and Yuhan Bai and Yu Luo and Yintang Yang and Kuan Zhang and Hui Li}, title = {SC-Chain: An Efficient Blockchain Framework for Smart City}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {5}, pages = {7863--7877}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3317451}, doi = {10.1109/JIOT.2023.3317451}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/0001LBLYZ024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/Wei0Z00Y24, author = {Guanglu Wei and Kai Fan and Kuan Zhang and Haoyang Wang and Hui Li and Yintang Yang}, title = {Quantum-Safe Lattice-Based Certificateless Anonymous Authenticated Key Agreement for Internet of Things}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {5}, pages = {9213--9225}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3323275}, doi = {10.1109/JIOT.2023.3323275}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/Wei0Z00Y24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/FanRBWZLY24, author = {Kai Fan and Yuanshuai Ren and Yuhan Bai and Guanglu Wei and Kuan Zhang and Hui Li and Yintang Yang}, title = {Fault-Tolerant and Collusion-Resistant Lattice-Based Multidimensional Privacy-Preserving Data Aggregation in Edge-Based Smart Grid}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {6}, pages = {9487--9504}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3323542}, doi = {10.1109/JIOT.2023.3323542}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/FanRBWZLY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mam/0002HLC0W24, author = {Qiao Liu and Qi Han and Guangze Luo and Jin Cao and Hui Li and Yong Wang}, title = {Wiretap resisting and privacy preserving data exchange with physical layer security and blockchain based authentication in Internet of Vehicles}, journal = {Microprocess. Microsystems}, volume = {104}, pages = {104965}, year = {2024}, url = {https://doi.org/10.1016/j.micpro.2023.104965}, doi = {10.1016/J.MICPRO.2023.104965}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mam/0002HLC0W24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/ShangCZZNL24, author = {Chao Shang and Jin Cao and Tong Zhu and Yinghui Zhang and Ben Niu and Hui Li}, title = {{CADFA:} {A} Clock Skew-Based Active Device Fingerprint Authentication Scheme for Class-1 IoT Devices}, journal = {{IEEE} Syst. J.}, volume = {18}, number = {1}, pages = {590--599}, year = {2024}, url = {https://doi.org/10.1109/JSYST.2024.3351222}, doi = {10.1109/JSYST.2024.3351222}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/ShangCZZNL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhengL23, author = {Xianchun Zheng and Hui Li}, title = {Identification of Malicious Encrypted Traffic Through Feature Fusion}, journal = {{IEEE} Access}, volume = {11}, pages = {80072--80080}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3279120}, doi = {10.1109/ACCESS.2023.3279120}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhengL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/YangCRNZL23, author = {Yuanyuan Yang and Jin Cao and Xiongpeng Ren and Ben Niu and Yinghui Zhang and Hui Li}, title = {{LK-AKA:} {A} lightweight location key-based authentication and key agreement protocol for {S2S} communication}, journal = {Comput. Commun.}, volume = {197}, pages = {214--229}, year = {2023}, url = {https://doi.org/10.1016/j.comcom.2022.10.028}, doi = {10.1016/J.COMCOM.2022.10.028}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/YangCRNZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/DuZZLWL23, author = {Xiaoxin Du and Hui Zhu and Yandong Zheng and Rongxing Lu and Fengwei Wang and Hui Li}, title = {A Semantic-Preserving Scheme to Trajectory Synthesis Using Differential Privacy}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {15}, pages = {13784--13797}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2023.3262964}, doi = {10.1109/JIOT.2023.3262964}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/DuZZLWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/YangCMCCNL23, author = {Yuanyuan Yang and Jin Cao and Ruhui Ma and Lifu Cheng and Lilan Chen and Ben Niu and Hui Li}, title = {{FHAP:} Fast Handover Authentication Protocol for High-Speed Mobile Terminals in 5G Satellite-Terrestrial-Integrated Networks}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {15}, pages = {13959--13973}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2023.3262933}, doi = {10.1109/JIOT.2023.3262933}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/YangCMCCNL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/BiFZBLY23, author = {Ye Bi and Kai Fan and Kuan Zhang and Yuhan Bai and Hui Li and Yintang Yang}, title = {A Secure and Efficient Two-Party Protocol Enabling Ownership Transfer of {RFID} Objects}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {18}, pages = {16225--16237}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2023.3267501}, doi = {10.1109/JIOT.2023.3267501}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/BiFZBLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ZhaoZWLL23, author = {Jiaqi Zhao and Hui Zhu and Fengwei Wang and Rongxing Lu and Hui Li}, title = {Efficient and privacy-preserving tree-based inference via additive homomorphic encryption}, journal = {Inf. Sci.}, volume = {650}, pages = {119480}, year = {2023}, url = {https://doi.org/10.1016/j.ins.2023.119480}, doi = {10.1016/J.INS.2023.119480}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ZhaoZWLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/FanBYZL23, author = {Kai Fan and Ye Bi and Yintang Yang and Kuan Zhang and Hui Li}, title = {Secure and Efficient Lightweight Protocol for Emergency Vehicle Avoidance Based on Cloud}, journal = {{IEEE} Netw.}, volume = {37}, number = {4}, pages = {314--322}, year = {2023}, url = {https://doi.org/10.1109/MNET.002.2300009}, doi = {10.1109/MNET.002.2300009}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/network/FanBYZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/FanSYBYYL23, author = {Kai Fan and Zeyu Shi and Yicen Yang and Liyang Bai and Yintang Yang and Kan Yang and Hui Li}, title = {Blockchain-based cloud-edge clock calibration in IoT}, journal = {Peer Peer Netw. Appl.}, volume = {16}, number = {3}, pages = {1432--1444}, year = {2023}, url = {https://doi.org/10.1007/s12083-023-01475-z}, doi = {10.1007/S12083-023-01475-Z}, timestamp = {Thu, 22 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/FanSYBYYL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/FanCSZWLY23, author = {Kai Fan and Qi Chen and Ruidan Su and Kuan Zhang and Haoyang Wang and Hui Li and Yintang Yang}, title = {{MSIAP:} {A} Dynamic Searchable Encryption for Privacy-Protection on Smart Grid With Cloud-Edge-End}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {11}, number = {2}, pages = {1170--1181}, year = {2023}, url = {https://doi.org/10.1109/TCC.2021.3134015}, doi = {10.1109/TCC.2021.3134015}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcc/FanCSZWLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/ZhaoZWLWLL23, author = {Jiaqi Zhao and Hui Zhu and Fengwei Wang and Rongxing Lu and Ermei Wang and Linfeng Li and Hui Li}, title = {{VFLR:} An Efficient and Privacy-Preserving Vertical Federated Framework for Logistic Regression}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {11}, number = {4}, pages = {3326--3340}, year = {2023}, url = {https://doi.org/10.1109/TCC.2023.3247870}, doi = {10.1109/TCC.2023.3247870}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcc/ZhaoZWLWLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiYCSL23, author = {Xiaoguang Li and Haonan Yan and Zelei Cheng and Wenhai Sun and Hui Li}, title = {Protecting Regression Models With Personalized Local Differential Privacy}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {2}, pages = {960--974}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3144690}, doi = {10.1109/TDSC.2022.3144690}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiYCSL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CaoZMGZL23, author = {Jin Cao and Tong Zhu and Ruhui Ma and Zhenyang Guo and Yinghui Zhang and Hui Li}, title = {A Software-Based Remote Attestation Scheme for Internet of Things Devices}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {2}, pages = {1422--1434}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3154887}, doi = {10.1109/TDSC.2022.3154887}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CaoZMGZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangFCCZLLY23, author = {Haoyang Wang and Kai Fan and Hongyan Chen and Qi Chen and Kuan Zhang and Fenghua Li and Hui Li and Yintang Yang}, title = {Joint Biological {ID} : {A} Secure and Efficient Lightweight Biometric Authentication Scheme}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {3}, pages = {2578--2592}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3186999}, doi = {10.1109/TDSC.2022.3186999}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/WangFCCZLLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangSLNLZXZ23, author = {Ming Zhang and Zhe Sun and Hui Li and Ben Niu and Fenghua Li and Zixu Zhang and Yuhang Xie and Chunhao Zheng}, title = {Go-Sharing: {A} Blockchain-Based Privacy-Preserving Framework for Cross-Social Network Photo Sharing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {5}, pages = {3572--3587}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3208934}, doi = {10.1109/TDSC.2022.3208934}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangSLNLZXZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhengLZZGSWL23, author = {Yandong Zheng and Rongxing Lu and Hui Zhu and Songnian Zhang and Yunguo Guan and Jun Shao and Fengwei Wang and Hui Li}, title = {SetRkNN: Efficient and Privacy-Preserving Set Reverse kNN Query in Cloud}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {888--903}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2022.3231785}, doi = {10.1109/TIFS.2022.3231785}, timestamp = {Tue, 02 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhengLZZGSWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhaoZXWLL23, author = {Jiaqi Zhao and Hui Zhu and Wei Xu and Fengwei Wang and Rongxing Lu and Hui Li}, title = {SGBoost: An Efficient and Privacy-Preserving Vertical Federated Tree Boosting Framework}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {1022--1036}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2022.3232955}, doi = {10.1109/TIFS.2022.3232955}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhaoZXWLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhengZLGZWSL23, author = {Yandong Zheng and Hui Zhu and Rongxing Lu and Yunguo Guan and Songnian Zhang and Fengwei Wang and Jun Shao and Hui Li}, title = {PGSim: Efficient and Privacy-Preserving Graph Similarity Query Over Encrypted Data in Cloud}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {2030--2045}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3262147}, doi = {10.1109/TIFS.2023.3262147}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhengZLGZWSL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangZHLZL23, author = {Fengwei Wang and Hui Zhu and Guozhang He and Rongxing Lu and Yandong Zheng and Hui Li}, title = {Efficient and Privacy-Preserving Arbitrary Polygon Range Query Scheme Over Dynamic and Time-Series Location Data}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {3414--3429}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3282133}, doi = {10.1109/TIFS.2023.3282133}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangZHLZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhengZLGZWSL23a, author = {Yandong Zheng and Hui Zhu and Rongxing Lu and Yunguo Guan and Songnian Zhang and Fengwei Wang and Jun Shao and Hui Li}, title = {Efficient and Privacy-Preserving Aggregated Reverse kNN Query Over Crowd-Sensed Data}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {4285--4299}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3293416}, doi = {10.1109/TIFS.2023.3293416}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhengZLGZWSL23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/RenCMLGZL23, author = {Xiongpeng Ren and Jin Cao and Ruhui Ma and Yurong Luo and Jian Guan and Yinghui Zhang and Hui Li}, title = {A Novel Access and Handover Authentication Scheme in UAV-Aided Satellite-Terrestrial Integration Networks Enabling 5G}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {20}, number = {3}, pages = {3880--3899}, year = {2023}, url = {https://doi.org/10.1109/TNSM.2023.3246732}, doi = {10.1109/TNSM.2023.3246732}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/RenCMLGZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/GuoYL023, author = {Ziyao Guo and Haonan Yan and Hui Li and Xiaodong Lin}, title = {Class Attention Transfer Based Knowledge Distillation}, booktitle = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition, {CVPR} 2023, Vancouver, BC, Canada, June 17-24, 2023}, pages = {11868--11877}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CVPR52729.2023.01142}, doi = {10.1109/CVPR52729.2023.01142}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cvpr/GuoYL023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/LiZZXLL23, author = {Peining Li and Yandong Zheng and Hui Zhu and Qi Xu and Zhe Liu and Hui Li}, title = {Efficient and Private Edit Distance Based Range Query over Encrypted String Sequences}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2023, Kuala Lumpur, Malaysia, December 4-8, 2023}, pages = {3306--3311}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/GLOBECOM54140.2023.10437476}, doi = {10.1109/GLOBECOM54140.2023.10437476}, timestamp = {Sun, 10 Mar 2024 10:39:12 +0100}, biburl = {https://dblp.org/rec/conf/globecom/LiZZXLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/ZhaoZWLL23, author = {Jiaqi Zhao and Hui Zhu and Fengwei Wang and Rongxing Lu and Hui Li}, title = {Efficient and Privacy-Preserving Logistic Regression Prediction over Vertically Partitioned Data}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2023, Kuala Lumpur, Malaysia, December 4-8, 2023}, pages = {4253--4258}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/GLOBECOM54140.2023.10437155}, doi = {10.1109/GLOBECOM54140.2023.10437155}, timestamp = {Sun, 10 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/ZhaoZWLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/WangFLCLY23, author = {Jiahui Wang and Yulong Fu and Mengru Liu and Jin Cao and Hui Li and Zheng Yan}, editor = {Weizhi Meng and Zheng Yan and Vincenzo Piuri}, title = {Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft Biometrics}, booktitle = {Information Security Practice and Experience - 18th International Conference, {ISPEC} 2023, Copenhagen, Denmark, August 24-25, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14341}, pages = {52--73}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-7032-2\_4}, doi = {10.1007/978-981-99-7032-2\_4}, timestamp = {Wed, 15 Nov 2023 10:18:14 +0100}, biburl = {https://dblp.org/rec/conf/ispec/WangFLCLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/YanZCLS0023, author = {Haonan Yan and Wenjing Zhang and Qian Chen and Xiaoguang Li and Wenhai Sun and Hui Li and Xiaodong Lin}, editor = {Alice Oh and Tristan Naumann and Amir Globerson and Kate Saenko and Moritz Hardt and Sergey Levine}, title = {{RECESS} Vaccine for Federated Learning: Proactive Defense Against Model Poisoning Attacks}, booktitle = {Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans, LA, USA, December 10 - 16, 2023}, year = {2023}, url = {http://papers.nips.cc/paper\_files/paper/2023/hash/1b80fe066fdbceb3a2960117bac33917-Abstract-Conference.html}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nips/YanZCLS0023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LiLSG023, author = {Xiaoguang Li and Ninghui Li and Wenhai Sun and Neil Zhenqiang Gong and Hui Li}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Fine-grained Poisoning Attack to Local Differential Privacy Protocols for Mean and Variance Estimation}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {1739--1756}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/li-xiaoguang}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/LiLSG023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-12777, author = {Ziyao Guo and Haonan Yan and Hui Li and Xiaodong Lin}, title = {Class Attention Transfer Based Knowledge Distillation}, journal = {CoRR}, volume = {abs/2304.12777}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.12777}, doi = {10.48550/ARXIV.2304.12777}, eprinttype = {arXiv}, eprint = {2304.12777}, timestamp = {Wed, 03 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-12777.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ZhaoZWLLZW22, author = {Jiaqi Zhao and Hui Zhu and Fengwei Wang and Rongxing Lu and Hui Li and Zhongmin Zhou and Haitao Wan}, title = {{ACCEL:} an efficient and privacy-preserving federated logistic regression scheme over vertically partitioned data}, journal = {Sci. China Inf. Sci.}, volume = {65}, number = {7}, pages = {1--2}, year = {2022}, url = {https://doi.org/10.1007/s11432-021-3415-1}, doi = {10.1007/S11432-021-3415-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/ZhaoZWLLZW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/WangFYCDLY22, author = {Xingmiao Wang and Kai Fan and Kan Yang and Xiaochun Cheng and Qingkuan Dong and Hui Li and Yintang Yang}, title = {A new {RFID} ultra-lightweight authentication protocol for medical privacy protection in smart living}, journal = {Comput. Commun.}, volume = {186}, pages = {121--132}, year = {2022}, url = {https://doi.org/10.1016/j.comcom.2022.01.014}, doi = {10.1016/J.COMCOM.2022.01.014}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/WangFYCDLY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/RenCMLZ22, author = {Xiongpeng Ren and Jin Cao and Maode Ma and Hui Li and Yinghui Zhang}, title = {A Novel PUF-Based Group Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {5}, pages = {3642--3656}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2021.3098224}, doi = {10.1109/JIOT.2021.3098224}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/RenCMLZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/WangFZWLY22, author = {Haoyang Wang and Kai Fan and Kuan Zhang and Zilong Wang and Hui Li and Yintang Yang}, title = {Encrypted Data Retrieval and Sharing Scheme in Space-Air-Ground-Integrated Vehicular Networks}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {8}, pages = {5957--5970}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2021.3062626}, doi = {10.1109/JIOT.2021.3062626}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/WangFZWLY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/TangZLLLW22, author = {Jiezhen Tang and Hui Zhu and Rongxing Lu and Xiaodong Lin and Hui Li and Fengwei Wang}, title = {{DLP:} Achieve Customizable Location Privacy With Deceptive Dummy Techniques in {LBS} Applications}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {9}, pages = {6969--6984}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2021.3115849}, doi = {10.1109/JIOT.2021.3115849}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/TangZLLLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/YanLDLZL22, author = {Haonan Yan and Xiaoguang Li and Rui Dai and Hui Li and Xingwen Zhao and Fenghua Li}, title = {{MARS:} Automated Protocol Analysis Framework for Internet of Things}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {19}, pages = {18333--18345}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2022.3160296}, doi = {10.1109/JIOT.2022.3160296}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/YanLDLZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/CaoLMHZL22, author = {Jin Cao and Sheng Li and Ruhui Ma and Yuxi Han and Yueyu Zhang and Hui Li}, title = {{RPRIA:} Reputation and PUF-Based Remote Identity Attestation Protocol for Massive IoT Devices}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {19}, pages = {19174--19187}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2022.3164174}, doi = {10.1109/JIOT.2022.3164174}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/CaoLMHZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/XuZZZLL22, author = {Qi Xu and Hui Zhu and Yandong Zheng and Jiaqi Zhao and Rongxing Lu and Hui Li}, title = {An Efficient and Privacy-Preserving Route Matching Scheme for Carpooling Services}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {20}, pages = {19890--19902}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2022.3168661}, doi = {10.1109/JIOT.2022.3168661}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/XuZZZLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/WangFZWLY22a, author = {Haoyang Wang and Kai Fan and Kuan Zhang and Zilong Wang and Hui Li and Yintang Yang}, title = {Secure and Efficient Data-Privacy-Preserving Scheme for Mobile Cyber-Physical Systems}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {22}, pages = {22375--22388}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2021.3081456}, doi = {10.1109/JIOT.2021.3081456}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/WangFZWLY22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ZhaoZWLLTS22, author = {Jiaqi Zhao and Hui Zhu and Fengwei Wang and Rongxing Lu and Hui Li and Jingwei Tu and Jie Shen}, title = {{CORK:} {A} privacy-preserving and lossless federated learning scheme for deep neural network}, journal = {Inf. Sci.}, volume = {603}, pages = {190--209}, year = {2022}, url = {https://doi.org/10.1016/j.ins.2022.04.052}, doi = {10.1016/J.INS.2022.04.052}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ZhaoZWLLTS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/MaCFLLX22, author = {Ruhui Ma and Jin Cao and Dengguo Feng and Hui Li and Xiaowei Li and Yang Xu}, title = {A robust authentication scheme for remote diagnosis and maintenance in 5G {V2N}}, journal = {J. Netw. Comput. Appl.}, volume = {198}, pages = {103281}, year = {2022}, url = {https://doi.org/10.1016/j.jnca.2021.103281}, doi = {10.1016/J.JNCA.2021.103281}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/MaCFLLX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/FanSSBHZLY22, author = {Kai Fan and Zeyu Shi and Ruidan Su and Yuhan Bai and Pei Huang and Kuan Zhang and Hui Li and Yintang Yang}, title = {Blockchain-based trust management for verifiable time synchronization service in IoT}, journal = {Peer-to-Peer Netw. Appl.