Guangshun Li

Orcid: 0000-0001-6147-0637

According to our database1, Guangshun Li authored at least 59 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Efficient and secure privacy protection scheme and consensus mechanism in MEC enabled e-commerce consortium blockchain.
J. Cloud Comput., December, 2024

2023
IoV data sharing scheme based on the hybrid architecture of blockchain and cloud-edge computing.
J. Cloud Comput., December, 2023

Privacy-Aware Traffic Flow Prediction Based on Multi-Party Sensor Data with Zero Trust in Smart City.
ACM Trans. Internet Techn., August, 2023

Blockchain-Based Privacy-Preserving Positioning Data Sharing for IoT-Enabled Maritime Transportation Systems.
IEEE Trans. Intell. Transp. Syst., February, 2023

Concatenated Masked Autoencoders as Spatial-Temporal Learner.
CoRR, 2023

CD-Net: Cross-Domain Description and Detection for 2D-3D Learning Local Features.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

A Truth Inference Algorithm Using Bidirectional Convolution Autoencoder for Crowdsourcing Image Segmentation.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

An Updatable Key Management Scheme for Underwater Wireless Sensor Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

Combining Reverse Temporal Attention Mechanism and Dynamic Similarity Analysis for Disease Prediction.
Proceedings of the IEEE Intl Conf on Dependable, 2023

Epoch: Enabling Path Concealing Payment Channel Hubs with Optimal Path Encryption.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

SARA: Slot Attention for Robust Adversarial Training.
Proceedings of the 6th International Conference on Algorithms, 2023

2022
The impact of mobility on physical layer security in 5G uRLLC.
Int. J. Intell. Syst., December, 2022

Secure storage scheme of trajectory data for digital tracking mechanism.
Int. J. Intell. Syst., December, 2022

Design of vehicle certification schemes in IoV based on blockchain.
World Wide Web, 2022

Edge-cloud-enabled matrix factorization for diversified APIs recommendation in mashup creation.
World Wide Web, 2022

A New Secure Crowdfunding Transaction Scheme Based on Blockchain.
J. Circuits Syst. Comput., 2022

An intelligent forecast for COVID-19 based on single and multiple features.
Int. J. Intell. Syst., 2022

Intelligent federated learning on lattice-based efficient heterogeneous signcryption.
Int. J. Intell. Syst., 2022

Increasing the Accuracy of Secure Model for Medical Data Sharing in the Internet of Things.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Securing uRLLC in UAV-assisted NOMA Wireless Network.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022

Blockchain-based Secure Medical Data Management and Disease Prediction.
Proceedings of the BSCI 2022: Proceedings of the 4th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2022

2021
On Constructing t -Spanner in IoT under SINRI.
Wirel. Commun. Mob. Comput., 2021

Noniterative Sparse LS-SVM Based on Globally Representative Point Selection.
IEEE Trans. Neural Networks Learn. Syst., 2021

PDM: Privacy-Aware Deployment of Machine-Learning Applications for Industrial Cyber-Physical Cloud Systems.
IEEE Trans. Ind. Informatics, 2021

Blockchain-based mobile edge computing system.
Inf. Sci., 2021

Dimension Reduction Algorithm Based on Adaptive Maximum Linear Neighborhood Selection in Edge Computing.
IEEE Internet Things J., 2021

Shortest link scheduling in wireless networks under the Rayleigh fading model.
EURASIP J. Wirel. Commun. Netw., 2021

Blockchain-Based Privacy-Preserving Medical Data Sharing Scheme Using Federated Learning.
Proceedings of the Knowledge Science, Engineering and Management, 2021

An Edge Trajectory Protection Approach Using Blockchain.
Proceedings of the Knowledge Science, Engineering and Management, 2021

2020
A self-attention-based destruction and construction learning fine-grained image classification method for retail product recognition.
Neural Comput. Appl., 2020

Securing transmissions by friendly jamming scheme in wireless networks.
J. Parallel Distributed Comput., 2020

A new load balancing strategy by task allocation in edge computing based on intermediary nodes.
EURASIP J. Wirel. Commun. Netw., 2020

Resource Management Framework Based on the Stackelberg Game in Vehicular Edge Computing.
Complex., 2020

Distributed Shortest Link Scheduling Algorithms With Constant Time Complexity in IoT Under Rayleigh Fading.
IEEE Access, 2020

A Location-Based Path Privacy Protection Scheme in Internet of Vehicles.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Multi-sensor Data Fusion Algorithm Based on Adaptive Trust Estimation and Neural Network.
Proceedings of the 9th IEEE/CIC International Conference on Communications in China, 2020

2019
ACCBN: ant-Colony-clustering-based bipartite network method for predicting long non-coding RNA-protein interactions.
BMC Bioinform., December, 2019

Distributed Link Scheduling Algorithm Based on Successive Interference Cancellation in MIMO Wireless Networks.
Wirel. Commun. Mob. Comput., 2019

Methods of Resource Scheduling Based on Optimized Fuzzy Clustering in Fog Computing.
Sensors, 2019

Energy Consumption Optimization With a Delay Threshold in Cloud-Fog Cooperation Computing.
IEEE Access, 2019

Dynamic Computation Offloading Based on Graph Partitioning in Mobile Edge Computing.
IEEE Access, 2019

2018
Data Processing Delay Optimization in Mobile Edge Computing.
Wirel. Commun. Mob. Comput., 2018

Method of Resource Estimation Based on QoS in Edge Computing.
Wirel. Commun. Mob. Comput., 2018

Resource Scheduling Based on Improved Spectral Clustering Algorithm in Edge Computing.
Sci. Program., 2018

Methods of increasing two-way transmission capacity of wireless ad hoc networks.
EURASIP J. Wirel. Commun. Netw., 2018

Dynamic Mobile Crowdsourcing Selection for Electricity Load Forecasting.
IEEE Access, 2018

DV-Hop Localization Algorithm Based on Minimum Mean Square Error in Internet of Things.
Proceedings of the 2018 International Conference on Identification, 2018

Trajectory Privacy Protection Method Based on Location Service in Fog Computing.
Proceedings of the 2018 International Conference on Identification, 2018

RFID Location Algorithm Based on Target Search and Repeat Calibration.
Proceedings of the 2018 International Conference on Identification, 2018

A Fast Quantum Clustering Approach for Cancer Gene Clustering.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2018

2017
分裂二进制追踪树标签防碰撞协议 (Novel Tag Anticollision Protocol with Splitting Binary Tracking Tree).
计算机科学, 2017

Multi-leader election in dynamic sensor networks.
EURASIP J. Wirel. Commun. Netw., 2017

A New Weighted Connection-Least Load Balancing Algorithm Based on Delay Optimization Strategy.
Proceedings of the Geo-Spatial Knowledge and Intelligence - 5th International Conference, 2017

2016
WDFAD-DBR: Weighting depth and forwarding area division DBR routing protocol for UASNs.
Ad Hoc Networks, 2016

Distributed deterministic broadcasting algorithms under the SINR model.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

2015
Minimum connected dominating set construction in wireless networks under the beeping model.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

2007
Verification of Circuits Including Black Box Based on TED.
Proceedings of the 10th International Conference on Computer-Aided Design and Computer Graphics, 2007

2006
Sharing Methods of Multi-objective Functions Based on TED.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Complex Data Flow Matching Algorithm Based on TDG.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006


  Loading...