}, volume = {15}, number = {2}, pages = {1152--1162}, year = {2022}, url = {https://doi.org/10.1007/s12083-021-01276-2}, doi = {10.1007/S12083-021-01276-2}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ppna/FanSSBHZLY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SunCMZLN22, author = {Yunqing Sun and Jin Cao and Maode Ma and Yinghui Zhang and Hui Li and Ben Niu}, title = {{EAP-DDBA:} Efficient Anonymity Proximity Device Discovery and Batch Authentication Mechanism for Massive {D2D} Communication Devices in 3GPP 5G HetNet}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {1}, pages = {370--387}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2020.2989784}, doi = {10.1109/TDSC.2020.2989784}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/SunCMZLN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangZLZL22, author = {Fengwei Wang and Hui Zhu and Rongxing Lu and Yandong Zheng and Hui Li}, title = {Achieve Efficient and Privacy-Preserving Disease Risk Assessment Over Multi-Outsourced Vertical Datasets}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {3}, pages = {1492--1504}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2020.3026631}, doi = {10.1109/TDSC.2020.3026631}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangZLZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YanL0LSL22, author = {Haonan Yan and Xiaoguang Li and Hui Li and Jiamin Li and Wenhai Sun and Fenghua Li}, title = {Monitoring-Based Differential Privacy Mechanism Against Query Flooding-Based Model Extraction Attack}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {4}, pages = {2680--2694}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3069258}, doi = {10.1109/TDSC.2021.3069258}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/YanL0LSL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhaoZWLLL22, author = {Jiaqi Zhao and Hui Zhu and Fengwei Wang and Rongxing Lu and Zhe Liu and Hui Li}, title = {{PVD-FL:} {A} Privacy-Preserving and Verifiable Decentralized Federated Learning Framework}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {2059--2073}, year = {2022}, url = {https://doi.org/10.1109/TIFS.2022.3176191}, doi = {10.1109/TIFS.2022.3176191}, timestamp = {Thu, 18 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhaoZWLLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/MaCZSXL22, author = {Ruhui Ma and Jin Cao and Yinghui Zhang and Chao Shang and Lihui Xiong and Hui Li}, title = {A Group-Based Multicast Service Authentication and Data Transmission Scheme for 5G-V2X}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {23}, number = {12}, pages = {23976--23992}, year = {2022}, url = {https://doi.org/10.1109/TITS.2022.3197767}, doi = {10.1109/TITS.2022.3197767}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/MaCZSXL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/NiuCWLWL22, author = {Ben Niu and Yahong Chen and Zhibo Wang and Fenghua Li and Boyang Wang and Hui Li}, title = {Eclipse: Preserving Differential Location Privacy Against Long-Term Observation Attacks}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {21}, number = {1}, pages = {125--138}, year = {2022}, url = {https://doi.org/10.1109/TMC.2020.3000730}, doi = {10.1109/TMC.2020.3000730}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmc/NiuCWLWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/NiuLWCLL22, author = {Ben Niu and Qinghua Li and Hanyi Wang and Guohong Cao and Fenghua Li and Hui Li}, title = {A Framework for Personalized Location Privacy}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {21}, number = {9}, pages = {3071--3083}, year = {2022}, url = {https://doi.org/10.1109/TMC.2021.3055865}, doi = {10.1109/TMC.2021.3055865}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmc/NiuLWCLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/LiSZHYLP22, author = {Liang Li and Dian Shi and Xinyue Zhang and Ronghui Hou and Hao Yue and Hui Li and Miao Pan}, title = {Privacy Preserving Participant Recruitment for Coverage Maximization in Location Aware Mobile Crowdsensing}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {21}, number = {9}, pages = {3250--3262}, year = {2022}, url = {https://doi.org/10.1109/TMC.2021.3050147}, doi = {10.1109/TMC.2021.3050147}, timestamp = {Tue, 13 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmc/LiSZHYLP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/LiZZWL022, author = {Linlin Li and Hui Zhu and Yandong Zheng and Fengwei Wang and Rongxing Lu and Hui Li}, title = {Efficient and Privacy-Preserving Fusion Based Multi-Biometric Recognition}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2022, Rio de Janeiro, Brazil, December 4-8, 2022}, pages = {4860--4865}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/GLOBECOM48099.2022.10000971}, doi = {10.1109/GLOBECOM48099.2022.10000971}, timestamp = {Wed, 18 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/LiZZWL022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/YanLG0L022, author = {Haonan Yan and Xiaoguang Li and Ziyao Guo and Hui Li and Fenghua Li and Xiaodong Lin}, editor = {Luc De Raedt}, title = {{ARCANE:} An Efficient Architecture for Exact Machine Unlearning}, booktitle = {Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, {IJCAI} 2022, Vienna, Austria, 23-29 July 2022}, pages = {4006--4013}, publisher = {ijcai.org}, year = {2022}, url = {https://doi.org/10.24963/ijcai.2022/556}, doi = {10.24963/IJCAI.2022/556}, timestamp = {Wed, 27 Jul 2022 16:43:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/YanLG0L022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ZhangSLNLXZ22, author = {Ming Zhang and Zhe Sun and Hui Li and Ben Niu and Fenghua Li and Yuhang Xie and Chunhao Zheng}, title = {A blockchain-based Privacy-Preserving Framework for Cross-Social Network Photo Sharing}, booktitle = {{IEEE} {INFOCOM} 2022 - {IEEE} Conference on Computer Communications Workshops, {INFOCOM} 2022 - Workshops, New York, NY, USA, May 2-5, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/INFOCOMWKSHPS54753.2022.9798330}, doi = {10.1109/INFOCOMWKSHPS54753.2022.9798330}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/ZhangSLNLXZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/SunLYMPC22, author = {Longlong Sun and Hui Li and Shiwen Yu and Xindi Ma and Yanguo Peng and Jiangtao Cui}, editor = {Willy Susilo and Xiaofeng Chen and Fuchun Guo and Yudi Zhang and Rolly Intan}, title = {HeHe: Balancing the Privacy and Efficiency in Training CNNs over the Semi-honest Cloud}, booktitle = {Information Security - 25th International Conference, {ISC} 2022, Bali, Indonesia, December 18-22, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13640}, pages = {422--442}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22390-7\_25}, doi = {10.1007/978-3-031-22390-7\_25}, timestamp = {Mon, 06 Nov 2023 13:38:03 +0100}, biburl = {https://dblp.org/rec/conf/isw/SunLYMPC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicom/WangGZLLL22, author = {Yao Wang and Tao Gu and Yu Zhang and Minjie Lyu and Tom H. Luan and Hui Li}, title = {Enabling secure touch-to-access device pairing based on human body's electrical response}, booktitle = {{ACM} MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17 - 21, 2022}, pages = {556--569}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3495243.3564146}, doi = {10.1145/3495243.3564146}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobicom/WangGZLLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicom/WangGZLLL22a, author = {Yao Wang and Tao Gu and Yu Zhang and Minjie Lyu and Tom H. Luan and Hui Li}, title = {BiTouch: enabling secure touch-to-access device pairing based on human body's electrical response}, booktitle = {{ACM} MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17 - 21, 2022}, pages = {889--891}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3495243.3558273}, doi = {10.1145/3495243.3558273}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobicom/WangGZLLL22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-11782, author = {Xiaoguang Li and Neil Zhenqiang Gong and Ninghui Li and Wenhai Sun and Hui Li}, title = {Fine-grained Poisoning Attacks to Local Differential Privacy Protocols for Mean and Variance Estimation}, journal = {CoRR}, volume = {abs/2205.11782}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.11782}, doi = {10.48550/ARXIV.2205.11782}, eprinttype = {arXiv}, eprint = {2205.11782}, timestamp = {Mon, 30 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-11782.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/KangFZCLY21, author = {Junbin Kang and Kai Fan and Kuan Zhang and Xiaochun Cheng and Hui Li and Yintang Yang}, title = {An ultra light weight and secure {RFID} batch authentication scheme for IoMT}, journal = {Comput. Commun.}, volume = {167}, pages = {48--54}, year = {2021}, url = {https://doi.org/10.1016/j.comcom.2020.12.004}, doi = {10.1016/J.COMCOM.2020.12.004}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/KangFZCLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/XieLSGNS21, author = {Rongna Xie and Hui Li and Guozhen Shi and Yunchuan Guo and Ben Niu and Mang Su}, title = {Provenance-based data flow control mechanism for Internet of things}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {32}, number = {5}, year = {2021}, url = {https://doi.org/10.1002/ett.3934}, doi = {10.1002/ETT.3934}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/XieLSGNS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/YuZXSDL21, author = {Zhipeng Yu and Hui Zhu and Rui Xiao and Chao Song and Jian Dong and Hui Li}, title = {Detection and defense against network isolation attacks in software-defined networks}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {32}, number = {5}, year = {2021}, url = {https://doi.org/10.1002/ett.3895}, doi = {10.1002/ETT.3895}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/YuZXSDL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/Zhu00000S21, author = {Quanlong Zhu and Chao Yang and Yu Zheng and Jianfeng Ma and Hui Li and Junwei Zhang and Jiajie Shao}, title = {Smart home: Keeping privacy based on Air-Padding}, journal = {{IET} Inf. Secur.}, volume = {15}, number = {2}, pages = {156--168}, year = {2021}, url = {https://doi.org/10.1049/ise2.12015}, doi = {10.1049/ISE2.12015}, timestamp = {Tue, 25 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-ifs/Zhu00000S21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/KhanLZAY21, author = {Fawad Khan and Hui Li and Yinghui Zhang and Haider Abbas and Tahreem Yaqoob}, title = {Efficient attribute-based encryption with repeated attributes optimization}, journal = {Int. J. Inf. Sec.}, volume = {20}, number = {3}, pages = {431--444}, year = {2021}, url = {https://doi.org/10.1007/s10207-020-00505-8}, doi = {10.1007/S10207-020-00505-8}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/KhanLZAY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LiSHLWLP21, author = {Liang Li and Dian Shi and Ronghui Hou and Xuanheng Li and Jie Wang and Hui Li and Miao Pan}, title = {Data-Driven Optimization for Cooperative Edge Service Provisioning With Demand Uncertainty}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {6}, pages = {4317--4328}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3028242}, doi = {10.1109/JIOT.2020.3028242}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/LiSHLWLP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/irob/LiTLZZW21, author = {Hui Li and Tinglong Tang and Jake Luo and Meng Zhao and Baole Zheng and Yirong Wu}, title = {An anomaly detection method based on double encoder-decoder generative adversarial networks}, journal = {Ind. Robot}, volume = {48}, number = {5}, pages = {643--648}, year = {2021}, url = {https://doi.org/10.1108/IR-09-2020-0200}, doi = {10.1108/IR-09-2020-0200}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/irob/LiTLZZW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WangZLZL21, author = {Fengwei Wang and Hui Zhu and Rongxing Lu and Yandong Zheng and Hui Li}, title = {A privacy-preserving and non-interactive federated learning scheme for regression training with gradient descent}, journal = {Inf. Sci.}, volume = {552}, pages = {183--200}, year = {2021}, url = {https://doi.org/10.1016/j.ins.2020.12.007}, doi = {10.1016/J.INS.2020.12.007}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/WangZLZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jfi/FanJLLY21, author = {Kai Fan and Wei Jiang and Qi Luo and Hui Li and Yintang Yang}, title = {Cloud-based {RFID} mutual authentication scheme for efficient privacy preserving in IoV}, journal = {J. Frankl. Inst.}, volume = {358}, number = {1}, pages = {193--209}, year = {2021}, url = {https://doi.org/10.1016/j.jfranklin.2019.02.023}, doi = {10.1016/J.JFRANKLIN.2019.02.023}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jfi/FanJLLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/BaiFBCLY21, author = {Liyang Bai and Kai Fan and Yuhan Bai and Xiaochun Cheng and Hui Li and Yintang Yang}, title = {Cross-domain access control based on trusted third-party and attribute mapping center}, journal = {J. Syst. Archit.}, volume = {116}, pages = {101957}, year = {2021}, url = {https://doi.org/10.1016/j.sysarc.2020.101957}, doi = {10.1016/J.SYSARC.2020.101957}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsa/BaiFBCLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LiuFLY21, author = {Jianxing Liu and Kai Fan and Hui Li and Yintang Yang}, title = {A blockchain-based privacy preservation scheme in multimedia network}, journal = {Multim. Tools Appl.}, volume = {80}, number = {20}, pages = {30691--30705}, year = {2021}, url = {https://doi.org/10.1007/s11042-021-10513-y}, doi = {10.1007/S11042-021-10513-Y}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/LiuFLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/YangZWZLL21, author = {Xiaopeng Yang and Hui Zhu and Fengwei Wang and Songnian Zhang and Rongxing Lu and Hui Li}, title = {{MASK:} Efficient and privacy-preserving m-tree based biometric identification over cloud}, journal = {Peer-to-Peer Netw. Appl.}, volume = {14}, number = {4}, pages = {2171--2186}, year = {2021}, url = {https://doi.org/10.1007/s12083-021-01120-7}, doi = {10.1007/S12083-021-01120-7}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/YangZWZLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LuoLMG21, author = {Yurong Luo and Hui Li and Ruhui Ma and Zhenyang Guo}, title = {A Composable Multifactor Identity Authentication and Authorization Scheme for 5G Services}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {6697155:1--6697155:18}, year = {2021}, url = {https://doi.org/10.1155/2021/6697155}, doi = {10.1155/2021/6697155}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LuoLMG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YangSHBFYLY21, author = {Hanzhe Yang and Ruidan Su and Pei Huang and Yuhan Bai and Kai Fan and Kan Yang and Hui Li and Yintang Yang}, title = {{PMAB:} {A} Public Mutual Audit Blockchain for Outsourced Data in Cloud Storage}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {9993855:1--9993855:11}, year = {2021}, url = {https://doi.org/10.1155/2021/9993855}, doi = {10.1155/2021/9993855}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YangSHBFYLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/ZhuWYLL21, author = {Hui Zhu and Qing Wei and Xiaopeng Yang and Rongxing Lu and Hui Li}, title = {Efficient and Privacy-Preserving Online Fingerprint Authentication Scheme over Outsourced Data}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {9}, number = {2}, pages = {576--586}, year = {2021}, url = {https://doi.org/10.1109/TCC.2018.2866405}, doi = {10.1109/TCC.2018.2866405}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/ZhuWYLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CaoMFLZ21, author = {Jin Cao and Maode Ma and Yulong Fu and Hui Li and Yinghui Zhang}, title = {{CPPHA:} Capability-Based Privacy-Protection Handover Authentication Mechanism for SDN-Based 5G HetNets}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {3}, pages = {1182--1195}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2916593}, doi = {10.1109/TDSC.2019.2916593}, timestamp = {Fri, 17 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CaoMFLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/ZhaoFYWLY21, author = {Bin Zhao and Kai Fan and Kan Yang and Zilong Wang and Hui Li and Yintang Yang}, title = {Anonymous and Privacy-Preserving Federated Learning With Industrial Big Data}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {17}, number = {9}, pages = {6314--6323}, year = {2021}, url = {https://doi.org/10.1109/TII.2021.3052183}, doi = {10.1109/TII.2021.3052183}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/ZhaoFYWLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/LiLLLSYL21, author = {Zhao Li and Jun Li and Yinghou Liu and Xiujuan Liang and Kang G. Shin and Zheng Yan and Hui Li}, title = {Exploiting Interactions of Multiple Interference for Cooperative Interference Alignment}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {20}, number = {11}, pages = {7072--7085}, year = {2021}, url = {https://doi.org/10.1109/TWC.2021.3080584}, doi = {10.1109/TWC.2021.3080584}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/LiLLLSYL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acmturc/ZhuL21, author = {Xudong Zhu and Hui Li}, title = {Privacy-preserving Decentralized Federated Deep Learning}, booktitle = {{ACM} {TURC} 2021: {ACM} Turing Award Celebration Conference - Hefei, China, 30 July 2021 - 1 August 2021}, pages = {33--38}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3472634.3472642}, doi = {10.1145/3472634.3472642}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acmturc/ZhuL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/LiSHLPH21, author = {Liang Li and Dian Shi and Ronghui Hou and Hui Li and Miao Pan and Zhu Han}, title = {To Talk or to Work: Flexible Communication Compression for Energy Efficient Federated Learning over Heterogeneous Mobile Edge Devices}, booktitle = {40th {IEEE} Conference on Computer Communications, {INFOCOM} 2021, Vancouver, BC, Canada, May 10-13, 2021}, pages = {1--10}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/INFOCOM42981.2021.9488839}, doi = {10.1109/INFOCOM42981.2021.9488839}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/LiSHLPH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/ZhuL21, author = {Xudong Zhu and Hui Li}, editor = {Min Yang and Chao Chen and Yang Liu}, title = {Privacy-Preserving and Auditable Federated Deep Reinforcement Learning for Robotic Manipulation}, booktitle = {Network and System Security - 15th International Conference, {NSS} 2021, Tianjin, China, October 23, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13041}, pages = {314--325}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92708-0\_20}, doi = {10.1007/978-3-030-92708-0\_20}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/ZhuL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HuangFYZLY20, author = {Pei Huang and Kai Fan and Hanzhe Yang and Kuan Zhang and Hui Li and Yintang Yang}, title = {A Collaborative Auditing Blockchain for Trustworthy Data Integrity in Cloud Storage System}, journal = {{IEEE} Access}, volume = {8}, pages = {94780--94794}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2993606}, doi = {10.1109/ACCESS.2020.2993606}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/HuangFYZLY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cea/HuanLLC20, author = {Juan Huan and Hui Li and Mingbao Li and Bo Chen}, title = {Prediction of dissolved oxygen in aquaculture based on gradient boosting decision tree and long short-term memory network: {A} study of Chang Zhou fishery demonstration base, China}, journal = {Comput. Electron. Agric.}, volume = {175}, pages = {105530}, year = {2020}, url = {https://doi.org/10.1016/j.compag.2020.105530}, doi = {10.1016/J.COMPAG.2020.105530}, timestamp = {Tue, 11 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cea/HuanLLC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ChenFZWLY20, author = {Qi Chen and Kai Fan and Kuan Zhang and Haoyang Wang and Hui Li and Yingtang Yang}, title = {Privacy-preserving searchable encryption in the intelligent edge computing}, journal = {Comput. Commun.}, volume = {164}, pages = {31--41}, year = {2020}, url = {https://doi.org/10.1016/j.comcom.2020.09.012}, doi = {10.1016/J.COMCOM.2020.09.012}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/ChenFZWLY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhangJLTLL20, author = {Wenjing Zhang and Bo Jiang and Ming Li and Ravi Tandon and Qiao Liu and Hui Li}, title = {Aggregation-based location privacy: An information theoretic approach}, journal = {Comput. Secur.}, volume = {97}, pages = {101953}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101953}, doi = {10.1016/J.COSE.2020.101953}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhangJLTLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/CaoMLMSYX20, author = {Jin Cao and Maode Ma and Hui Li and Ruhui Ma and Yunqing Sun and Pu Yu and Lihui Xiong}, title = {A Survey on Security Aspects for 3GPP 5G Networks}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {22}, number = {1}, pages = {170--195}, year = {2020}, url = {https://doi.org/10.1109/COMST.2019.2951818}, doi = {10.1109/COMST.2019.2951818}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/CaoMLMSYX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/LiNCLL20, author = {Weihao Li and Ben Niu and Jin Cao and Yurong Luo and Hui Li}, title = {A personalized range-sensitive privacy-preserving scheme in LBSs}, journal = {Concurr. Comput. Pract. Exp.}, volume = {32}, number = {5}, year = {2020}, url = {https://doi.org/10.1002/cpe.5462}, doi = {10.1002/CPE.5462}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/LiNCLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/LiLPLT20, author = {Hui Li and Zhe Li and Sizhe Peng and Jingjing Li and Chia Emmanuel Tungom}, title = {Mining the frequency of time-constrained serial episodes over massive data sequences and streams}, journal = {Future Gener. Comput. Syst.}, volume = {110}, pages = {849--863}, year = {2020}, url = {https://doi.org/10.1016/j.future.2019.11.008}, doi = {10.1016/J.FUTURE.2019.11.008}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/LiLPLT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/MaCFL20, author = {Ruhui Ma and Jin Cao and Dengguo Feng and Hui Li}, title = {{LAA:} Lattice-Based Access Authentication Scheme for IoT in Space Information Networks}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {4}, pages = {2791--2805}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2019.2962553}, doi = {10.1109/JIOT.2019.2962553}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/MaCFL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/CaoYMZFL20, author = {Jin Cao and Zheng Yan and Ruhui Ma and Yinghui Zhang and Yulong Fu and Hui Li}, title = {{LSAA:} {A} Lightweight and Secure Access Authentication Scheme for Both {UE} and mMTC Devices in 5G Networks}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {6}, pages = {5329--5344}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2020.2976740}, doi = {10.1109/JIOT.2020.2976740}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/CaoYMZFL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ZhuZLLWLF20, author = {Dan Zhu and Hui Zhu and Ximeng Liu and Hui Li and Fengwei Wang and Hao Li and Dengguo Feng}, title = {{CREDO:} Efficient and privacy-preserving multi-level medical pre-diagnosis based on ML-\emph{kNN}}, journal = {Inf. Sci.}, volume = {514}, pages = {244--262}, year = {2020}, url = {https://doi.org/10.1016/j.ins.2019.11.041}, doi = {10.1016/J.INS.2019.11.041}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/ZhuZLLWLF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LiWNLLC20, author = {Fenghua Li and Xinyu Wang and Ben Niu and Hui Li and Chao Li and Lihua Chen}, title = {Exploiting location-related behaviors without the {GPS} data on smartphones}, journal = {Inf. Sci.}, volume = {527}, pages = {444--459}, year = {2020}, url = {https://doi.org/10.1016/j.ins.2019.05.052}, doi = {10.1016/J.INS.2019.05.052}, timestamp = {Wed, 20 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/LiWNLLC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/FuCZYKJCL20, author = {Yulong Fu and Hanlu Chen and Qinghua Zheng and Zheng Yan and Raimo Kantola and Xuyang Jing and Jin Cao and Hui Li}, title = {An Adaptive Security Data Collection and Composition Recognition method for security measurement over {LTE/LTE-A} networks}, journal = {J. Netw. Comput. Appl.}, volume = {155}, pages = {102549}, year = {2020}, url = {https://doi.org/10.1016/j.jnca.2020.102549}, doi = {10.1016/J.JNCA.2020.102549}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/FuCZYKJCL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/FanLZLY20, author = {Kai Fan and Tingting Liu and Kuan Zhang and Hui Li and Yintang Yang}, title = {A secure and efficient outsourced computation on data sharing scheme for privacy computing}, journal = {J. Parallel Distributed Comput.}, volume = {135}, pages = {169--176}, year = {2020}, url = {https://doi.org/10.1016/j.jpdc.2019.09.008}, doi = {10.1016/J.JPDC.2019.09.008}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpdc/FanLZLY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/lgrs/CaoRZLJ20, author = {Xianghai Cao and Meiru Ren and Jing Zhao and Hui Li and Licheng Jiao}, title = {Hyperspectral Imagery Classification Based on Compressed Convolutional Neural Network}, journal = {{IEEE} Geosci. Remote. Sens. Lett.}, volume = {17}, number = {9}, pages = {1583--1587}, year = {2020}, url = {https://doi.org/10.1109/LGRS.2019.2951372}, doi = {10.1109/LGRS.2019.2951372}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/lgrs/CaoRZLJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/WangFLY20, author = {Haoyang Wang and Kai Fan and Hui Li and Yintang Yang}, title = {A dynamic and verifiable multi-keyword ranked search scheme in the {P2P} networking environment}, journal = {Peer-to-Peer Netw. Appl.}, volume = {13}, number = {6}, pages = {2342--2355}, year = {2020}, url = {https://doi.org/10.1007/s12083-020-00912-7}, doi = {10.1007/S12083-020-00912-7}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/WangFLY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/LiuZDLW20, author = {Qiao Liu and Wenjing Zhang and Sheng Ding and Hui Li and Yong Wang}, title = {Novel Secure Group Data Exchange Protocol in Smart Home with Physical Layer Network Coding}, journal = {Sensors}, volume = {20}, number = {4}, pages = {1138}, year = {2020}, url = {https://doi.org/10.3390/s20041138}, doi = {10.3390/S20041138}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/LiuZDLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/MaCFLH20, author = {Ruhui Ma and Jin Cao and Dengguo Feng and Hui Li and Shiyang He}, title = {{FTGPHA:} Fixed-Trajectory Group Pre-Handover Authentication Mechanism for Mobile Relays in 5G High-Speed Rail Networks}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {69}, number = {2}, pages = {2126--2140}, year = {2020}, url = {https://doi.org/10.1109/TVT.2019.2960313}, doi = {10.1109/TVT.2019.2960313}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/MaCFLH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/FanPZBSLY20, author = {Kai Fan and Qiang Pan and Kuan Zhang and Yuhan Bai and Shili Sun and Hui Li and Yintang Yang}, title = {A Secure and Verifiable Data Sharing Scheme Based on Blockchain in Vehicular Social Networks}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {69}, number = {6}, pages = {5826--5835}, year = {2020}, url = {https://doi.org/10.1109/TVT.2020.2968094}, doi = {10.1109/TVT.2020.2968094}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvt/FanPZBSLY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/0005BS0020, author = {Zhao Li and Yujiao Bai and Kang G. Shin and Zheng Yan and Hui Li}, title = {Inside-Out Precoding to Manage Multiple Interferences From the Same Source}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {69}, number = {7}, pages = {7583--7595}, year = {2020}, url = {https://doi.org/10.1109/TVT.2020.2994332}, doi = {10.1109/TVT.2020.2994332}, timestamp = {Fri, 31 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/0005BS0020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wc/LiYCNL20, author = {Fenghua Li and Peijie Yin and Yahong Chen and Ben Niu and Hui Li}, title = {Achieving Fine-Grained QoS for Privacy-Aware Users in LBSs}, journal = {{IEEE} Wirel. Commun.}, volume = {27}, number = {3}, pages = {31--37}, year = {2020}, url = {https://doi.org/10.1109/MWC.001.1900469}, doi = {10.1109/MWC.001.1900469}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wc/LiYCNL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/JiHLL20, author = {Yongxin Ji and Ronghui Hou and King{-}Shan Lui and Hui Li}, title = {A Blockchain-Based Vehicle Platoon Leader Updating Scheme}, booktitle = {2020 {IEEE} International Conference on Communications, {ICC} 2020, Dublin, Ireland, June 7-11, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICC40277.2020.9149388}, doi = {10.1109/ICC40277.2020.9149388}, timestamp = {Sat, 11 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/JiHLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ZhaoFY0WL20, author = {Bin Zhao and Kai Fan and Wei You and Kan Yang and Zilong Wang and Hui Li}, title = {A Weight-based k-prototypes Algorithm for Anomaly Detection in Smart Grid}, booktitle = {2020 {IEEE} International Conference on Communications, {ICC} 2020, Dublin, Ireland, June 7-11, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICC40277.2020.9148623}, doi = {10.1109/ICC40277.2020.9148623}, timestamp = {Sat, 22 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/ZhaoFY0WL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccchina/DongMHLL20, author = {Wenbin Dong and Xinhong Mao and Ronghui Hou and Xixiang Lv and Hui Li}, title = {An Enhanced Handover Scheme for Cellular-Connected UAVs}, booktitle = {9th {IEEE/CIC} International Conference on Communications in China, {ICCC} 2020, Chongqing, China, August 9-11, 2020}, pages = {418--423}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICCC49849.2020.9238986}, doi = {10.1109/ICCC49849.2020.9238986}, timestamp = {Sat, 11 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccchina/DongMHLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccchina/WuMHLL20, author = {Jinli Wu and Xinhong Mao and Ronghui Hou and Xixiang Lv and Hui Li}, title = {Beam Management for Cellular-Connected UAVs: {A} Fast Link Recovery Approach}, booktitle = {9th {IEEE/CIC} International Conference on Communications in China, {ICCC} 2020, Chongqing, China, August 9-11, 2020}, pages = {758--763}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICCC49849.2020.9238835}, doi = {10.1109/ICCC49849.2020.9238835}, timestamp = {Sat, 11 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccchina/WuMHLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pakdd/LiLB20, author = {Hui Li and Hui Li and Sourav S. Bhowmick}, editor = {Hady W. Lauw and Raymond Chi{-}Wing Wong and Alexandros Ntoulas and Ee{-}Peng Lim and See{-}Kiong Ng and Sinno Jialin Pan}, title = {{BRUNCH:} Branching Structure Inference of Hybrid Multivariate Hawkes Processes with Application to Social Media}, booktitle = {Advances in Knowledge Discovery and Data Mining - 24th Pacific-Asia Conference, {PAKDD} 2020, Singapore, May 11-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12084}, pages = {553--566}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-47426-3\_43}, doi = {10.1007/978-3-030-47426-3\_43}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pakdd/LiLB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmod/LiLB20, author = {Hui Li and Hui Li and Sourav S. Bhowmick}, editor = {David Maier and Rachel Pottinger and AnHai Doan and Wang{-}Chiew Tan and Abdussalam Alawini and Hung Q. Ngo}, title = {{CHASSIS:} Conformity Meets Online Information Diffusion}, booktitle = {Proceedings of the 2020 International Conference on Management of Data, {SIGMOD} Conference 2020, online conference [Portland, OR, USA], June 14-19, 2020}, pages = {1829--1840}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3318464.3389780}, doi = {10.1145/3318464.3389780}, timestamp = {Wed, 04 May 2022 13:02:28 +0200}, biburl = {https://dblp.org/rec/conf/sigmod/LiLB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/LiuLD020, author = {Qiao Liu and Hui Li and Sheng Ding and Yong Wang}, title = {Lightweight Secure Data Exchange in Decentralized VANETs with Physical Layer Security}, booktitle = {92nd {IEEE} Vehicular Technology Conference, {VTC} Fall 2020, Victoria, BC, Canada, November 18 - December 16, 2020}, pages = {1--5}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/VTC2020-Fall49728.2020.9348470}, doi = {10.1109/VTC2020-FALL49728.2020.9348470}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vtc/LiuLD020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/MaCF0NLY20, author = {Ruhui Ma and Jin Cao and Dengguo Feng and Hui Li and Ben Niu and Fenghua Li and Lihua Yin}, title = {A Secure Authentication Scheme for Remote Diagnosis and Maintenance in Internet of Vehicles}, booktitle = {2020 {IEEE} Wireless Communications and Networking Conference, {WCNC} 2020, Seoul, Korea (South), May 25-28, 2020}, pages = {1--7}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/WCNC45663.2020.9120719}, doi = {10.1109/WCNC45663.2020.9120719}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcnc/MaCF0NLY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-00418, author = {Haonan Yan and Xiaoguang Li and Hui Li and Jiamin Li and Wenhai Sun and Fenghua Li}, title = {Monitoring-based Differential Privacy Mechanism Against Query-Flooding Parameter Duplication Attack}, journal = {CoRR}, volume = {abs/2011.00418}, year = {2020}, url = {https://arxiv.org/abs/2011.00418}, eprinttype = {arXiv}, eprint = {2011.00418}, timestamp = {Mon, 30 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-00418.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-11804, author = {Liang Li and Dian Shi and Ronghui Hou and Hui Li and Miao Pan and Zhu Han}, title = {To Talk or to Work: Flexible Communication Compression for Energy Efficient Federated Learning over Heterogeneous Mobile Edge Devices}, journal = {CoRR}, volume = {abs/2012.11804}, year = {2020}, url = {https://arxiv.org/abs/2012.11804}, eprinttype = {arXiv}, eprint = {2012.11804}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-11804.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/DingCLFL19, author = {Sheng Ding and Jin Cao and Chen Li and Kai Fan and Hui Li}, title = {A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT}, journal = {{IEEE} Access}, volume = {7}, pages = {38431--38441}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2905846}, doi = {10.1109/ACCESS.2019.2905846}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/DingCLFL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangZLLHLL19, author = {Fengwei Wang and Hui Zhu and Ximeng Liu and Rongxing Lu and Jiafeng Hua and Hui Li and Hao Li}, title = {Privacy-Preserving Collaborative Model Learning Scheme for E-Healthcare}, journal = {{IEEE} Access}, volume = {7}, pages = {166054--166065}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2953495}, doi = {10.1109/ACCESS.2019.2953495}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/WangZLLHLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/QiuFZPLY19, author = {Jianying Qiu and Kai Fan and Kuan Zhang and Qiang Pan and Hui Li and Yintang Yang}, title = {An Efficient Multi-Message and Multi-Receiver Signcryption Scheme for Heterogeneous Smart Mobile IoT}, journal = {{IEEE} Access}, volume = {7}, pages = {180205--180217}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2958089}, doi = {10.1109/ACCESS.2019.2958089}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/QiuFZPLY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/MaCFLZL19, author = {Ruhui Ma and Jin Cao and Dengguo Feng and Hui Li and Yinghui Zhang and Xixiang Lv}, title = {{PPSHA:} Privacy preserving secure handover authentication scheme for all application scenarios in {LTE-A} networks}, journal = {Ad Hoc Networks}, volume = {87}, pages = {49--60}, year = {2019}, url = {https://doi.org/10.1016/j.adhoc.2018.11.012}, doi = {10.1016/J.ADHOC.2018.11.012}, timestamp = {Wed, 15 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/adhoc/MaCFLZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/GuoLCW19, author = {Zhen Guo and Hui Li and Chunjie Cao and Zhengxi Wei}, title = {Verifiable algorithm for outsourced database with updating}, journal = {Clust. Comput.}, volume = {22}, number = {Supplement}, pages = {5185--5193}, year = {2019}, url = {https://doi.org/10.1007/s10586-017-1133-8}, doi = {10.1007/S10586-017-1133-8}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cluster/GuoLCW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dpd/LiCMM19, author = {Hui Li and Jiangtao Cui and Xue Meng and Jianfeng Ma}, title = {{IHP:} improving the utility in differential private histogram publication}, journal = {Distributed Parallel Databases}, volume = {37}, number = {4}, pages = {721--750}, year = {2019}, url = {https://doi.org/10.1007/s10619-018-07255-6}, doi = {10.1007/S10619-018-07255-6}, timestamp = {Sat, 29 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dpd/LiCMM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/LiuLW19, author = {Qiao Liu and Hui Li and Yong Wang}, title = {General Secure Information Exchange Protocol for a Multiuser {MIMO} Relay Channel}, journal = {Entropy}, volume = {21}, number = {11}, pages = {1054}, year = {2019}, url = {https://doi.org/10.3390/e21111054}, doi = {10.3390/E21111054}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entropy/LiuLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/LinNLA19, author = {Jiaping Lin and Jianwei Niu and Hui Li and Mohammed Atiquzzaman}, title = {A Secure and Efficient Location-based Service Scheme for Smart Transportation}, journal = {Future Gener. Comput. Syst.}, volume = {92}, pages = {694--704}, year = {2019}, url = {https://doi.org/10.1016/j.future.2017.11.030}, doi = {10.1016/J.FUTURE.2017.11.030}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/LinNLA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/FanXGLY19, author = {Kai Fan and Huiyue Xu and Longxiang Gao and Hui Li and Yintang Yang}, title = {Efficient and privacy preserving access control scheme for fog-enabled IoT}, journal = {Future Gener. Comput. Syst.}, volume = {99}, pages = {134--142}, year = {2019}, url = {https://doi.org/10.1016/j.future.2019.04.003}, doi = {10.1016/J.FUTURE.2019.04.003}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/FanXGLY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/FanSYPLY19, author = {Kai Fan and Shili Sun and Zheng Yan and Qiang Pan and Hui Li and Yintang Yang}, title = {A blockchain-based clock synchronization Scheme in IoT}, journal = {Future Gener. Comput. Syst.}, volume = {101}, pages = {524--533}, year = {2019}, url = {https://doi.org/10.1016/j.future.2019.06.007}, doi = {10.1016/J.FUTURE.2019.06.007}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/FanSYPLY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceee/MiaoCLLY19, author = {Runyun Miao and Changchun Chai and Yuqian Liu and Hui Li and Yintang Yang}, title = {Light-load efficiency improving boost converter with the hybrid modulation of hysteresis current mode and burst mode}, journal = {{IEICE} Electron. Express}, volume = {16}, number = {11}, pages = {20190108}, year = {2019}, url = {https://doi.org/10.1587/elex.16.20190108}, doi = {10.1587/ELEX.16.20190108}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieiceee/MiaoCLLY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/CaoML19, author = {Jin Cao and Maode Ma and Hui Li}, title = {{LPPA:} Lightweight privacy-preservation access authentication scheme for massive devices in fifth Generation {(5G)} cellular networks}, journal = {Int. J. Commun. Syst.}, volume = {32}, number = {3}, year = {2019}, url = {https://doi.org/10.1002/dac.3860}, doi = {10.1002/DAC.3860}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/CaoML19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijitwe/ShanLLGX19, author = {Fangfang Shan and Hui Li and Fenghua Li and Yunchuan Guo and Jinbo Xiong}, title = {An Attribute-Based Assured Deletion Scheme in Cloud Computing}, journal = {Int. J. Inf. Technol. Web Eng.}, volume = {14}, number = {2}, pages = {74--91}, year = {2019}, url = {https://doi.org/10.4018/IJITWE.2019040105}, doi = {10.4018/IJITWE.2019040105}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijitwe/ShanLLGX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LiLWRB19, author = {Fenghua Li and Hui Li and Cong Wang and Kui Ren and Elisa Bertino}, title = {Guest Editorial Special Issue on Security and Privacy Protection for Big Data and IoT}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {2}, pages = {1446--1449}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2019.2908460}, doi = {10.1109/JIOT.2019.2908460}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/LiLWRB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/FanWRYYLY19, author = {Kai Fan and Shangyang Wang and Yanhui Ren and Kan Yang and Zheng Yan and Hui Li and Yintang Yang}, title = {Blockchain-Based Secure Time Protection Scheme in IoT}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {3}, pages = {4671--4679}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2018.2874222}, doi = {10.1109/JIOT.2018.2874222}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/FanWRYYLY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/CaoYXML19, author = {Jin Cao and Pu Yu and Xinyin Xiang and Maode Ma and Hui Li}, title = {Anti-Quantum Fast Authentication and Data Transmission Scheme for Massive Devices in 5G NB-IoT System}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {6}, pages = {9794--9805}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2019.2931724}, doi = {10.1109/JIOT.2019.2931724}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/CaoYXML19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LiLZH19, author = {Xiaoguang Li and Hui Li and Hui Zhu and Muyang Huang}, title = {The optimal upper bound of the number of queries for Laplace mechanism under differential privacy}, journal = {Inf. Sci.}, volume = {503}, pages = {219--237}, year = {2019}, url = {https://doi.org/10.1016/j.ins.2019.07.001}, doi = {10.1016/J.INS.2019.07.001}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/LiLZH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LiPLLCM19, author = {Hui Li and Sizhe Peng and Jian Li and Jingjing Li and Jiangtao Cui and Jianfeng Ma}, title = {Counting the frequency of time-constrained serial episodes in a streaming sequence}, journal = {Inf. Sci.}, volume = {505}, pages = {422--439}, year = {2019}, url = {https://doi.org/10.1016/j.ins.2019.07.098}, doi = {10.1016/J.INS.2019.07.098}, timestamp = {Sat, 29 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/LiPLLCM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/LiZ19, author = {Hui Li and Bin Zhao}, title = {On distributivity equations of implications over overlap functions and contrapositive symmetry equations of implications}, journal = {J. Intell. Fuzzy Syst.}, volume = {36}, number = {1}, pages = {283--294}, year = {2019}, url = {https://doi.org/10.3233/JIFS-181279}, doi = {10.3233/JIFS-181279}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jifs/LiZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/FanZZ0Y19, author = {Kai Fan and Shanshan Zhu and Kuan Zhang and Hui Li and Yintang Yang}, title = {A Lightweight Authentication Scheme for Cloud-Based {RFID} Healthcare Systems}, journal = {{IEEE} Netw.}, volume = {33}, number = {2}, pages = {44--49}, year = {2019}, url = {https://doi.org/10.1109/MNET.2019.1800225}, doi = {10.1109/MNET.2019.1800225}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/network/FanZZ0Y19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/FengMMML0019, author = {Xiaoqin Feng and Jianfeng Ma and Yinbin Miao and Qian Meng and Ximeng Liu and Qi Jiang and Hui Li}, title = {Pruneable sharding-based blockchain protocol}, journal = {Peer-to-Peer Netw. Appl.}, volume = {12}, number = {4}, pages = {934--950}, year = {2019}, url = {https://doi.org/10.1007/s12083-018-0685-6}, doi = {10.1007/S12083-018-0685-6}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/FengMMML0019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/FanKZLY19, author = {Kai Fan and Junbin Kang and Shanshan Zhu and Hui Li and Yintang Yang}, title = {Permutation Matrix Encryption Based Ultralightweight Secure {RFID} Scheme in Internet of Vehicles}, journal = {Sensors}, volume = {19}, number = {1}, pages = {152}, year = {2019}, url = {https://doi.org/10.3390/s19010152}, doi = {10.3390/S19010152}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/FanKZLY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangLTL19, author = {Wenjing Zhang and Ming Li and Ravi Tandon and Hui Li}, title = {Online Location Trace Privacy: An Information Theoretic Approach}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {14}, number = {1}, pages = {235--250}, year = {2019}, url = {https://doi.org/10.1109/TIFS.2018.2848659}, doi = {10.1109/TIFS.2018.2848659}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangLTL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/MiaoMLWLL19, author = {Yinbin Miao and Jianfeng Ma and Ximeng Liu and Jian Weng and Hongwei Li and Hui Li}, title = {Lightweight Fine-Grained Search Over Encrypted Data in Fog Computing}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {12}, number = {5}, pages = {772--785}, year = {2019}, url = {https://doi.org/10.1109/TSC.2018.2823309}, doi = {10.1109/TSC.2018.2823309}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsc/MiaoMLWLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiWLDCML19, author = {Yan Li and Zilong Wang and Yingjiu Li and Robert H. Deng and Binbin Chen and Weizhi Meng and Hui Li}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {A Closer Look Tells More: {A} Facial Distortion Based Liveness Detection for Face Authentication}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {241--246}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329850}, doi = {10.1145/3321705.3329850}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LiWLDCML19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/DongLHLLS19, author = {Wenbin Dong and Yang Li and Ronghui Hou and Xixiang Lv and Hui Li and Bo Sun}, title = {A Blockchain-Based Hierarchical Reputation Management Scheme in Vehicular Network}, booktitle = {2019 {IEEE} Global Communications Conference, {GLOBECOM} 2019, Waikoloa, HI, USA, December 9-13, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/GLOBECOM38437.2019.9013631}, doi = {10.1109/GLOBECOM38437.2019.9013631}, timestamp = {Sat, 11 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/DongLHLLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/LiHLLPH19, author = {Liang Li and Ronghui Hou and Ruoguang Li and Hui Li and Miao Pan and Zhu Han}, title = {Delay-Aware Adaptive Wireless Video Streaming in Edge Computing Assisted Ultra-Dense Networks}, booktitle = {2019 {IEEE} Global Communications Conference, {GLOBECOM} 2019, Waikoloa, HI, USA, December 9-13, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/GLOBECOM38437.2019.9014000}, doi = {10.1109/GLOBECOM38437.2019.9014000}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/LiHLLPH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/LiZHYLP19, author = {Liang Li and Xinyue Zhang and Ronghui Hou and Hao Yue and Hui Li and Miao Pan}, title = {Participant Recruitment for Coverage-Aware Mobile Crowdsensing with Location Differential Privacy}, booktitle = {2019 {IEEE} Global Communications Conference, {GLOBECOM} 2019, Waikoloa, HI, USA, December 9-13, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/GLOBECOM38437.2019.9013831}, doi = {10.1109/GLOBECOM38437.2019.9013831}, timestamp = {Tue, 13 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/LiZHYLP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/WuHLLLS19, author = {Jinli Wu and Ronghui Hou and Xixiang Lv and King{-}Shan Lui and Hui Li and Bo Sun}, title = {Physical Layer Security of {OFDM} Communication Using Artificial Pilot Noise}, booktitle = {2019 {IEEE} Global Communications Conference, {GLOBECOM} 2019, Waikoloa, HI, USA, December 9-13, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/GLOBECOM38437.2019.9013183}, doi = {10.1109/GLOBECOM38437.2019.9013183}, timestamp = {Sat, 11 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/WuHLLLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/YanLXDZZL19, author = {Haonan Yan and Hui Li and Mingchi Xiao and Rui Dai and Xianchun Zheng and Xingwen Zhao and Fenghua Li}, title = {{PGSM-DPI:} Precisely Guided Signature Matching of Deep Packet Inspection for Traffic Analysis}, booktitle = {2019 {IEEE} Global Communications Conference, {GLOBECOM} 2019, Waikoloa, HI, USA, December 9-13, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/GLOBECOM38437.2019.9013941}, doi = {10.1109/GLOBECOM38437.2019.9013941}, timestamp = {Wed, 20 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/YanLXDZZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/FanBXPLY19, author = {Kai Fan and Yuhan Bai and Huiyue Xu and Qiang Pan and Hui Li and Yintang Yang}, title = {A Secure Cross-Domain Access Control Scheme in Social Networks}, booktitle = {2019 {IEEE} International Conference on Communications, {ICC} 2019, Shanghai, China, May 20-24, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICC.2019.8761745}, doi = {10.1109/ICC.2019.8761745}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/FanBXPLY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/LiZZLWL19, author = {Qi Li and Hui Zhu and Ziling Zhang and Rongxing Lu and Fengwei Wang and Hui Li}, title = {Spoofing Attacks on Speaker Verification Systems Based Generated Voice using Genetic Algorithm}, booktitle = {2019 {IEEE} International Conference on Communications, {ICC} 2019, Shanghai, China, May 20-24, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICC.2019.8761244}, doi = {10.1109/ICC.2019.8761244}, timestamp = {Wed, 27 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/LiZZLWL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccnc/LiS0CL19, author = {Fenghua Li and Zhe Sun and Ben Niu and Jin Cao and Hui Li}, title = {An Extended Control Framework for Privacy-Preserving Photo Sharing across Different Social Networks}, booktitle = {International Conference on Computing, Networking and Communications, {ICNC} 2019, Honolulu, HI, USA, February 18-21, 2019}, pages = {390--394}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICCNC.2019.8685488}, doi = {10.1109/ICCNC.2019.8685488}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccnc/LiS0CL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccnc/LuoCMLNL19, author = {Yurong Luo and Jin Cao and Maode Ma and Hui Li and Ben Niu and Fenghua Li}, title = {{DIAM:} Diversified Identity Authentication Mechanism for 5G Multi-Service System}, booktitle = {International Conference on Computing, Networking and Communications, {ICNC} 2019, Honolulu, HI, USA, February 18-21, 2019}, pages = {418--424}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICCNC.2019.8685543}, doi = {10.1109/ICCNC.2019.8685543}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccnc/LuoCMLNL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccnc/SunCMLNL19, author = {Yunqing Sun and Jin Cao and Maode Ma and Hui Li and Ben Niu and Fenghua Li}, title = {Privacy-Preserving Device Discovery and Authentication Scheme for {D2D} Communication in 3GPP 5G HetNet}, booktitle = {International Conference on Computing, Networking and Communications, {ICNC} 2019, Honolulu, HI, USA, February 18-21, 2019}, pages = {425--431}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICCNC.2019.8685499}, doi = {10.1109/ICCNC.2019.8685499}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccnc/SunCMLNL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/LiSL0LC19, author = {Fenghua Li and Zhe Sun and Ang Li and Ben Niu and Hui Li and Guohong Cao}, title = {HideMe: Privacy-Preserving Photo Sharing on Social Networks}, booktitle = {2019 {IEEE} Conference on Computer Communications, {INFOCOM} 2019, Paris, France, April 29 - May 2, 2019}, pages = {154--162}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/INFOCOM.2019.8737466}, doi = {10.1109/INFOCOM.2019.8737466}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/LiSL0LC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/FuYWYL19, author = {Yulong Fu and Xinyi Yuan and Ke Wang and Zheng Yan and Hui Li}, title = {A Security Formal Model for Multiple Channels Communication}, booktitle = {2019 {IEEE} SmartWorld, Ubiquitous Intelligence {\&} Computing, Advanced {\&} Trusted Computing, Scalable Computing {\&} Communications, Cloud {\&} Big Data Computing, Internet of People and Smart City Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019, Leicester, United Kingdom, August 19-23, 2019}, pages = {1425--1430}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00258}, doi = {10.1109/SMARTWORLD-UIC-ATC-SCALCOM-IOP-SCI.2019.00258}, timestamp = {Wed, 16 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uic/FuYWYL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/FuLA0CL19, author = {Yulong Fu and Guoquan Li and Mohammed Atiquzzaman and Zheng Yan and Jin Cao and Hui Li}, title = {A Study and Enhancement to the Security of {MANET} {AODV} Protocol Against Black Hole Attacks}, booktitle = {2019 {IEEE} SmartWorld, Ubiquitous Intelligence {\&} Computing, Advanced {\&} Trusted Computing, Scalable Computing {\&} Communications, Cloud {\&} Big Data Computing, Internet of People and Smart City Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019, Leicester, United Kingdom, August 19-23, 2019}, pages = {1431--1436}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00259}, doi = {10.1109/SMARTWORLD-UIC-ATC-SCALCOM-IOP-SCI.2019.00259}, timestamp = {Wed, 16 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uic/FuLA0CL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/YuCM0NL19, author = {Pu Yu and Jin Cao and Maode Ma and Hui Li and Ben Niu and Fenghua Li}, title = {Quantum-Resistance Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks}, booktitle = {2019 {IEEE} Wireless Communications and Networking Conference, {WCNC} 2019, Marrakesh, Morocco, April 15-18, 2019}, pages = {1--7}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/WCNC.2019.8885686}, doi = {10.1109/WCNC.2019.8885686}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcnc/YuCM0NL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ZhangLML18, author = {Kai Zhang and Hui Li and Jianfeng Ma and Ximeng Liu}, title = {Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability}, journal = {Sci. China Inf. Sci.}, volume = {61}, number = {3}, pages = {32102}, year = {2018}, url = {https://doi.org/10.1007/s11432-016-9019-8}, doi = {10.1007/S11432-016-9019-8}, timestamp = {Fri, 28 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/ZhangLML18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/MaMLJG18, author = {XinDi Ma and Jianfeng Ma and Hui Li and Qi Jiang and Sheng Gao}, title = {{ARMOR:} {A} trust-based privacy-preserving framework for decentralized friend recommendation in online social networks}, journal = {Future Gener. Comput. Syst.}, volume = {79}, pages = {82--94}, year = {2018}, url = {https://doi.org/10.1016/j.future.2017.09.060}, doi = {10.1016/J.FUTURE.2017.09.060}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/MaMLJG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/HanZL18, author = {Qi Han and Yinghui Zhang and Hui Li}, title = {Efficient and robust attribute-based encryption supporting access policy hiding in Internet of Things}, journal = {Future Gener. Comput. Syst.}, volume = {83}, pages = {269--277}, year = {2018}, url = {https://doi.org/10.1016/j.future.2018.01.019}, doi = {10.1016/J.FUTURE.2018.01.019}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/HanZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-com/FanRWLY18, author = {Kai Fan and Yanhui Ren and Yue Wang and Hui Li and Yingtang Yang}, title = {Blockchain-based efficient privacy preserving and data sharing scheme of content-centric network in 5G}, journal = {{IET} Commun.}, volume = {12}, number = {5}, pages = {527--532}, year = {2018}, url = {https://doi.org/10.1049/iet-com.2017.0619}, doi = {10.1049/IET-COM.2017.0619}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-com/FanRWLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/DangXC0CZF18, author = {Lanjun Dang and Jie Xu and Xuefei Cao and Hui Li and Jie Chen and Yueyu Zhang and Xiaotong Fu}, title = {Efficient identity-based authenticated key agreement protocol with provable security for vehicular ad hoc networks}, journal = {Int. J. Distributed Sens. Networks}, volume = {14}, number = {4}, year = {2018}, url = {https://doi.org/10.1177/1550147718772545}, doi = {10.1177/1550147718772545}, timestamp = {Wed, 09 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/DangXC0CZF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ZhuWLLFL18, author = {Hui Zhu and Fengwei Wang and Rongxing Lu and Fen Liu and Gang Fu and Hui Li}, title = {Efficient and Privacy-Preserving Proximity Detection Schemes for Social Applications}, journal = {{IEEE} Internet Things J.}, volume = {5}, number = {4}, pages = {2947--2957}, year = {2018}, url = {https://doi.org/10.1109/JIOT.2017.2766701}, doi = {10.1109/JIOT.2017.2766701}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/ZhuWLLFL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/MiaoMLLLL18, author = {Yinbin Miao and Jianfeng Ma and Ximeng Liu and Xinghua Li and Zhiquan Liu and Hui Li}, title = {Practical Attribute-Based Multi-Keyword Search Scheme in Mobile Crowdsourcing}, journal = {{IEEE} Internet Things J.}, volume = {5}, number = {4}, pages = {3008--3018}, year = {2018}, url = {https://doi.org/10.1109/JIOT.2017.2779124}, doi = {10.1109/JIOT.2017.2779124}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/MiaoMLLLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/FanWRLY18, author = {Kai Fan and Shangyang Wang and Yanhui Ren and Hui Li and Yintang Yang}, title = {MedBlock: Efficient and Secure Medical Data Sharing Via Blockchain}, journal = {J. Medical Syst.}, volume = {42}, number = {8}, pages = {136:1--136:11}, year = {2018}, url = {https://doi.org/10.1007/s10916-018-0993-7}, doi = {10.1007/S10916-018-0993-7}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jms/FanWRLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/CaoMLFL18, author = {Jin Cao and Maode Ma and Hui Li and Yulong Fu and Xuefeng Liu}, title = {{EGHR:} Efficient group-based handover authentication protocols for mMTC in 5G wireless networks}, journal = {J. Netw. Comput. Appl.}, volume = {102}, pages = {1--16}, year = {2018}, url = {https://doi.org/10.1016/j.jnca.2017.11.009}, doi = {10.1016/J.JNCA.2017.11.009}, timestamp = {Fri, 28 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/CaoMLFL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/FanWSLY18, author = {Kai Fan and Xin Wang and Katsuya Suto and Hui Li and Yintang Yang}, title = {Secure and Efficient Privacy-Preserving Ciphertext Retrieval in Connected Vehicular Cloud Computing}, journal = {{IEEE} Netw.}, volume = {32}, number = {3}, pages = {52--57}, year = {2018}, url = {https://doi.org/10.1109/MNET.2018.1700327}, doi = {10.1109/MNET.2018.1700327}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/FanWSLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/LiuZLL18, author = {Xiaoxia Liu and Hui Zhu and Rongxing Lu and Hui Li}, title = {Efficient privacy-preserving online medical primary diagnosis scheme on naive bayesian classification}, journal = {Peer-to-Peer Netw. Appl.}, volume = {11}, number = {2}, pages = {334--347}, year = {2018}, url = {https://doi.org/10.1007/s12083-016-0506-8}, doi = {10.1007/S12083-016-0506-8}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/LiuZLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/MaMLJG18, author = {XinDi Ma and Jianfeng Ma and Hui Li and Qi Jiang and Sheng Gao}, title = {{AGENT:} an adaptive geo-indistinguishable mechanism for continuous location-based service}, journal = {Peer-to-Peer Netw. Appl.}, volume = {11}, number = {3}, pages = {473--485}, year = {2018}, url = {https://doi.org/10.1007/s12083-017-0545-9}, doi = {10.1007/S12083-017-0545-9}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/MaMLJG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/FanWJLY18, author = {Kai Fan and Wei Wang and Wei Jiang and Hui Li and Yintang Yang}, title = {Secure ultra-lightweight {RFID} mutual authentication protocol based on transparent computing for IoV}, journal = {Peer-to-Peer Netw. Appl.}, volume = {11}, number = {4}, pages = {723--734}, year = {2018}, url = {https://doi.org/10.1007/s12083-017-0553-9}, doi = {10.1007/S12083-017-0553-9}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/FanWJLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/FanWWLY18, author = {Kai Fan and Junxiong Wang and Xin Wang and Hui Li and Yintang Yang}, title = {Secure, efficient and revocable data sharing scheme for vehicular fogs}, journal = {Peer-to-Peer Netw. Appl.}, volume = {11}, number = {4}, pages = {766--777}, year = {2018}, url = {https://doi.org/10.1007/s12083-017-0562-8}, doi = {10.1007/S12083-017-0562-8}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/FanWWLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/FanLSLY18, author = {Kai Fan and Shuyang Lou and Ruidan Su and Hui Li and Yintang Yang}, title = {Secure and private key management scheme in big data networking}, journal = {Peer-to-Peer Netw. Appl.}, volume = {11}, number = {5}, pages = {992--999}, year = {2018}, url = {https://doi.org/10.1007/s12083-017-0579-z}, doi = {10.1007/S12083-017-0579-Z}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/FanLSLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/CaoLML18, author = {Jin Cao and Hui Li and Maode Ma and Fenghua Li}, title = {{UPPGHA:} Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in {LTE-A} Networks}, journal = {Secur. Commun. Networks}, volume = {2018}, pages = {6854612:1--6854612:16}, year = {2018}, url = {https://doi.org/10.1155/2018/6854612}, doi = {10.1155/2018/6854612}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/CaoLML18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ShanLLGN18, author = {Fangfang Shan and Hui Li and Fenghua Li and Yunchuan Guo and Ben Niu}, title = {{HAC:} Hybrid Access Control for Online Social Networks}, journal = {Secur. Commun. Networks}, volume = {2018}, pages = {7384194:1--7384194:11}, year = {2018}, url = {https://doi.org/10.1155/2018/7384194}, doi = {10.1155/2018/7384194}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/ShanLLGN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/FanYZLY18, author = {Kai Fan and Jie Yin and Kuan Zhang and Hui Li and Yintang Yang}, title = {{EARS-DM:} Efficient Auto Correction Retrieval Scheme for Data Management in Edge Computing}, journal = {Sensors}, volume = {18}, number = {11}, pages = {3616}, year = {2018}, url = {https://doi.org/10.3390/s18113616}, doi = {10.3390/S18113616}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/FanYZLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/FanJ0Y18, author = {Kai Fan and Wei Jiang and Hui Li and Yintang Yang}, title = {Lightweight {RFID} Protocol for Medical Privacy Protection in IoT}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {14}, number = {4}, pages = {1656--1665}, year = {2018}, url = {https://doi.org/10.1109/TII.2018.2794996}, doi = {10.1109/TII.2018.2794996}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/FanJ0Y18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/WangZLLLLZ18, author = {Fengwei Wang and Hui Zhu and Ximeng Liu and Rongxing Lu and Fenghua Li and Hui Li and Songnian Zhang}, title = {Efficient and Privacy-Preserving Dynamic Spatial Query Scheme for Ride-Hailing Services}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {67}, number = {11}, pages = {11084--11097}, year = {2018}, url = {https://doi.org/10.1109/TVT.2018.2868869}, doi = {10.1109/TVT.2018.2868869}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvt/WangZLLLLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/Zhu0Y18, author = {Xudong Zhu and Hui Li and Yang Yu}, editor = {Fuchun Guo and Xinyi Huang and Moti Yung}, title = {Blockchain-Based Privacy Preserving Deep Learning}, booktitle = {Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11449}, pages = {370--383}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-14234-6\_20}, doi = {10.1007/978-3-030-14234-6\_20}, timestamp = {Thu, 14 Jul 2022 16:21:07 +0200}, biburl = {https://dblp.org/rec/conf/cisc/Zhu0Y18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edge/FanPWL0Y18, author = {Kai Fan and Qiang Pan and Junxiong Wang and Tingting Liu and Hui Li and Yintang Yang}, title = {Cross-Domain Based Data Sharing Scheme in Cooperative Edge Computing}, booktitle = {2018 {IEEE} International Conference on Edge Computing, {EDGE} 2018, San Francisco, CA, USA, July 2-7, 2018}, pages = {87--92}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/EDGE.2018.00019}, doi = {10.1109/EDGE.2018.00019}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edge/FanPWL0Y18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/LiHLL18, author = {Yang Li and Ronghui Hou and King{-}Shan Lui and Hui Li}, title = {An MEC-Based DoS Attack Detection Mechanism for {C-V2X} Networks}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2018, Abu Dhabi, United Arab Emirates, December 9-13, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/GLOCOM.2018.8647323}, doi = {10.1109/GLOCOM.2018.8647323}, timestamp = {Sat, 11 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/LiHLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/XiaoZSLDL18, author = {Rui Xiao and Hui Zhu and Chao Song and Ximeng Liu and Jian Dong and Hui Li}, title = {Attacking Network Isolation in Software-Defined Networks: New Attacks and Countermeasures}, booktitle = {27th International Conference on Computer Communication and Networks, {ICCCN} 2018, Hangzhou, China, July 30 - August 2, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICCCN.2018.8487340}, doi = {10.1109/ICCCN.2018.8487340}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccn/XiaoZSLDL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/ZhuZLLWL18, author = {Dan Zhu and Hui Zhu and Ximeng Liu and Hui Li and Fengwei Wang and Hao Li}, title = {Achieve Efficient and Privacy-Preserving Medical Primary Diagnosis Based on kNN}, booktitle = {27th International Conference on Computer Communication and Networks, {ICCCN} 2018, Hangzhou, China, July 30 - August 2, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICCCN.2018.8487422}, doi = {10.1109/ICCCN.2018.8487422}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccn/ZhuZLLWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ithings/YangZLLL18, author = {Xiaopeng Yang and Hui Zhu and Rongxing Lu and Ximeng Liu and Hui Li}, title = {Efficient and Privacy-Preserving Online Face Recognition Over Encrypted Outsourced Data}, booktitle = {{IEEE} International Conference on Internet of Things (iThings) and {IEEE} Green Computing and Communications (GreenCom) and {IEEE} Cyber, Physical and Social Computing (CPSCom) and {IEEE} Smart Data (SmartData), iThings/GreenCom/CPSCom/SmartData 2018, Halifax, NS, Canada, July 30 - August 3, 2018}, pages = {366--373}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/Cybermatics\_2018.2018.00089}, doi = {10.1109/CYBERMATICS\_2018.2018.00089}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ithings/YangZLLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ithings/FanRYWLY18, author = {Kai Fan and Yanhui Ren and Zheng Yan and Shangyang Wang and Hui Li and Yintang Yang}, title = {Secure Time Synchronization Scheme in IoT Based on Blockchain}, booktitle = {{IEEE} International Conference on Internet of Things (iThings) and {IEEE} Green Computing and Communications (GreenCom) and {IEEE} Cyber, Physical and Social Computing (CPSCom) and {IEEE} Smart Data (SmartData), iThings/GreenCom/CPSCom/SmartData 2018, Halifax, NS, Canada, July 30 - August 3, 2018}, pages = {1063--1068}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/Cybermatics\_2018.2018.00196}, doi = {10.1109/CYBERMATICS\_2018.2018.00196}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ithings/FanRYWLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-09639, author = {Hui Li and Sizhe Peng and Jian Li and Jingjing Li and Jiangtao Cui and Jianfeng Ma}, title = {{ONCE} and {ONCE+:} Counting the Frequency of Time-constrained Serial Episodes in a Streaming Sequence}, journal = {CoRR}, volume = {abs/1801.09639}, year = {2018}, url = {http://arxiv.org/abs/1801.09639}, eprinttype = {arXiv}, eprint = {1801.09639}, timestamp = {Sat, 29 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-09639.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiLNC18, author = {Fenghua Li and Hui Li and Ben Niu and Jinjun Chen}, title = {Privacy Computing: Concept, Computing Framework And Future Development Trends}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1145}, year = {2018}, url = {https://eprint.iacr.org/2018/1145}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiLNC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/Peng0CZMP17, author = {Yanguo Peng and Hui Li and Jiangtao Cui and Junwei Zhang and Jianfeng Ma and Changgen Peng}, title = {hOPE: improved order preserving encryption with the power to homomorphic operations of ciphertexts}, journal = {Sci. China Inf. Sci.}, volume = {60}, number = {6}, pages = {62101}, year = {2017}, url = {https://doi.org/10.1007/s11432-016-0242-7}, doi = {10.1007/S11432-016-0242-7}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/Peng0CZMP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/Ma0M0GXL17, author = {XinDi Ma and Hui Li and Jianfeng Ma and Qi Jiang and Sheng Gao and Ning Xi and Di Lu}, title = {{APPLET:} a privacy-preserving framework for location-aware recommender system}, journal = {Sci. China Inf. Sci.}, volume = {60}, number = {9}, pages = {92101}, year = {2017}, url = {https://doi.org/10.1007/s11432-015-0981-4}, doi = {10.1007/S11432-015-0981-4}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/Ma0M0GXL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FuYLXC17, author = {Yulong Fu and Zheng Yan and Hui Li and Xiao{-}Long Xin and Jin Cao}, title = {A secure {SDN} based multi-RANs architecture for future 5G networks}, journal = {Comput. Secur.}, volume = {70}, pages = {648--662}, year = {2017}, url = {https://doi.org/10.1016/j.cose.2017.08.013}, doi = {10.1016/J.COSE.2017.08.013}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FuYLXC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/Cao0DL17, author = {Xuefei Cao and Hui Li and Lanjun Dang and Yin Lin}, title = {A two-party privacy preserving set intersection protocol against malicious users in cloud computing}, journal = {Comput. Stand. Interfaces}, volume = {54}, pages = {41--45}, year = {2017}, url = {https://doi.org/10.1016/j.csi.2016.08.004}, doi = {10.1016/J.CSI.2016.08.004}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/Cao0DL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ZhuLL17, author = {Hui Zhu and Fen Liu and Hui Li}, title = {Efficient and Privacy-Preserving Polygons Spatial Query Framework for Location-Based Services}, journal = {{IEEE} Internet Things J.}, volume = {4}, number = {2}, pages = {536--545}, year = {2017}, url = {https://doi.org/10.1109/JIOT.2016.2553083}, doi = {10.1109/JIOT.2016.2553083}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/ZhuLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/YangHLZSS17, author = {Kan Yang and Qi Han and Hui Li and Kan Zheng and Zhou Su and Xuemin Shen}, title = {An Efficient and Fine-Grained Big Data Access Control Scheme With Privacy-Preserving Policy}, journal = {{IEEE} Internet Things J.}, volume = {4}, number = {2}, pages = {563--571}, year = {2017}, url = {https://doi.org/10.1109/JIOT.2016.2571718}, doi = {10.1109/JIOT.2016.2571718}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/YangHLZSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ZhangCLWLY17, author = {Yinghui Zhang and Xiaofeng Chen and Jin Li and Duncan S. Wong and Hui Li and Ilsun You}, title = {Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing}, journal = {Inf. Sci.}, volume = {379}, pages = {42--61}, year = {2017}, url = {https://doi.org/10.1016/j.ins.2016.04.015}, doi = {10.1016/J.INS.2016.04.015}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ZhangCLWLY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LiHNL17, author = {Fenghua Li and Yuanyuan He and Ben Niu and Hui Li}, title = {Small-world: Secure friend matching over physical world and social networks}, journal = {Inf. Sci.}, volume = {387}, pages = {205--220}, year = {2017}, url = {https://doi.org/10.1016/j.ins.2016.09.057}, doi = {10.1016/J.INS.2016.09.057}, timestamp = {Wed, 29 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/LiHNL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcin/MengLC17, author = {Xue Meng and Hui Li and Jiangtao Cui}, title = {Different strategies for differentially private histogram publication}, journal = {J. Commun. Inf. Networks}, volume = {2}, number = {3}, pages = {68--77}, year = {2017}, url = {https://doi.org/10.1007/s41650-017-0014-x}, doi = {10.1007/S41650-017-0014-X}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcin/MengLC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/LiuWZL17, author = {Qiao Liu and Yong Wang and Wenjing Zhang and Hui Li}, title = {Secret Data Transmission in Wireless Sensor Network with Physical Layer Network Coding}, journal = {J. Inf. Sci. Eng.}, volume = {33}, number = {4}, pages = {1055--1067}, year = {2017}, url = {https://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=157\_2056}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/LiuWZL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mis/LiuGWL17, author = {Qiao Liu and Guang Gong and Yong Wang and Hui Li}, title = {A Novel Secure Transmission Scheme in {MIMO} Two-Way Relay Channels with Physical Layer Approach}, journal = {Mob. Inf. Syst.}, volume = {2017}, pages = {7843843:1--7843843:12}, year = {2017}, url = {https://doi.org/10.1155/2017/7843843}, doi = {10.1155/2017/7843843}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mis/LiuGWL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/FanGGLSY17, author = {Kai Fan and Nan Ge and Yuanyuan Gong and Hui Li and Ruidan Su and Yintang Yang}, title = {An ultra-lightweight {RFID} authentication scheme for mobile commerce}, journal = {Peer-to-Peer Netw. Appl.}, volume = {10}, number = {2}, pages = {368--376}, year = {2017}, url = {https://doi.org/10.1007/s12083-016-0443-6}, doi = {10.1007/S12083-016-0443-6}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/FanGGLSY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/puc/ZhangLZCL17, author = {Yinghui Zhang and Jin Li and Dong Zheng and Xiaofeng Chen and Hui Li}, title = {Towards privacy protection and malicious behavior traceability in smart health}, journal = {Pers. Ubiquitous Comput.}, volume = {21}, number = {5}, pages = {815--830}, year = {2017}, url = {https://doi.org/10.1007/s00779-017-1047-8}, doi = {10.1007/S00779-017-1047-8}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/puc/ZhangLZCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/puc/ZhouLWL17, author = {Lu Zhou and Qiao Liu and Yong Wang and Hui Li}, title = {Secure group information exchange scheme for vehicular ad hoc networks}, journal = {Pers. Ubiquitous Comput.}, volume = {21}, number = {5}, pages = {903--910}, year = {2017}, url = {https://doi.org/10.1007/s00779-017-1049-6}, doi = {10.1007/S00779-017-1049-6}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/puc/ZhouLWL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/FanSDZLYLY17, author = {Kai Fan and Panfei Song and Zhao Du and Haojin Zhu and Hui Li and Yintang Yang and Xinghua Li and Chao Yang}, title = {{NFC} Secure Payment and Verification Scheme with {CS} E-Ticket}, journal = {Secur. Commun. Networks}, volume = {2017}, pages = {4796373:1--4796373:9}, year = {2017}, url = {https://doi.org/10.1155/2017/4796373}, doi = {10.1155/2017/4796373}, timestamp = {Thu, 08 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/FanSDZLYLY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/FanWWLY17, author = {Kai Fan and Junxiong Wang and Xin Wang and Hui Li and Yintang Yang}, title = {A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing}, journal = {Sensors}, volume = {17}, number = {7}, pages = {1695}, year = {2017}, url = {https://doi.org/10.3390/s17071695}, doi = {10.3390/S17071695}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/FanWWLY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/titb/ZhuLL017, author = {Hui Zhu and Xiaoxia Liu and Rongxing Lu and Hui Li}, title = {Efficient and Privacy-Preserving Online Medical Prediagnosis Framework Using Nonlinear {SVM}}, journal = {{IEEE} J. Biomed. Health Informatics}, volume = {21}, number = {3}, pages = {838--850}, year = {2017}, url = {https://doi.org/10.1109/JBHI.2016.2548248}, doi = {10.1109/JBHI.2016.2548248}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/titb/ZhuLL017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/LaiZC0S17, author = {Chengzhe Lai and Kuan Zhang and Nan Cheng and Hui Li and Xuemin Shen}, title = {{SIRC:} {A} Secure Incentive Scheme for Reliable Cooperative Downloading in Highway VANETs}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {18}, number = {6}, pages = {1559--1574}, year = {2017}, url = {https://doi.org/10.1109/TITS.2016.2612233}, doi = {10.1109/TITS.2016.2612233}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/LaiZC0S17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/LiuSQLZL17, author = {Xuefeng Liu and Wenhai Sun and Hanyu Quan and Wenjing Lou and Yuqing Zhang and Hui Li}, title = {Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {10}, number = {5}, pages = {826--838}, year = {2017}, url = {https://doi.org/10.1109/TSC.2016.2531665}, doi = {10.1109/TSC.2016.2531665}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/LiuSQLZL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/CaoML17, author = {Jin Cao and Maode Ma and Hui Li}, title = {{G2RHA:} Group-to-Route Handover Authentication Scheme for Mobile Relays in {LTE-A} High-Speed Rail Networks}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {66}, number = {11}, pages = {9689--9701}, year = {2017}, url = {https://doi.org/10.1109/TVT.2017.2750219}, doi = {10.1109/TVT.2017.2750219}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/CaoML17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acm/FanLJXY17, author = {Kai Fan and Hui Li and Wei Jiang and Chengsheng Xiao and Yintang Yang}, editor = {John C. S. Lui and Xinbing Wang and Alexander Wolf and Yunhao Liu and Chuanping Hu}, title = {{U2F} based secure mutual authentication protocol for mobile payment}, booktitle = {Proceedings of the {ACM} Turing 50th Celebration Conference - China, {TUR-C} 2017, Shanghai, China, May 12-14, 2017}, pages = {27:1--27:6}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3063955.3063982}, doi = {10.1145/3063955.3063982}, timestamp = {Tue, 20 Dec 2022 21:20:01 +0100}, biburl = {https://dblp.org/rec/conf/acm/FanLJXY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsw/LinZL17, author = {Jiaping Lin and Xingwen Zhao and Hui Li}, title = {Target: category-based android malware detection revisited}, booktitle = {Proceedings of the Australasian Computer Science Week Multiconference, {ACSW} 2017, Geelong, Australia, January 31 - February 3, 2017}, pages = {74:1--74:9}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3014812.3014888}, doi = {10.1145/3014812.3014888}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsw/LinZL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/css/ZhaoL17, author = {Xingwen Zhao and Hui Li}, editor = {Sheng Wen and Wei Wu and Aniello Castiglione}, title = {Privacy Preserving Authenticating and Billing Scheme for Video Streaming Service}, booktitle = {Cyberspace Safety and Security - 9th International Symposium, {CSS} 2017, Xi'an, China, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10581}, pages = {396--410}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69471-9\_29}, doi = {10.1007/978-3-319-69471-9\_29}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/css/ZhaoL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/KhanLZS17, author = {Fawad Khan and Hui Li and Liangxuan Zhang and Jian Shen}, title = {An Expressive Hidden Access Policy {CP-ABE}}, booktitle = {Second {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2017, Shenzhen, China, June 26-29, 2017}, pages = {178--186}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/DSC.2017.29}, doi = {10.1109/DSC.2017.29}, timestamp = {Wed, 25 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dsc/KhanLZS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/FanLLY17, author = {Kai Fan and Qi Luo and Hui Li and Yintang Yang}, title = {Cloud-Based Lightweight {RFID} Mutual Authentication Protocol}, booktitle = {Second {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2017, Shenzhen, China, June 26-29, 2017}, pages = {333--338}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/DSC.2017.41}, doi = {10.1109/DSC.2017.41}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsc/FanLLY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/ZhangLZK17, author = {Liangxuan Zhang and Hui Li and Yinghui Zhang and Fawad Khan}, title = {Privacy-Preserving Attribute-Based Encryption Supporting Expressive Access Structures}, booktitle = {Second {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2017, Shenzhen, China, June 26-29, 2017}, pages = {475--482}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/DSC.2017.61}, doi = {10.1109/DSC.2017.61}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsc/ZhangLZK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/LiNL17, author = {Weihao Li and Ben Niu and Hui Li}, title = {Privacy Preservation Strategy in Time-Sensitive LBSs}, booktitle = {Second {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2017, Shenzhen, China, June 26-29, 2017}, pages = {488--493}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/DSC.2017.12}, doi = {10.1109/DSC.2017.12}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsc/LiNL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/FanYWLY17, author = {Kai Fan and Jie Yin and Junxiong Wang and Hui Li and Yintang Yang}, title = {Multi-Keyword Fuzzy and Sortable Ciphertext Retrieval Scheme for Big Data}, booktitle = {2017 {IEEE} Global Communications Conference, {GLOBECOM} 2017, Singapore, December 4-8, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/GLOCOM.2017.8254990}, doi = {10.1109/GLOCOM.2017.8254990}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/FanYWLY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/LiWNLLC17, author = {Fenghua Li and Xinyu Wang and Ben Niu and Hui Li and Chao Li and Lihua Chen}, title = {TrackU: Exploiting User's Mobility Behavior via WiFi List}, booktitle = {2017 {IEEE} Global Communications Conference, {GLOBECOM} 2017, Singapore, December 4-8, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/GLOCOM.2017.8254030}, doi = {10.1109/GLOCOM.2017.8254030}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/LiWNLLC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/CaoMLFNL17, author = {Jin Cao and Maode Ma and Hui Li and Yulong Fu and Ben Niu and Fenghua Li}, title = {Trajectory prediction-based handover authentication mechanism for mobile relays in {LTE-A} high-speed rail networks}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2017, Paris, France, May 21-25, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICC.2017.7997254}, doi = {10.1109/ICC.2017.7997254}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/CaoMLFNL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/HeZWLNL17, author = {Yuanyuan He and Kuan Zhang and Hanyi Wang and Fenghua Li and Ben Niu and Hui Li}, title = {Impact factor-based group recommendation scheme with privacy preservation in MSNs}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2017, Paris, France, May 21-25, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICC.2017.7996987}, doi = {10.1109/ICC.2017.7996987}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/HeZWLNL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/WeiZLL17, author = {Qing Wei and Hui Zhu and Rongxing Lu and Hui Li}, title = {Achieve efficient and privacy-preserving online fingerprint authentication over encrypted outsourced data}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2017, Paris, France, May 21-25, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICC.2017.7997112}, doi = {10.1109/ICC.2017.7997112}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/WeiZLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/LiuLLMM17, author = {Hai Liu and Xinghua Li and Hui Li and Jianfeng Ma and XinDi Ma}, title = {Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services}, booktitle = {2017 {IEEE} Conference on Computer Communications, {INFOCOM} 2017, Atlanta, GA, USA, May 1-4, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/INFOCOM.2017.8056978}, doi = {10.1109/INFOCOM.2017.8056978}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/LiuLLMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ZhangLZK17, author = {Liangxuan Zhang and Hui Li and Yinghui Zhang and Fawad Khan}, title = {Efficient privacy-preserving decentralized {ABE} supporting expressive access structures}, booktitle = {2017 {IEEE} Conference on Computer Communications Workshops, {INFOCOM} Workshops, Atlanta, GA, USA, May 1-4, 2017}, pages = {547--552}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/INFCOMW.2017.8116436}, doi = {10.1109/INFCOMW.2017.8116436}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/ZhangLZK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsda/MaWG017, author = {Dongxu Ma and Zilong Wang and Guang Gong and Hui Li}, title = {A new method to construct golay complementary set and near-complementary set by paraunitary matrices}, booktitle = {Eighth International Workshop on Signal Design and Its Applications in Communications, {IWSDA} 2017, Sapporo, Japan, September 24-28, 2017}, pages = {9--13}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/IWSDA.2017.8095726}, doi = {10.1109/IWSDA.2017.8095726}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsda/MaWG017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/WangZLLH017, author = {Fengwei Wang and Hui Zhu and Rongxing Lu and Fen Liu and Cheng Huang and Hui Li}, editor = {Xiaodong Lin and Ali A. Ghorbani and Kui Ren and Sencun Zhu and Aiqing Zhang}, title = {Achieve Efficient and Privacy-Preserving Proximity Detection Scheme for Social Applications}, booktitle = {Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {238}, pages = {339--355}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-78813-5\_17}, doi = {10.1007/978-3-319-78813-5\_17}, timestamp = {Wed, 22 Dec 2021 13:40:59 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/WangZLLH017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/LiLFNG017, author = {Fenghua Li and Jiawen Liu and Liang Fang and Ben Niu and Kui Geng and Hui Li}, editor = {Liran Ma and Abdallah Khreishah and Yan Zhang and Mingyuan Yan}, title = {Pricing Privacy Leakage in Location-Based Services}, booktitle = {Wireless Algorithms, Systems, and Applications - 12th International Conference, {WASA} 2017, Guilin, China, June 19-21, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10251}, pages = {406--418}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60033-8\_36}, doi = {10.1007/978-3-319-60033-8\_36}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wasa/LiLFNG017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LaiLZLS16, author = {Chengzhe Lai and Rongxing Lu and Dong Zheng and Hui Li and Xuemin (Sherman) Shen}, title = {{GLARM:} Group-based lightweight authentication scheme for resource-constrained machine to machine communications}, journal = {Comput. Networks}, volume = {99}, pages = {66--81}, year = {2016}, url = {https://doi.org/10.1016/j.comnet.2016.02.007}, doi = {10.1016/J.COMNET.2016.02.007}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LaiLZLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dsp/WangMLLL16, author = {Yong Wang and Sufang Ma and Qiao Liu and Yanling Liu and Hui Li}, title = {{MIMO} relay channel signal transmission in transformed signal subspace}, journal = {Digit. Signal Process.}, volume = {57}, pages = {46--55}, year = {2016}, url = {https://doi.org/10.1016/j.dsp.2016.06.011}, doi = {10.1016/J.DSP.2016.06.011}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dsp/WangMLLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/MaW016, author = {Dongxu Ma and Zilong Wang and Hui Li}, title = {A Generalized Construction of Non-Square {M-QAM} Sequences with Low {PMEPR} for {OFDM} Systems}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {99-A}, number = {6}, pages = {1222--1227}, year = {2016}, url = {https://doi.org/10.1587/transfun.E99.A.1222}, doi = {10.1587/TRANSFUN.E99.A.1222}, timestamp = {Sat, 22 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/MaW016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/FanDGWYLY16, author = {Kai Fan and Zhao Du and Yuanyuan Gong and Yue Wang and Tongjiang Yan and Hui Li and Yintang Yang}, title = {A Secure {RFID} Application Revocation Scheme for IoT}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {99-D}, number = {8}, pages = {2027--2035}, year = {2016}, url = {https://doi.org/10.1587/transinf.2015INP0008}, doi = {10.1587/TRANSINF.2015INP0008}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/FanDGWYLY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/ZhuHL016, author = {Hui Zhu and Xiaoying He and Ximeng Liu and Hui Li}, title = {{PTFA:} a secure and privacy-preserving traffic flow analysis scheme for intelligent transportation system}, journal = {Int. J. Embed. Syst.}, volume = {8}, number = {1}, pages = {78--86}, year = {2016}, url = {https://doi.org/10.1504/IJES.2016.073749}, doi = {10.1504/IJES.2016.073749}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijes/ZhuHL016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijthi/LiHNYL16, author = {Xiuguang Li and Yuanyuan He and Ben Niu and Kai Yang and Hui Li}, title = {An Exact and Efficient Privacy-Preserving Spatiotemporal Matching in Mobile Social Networks}, journal = {Int. J. Technol. Hum. Interact.}, volume = {12}, number = {2}, pages = {36--47}, year = {2016}, url = {https://doi.org/10.4018/IJTHI.2016040103}, doi = {10.4018/IJTHI.2016040103}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijthi/LiHNYL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/XiangLWZ16, author = {Xinyin Xiang and Hui Li and Mingyu Wang and Xingwen Zhao}, title = {Efficient multi-party concurrent signature from lattices}, journal = {Inf. Process. Lett.}, volume = {116}, number = {8}, pages = {497--502}, year = {2016}, url = {https://doi.org/10.1016/j.ipl.2016.02.007}, doi = {10.1016/J.IPL.2016.02.007}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipl/XiangLWZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/percom/ZhangZ0LL16, author = {Yinghui Zhang and Dong Zheng and Xiaofeng Chen and Jin Li and Hui Li}, title = {Efficient attribute-based data sharing in mobile clouds}, journal = {Pervasive Mob. Comput.}, volume = {28}, pages = {135--149}, year = {2016}, url = {https://doi.org/10.1016/j.pmcj.2015.06.009}, doi = {10.1016/J.PMCJ.2015.06.009}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/percom/ZhangZ0LL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhuLLL16, author = {Hui Zhu and Xiaoxia Liu and Rongxing Lu and Hui Li}, title = {{EPCS:} an efficient and privacy-preserving classification service query framework for {SVM}}, journal = {Secur. Commun. Networks}, volume = {9}, number = {11}, pages = {1309--1320}, year = {2016}, url = {https://doi.org/10.1002/sec.1416}, doi = {10.1002/SEC.1416}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/ZhuLLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Zhang00L16, author = {Yinghui Zhang and Jin Li and Xiaofeng Chen and Hui Li}, title = {Anonymous attribute-based proxy re-encryption for access control in cloud computing}, journal = {Secur. Commun. Networks}, volume = {9}, number = {14}, pages = {2397--2411}, year = {2016}, url = {https://doi.org/10.1002/sec.1509}, doi = {10.1002/SEC.1509}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Zhang00L16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/FanGLLY16, author = {Kai Fan and Yuanyuan Gong and Chen Liang and Hui Li and Yintang Yang}, title = {Lightweight and ultralightweight {RFID} mutual authentication protocol with cache in the reader for IoT in 5G}, journal = {Secur. Commun. Networks}, volume = {9}, number = {16}, pages = {3095--3104}, year = {2016}, url = {https://doi.org/10.1002/sec.1314}, doi = {10.1002/SEC.1314}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/FanGLLY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangZLLL16, author = {Yinghui Zhang and Dong Zheng and Qi Li and Jin Li and Hui Li}, title = {Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing}, journal = {Secur. Commun. Networks}, volume = {9}, number = {16}, pages = {3688--3702}, year = {2016}, url = {https://doi.org/10.1002/sec.1574}, doi = {10.1002/SEC.1574}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangZLLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/ZhuG016, author = {Hui Zhu and Lijuan Gao and Hui Li}, title = {Secure and Privacy-Preserving Body Sensor Data Collection and Query Scheme}, journal = {Sensors}, volume = {16}, number = {2}, pages = {179}, year = {2016}, url = {https://doi.org/10.3390/s16020179}, doi = {10.3390/S16020179}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/ZhuG016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/SunYLH016, author = {Wenhai Sun and Shucheng Yu and Wenjing Lou and Y. Thomas Hou and Hui Li}, title = {Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {27}, number = {4}, pages = {1187--1198}, year = {2016}, url = {https://doi.org/10.1109/TPDS.2014.2355202}, doi = {10.1109/TPDS.2014.2355202}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/SunYLH016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/ZhuLHCL16, author = {Hui Zhu and Rongxing Lu and Cheng Huang and Le Chen and Hui Li}, title = {An Efficient Privacy-Preserving Location-Based Services Query Scheme in Outsourced Cloud}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {65}, number = {9}, pages = {7729--7739}, year = {2016}, url = {https://doi.org/10.1109/TVT.2015.2499791}, doi = {10.1109/TVT.2015.2499791}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvt/ZhuLHCL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/LaiLLZS16, author = {Chengzhe Lai and Rongxing Lu and Hui Li and Dong Zheng and Xuemin (Sherman) Shen}, title = {Secure machine-type communications in {LTE} networks}, journal = {Wirel. Commun. Mob. Comput.}, volume = {16}, number = {12}, pages = {1495--1509}, year = {2016}, url = {https://doi.org/10.1002/wcm.2612}, doi = {10.1002/WCM.2612}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wicomm/LaiLLZS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangLZ0016, author = {Yinghui Zhang and Jin Li and Dong Zheng and Xiaofeng Chen and Hui Li}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, pages = {509--524}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6\_31}, doi = {10.1007/978-3-319-40253-6\_31}, timestamp = {Wed, 15 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ZhangLZ0016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/FanWWLY16, author = {Kai Fan and Wei Wang and Yue Wang and Hui Li and Yintang Yang}, title = {Cloud-Based Lightweight {RFID} Healthcare Privacy Protection Protocol}, booktitle = {2016 {IEEE} Global Communications Conference, {GLOBECOM} 2016, Washington, DC, USA, December 4-8, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/GLOCOM.2016.7841663}, doi = {10.1109/GLOCOM.2016.7841663}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/FanWWLY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccchina/FanTHWLY16, author = {Kai Fan and Qiong Tian and Nana Huang and Yue Wang and Hui Li and Yintang Yang}, title = {Privacy protection based access control scheme in cloud-based services}, booktitle = {2016 {IEEE/CIC} International Conference on Communications in China, {ICCC} 2016, Chengdu, China, July 27-29, 2016}, pages = {1--5}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICCChina.2016.7636861}, doi = {10.1109/ICCCHINA.2016.7636861}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccchina/FanTHWLY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccnc/LiHNLW16, author = {Fenghua Li and Yuanyuan He and Ben Niu and Hui Li and Hanyi Wang}, title = {Match-MORE: An efficient private matching scheme using friends-of-friends' recommendation}, booktitle = {2016 International Conference on Computing, Networking and Communications, {ICNC} 2016, Kauai, HI, USA, February 15-18, 2016}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ICCNC.2016.7440630}, doi = {10.1109/ICCNC.2016.7440630}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccnc/LiHNLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccnc/NiuGLLL16, author = {Ben Niu and Sheng Gao and Fenghua Li and Hui Li and Zongqing Lu}, title = {Protection of location privacy in continuous LBSs against adversaries with background information}, booktitle = {2016 International Conference on Computing, Networking and Communications, {ICNC} 2016, Kauai, HI, USA, February 15-18, 2016}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ICCNC.2016.7440649}, doi = {10.1109/ICCNC.2016.7440649}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccnc/NiuGLLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/FanSDZ0YLY16, author = {Kai Fan and Panfei Song and Zhao Du and Haojin Zhu and Hui Li and Yintang Yang and Xinghua Li and Chao Yang}, editor = {Qing Yang and Wei Yu and Yacine Challal}, title = {{NFC} Secure Payment and Verification Scheme for Mobile Payment}, booktitle = {Wireless Algorithms, Systems, and Applications - 11th International Conference, {WASA} 2016, Bozeman, MT, USA, August 8-10, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9798}, pages = {116--125}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-42836-9\_11}, doi = {10.1007/978-3-319-42836-9\_11}, timestamp = {Mon, 30 Jan 2023 09:32:36 +0100}, biburl = {https://dblp.org/rec/conf/wasa/FanSDZ0YLY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/LiWNHHL16, author = {Fenghua Li and Hanyi Wang and Ben Niu and Yuanyuan He and Jiafeng Hua and Hui Li}, title = {A practical group matching scheme for privacy-aware users in mobile social networks}, booktitle = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2016, Doha, Qatar, April 3-6, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/WCNC.2016.7564968}, doi = {10.1109/WCNC.2016.7564968}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcnc/LiWNHHL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/LiWNLH16a, author = {Fenghua Li and Sheng Wan and Ben Niu and Hui Li and Yuanyuan He}, title = {Time obfuscation-based privacy-preserving scheme for location-based services}, booktitle = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2016, Doha, Qatar, April 3-6, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/WCNC.2016.7564715}, doi = {10.1109/WCNC.2016.7564715}, timestamp = {Wed, 29 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcnc/LiWNLH16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/LiWNLH16, author = {Fenghua Li and Sheng Wan and Ben Niu and Hui Li and Yuanyuan He}, title = {Time obfuscation-based privacy-preserving scheme for Location-Based Services}, booktitle = {{IEEE} Wireless Communications and Networking Conference Workshops, {WCNC} Workshops 2016, Doha, Qatar, April 3-6, 2016}, pages = {465--470}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/WCNCW.2016.7552744}, doi = {10.1109/WCNCW.2016.7552744}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcnc/LiWNLH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhuHL15, author = {Hui Zhu and Cheng Huang and Hui Li}, title = {Information Diffusion Model Based on Privacy Setting in Online Social Networking Services}, journal = {Comput. J.}, volume = {58}, number = {4}, pages = {536--548}, year = {2015}, url = {https://doi.org/10.1093/comjnl/bxu062}, doi = {10.1093/COMJNL/BXU062}, timestamp = {Thu, 21 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhuHL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/LaiLZ0S15, author = {Chengzhe Lai and Rongxing Lu and Dong Zheng and Hui Li and Xuemin (Sherman) Shen}, title = {Toward secure large-scale machine-to-machine comm unications in 3GPP networks: chall enges and solutions}, journal = {{IEEE} Commun. Mag.}, volume = {53}, number = {12}, pages = {12--19}, year = {2015}, url = {https://doi.org/10.1109/MCOM.2015.7355579}, doi = {10.1109/MCOM.2015.7355579}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cm/LaiLZ0S15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/LaiLLC15, author = {Chengzhe Lai and Hui Li and Xiaoqing Li and Jin Cao}, title = {A novel group access authentication and key agreement protocol for machine-type communication}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {26}, number = {3}, pages = {414--431}, year = {2015}, url = {https://doi.org/10.1002/ett.2635}, doi = {10.1002/ETT.2635}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ett/LaiLLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/NiuZLC015, author = {Ben Niu and Xiaoyan Zhu and Qinghua Li and Jie Chen and Hui Li}, title = {A novel attack to spatial cloaking schemes in location-based services}, journal = {Future Gener. Comput. Syst.}, volume = {49}, pages = {125--132}, year = {2015}, url = {https://doi.org/10.1016/j.future.2014.10.026}, doi = {10.1016/J.FUTURE.2014.10.026}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/NiuZLC015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcm/LvM015, author = {Xixiang Lv and Yi Mu and Hui Li}, title = {Key management for Smart Grid based on asymmetric key-wrapping}, journal = {Int. J. Comput. Math.}, volume = {92}, number = {3}, pages = {498--512}, year = {2015}, url = {https://doi.org/10.1080/00207160.2014.917178}, doi = {10.1080/00207160.2014.917178}, timestamp = {Mon, 24 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcm/LvM015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/FanW0Y15, author = {Kai Fan and Wei Wang and Hui Li and Yintang Yang}, title = {Adaptive Sensing Private Property Protection Protocol Based on Cloud}, journal = {Int. J. Distributed Sens. Networks}, volume = {11}, pages = {743580:1--743580:9}, year = {2015}, url = {https://doi.org/10.1155/2015/743580}, doi = {10.1155/2015/743580}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/FanW0Y15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/ZhuLRL15, author = {Hui Zhu and Fen Liu and Yan Rong and Hui Li}, title = {{PAS:} An Efficient Privacy-Preserving Multidimensional Aggregation Scheme for Smart Grid}, journal = {Int. J. Distributed Sens. Networks}, volume = {11}, pages = {915795:1--915795:12}, year = {2015}, url = {https://doi.org/10.1155/2015/915795}, doi = {10.1155/2015/915795}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdsn/ZhuLRL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijguc/LiLLL15, author = {Xiaoqing Li and Jicheng Liu and Xuejun Li and Hui Li}, title = {A reputation-based secure scheme in vehicular ad hoc networks}, journal = {Int. J. Grid Util. Comput.}, volume = {6}, number = {2}, pages = {83--90}, year = {2015}, url = {https://doi.org/10.1504/IJGUC.2015.068823}, doi = {10.1504/IJGUC.2015.068823}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijguc/LiLLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/WangWTL15, author = {Yong Wang and Hao Wu and Liyang Tang and Hui Li}, title = {The Solution for Cooperative Beamforming Design in {MIMO} Multi-way Relay Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {3}, pages = {956--970}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.03.007}, doi = {10.3837/TIIS.2015.03.007}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/WangWTL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mis/ZhuX0LL15, author = {Hui Zhu and Yingfang Xue and Xiaofeng Chen and Qiang Li and Hui Li}, title = {{V-MGSM:} {A} Multilevel and Grouping Security Virtualization Model for Mobile Internet Service}, journal = {Mob. Inf. Syst.}, volume = {2015}, pages = {841292:1--841292:9}, year = {2015}, url = {https://doi.org/10.1155/2015/841292}, doi = {10.1155/2015/841292}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mis/ZhuX0LL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/0019L0CC15, author = {Chen Li and Rongxing Lu and Hui Li and Le Chen and Jie Chen}, title = {{PDA:} a privacy-preserving dual-functional aggregation scheme for smart grid communications}, journal = {Secur. Commun. Networks}, volume = {8}, number = {15}, pages = {2494--2506}, year = {2015}, url = {https://doi.org/10.1002/sec.1191}, doi = {10.1002/SEC.1191}, timestamp = {Mon, 18 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/0019L0CC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/CaoML15, author = {Jin Cao and Maode Ma and Hui Li}, title = {{GBAAM:} group-based access authentication for {MTC} in {LTE} networks}, journal = {Secur. Commun. Networks}, volume = {8}, number = {17}, pages = {3282--3299}, year = {2015}, url = {https://doi.org/10.1002/sec.1252}, doi = {10.1002/SEC.1252}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/CaoML15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/LiCLL15, author = {Chen Li and Le Chen and Rongxing Lu and Hui Li}, title = {Comment on "An Efficient Homomorphic {MAC} with Small Key Size for Authentication in Network Coding"}, journal = {{IEEE} Trans. Computers}, volume = {64}, number = {3}, pages = {882--883}, year = {2015}, url = {https://doi.org/10.1109/TC.2015.2389800}, doi = {10.1109/TC.2015.2389800}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/LiCLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LvM015, author = {Xixiang Lv and Yi Mu and Hui Li}, title = {Loss-Tolerant Bundle Fragment Authentication for Space-Based DTNs}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {6}, pages = {615--625}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2382601}, doi = {10.1109/TDSC.2014.2382601}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LvM015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/WangLL15, author = {Boyang Wang and Baochun Li and Hui Li}, title = {Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {8}, number = {1}, pages = {92--106}, year = {2015}, url = {https://doi.org/10.1109/TSC.2013.2295611}, doi = {10.1109/TSC.2013.2295611}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/WangLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/YuNAMWL15, author = {Yong Yu and Jianbing Ni and Man Ho Au and Yi Mu and Boyang Wang and Hui Li}, title = {Comments on a Public Auditing Mechanism for Shared Cloud Data Service}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {8}, number = {6}, pages = {998--999}, year = {2015}, url = {https://doi.org/10.1109/TSC.2014.2355201}, doi = {10.1109/TSC.2014.2355201}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsc/YuNAMWL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WangLWL15, author = {Boyang Wang and Ming Li and Haitao Wang and Hui Li}, title = {Circular range search on encrypted spatial data}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {182--190}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346827}, doi = {10.1109/CNS.2015.7346827}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/WangLWL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscloud/FanHWLY15, author = {Kai Fan and Nana Huang and Yue Wang and Hui Li and Yintang Yang}, title = {Secure and Efficient Personal Health Record Scheme Using Attribute-Based Encryption}, booktitle = {{IEEE} 2nd International Conference on Cyber Security and Cloud Computing, CSCloud 2015, New York, NY, USA, November 3-5, 2015}, pages = {111--114}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CSCloud.2015.40}, doi = {10.1109/CSCLOUD.2015.40}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cscloud/FanHWLY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/FanDWLY15, author = {Kai Fan and Hai Deng and Lang Wang and Hui Li and Yintang Yang}, title = {Ciphertext Retrieval in Super-Peer {P2P} Network}, booktitle = {2015 {IEEE} Global Communications Conference, {GLOBECOM} 2015, San Diego, CA, USA, December 6-10, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/GLOCOM.2014.7417717}, doi = {10.1109/GLOCOM.2014.7417717}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/FanDWLY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/LiuGWL15, author = {Qiao Liu and Guang Gong and Yong Wang and Hui Li}, title = {A Novel Physical Layer Security Scheme for {MIMO} Two-Way Relay Channels}, booktitle = {2015 {IEEE} Globecom Workshops, San Diego, CA, USA, December 6-10, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/GLOCOMW.2015.7414118}, doi = {10.1109/GLOCOMW.2015.7414118}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/LiuGWL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/CaoLM15, author = {Jin Cao and Hui Li and Maode Ma}, title = {{GAHAP:} {A} group-based anonymity handover authentication protocol for {MTC} in {LTE-A} networks}, booktitle = {2015 {IEEE} International Conference on Communications, {ICC} 2015, London, United Kingdom, June 8-12, 2015}, pages = {3020--3025}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICC.2015.7248787}, doi = {10.1109/ICC.2015.7248787}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/CaoLM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/CaoLML15, author = {Jin Cao and Hui Li and Maode Ma and Fenghua Li}, title = {{UGHA:} Uniform group-based handover authentication for {MTC} within {E-UTRAN} in {LTE-A} networks}, booktitle = {2015 {IEEE} International Conference on Communications, {ICC} 2015, London, United Kingdom, June 8-12, 2015}, pages = {7246--7251}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICC.2015.7249483}, doi = {10.1109/ICC.2015.7249483}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/CaoLML15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/JiangZHCLW15, author = {Shunrong Jiang and Xiaoyan Zhu and Ripei Hao and Haotian Chi and Hui Li and Liangmin Wang}, title = {Lightweight and privacy-preserving agent data transmission for mobile Healthcare}, booktitle = {2015 {IEEE} International Conference on Communications, {ICC} 2015, London, United Kingdom, June 8-12, 2015}, pages = {7322--7327}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICC.2015.7249496}, doi = {10.1109/ICC.2015.7249496}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/JiangZHCLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/LiNLL15, author = {Weihao Li and Ben Niu and Hui Li and Fenghua Li}, title = {Privacy-preserving strategies in service quality aware Location-Based Services}, booktitle = {2015 {IEEE} International Conference on Communications, {ICC} 2015, London, United Kingdom, June 8-12, 2015}, pages = {7328--7334}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICC.2015.7249497}, doi = {10.1109/ICC.2015.7249497}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/LiNLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccnc/NiuZLLWL15, author = {Ben Niu and Xiaoyan Zhu and Weihao Li and Hui Li and Yingjuan Wang and Zongqing Lu}, title = {A personalized two-tier cloaking scheme for privacy-aware location-based services}, booktitle = {International Conference on Computing, Networking and Communications, {ICNC} 2015, Garden Grove, CA, USA, February 16-19, 2015}, pages = {94--98}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICCNC.2015.7069322}, doi = {10.1109/ICCNC.2015.7069322}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccnc/NiuZLLWL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/WangLWL15, author = {Boyang Wang and Ming Li and Haitao Wang and Hui Li}, title = {Circular Range Search on Encrypted Spatial Data}, booktitle = {35th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2015, Columbus, OH, USA, June 29 - July 2, 2015}, pages = {794--795}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICDCS.2015.113}, doi = {10.1109/ICDCS.2015.113}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/WangLWL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/LiYL15, author = {Xiuguang Li and Kai Yang and Hui Li}, editor = {Fatos Xhafa and Leonard Barolli}, title = {Fine-Grained Privacy-Preserving Spatiotemporal Matching in Mobile Social Networks}, booktitle = {2015 International Conference on Intelligent Networking and Collaborative Systems, INCoS 2015, Taipei, Taiwan, September 2-4, 2015}, pages = {374--378}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/INCoS.2015.73}, doi = {10.1109/INCOS.2015.73}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/incos/LiYL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/NiuLZC015, author = {Ben Niu and Qinghua Li and Xiaoyan Zhu and Guohong Cao and Hui Li}, title = {Enhancing privacy through caching in location-based services}, booktitle = {2015 {IEEE} Conference on Computer Communications, {INFOCOM} 2015, Kowloon, Hong Kong, April 26 - May 1, 2015}, pages = {1017--1025}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/INFOCOM.2015.7218474}, doi = {10.1109/INFOCOM.2015.7218474}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/NiuLZC015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/SunLLH015, author = {Wenhai Sun and Xuefeng Liu and Wenjing Lou and Y. Thomas Hou and Hui Li}, title = {Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data}, booktitle = {2015 {IEEE} Conference on Computer Communications, {INFOCOM} 2015, Kowloon, Hong Kong, April 26 - May 1, 2015}, pages = {2110--2118}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/INFOCOM.2015.7218596}, doi = {10.1109/INFOCOM.2015.7218596}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/SunLLH015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/NiuHLL15, author = {Ben Niu and Yuanyuan He and Fenghua Li and Hui Li}, editor = {Qinqing Zhang and Jerry Brand and Thomas G. MacDonald and Bharat T. Doshi and Bonnie L. Gorsic}, title = {Achieving secure friend discovery in social strength-aware PMSNs}, booktitle = {34th {IEEE} Military Communications Conference, {MILCOM} 2015, Tampa, FL, USA, October 26-28, 2015}, pages = {947--953}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/MILCOM.2015.7357567}, doi = {10.1109/MILCOM.2015.7357567}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/milcom/NiuHLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FanGDLY15, author = {Kai Fan and Yuanyuan Gong and Zhao Du and Hui Li and Yintang Yang}, title = {{RFID} Secure Application Revocation for IoT in 5G}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {175--181}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.372}, doi = {10.1109/TRUSTCOM.2015.372}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FanGDLY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/FanGGLSY15, author = {Kai Fan and Nan Ge and Yuanyuan Gong and Hui Li and Ruidan Su and Yintang Yang}, editor = {Kuai Xu and Haojin Zhu}, title = {{ULRAS:} Ultra-Lightweight {RFID} Authentication Scheme for Mobile Device}, booktitle = {Wireless Algorithms, Systems, and Applications - 10th International Conference, {WASA} 2015, Qufu, China, August 10-12, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9204}, pages = {114--122}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-21837-3\_12}, doi = {10.1007/978-3-319-21837-3\_12}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wasa/FanGGLSY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Zhang0LL14, author = {Yinghui Zhang and Xiaofeng Chen and Jin Li and Hui Li}, title = {Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks}, journal = {Comput. Networks}, volume = {75}, pages = {192--211}, year = {2014}, url = {https://doi.org/10.1016/j.comnet.2014.10.009}, doi = {10.1016/J.COMNET.2014.10.009}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Zhang0LL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/CaoMLZL14, author = {Jin Cao and Maode Ma and Hui Li and Yueyu Zhang and Zhenxing Luo}, title = {A Survey on Security Aspects for {LTE} and {LTE-A} Networks}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {16}, number = {1}, pages = {283--302}, year = {2014}, url = {https://doi.org/10.1109/SURV.2013.041513.00174}, doi = {10.1109/SURV.2013.041513.00174}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/CaoMLZL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/FanLLLSY14, author = {Kai Fan and Jie Li and Hui Li and Xiaohui Liang and Xuemin (Sherman) Shen and Yintang Yang}, title = {{RSEL:} revocable secure efficient lightweight {RFID} authentication scheme}, journal = {Concurr. Comput. Pract. Exp.}, volume = {26}, number = {5}, pages = {1084--1096}, year = {2014}, url = {https://doi.org/10.1002/cpe.3065}, doi = {10.1002/CPE.3065}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/FanLLLSY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/HanZ0LQ14, author = {Qi Han and Yinghui Zhang and Xiaofeng Chen and Hui Li and Jiaxiang Quan}, title = {Efficient and robust identity-based handoff authentication for EAP-based wireless networks}, journal = {Concurr. Comput. Pract. Exp.}, volume = {26}, number = {8}, pages = {1561--1573}, year = {2014}, url = {https://doi.org/10.1002/cpe.3024}, doi = {10.1002/CPE.3024}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/HanZ0LQ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/Lv014, author = {Xixiang Lv and Hui Li}, title = {Error- and loss-tolerant bundle fragment authentication for space DTNs}, journal = {Frontiers Comput. Sci.}, volume = {8}, number = {6}, pages = {1012--1023}, year = {2014}, url = {https://doi.org/10.1007/s11704-014-3365-6}, doi = {10.1007/S11704-014-3365-6}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/Lv014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/LiLLCL14, author = {Chen Li and Rongxing Lu and Hui Li and Le Chen and Xiaoqing Li}, title = {Comment on "A Novel Homomorphic {MAC} Scheme for Authentication in Network Coding"}, journal = {{IEEE} Commun. Lett.}, volume = {18}, number = {12}, pages = {2129--2132}, year = {2014}, url = {https://doi.org/10.1109/LCOMM.2014.2361805}, doi = {10.1109/LCOMM.2014.2361805}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/LiLLCL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-com/WangL14, author = {Yong Wang and Hui Li}, title = {Complex signal transmission for multi-user multiple-input multiple-output relay}, journal = {{IET} Commun.}, volume = {8}, number = {14}, pages = {2584--2589}, year = {2014}, url = {https://doi.org/10.1049/iet-com.2014.0058}, doi = {10.1049/IET-COM.2014.0058}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-com/WangL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcm/LvLW14, author = {Xixiang Lv and Hui Li and Baocang Wang}, title = {Authenticated asymmetric group key agreement based on certificateless cryptosystem}, journal = {Int. J. Comput. Math.}, volume = {91}, number = {3}, pages = {447--460}, year = {2014}, url = {https://doi.org/10.1080/00207160.2013.806653}, doi = {10.1080/00207160.2013.806653}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcm/LvLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijguc/ChenCL14, author = {Yuan Chen and Xiaofeng Chen and Hui Li}, title = {More DCCA-secure public-key encryptions from {KEM} + {DEM} style hybrid paradigms and some observations on the 'inner-outer' structure}, journal = {Int. J. Grid Util. Comput.}, volume = {5}, number = {1}, pages = {60--70}, year = {2014}, url = {https://doi.org/10.1504/IJGUC.2014.058246}, doi = {10.1504/IJGUC.2014.058246}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijguc/ChenCL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijguc/ZhangCLCL14, author = {Yueyu Zhang and Jie Chen and Hui Li and Jin Cao and Chengzhe Lai}, title = {Group-based authentication and key agreement for machine-type communication}, journal = {Int. J. Grid Util. Comput.}, volume = {5}, number = {2}, pages = {87--95}, year = {2014}, url = {https://doi.org/10.1504/IJGUC.2014.060189}, doi = {10.1504/IJGUC.2014.060189}, timestamp = {Wed, 09 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijguc/ZhangCLCL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijguc/WangGHLL14, author = {Yong Wang and Aixiang Guo and Hong He and Hui Li and Fengrong Li}, title = {Signalling scheme for achieving dynamic degrees of freedom in {MIMO} {Y} channel}, journal = {Int. J. Grid Util. Comput.}, volume = {5}, number = {3}, pages = {149--155}, year = {2014}, url = {https://doi.org/10.1504/IJGUC.2014.062904}, doi = {10.1504/IJGUC.2014.062904}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijguc/WangGHLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/Lai0LLZS14, author = {Chengzhe Lai and Hui Li and Xiaohui Liang and Rongxing Lu and Kuan Zhang and Xuemin Shen}, title = {{CPAL:} {A} Conditional Privacy-Preserving Authentication With Access Linkability for Roaming Service}, journal = {{IEEE} Internet Things J.}, volume = {1}, number = {1}, pages = {46--57}, year = {2014}, url = {https://doi.org/10.1109/JIOT.2014.2306673}, doi = {10.1109/JIOT.2014.2306673}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/Lai0LLZS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/Zhang000L14, author = {Yinghui Zhang and Xiaofeng Chen and Jin Li and Hui Li and Fenghua Li}, title = {Attribute-Based Data Sharing with Flexible and Direct Revocation in Cloud Computing}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {8}, number = {11}, pages = {4028--4049}, year = {2014}, url = {https://doi.org/10.3837/tiis.2014.11.021}, doi = {10.3837/TIIS.2014.11.021}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/Zhang000L14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcn/WangLLLL14, author = {Boyang Wang and Hui Li and Xuefeng Liu and Fenghua Li and Xiaoqing Li}, title = {Efficient public verification on the integrity of multi-owner data in the cloud}, journal = {J. Commun. Networks}, volume = {16}, number = {6}, pages = {592--599}, year = {2014}, url = {https://doi.org/10.1109/JCN.2014.000105}, doi = {10.1109/JCN.2014.000105}, timestamp = {Fri, 28 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcn/WangLLLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LvM014, author = {Xixiang Lv and Yi Mu and Hui Li}, title = {Loss-tolerant authentication with digital signatures}, journal = {Secur. Commun. Networks}, volume = {7}, number = {11}, pages = {2054--2062}, year = {2014}, url = {https://doi.org/10.1002/sec.917}, doi = {10.1002/SEC.917}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LvM014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangLLLL14, author = {Boyang Wang and Hui Li and Xuefeng Liu and Xiaoqing Li and Fenghua Li}, title = {Preserving identity privacy on multi-owner cloud data during public verification}, journal = {Secur. Commun. Networks}, volume = {7}, number = {11}, pages = {2104--2113}, year = {2014}, url = {https://doi.org/10.1002/sec.922}, doi = {10.1002/SEC.922}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangLLLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Zhao014, author = {Xingwen Zhao and Hui Li}, title = {Achieving dynamic privileges in secure data sharing on cloud storage}, journal = {Secur. Commun. Networks}, volume = {7}, number = {11}, pages = {2211--2224}, year = {2014}, url = {https://doi.org/10.1002/sec.739}, doi = {10.1002/SEC.739}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Zhao014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/smartcr/CaoM014, author = {Jin Cao and Maode Ma and Hui Li}, title = {Access Authentication of Mass Device Connections for {MTC} in {LTE} Networks}, journal = {Smart Comput. Rev.}, volume = {4}, number = {4}, pages = {262--277}, year = {2014}, url = {https://doi.org/10.6029/smartcr.2014.04.003}, doi = {10.6029/SMARTCR.2014.04.003}, timestamp = {Fri, 23 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/smartcr/CaoM014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/WangLL14, author = {Boyang Wang and Baochun Li and Hui Li}, title = {Oruta: Privacy-Preserving Public Auditingfor Shared Data in the Cloud}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {2}, number = {1}, pages = {43--56}, year = {2014}, url = {https://doi.org/10.1109/TCC.2014.2299807}, doi = {10.1109/TCC.2014.2299807}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/WangLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LvML14, author = {Xixiang Lv and Yi Mu and Hui Li}, title = {Non-Interactive Key Establishment for Bundle Security Protocol of Space DTNs}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {9}, number = {1}, pages = {5--13}, year = {2014}, url = {https://doi.org/10.1109/TIFS.2013.2289993}, doi = {10.1109/TIFS.2013.2289993}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LvML14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/SunWCLLHL14, author = {Wenhai Sun and Bing Wang and Ning Cao and Ming Li and Wenjing Lou and Y. Thomas Hou and Hui Li}, title = {Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {25}, number = {11}, pages = {3025--3035}, year = {2014}, url = {https://doi.org/10.1109/TPDS.2013.282}, doi = {10.1109/TPDS.2013.282}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/SunWCLLHL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/ZhuJWL14, author = {Xiaoyan Zhu and Shunrong Jiang and Liangmin Wang and Hui Li}, title = {Efficient Privacy-Preserving Authentication for Vehicular Ad Hoc Networks}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {63}, number = {2}, pages = {907--919}, year = {2014}, url = {https://doi.org/10.1109/TVT.2013.2294032}, doi = {10.1109/TVT.2013.2294032}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvt/ZhuJWL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/NiuZCL14, author = {Ben Niu and Xiaoyan Zhu and Haotian Chi and Hui Li}, title = {Privacy and Authentication Protocol for Mobile {RFID} Systems}, journal = {Wirel. Pers. Commun.}, volume = {77}, number = {3}, pages = {1713--1731}, year = {2014}, url = {https://doi.org/10.1007/s11277-014-1605-6}, doi = {10.1007/S11277-014-1605-6}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wpc/NiuZCL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/FanLLY14, author = {Kai Fan and Chen Liang and Hui Li and Yintang Yang}, title = {{LRMAPC:} {A} Lightweight {RFID} Mutual Authentication Protocol with Cache in the Reader for IoT}, booktitle = {14th {IEEE} International Conference on Computer and Information Technology, {CIT} 2014, Xi'an, China, September 11-13, 2014}, pages = {276--280}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIT.2014.80}, doi = {10.1109/CIT.2014.80}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcit/FanLLY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apscc/LiZCLZ14, author = {Jieying Li and Yueyu Zhang and Jie Chen and Hui Li and Wujun Zhang}, title = {Group Key Agreement in Multimedia Service for Machine Type Communication}, booktitle = {2014 Asia-Pacific Services Computing Conference, {APSCC} 2014, Fuzhou, Fu Jian, China, December 4-6, 2014}, pages = {141--146}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/APSCC.2014.31}, doi = {10.1109/APSCC.2014.31}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apscc/LiZCLZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangHLWL14, author = {Boyang Wang and Yantian Hou and Ming Li and Haitao Wang and Hui Li}, editor = {Shiho Moriai and Trent Jaeger and Kouichi Sakurai}, title = {Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index}, booktitle = {9th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014}, pages = {111--122}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2590296.2590305}, doi = {10.1145/2590296.2590305}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WangHLWL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WangLC014, author = {Boyang Wang and Ming Li and Sherman S. M. Chow and Hui Li}, title = {A tale of two clouds: Computing on data encrypted under multiple keys}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {337--345}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997502}, doi = {10.1109/CNS.2014.6997502}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/WangLC014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ZhuHL14, author = {Hui Zhu and Cheng Huang and Hui Li}, title = {{MPPM:} Malware propagation and prevention model in online {SNS}}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2014, Sydney, Australia, June 10-14, 2014, Workshops Proceedings}, pages = {682--687}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICCW.2014.6881278}, doi = {10.1109/ICCW.2014.6881278}, timestamp = {Thu, 21 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/ZhuHL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ZhuHLL14, author = {Hui Zhu and Rong Huang and Ximeng Liu and Hui Li}, title = {{SPEMR:} {A} new secure personal electronic medical record scheme with privilege separation}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2014, Sydney, Australia, June 10-14, 2014, Workshops Proceedings}, pages = {700--705}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICCW.2014.6881281}, doi = {10.1109/ICCW.2014.6881281}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/ZhuHLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/NiuZLL14, author = {Ben Niu and Zhengyan Zhang and Xiaoqing Li and Hui Li}, title = {Privacy-area aware dummy generation algorithms for Location-Based Services}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2014, Sydney, Australia, June 10-14, 2014}, pages = {957--962}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICC.2014.6883443}, doi = {10.1109/ICC.2014.6883443}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/NiuZLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/LaiLLJS14, author = {Chengzhe Lai and Hui Li and Rongxing Lu and Rong Jiang and Xuemin Shen}, title = {{SEGR:} {A} secure and efficient group roaming scheme for machine to machine communications between 3GPP and WiMAX networks}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2014, Sydney, Australia, June 10-14, 2014}, pages = {1011--1016}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICC.2014.6883452}, doi = {10.1109/ICC.2014.6883452}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/LaiLLJS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ZhuCJLL14, author = {Xiaoyan Zhu and Haotian Chi and Shunrong Jiang and Xiaosan Lei and Hui Li}, title = {Using dynamic pseudo-IDs to protect privacy in location-based services}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2014, Sydney, Australia, June 10-14, 2014}, pages = {2307--2312}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICC.2014.6883667}, doi = {10.1109/ICC.2014.6883667}, timestamp = {Tue, 03 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/ZhuCJLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ZhuLJCL14, author = {Xiaoyan Zhu and Jie Liu and Shunrong Jiang and Zengbao Chen and Hui Li}, title = {Efficient Weight-based Private Matching for proximity-based mobile social networks}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2014, Sydney, Australia, June 10-14, 2014}, pages = {4114--4119}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICC.2014.6883965}, doi = {10.1109/ICC.2014.6883965}, timestamp = {Mon, 21 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/ZhuLJCL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/NiuLZL14, author = {Ben Niu and Qinghua Li and Xiaoyan Zhu and Hui Li}, title = {A fine-grained spatial cloaking scheme for privacy-aware users in Location-Based Services}, booktitle = {23rd International Conference on Computer Communication and Networks, {ICCCN} 2014, Shanghai, China, August 4-7, 2014}, pages = {1--8}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICCCN.2014.6911813}, doi = {10.1109/ICCCN.2014.6911813}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccn/NiuLZL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/SunYLHL14, author = {Wenhai Sun and Shucheng Yu and Wenjing Lou and Y. Thomas Hou and Hui Li}, title = {Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud}, booktitle = {2014 {IEEE} Conference on Computer Communications, {INFOCOM} 2014, Toronto, Canada, April 27 - May 2, 2014}, pages = {226--234}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/INFOCOM.2014.6847943}, doi = {10.1109/INFOCOM.2014.6847943}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/SunYLHL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/NiuLZCL14, author = {Ben Niu and Qinghua Li and Xiaoyan Zhu and Guohong Cao and Hui Li}, title = {Achieving k-anonymity in privacy-aware location-based services}, booktitle = {2014 {IEEE} Conference on Computer Communications, {INFOCOM} 2014, Toronto, Canada, April 27 - May 2, 2014}, pages = {754--762}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/INFOCOM.2014.6848002}, doi = {10.1109/INFOCOM.2014.6848002}, timestamp = {Mon, 21 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/NiuLZCL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mass/NiuZLL14, author = {Ben Niu and Xiaoyan Zhu and Weihao Li and Hui Li}, title = {EPcloak: An Efficient and Privacy-Preserving Spatial Cloaking Scheme for LBSs}, booktitle = {11th {IEEE} International Conference on Mobile Ad Hoc and Sensor Systems, {MASS} 2014, Philadelphia, PA, USA, October 28-30, 2014}, pages = {398--406}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/MASS.2014.53}, doi = {10.1109/MASS.2014.53}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mass/NiuZLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/ZhangZCLL14, author = {Yinghui Zhang and Dong Zheng and Xiaofeng Chen and Jin Li and Hui Li}, editor = {Sherman S. M. Chow and Joseph K. Liu and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts}, booktitle = {Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8782}, pages = {259--273}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12475-9\_18}, doi = {10.1007/978-3-319-12475-9\_18}, timestamp = {Wed, 15 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/provsec/ZhangZCLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/NiuLZLL14, author = {Ben Niu and Xiuguang Li and Xiaoyan Zhu and Xiaoqing Li and Hui Li}, editor = {Jing Tian and Jiwu Jing and Mudhakar Srivatsa}, title = {Are You Really My Friend? Exactly Spatiotemporal Matching Scheme in Privacy-Aware Mobile Social Networks}, booktitle = {International Conference on Security and Privacy in Communication Networks - 10th International {ICST} Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {153}, pages = {33--40}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-23802-9\_5}, doi = {10.1007/978-3-319-23802-9\_5}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/NiuLZLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/WangHLWLL14, author = {Boyang Wang and Yantian Hou and Ming Li and Haitao Wang and Hui Li and Fenghua Li}, editor = {Jing Tian and Jiwu Jing and Mudhakar Srivatsa}, title = {Tree-Based Multi-dimensional Range Search on Encrypted Data with Enhanced Privacy}, booktitle = {International Conference on Security and Privacy in Communication Networks - 10th International {ICST} Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {152}, pages = {374--394}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-23829-6\_26}, doi = {10.1007/978-3-319-23829-6\_26}, timestamp = {Wed, 10 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/WangHLWLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/securecloud14/SunLHL14, author = {Wenhai Sun and Wenjing Lou and Y. Thomas Hou and Hui Li}, editor = {Sushil Jajodia and Krishna Kant and Pierangela Samarati and Anoop Singhal and Vipin Swarup and Cliff Wang}, title = {Privacy-Preserving Keyword Search Over Encrypted Data in Cloud Computing}, booktitle = {Secure Cloud Computing}, pages = {189--212}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-1-4614-9278-8\_9}, doi = {10.1007/978-1-4614-9278-8\_9}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/securecloud14/SunLHL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/NiuZZLL14, author = {Ben Niu and Tanran Zhang and Xiaoyan Zhu and Hui Li and Zongqing Lu}, title = {Priority-Aware Private Matching Schemes for Proximity-Based Mobile Social Networks}, journal = {CoRR}, volume = {abs/1401.8064}, year = {2014}, url = {http://arxiv.org/abs/1401.8064}, eprinttype = {arXiv}, eprint = {1401.8064}, timestamp = {Mon, 21 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/NiuZZLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/SunWLY13, author = {Yuhua Sun and Zilong Wang and Hui Li and Tongjiang Yan}, title = {The cross-correlation distribution of a p-ary m-sequence of period p\({}^{\mbox{2k}}\)-1 and its decimated sequence by {(} (p\({}^{\mbox{k}}\)+1)\({}^{\mbox{2}}\) / 2(p\({}^{\mbox{e}}\)+1) {)}}, journal = {Adv. Math. Commun.}, volume = {7}, number = {4}, pages = {409--424}, year = {2013}, url = {https://doi.org/10.3934/amc.2013.7.409}, doi = {10.3934/AMC.2013.7.409}, timestamp = {Sat, 22 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amco/SunWLY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Zhang0L13, author = {Yinghui Zhang and Xiaofeng Chen and Hui Li}, title = {Key-Evolving Hierarchical ID-Based Signcryption}, journal = {Comput. J.}, volume = {56}, number = {10}, pages = {1228--1248}, year = {2013}, url = {https://doi.org/10.1093/comjnl/bxs154}, doi = {10.1093/COMJNL/BXS154}, timestamp = {Wed, 15 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/Zhang0L13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/ZhangZCLW13, author = {Wujun Zhang and Yueyu Zhang and Jie Chen and Hui Li and Yumin Wang}, title = {End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture}, journal = {Clust. Comput.}, volume = {16}, number = {4}, pages = {861--871}, year = {2013}, url = {https://doi.org/10.1007/s10586-013-0259-6}, doi = {10.1007/S10586-013-0259-6}, timestamp = {Wed, 09 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/ZhangZCLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/ZhuLWL13, author = {Hui Zhu and Tingting Liu and Guanghui Wei and Hui Li}, title = {{PPAS:} privacy protection authentication scheme for {VANET}}, journal = {Clust. Comput.}, volume = {16}, number = {4}, pages = {873--886}, year = {2013}, url = {https://doi.org/10.1007/s10586-013-0260-0}, doi = {10.1007/S10586-013-0260-0}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cluster/ZhuLWL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LaiLLS13, author = {Chengzhe Lai and Hui Li and Rongxing Lu and Xuemin (Sherman) Shen}, title = {{SE-AKA:} {A} secure and efficient group authentication and key agreement protocol for {LTE} networks}, journal = {Comput. Networks}, volume = {57}, number = {17}, pages = {3492--3510}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.08.003}, doi = {10.1016/J.COMNET.2013.08.003}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LaiLLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SunYL13, author = {Yuhua Sun and Tongjiang Yan and Hui Li}, title = {The Linear Complexity of a Class of Binary Sequences with Three-Level Autocorrelation}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {96-A}, number = {7}, pages = {1586--1592}, year = {2013}, url = {https://doi.org/10.1587/transfun.E96.A.1586}, doi = {10.1587/TRANSFUN.E96.A.1586}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/SunYL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/LvL13, author = {Xixiang Lv and Hui Li}, title = {Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {2}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2010.0314}, doi = {10.1049/IET-IFS.2010.0314}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/LvL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/WangYALZL13, author = {Yong Wang and Liu Yang and Yun Ai and Hui Li and Yueyu Zhang and Fengrong Li}, title = {Interference management strategy for multiuser two-way relay networks}, journal = {Int. J. Embed. Syst.}, volume = {5}, number = {3}, pages = {175--180}, year = {2013}, url = {https://doi.org/10.1504/IJES.2013.057081}, doi = {10.1504/IJES.2013.057081}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/WangYALZL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijguc/ZhuLL13, author = {Xudong Zhu and Hui Li and Fenghua Li}, title = {Privacy-preserving logistic regression outsourcing in cloud computing}, journal = {Int. J. Grid Util. Comput.}, volume = {4}, number = {2/3}, pages = {144--150}, year = {2013}, url = {https://doi.org/10.1504/IJGUC.2013.056250}, doi = {10.1504/IJGUC.2013.056250}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijguc/ZhuLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijiids/ZhuL13, author = {Xudong Zhu and Hui Li}, title = {Activity clustering for anomaly detection}, journal = {Int. J. Intell. Inf. Database Syst.}, volume = {7}, number = {5}, pages = {441--453}, year = {2013}, url = {https://doi.org/10.1504/IJIIDS.2013.056389}, doi = {10.1504/IJIIDS.2013.056389}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijiids/ZhuL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcn/LvML13, author = {Xixiang Lv and Yi Mu and Hui Li}, title = {Key distribution for heterogeneous public-key cryptosystems}, journal = {J. Commun. Networks}, volume = {15}, number = {5}, pages = {464--468}, year = {2013}, url = {https://doi.org/10.1109/JCN.2013.000085}, doi = {10.1109/JCN.2013.000085}, timestamp = {Fri, 03 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcn/LvML13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LvMLMZ13, author = {Chao Lv and Maode Ma and Hui Li and Jianfeng Ma and Yaoyu Zhang}, title = {An novel three-party authenticated key exchange protocol using one-time key}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {498--503}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.04.006}, doi = {10.1016/J.JNCA.2012.04.006}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LvMLMZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LvLW13, author = {Xixiang Lv and Hui Li and Baocang Wang}, title = {Virtual private key generator based escrow-free certificateless public key cryptosystem for mobile ad hoc networks}, journal = {Secur. Commun. Networks}, volume = {6}, number = {1}, pages = {49--57}, year = {2013}, url = {https://doi.org/10.1002/sec.529}, doi = {10.1002/SEC.529}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LvLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SunWCLLHL13, author = {Wenhai Sun and Bing Wang and Ning Cao and Ming Li and Wenjing Lou and Y. Thomas Hou and Hui Li}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Ninghui Li and Wen{-}Guey Tzeng}, title = {Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking}, booktitle = {8th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013}, pages = {71--82}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484313.2484322}, doi = {10.1145/2484313.2484322}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/SunWCLLHL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangCLWL13, author = {Yinghui Zhang and Xiaofeng Chen and Jin Li and Duncan S. Wong and Hui Li}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Ninghui Li and Wen{-}Guey Tzeng}, title = {Anonymous attribute-based encryption supporting efficient decryption test}, booktitle = {8th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013}, pages = {511--516}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484313.2484381}, doi = {10.1145/2484313.2484381}, timestamp = {Wed, 15 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangCLWL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WangLLL13, author = {Boyang Wang and Baochun Li and Hui Li and Fenghua Li}, title = {Certificateless public auditing for data integrity in the cloud}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {136--144}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682701}, doi = {10.1109/CNS.2013.6682701}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/WangLLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WangLCL13, author = {Boyang Wang and Ming Li and Sherman S. M. Chow and Hui Li}, title = {Computing encrypted cloud data efficiently under multiple keys}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {504--513}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682768}, doi = {10.1109/CNS.2013.6682768}, timestamp = {Wed, 19 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/WangLCL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/ZhuCNZLL13, author = {Xiaoyan Zhu and Haotian Chi and Ben Niu and Weidong Zhang and Zan Li and Hui Li}, title = {MobiCache: When k-anonymity meets cache}, booktitle = {2013 {IEEE} Global Communications Conference, {GLOBECOM} 2013, Atlanta, GA, USA, December 9-13, 2013}, pages = {820--825}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/GLOCOM.2013.6831174}, doi = {10.1109/GLOCOM.2013.6831174}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/ZhuCNZLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/LaiLLJS13, author = {Chengzhe Lai and Hui Li and Rongxing Lu and Rong Jiang and Xuemin Shen}, title = {{LGTH:} {A} lightweight group authentication protocol for machine-type communication in {LTE} networks}, booktitle = {2013 {IEEE} Global Communications Conference, {GLOBECOM} 2013, Atlanta, GA, USA, December 9-13, 2013}, pages = {832--837}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/GLOCOM.2013.6831176}, doi = {10.1109/GLOCOM.2013.6831176}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/LaiLLJS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/NiuZLZL13, author = {Ben Niu and Xiaoyan Zhu and Xiaosan Lei and Weidong Zhang and Hui Li}, title = {{EPS:} Encounter-Based Privacy-Preserving Scheme for Location-Based Services}, booktitle = {2013 {IEEE} Global Communications Conference, {GLOBECOM} 2013, Atlanta, GA, USA, December 9-13, 2013}, pages = {2139--2144}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/GLOCOM.2013.6831391}, doi = {10.1109/GLOCOM.2013.6831391}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/NiuZLZL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/NiuZLLL13, author = {Ben Niu and Xiaoyan Zhu and Jie Liu and Zan Li and Hui Li}, title = {Weight-aware private matching scheme for Proximity-based Mobile Social Networks}, booktitle = {2013 {IEEE} Global Communications Conference, {GLOBECOM} 2013, Atlanta, GA, USA, December 9-13, 2013}, pages = {3170--3175}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/GLOCOM.2013.6831559}, doi = {10.1109/GLOCOM.2013.6831559}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/NiuZLLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/WangLL13, author = {Boyang Wang and Hui Li and Ming Li}, title = {Privacy-preserving public auditing for shared cloud data supporting group dynamics}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2013, Budapest, Hungary, June 9-13, 2013}, pages = {1946--1950}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICC.2013.6654808}, doi = {10.1109/ICC.2013.6654808}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/WangLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/WangCLL13, author = {Boyang Wang and Sherman S. M. Chow and Ming Li and Hui Li}, title = {Storing Shared Data on the Cloud via Security-Mediator}, booktitle = {{IEEE} 33rd International Conference on Distributed Computing Systems, {ICDCS} 2013, 8-11 July, 2013, Philadelphia, Pennsylvania, {USA}}, pages = {124--133}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ICDCS.2013.60}, doi = {10.1109/ICDCS.2013.60}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/WangCLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict-eurasia/SheLZ13, author = {Yuchao She and Hui Li and Hui Zhu}, editor = {Khabib Mustofa and Erich J. Neuhold and A Min Tjoa and Edgar R. Weippl and Ilsun You}, title = {{UVHM:} Model Checking Based Formal Analysis Scheme for Hypervisors}, booktitle = {Information and Communicatiaon Technology - International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7804}, pages = {300--305}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36818-9\_31}, doi = {10.1007/978-3-642-36818-9\_31}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ict-eurasia/SheLZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict-eurasia/ZhangLLZ13, author = {Yinghui Zhang and Hui Li and Xiaoqing Li and Hui Zhu}, editor = {Khabib Mustofa and Erich J. Neuhold and A Min Tjoa and Edgar R. Weippl and Ilsun You}, title = {Provably Secure and Subliminal-Free Variant of Schnorr Signature}, booktitle = {Information and Communicatiaon Technology - International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7804}, pages = {383--391}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36818-9\_42}, doi = {10.1007/978-3-642-36818-9\_42}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ict-eurasia/ZhangLLZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict-eurasia/ZhuLWLL13, author = {Hui Zhu and Tingting Liu and Guanghui Wei and Beishui Liu and Hui Li}, editor = {Khabib Mustofa and Erich J. Neuhold and A Min Tjoa and Edgar R. Weippl and Ilsun You}, title = {CSP-Based General Detection Model of Network Covert Storage Channels}, booktitle = {Information and Communicatiaon Technology - International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7804}, pages = {459--468}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36818-9\_51}, doi = {10.1007/978-3-642-36818-9\_51}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ict-eurasia/ZhuLWLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/ZhuXZ0LL13, author = {Hui Zhu and Yingfang Xue and Yun Zhang and Xiaofeng Chen and Hui Li and Ximeng Liu}, title = {{V-MLR:} {A} Multilevel Security Model for Virtualization}, booktitle = {2013 5th International Conference on Intelligent Networking and Collaborative Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013}, pages = {9--16}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/INCoS.2013.12}, doi = {10.1109/INCOS.2013.12}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/incos/ZhuXZ0LL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/ZhuCZLC13, author = {Hui Zhu and Siyu Chen and Lexiang Zhu and Hui Li and Xiaofeng Chen}, title = {RangeTree: {A} Feature Selection Algorithm for {C4.5} Decision Tree}, booktitle = {2013 5th International Conference on Intelligent Networking and Collaborative Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013}, pages = {17--22}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/INCoS.2013.13}, doi = {10.1109/INCOS.2013.13}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/incos/ZhuCZLC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/FanZLY13, author = {Kai Fan and Dayang Zhang and Hui Li and Yintang Yang}, title = {An Adaptive Feedback Load Balancing Algorithm in {HDFS}}, booktitle = {2013 5th International Conference on Intelligent Networking and Collaborative Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013}, pages = {23--29}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/INCoS.2013.14}, doi = {10.1109/INCOS.2013.14}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/incos/FanZLY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/ZhangCLLL13, author = {Yinghui Zhang and Xiaofeng Chen and Jin Li and Hui Li and Fenghua Li}, title = {{FDR-ABE:} Attribute-Based Encryption with Flexible and Direct Revocation}, booktitle = {2013 5th International Conference on Intelligent Networking and Collaborative Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013}, pages = {38--45}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/INCoS.2013.16}, doi = {10.1109/INCOS.2013.16}, timestamp = {Wed, 15 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/incos/ZhangCLLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/WangLL13, author = {Boyang Wang and Baochun Li and Hui Li}, title = {Public auditing for shared data with efficient user revocation in the cloud}, booktitle = {Proceedings of the {IEEE} {INFOCOM} 2013, Turin, Italy, April 14-19, 2013}, pages = {2904--2912}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/INFCOM.2013.6567101}, doi = {10.1109/INFCOM.2013.6567101}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/WangLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mass/NiuZZCL13, author = {Ben Niu and Xiaoyan Zhu and Tanran Zhang and Haotian Chi and Hui Li}, title = {P-Match: Priority-Aware Friend Discovery for Proximity-Based Mobile Social Networks}, booktitle = {{IEEE} 10th International Conference on Mobile Ad-Hoc and Sensor Systems, {MASS} 2013, Hangzhou, China, October 14-16, 2013}, pages = {351--355}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/MASS.2013.70}, doi = {10.1109/MASS.2013.70}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mass/NiuZZCL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/NiuZL13, author = {Ben Niu and Xiaoyan Zhu and Hui Li}, title = {An ultralightweight and privacy-preserving authentication protocol for mobile {RFID} systems}, booktitle = {2013 {IEEE} Wireless Communications and Networking Conference (WCNC), Shanghai, Shanghai, China, April 7-10, 2013}, pages = {1864--1869}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WCNC.2013.6554848}, doi = {10.1109/WCNC.2013.6554848}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcnc/NiuZL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/NiuZCL13, author = {Ben Niu and Xiaoyan Zhu and Haotian Chi and Hui Li}, title = {3PLUS: Privacy-preserving pseudo-location updating system in location-based services}, booktitle = {2013 {IEEE} Wireless Communications and Networking Conference (WCNC), Shanghai, Shanghai, China, April 7-10, 2013}, pages = {4564--4569}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WCNC.2013.6555314}, doi = {10.1109/WCNC.2013.6555314}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcnc/NiuZCL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1303-6378, author = {Yuhua Sun and Tongjiang Yan and Hui Li}, title = {Cyclic code from the first class Whiteman's generalized cyclotomic sequence with order 4}, journal = {CoRR}, volume = {abs/1303.6378}, year = {2013}, url = {http://arxiv.org/abs/1303.6378}, eprinttype = {arXiv}, eprint = {1303.6378}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1303-6378.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/CaoLMZL12, author = {Jin Cao and Hui Li and Maode Ma and Yueyu Zhang and Chengzhe Lai}, title = {A simple and robust handover authentication between HeNB and eNB in {LTE} networks}, journal = {Comput. Networks}, volume = {56}, number = {8}, pages = {2119--2131}, year = {2012}, url = {https://doi.org/10.1016/j.comnet.2012.02.012}, doi = {10.1016/J.COMNET.2012.02.012}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/CaoLMZL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/LvLMZ12, author = {Chao Lv and Hui Li and Jianfeng Ma and Yaoyu Zhang}, title = {Vulnerability analysis of elliptic curve cryptography-based {RFID} authentication protocols}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {23}, number = {7}, pages = {618--624}, year = {2012}, url = {https://doi.org/10.1002/ett.2514}, doi = {10.1002/ETT.2514}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ett/LvLMZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/WangLC12, author = {Boyang Wang and Hui Li and Jin Cao}, title = {An efficient {MAC} scheme for secure network coding with probabilistic detection}, journal = {Frontiers Comput. Sci.}, volume = {6}, number = {4}, pages = {429--441}, year = {2012}, url = {https://doi.org/10.1007/s11704-012-1068-4}, doi = {10.1007/S11704-012-1068-4}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/WangLC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijguc/FanWL12, author = {Kai Fan and Yue Wang and Hui Li}, title = {A new proxy blind signature scheme}, journal = {Int. J. Grid Util. Comput.}, volume = {3}, number = {1}, pages = {38--42}, year = {2012}, url = {https://doi.org/10.1504/IJGUC.2012.045709}, doi = {10.1504/IJGUC.2012.045709}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijguc/FanWL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijguc/SuSLM12, author = {Zhitu Su and Chunhui Sun and Hui Li and Jianfeng Ma}, title = {A method for efficient parallel computation of Tate pairing}, journal = {Int. J. Grid Util. Comput.}, volume = {3}, number = {1}, pages = {43--52}, year = {2012}, url = {https://doi.org/10.1504/IJGUC.2012.045698}, doi = {10.1504/IJGUC.2012.045698}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijguc/SuSLM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijguc/FanWL12a, author = {Kai Fan and Yue Wang and Hui Li}, title = {Fairness electronic payment protocol}, journal = {Int. J. Grid Util. Comput.}, volume = {3}, number = {1}, pages = {53--58}, year = {2012}, url = {https://doi.org/10.1504/IJGUC.2012.045708}, doi = {10.1504/IJGUC.2012.045708}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijguc/FanWL12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ZhouLL12, author = {Jianying Zhou and Xuejia Lai and Hui Li}, title = {Message from the Guest Editors}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {5}, pages = {291--292}, year = {2012}, url = {https://doi.org/10.1007/s10207-012-0172-7}, doi = {10.1007/S10207-012-0172-7}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/ZhouLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijrfita/LvLMN12, author = {Chao Lv and Hui Li and Jianfeng Ma and Ben Niu}, title = {Vulnerability analysis of lightweight secure search protocols for low-cost {RFID} systems}, journal = {Int. J. Radio Freq. Identif. Technol. Appl.}, volume = {4}, number = {1}, pages = {3--12}, year = {2012}, url = {https://doi.org/10.1504/IJRFITA.2012.044646}, doi = {10.1504/IJRFITA.2012.044646}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijrfita/LvLMN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LaiLZC12, author = {Chengzhe Lai and Hui Li and Yueyu Zhang and Jin Cao}, title = {Security Issues on Machine to Machine Communications}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {6}, number = {2}, pages = {198--514}, year = {2012}, url = {https://doi.org/10.3837/tiis.2012.02.003}, doi = {10.3837/TIIS.2012.02.003}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LaiLZC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LvL12, author = {Xixiang Lv and Hui Li}, title = {Group Key Agreement From Signcryption}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {6}, number = {12}, pages = {3338--3351}, year = {2012}, url = {https://doi.org/10.3837/tiis.2012.12.017}, doi = {10.3837/TIIS.2012.12.017}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LvL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/LvLW12, author = {Xixiang Lv and Hui Li and Baocang Wang}, title = {Group key agreement for secure group communication in dynamic peer systems}, journal = {J. Parallel Distributed Comput.}, volume = {72}, number = {10}, pages = {1195--1200}, year = {2012}, url = {https://doi.org/10.1016/j.jpdc.2012.06.004}, doi = {10.1016/J.JPDC.2012.06.004}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpdc/LvLW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LvMLMN12, author = {Chao Lv and Maode Ma and Hui Li and Jianfeng Ma and Ben Niu}, title = {A security enhanced authentication and key distribution protocol for wireless networks}, journal = {Secur. Commun. Networks}, volume = {5}, number = {4}, pages = {343--352}, year = {2012}, url = {https://doi.org/10.1002/sec.312}, doi = {10.1002/SEC.312}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/LvMLMN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LvMLMN12a, author = {Chao Lv and Maode Ma and Hui Li and Jianfeng Ma and Ben Niu}, title = {Security enhancement of the communication-efficient AUTHMAC{\_}DH protocols}, journal = {Secur. Commun. Networks}, volume = {5}, number = {6}, pages = {674--680}, year = {2012}, url = {https://doi.org/10.1002/sec.361}, doi = {10.1002/SEC.361}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/LvMLMN12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/CaoML12, author = {Jin Cao and Maode Ma and Hui Li}, title = {An Uniform Handover Authentication between {E-UTRAN} and Non-3GPP Access Networks}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {11}, number = {10}, pages = {3644--3650}, year = {2012}, url = {https://doi.org/10.1109/TWC.2012.081612.112070}, doi = {10.1109/TWC.2012.081612.112070}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/CaoML12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/WangLL12, author = {Boyang Wang and Baochun Li and Hui Li}, editor = {Rong Chang}, title = {Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud}, booktitle = {2012 {IEEE} Fifth International Conference on Cloud Computing, Honolulu, HI, USA, June 24-29, 2012}, pages = {295--302}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CLOUD.2012.46}, doi = {10.1109/CLOUD.2012.46}, timestamp = {Wed, 09 Aug 2023 12:14:21 +0200}, biburl = {https://dblp.org/rec/conf/IEEEcloud/WangLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/WangLL12, author = {Boyang Wang and Baochun Li and Hui Li}, editor = {Feng Bao and Pierangela Samarati and Jianying Zhou}, title = {Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud}, booktitle = {Applied Cryptography and Network Security - 10th International Conference, {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7341}, pages = {507--525}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31284-7\_30}, doi = {10.1007/978-3-642-31284-7\_30}, timestamp = {Fri, 09 Apr 2021 18:46:11 +0200}, biburl = {https://dblp.org/rec/conf/acns/WangLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/WangLL12, author = {Boyang Wang and Baochun Li and Hui Li}, title = {Gmatch: Secure and privacy-preserving group matching in social networks}, booktitle = {2012 {IEEE} Global Communications Conference, {GLOBECOM} 2012, Anaheim, CA, USA, December 3-7, 2012}, pages = {726--731}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/GLOCOM.2012.6503199}, doi = {10.1109/GLOCOM.2012.6503199}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/WangLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/CaoML12, author = {Jin Cao and Maode Ma and Hui Li}, title = {A group-based authentication and key agreement for {MTC} in {LTE} networks}, booktitle = {2012 {IEEE} Global Communications Conference, {GLOBECOM} 2012, Anaheim, CA, USA, December 3-7, 2012}, pages = {1017--1022}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/GLOCOM.2012.6503246}, doi = {10.1109/GLOCOM.2012.6503246}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/CaoML12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/CaoML12a, author = {Jin Cao and Maode Ma and Hui Li}, title = {Unified handover authentication between heterogeneous access systems in {LTE} networks}, booktitle = {2012 {IEEE} Global Communications Conference, {GLOBECOM} 2012, Anaheim, CA, USA, December 3-7, 2012}, pages = {5308--5313}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/GLOCOM.2012.6503964}, doi = {10.1109/GLOCOM.2012.6503964}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/CaoML12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccchina/FanZSLY12, author = {Kai Fan and Libin Zhao and Xuemin (Sherman) Shen and Hui Li and Yintang Yang}, title = {Smart-blocking file storage method in cloud computing}, booktitle = {2012 1st {IEEE} International Conference on Communications in China (ICCC), Beijing, China, August 15-17, 2012}, pages = {57--62}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICCChina.2012.6356951}, doi = {10.1109/ICCCHINA.2012.6356951}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccchina/FanZSLY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/WangGHL12, author = {Yong Wang and Aixiang Guo and Hong He and Hui Li}, editor = {Fatos Xhafa and Leonard Barolli and Florin Pop and Xiaofeng Chen and Valentin Cristea}, title = {Optimization Transmission for Improving Degrees of Freedom in {MIMO} {Y} Channel}, booktitle = {2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19-21, 2012}, pages = {121--125}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/iNCoS.2012.56}, doi = {10.1109/INCOS.2012.56}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/incos/WangGHL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/ZhuPLL12, author = {Hui Zhu and Wenhai Pan and Beishui Liu and Hui Li}, editor = {Fatos Xhafa and Leonard Barolli and Florin Pop and Xiaofeng Chen and Valentin Cristea}, title = {A Lightweight Anonymous Authentication Scheme for {VANET} Based on Bilinear Pairing}, booktitle = {2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19-21, 2012}, pages = {222--228}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/iNCoS.2012.63}, doi = {10.1109/INCOS.2012.63}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/incos/ZhuPLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/Chen0L12, author = {Yuan Chen and Xiaofeng Chen and Hui Li}, editor = {Fatos Xhafa and Leonard Barolli and Florin Pop and Xiaofeng Chen and Valentin Cristea}, title = {DCCA-Secure Public-Key Encryptions from Hybrid Paradigms}, booktitle = {2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19-21, 2012}, pages = {264--269}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/iNCoS.2012.29}, doi = {10.1109/INCOS.2012.29}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/incos/Chen0L12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/FanLLLSY12, author = {Kai Fan and Jie Li and Hui Li and Xiaohui Liang and Xuemin (Sherman) Shen and Yintang Yang}, editor = {Fatos Xhafa and Leonard Barolli and Florin Pop and Xiaofeng Chen and Valentin Cristea}, title = {{ESLRAS:} {A} Lightweight {RFID} Authentication Scheme with High Efficiency and Strong Security for Internet of Things}, booktitle = {2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19-21, 2012}, pages = {323--328}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/iNCoS.2012.48}, doi = {10.1109/INCOS.2012.48}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/incos/FanLLLSY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/ZhangCLZCL12, author = {Yueyu Zhang and Jie Chen and Hui Li and Wujun Zhang and Jin Cao and Chengzhe Lai}, editor = {Fatos Xhafa and Leonard Barolli and Florin Pop and Xiaofeng Chen and Valentin Cristea}, title = {Dynamic Group Based Authentication Protocol for Machine Type Communications}, booktitle = {2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19-21, 2012}, pages = {334--341}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/iNCoS.2012.86}, doi = {10.1109/INCOS.2012.86}, timestamp = {Wed, 09 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/incos/ZhangCLZCL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/ZhuL12, author = {Xudong Zhu and Hui Li}, editor = {Fatos Xhafa and Leonard Barolli and Florin Pop and Xiaofeng Chen and Valentin Cristea}, title = {Unsupervised Human Action Categorization Using Latent Dirichlet Markov Clustering}, booktitle = {2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19-21, 2012}, pages = {347--352}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/iNCoS.2012.114}, doi = {10.1109/INCOS.2012.114}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/incos/ZhuL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/ZhangZCLW12, author = {Wujun Zhang and Yueyu Zhang and Jie Chen and Hui Li and Yumin Wang}, editor = {Fatos Xhafa and Leonard Barolli and Florin Pop and Xiaofeng Chen and Valentin Cristea}, title = {End-to-End Security Scheme for Machine Type Communication Based on Generic Authentication Architecture}, booktitle = {2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19-21, 2012}, pages = {353--359}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/iNCoS.2012.79}, doi = {10.1109/INCOS.2012.79}, timestamp = {Wed, 09 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/incos/ZhangZCLW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/WangYALZ12, author = {Yong Wang and Liu Yang and Yun Ai and Hui Li and Weidong Zhang}, editor = {Fatos Xhafa and Leonard Barolli and Florin Pop and Xiaofeng Chen and Valentin Cristea}, title = {Joint Signal Space Alignment and Precoding in Two-Way Relay Multi-user Networks}, booktitle = {2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19-21, 2012}, pages = {385--389}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/iNCoS.2012.55}, doi = {10.1109/INCOS.2012.55}, timestamp = {Mon, 25 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/incos/WangYALZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/HanZ0LQ12, author = {Qi Han and Yinghui Zhang and Xiaofeng Chen and Hui Li and Jiaxiang Quan}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {Efficient and Robust Identity-Based Handoff Authentication in Wireless Networks}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {180--191}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_14}, doi = {10.1007/978-3-642-34601-9\_14}, timestamp = {Wed, 15 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/HanZ0LQ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/ZhaoL12, author = {Xingwen Zhao and Hui Li}, editor = {Tsuyoshi Takagi and Guilin Wang and Zhiguang Qin and Shaoquan Jiang and Yong Yu}, title = {Codes Based Tracing and Revoking Scheme with Constant Ciphertext}, booktitle = {Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7496}, pages = {318--335}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33272-2\_21}, doi = {10.1007/978-3-642-33272-2\_21}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/ZhaoL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/LvLMZ11, author = {Chao Lv and Hui Li and Jianfeng Ma and Meng Zhao}, title = {Security analysis of two recently proposed {RFID} authentication protocols}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {3}, pages = {335--340}, year = {2011}, url = {https://doi.org/10.1007/s11704-011-0153-4}, doi = {10.1007/S11704-011-0153-4}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/LvLMZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/LvLW11, author = {Xixiang Lv and Hui Li and Baocang Wang}, title = {Identity-based key distribution for mobile Ad Hoc networks}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {4}, pages = {442--447}, year = {2011}, url = {https://doi.org/10.1007/s11704-011-0197-5}, doi = {10.1007/S11704-011-0197-5}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/LvLW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/WangLW11, author = {Yong Wang and Hui Li and Xiyuan Wang}, title = {Robustness of Weighting Receive Antenna Selection Algorithm}, journal = {Wirel. Pers. Commun.}, volume = {61}, number = {1}, pages = {59--67}, year = {2011}, url = {https://doi.org/10.1007/s11277-010-9998-3}, doi = {10.1007/S11277-010-9998-3}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/WangLW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/NiuLZL11, author = {Ben Niu and Hui Li and Xiaoyan Zhu and Chao Lv}, editor = {Yuping Wang and Yiu{-}ming Cheung and Ping Guo and Yingbin Wei}, title = {Security Analysis of Some Recent Authentication Protocols for {RFID}}, booktitle = {Seventh International Conference on Computational Intelligence and Security, {CIS} 2011, Sanya, Hainan, China, December 3-4, 2011}, pages = {665--669}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/CIS.2011.152}, doi = {10.1109/CIS.2011.152}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/NiuLZL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/SuSLMF11, author = {Zhitu Su and Chunhui Sun and Hui Li and Jianfeng Ma and Kai Fan}, editor = {Fatos Xhafa and Leonard Barolli and Mario K{\"{o}}ppen}, title = {Fast Parallel Computation of Tate Pairing}, booktitle = {2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30 - Dec. 2, 2011}, pages = {178--183}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/INCoS.2011.93}, doi = {10.1109/INCOS.2011.93}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/incos/SuSLMF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/FanWL11, author = {Kai Fan and Yue Wang and Hui Li}, editor = {Fatos Xhafa and Leonard Barolli and Mario K{\"{o}}ppen}, title = {Forward Secure Proxy Blind Signature Scheme}, booktitle = {2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30 - Dec. 2, 2011}, pages = {263--267}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/INCoS.2011.95}, doi = {10.1109/INCOS.2011.95}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/incos/FanWL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/FanWL11a, author = {Kai Fan and Yue Wang and Hui Li}, editor = {Fatos Xhafa and Leonard Barolli and Mario K{\"{o}}ppen}, title = {Abuse-freeness Electronic Payment Protocol}, booktitle = {2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30 - Dec. 2, 2011}, pages = {275--278}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/INCoS.2011.45}, doi = {10.1109/INCOS.2011.45}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/incos/FanWL11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsda/SunW0Y11, author = {Yuhua Sun and Zilong Wang and Hui Li and Tongjiang Yan}, title = {On the cross-correlation of a ternary m-sequence of period 3\({}^{\mbox{4k}}\) - 1 and its decimated sequence by (3\({}^{\mbox{2k}}\)+1)\({}^{\mbox{2}}\)/20}, booktitle = {Fifth International Workshop on Signal Design and its Applications in Communications, {IWSDA} 2011, Guilin, China, October 10-14, 2011}, pages = {48--51}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/IWSDA.2011.6159436}, doi = {10.1109/IWSDA.2011.6159436}, timestamp = {Sat, 22 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsda/SunW0Y11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/crc/11/MaL011, author = {Maode Ma and Chao Lu and Hui Li}, editor = {Athanasios V. Vasilakos and Yan Zhang and Thrasyvoulos Spyropoulos}, title = {Delay Tolerant Networking}, booktitle = {Delay Tolerant Networks - Protocols and Applications}, series = {Wireless Networks and Mobile Communications Series}, pages = {1--30}, publisher = {{CRC} Press}, year = {2011}, timestamp = {Wed, 10 Jun 2020 16:07:48 +0200}, biburl = {https://dblp.org/rec/books/crc/11/MaL011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1105-2783, author = {Yuhua Sun and Hui Li and Zilong Wang and Tongjiang Yan}, title = {{\textdollar}p{\textdollar}-ary sequences with six-valued cross-correlation function: a new decimation of Niho type}, journal = {CoRR}, volume = {abs/1105.2783}, year = {2011}, url = {http://arxiv.org/abs/1105.2783}, eprinttype = {arXiv}, eprint = {1105.2783}, timestamp = {Sat, 22 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1105-2783.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1105-2786, author = {Yuhua Sun and Zilong Wang and Hui Li}, title = {On the Cross-Correlation of a Ternary m-sequence of Period 3\({}^{\mbox{4k}}\)-1 and Its Decimated Sequence by (3\({}^{\mbox{2k}}\)+1)\({}^{\mbox{2}}\) / 20}, journal = {CoRR}, volume = {abs/1105.2786}, year = {2011}, url = {http://arxiv.org/abs/1105.2786}, eprinttype = {arXiv}, eprint = {1105.2786}, timestamp = {Sat, 22 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1105-2786.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1111-3477, author = {Yuhua Sun and Hui Li and Zilong Wang}, title = {The cross-correlation distribution of a p-ary m-sequence of period p\({}^{\mbox{2m}}\)-1 and its decimation by (p\({}^{\mbox{m}}\)+1)\({}^{\mbox{2}}\) / 2(p\({}^{\mbox{e}}\)+1)}, journal = {CoRR}, volume = {abs/1111.3477}, year = {2011}, url = {http://arxiv.org/abs/1111.3477}, eprinttype = {arXiv}, eprint = {1111.3477}, timestamp = {Sat, 22 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1111-3477.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/LvL10, author = {Xixiang Lv and Hui Li}, title = {ID-based authenticated group key agreement from bilinear maps}, journal = {Frontiers Comput. Sci. China}, volume = {4}, number = {2}, pages = {302--307}, year = {2010}, url = {https://doi.org/10.1007/s11704-009-0063-x}, doi = {10.1007/S11704-009-0063-X}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/LvL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ZhaoKLDZ10, author = {Bin Zhao and Weidong Kou and Hui Li and Lanjun Dang and Jun Zhang}, title = {Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol}, journal = {Inf. Sci.}, volume = {180}, number = {23}, pages = {4672--4684}, year = {2010}, url = {https://doi.org/10.1016/j.ins.2010.08.003}, doi = {10.1016/J.INS.2010.08.003}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ZhaoKLDZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/DangKLZCZF10, author = {Lanjun Dang and Weidong Kou and Hui Li and Junwei Zhang and Xuefei Cao and Bin Zhao and Kai Fan}, title = {Efficient ID-based registration protocol featured with user anonymity in mobile {IP} networks}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {9}, number = {2}, pages = {594--604}, year = {2010}, url = {https://doi.org/10.1109/TWC.2010.02.060445}, doi = {10.1109/TWC.2010.02.060445}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/DangKLZCZF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apscc/DangXLD10, author = {Lanjun Dang and Jie Xu and Hui Li and Nan Dang}, title = {{DASR:} Distributed Anonymous Secure Routing with Good Scalability for Mobile Ad Hoc Networks}, booktitle = {5th {IEEE} Asia-Pacific Services Computing Conference, {APSCC} 2010, 6-10 December 2010, Hangzhou, China, Proceedings}, pages = {454--461}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/APSCC.2010.16}, doi = {10.1109/APSCC.2010.16}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apscc/DangXLD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/ZhuLL10, author = {Xudong Zhu and Hui Li and Zhijing Liu}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {Behavior Clustering for Anomaly Detection}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {14--27}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_2}, doi = {10.1007/978-3-642-23602-0\_2}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/ZhuLL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/MoLZ10, author = {Can Mo and Hui Li and Hui Zhu}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {A Stream Pattern Matching Method for Traffic Analysis}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {131--140}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_12}, doi = {10.1007/978-3-642-23602-0\_12}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eforensics/MoLZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnc/WangLW10, author = {Yong Wang and Hui Li and Xiyuan Wang}, title = {Performance analysis of optimal antenna scheme in transmit diversity systems}, booktitle = {Sixth International Conference on Natural Computation, {ICNC} 2010, Yantai, Shandong, China, 10-12 August 2010}, pages = {2793--2797}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICNC.2010.5583365}, doi = {10.1109/ICNC.2010.5583365}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/icnc/WangLW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/ChaoHJ09, author = {Chao Lv and Hui Li and Jianfeng Ma}, title = {Analysis the Properties of {TLS} Based on Temporal Logic of Knowledge}, booktitle = {Proceedings of the Fifth International Conference on Information Assurance and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009}, pages = {19--22}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/IAS.2009.49}, doi = {10.1109/IAS.2009.49}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/ChaoHJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/LiLMZ09, author = {Xiaoqing Li and Hui Li and Jianfeng Ma and Weidong Zhang}, title = {An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Networks}, booktitle = {Proceedings of the Fifth International Conference on Information Assurance and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009}, pages = {287--290}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/IAS.2009.267}, doi = {10.1109/IAS.2009.267}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/LiLMZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/FanLW09, author = {Kai Fan and Hui Li and Yue Wang}, title = {Security Analysis of the Kerberos Protocol Using {BAN} Logic}, booktitle = {Proceedings of the Fifth International Conference on Information Assurance and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009}, pages = {467--470}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/IAS.2009.320}, doi = {10.1109/IAS.2009.320}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/FanLW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/FanWL09, author = {Kai Fan and Yue Wang and Hui Li}, title = {A New Abuse-Free Fair Electronic Payment Protocol}, booktitle = {Proceedings of the Fifth International Conference on Information Assurance and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009}, pages = {633--636}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/IAS.2009.319}, doi = {10.1109/IAS.2009.319}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/FanWL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhuLW09, author = {Hui Zhu and Hui Li and Yumin Wang}, title = {An Efficient Fast Authentication Protocol}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 2 - Workshop Papers}, pages = {222--225}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.226}, doi = {10.1109/CIS.2009.226}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhuLW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/ZhouLM09, author = {Yejun Zhou and Hui Li and Jianfeng Ma}, editor = {Jong Hyuk Park and Hsiao{-}Hwa Chen and Mohammed Atiquzzaman and Changhoon Lee and Tai{-}Hoon Kim and Sang{-}Soo Yeo}, title = {Secure Error-Correction Network Coding in a Randomized Setting}, booktitle = {Advances in Information Security and Assurance, Third International Conference and Workshops, {ISA} 2009, Seoul, Korea, June 25-27, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5576}, pages = {570--577}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02617-1\_58}, doi = {10.1007/978-3-642-02617-1\_58}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sersc-isa/ZhouLM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/WangDLW08, author = {Ying Wang and Xinjun Du and Hui Li and Yumin Wang}, title = {The Design of Optimal Period Interleaver}, booktitle = {22nd International Conference on Advanced Information Networking and Applications, {AINA} 2008, Workshops Proceedings, GinoWan, Okinawa, Japan, March 25-28, 2008}, pages = {413--415}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/WAINA.2008.276}, doi = {10.1109/WAINA.2008.276}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/WangDLW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0805-2286, author = {Yejun Zhou and Hui Li and Jianfeng Ma}, title = {Secure Network Coding Against the Contamination and Eavesdropping Adversaries}, journal = {CoRR}, volume = {abs/0805.2286}, year = {2008}, url = {http://arxiv.org/abs/0805.2286}, eprinttype = {arXiv}, eprint = {0805.2286}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-0805-2286.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/suLM08, author = {Zhitu Su and Hui Li and Jianfeng Ma}, title = {Factoring Polynomials for Constructing Pairing-friendly Elliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {8}, year = {2008}, url = {http://eprint.iacr.org/2008/008}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/suLM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SuLM08, author = {Zhitu Su and Hui Li and Jianfeng Ma}, title = {Polynomials for Ate Pairing and Ate\({}_{\mbox{i}}\) Pairing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {202}, year = {2008}, url = {http://eprint.iacr.org/2008/202}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SuLM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/DangKDLZF07, author = {Lanjun Dang and Weidong Kou and Nan Dang and Hui Li and Bin Zhao and Kai Fan}, title = {Mobile ip registration in certificateless public key infrastructure}, journal = {{IET} Inf. Secur.}, volume = {1}, number = {4}, pages = {167--173}, year = {2007}, url = {https://doi.org/10.1049/iet-ifs:20070010}, doi = {10.1049/IET-IFS:20070010}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/DangKDLZF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/HuiT05, author = {Hui Li and Ting Shen}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {A Token-Based Single Sign-On Protocol}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {180--185}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_27}, doi = {10.1007/11596981\_27}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/HuiT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccnmc/WangLL05, author = {Meng Wang and Hui Li and Zhijing Liu}, editor = {Xicheng Lu and Wei Zhao}, title = {Efficient Identity Based Proxy-Signcryption Schemes with Forward Security and Public Verifiability}, booktitle = {Networking and Mobile Computing, Third International Conference, {ICCNMC} 2005, Zhangjiajie, China, August 2-4, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3619}, pages = {982--991}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11534310\_103}, doi = {10.1007/11534310\_103}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccnmc/WangLL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.