Fenghua Li
Orcid: 0000-0003-0803-5526
According to our database1,
Fenghua Li
authored at least 170 papers
between 2004 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Biomed. Signal Process. Control., 2025
2024
Authentication for Satellite Internet Resource Slicing Access Based on Trust Measurement.
IEEE Internet Things J., June, 2024
LSPSS: Constructing Lightweight and Secure Scheme for Private Data Storage and Sharing in Aerial Computing.
IEEE Trans. Serv. Comput., 2024
IMap: Toward a Fast, Scalable and Reconfigurable In-Network Scanner With Programmable Switches.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
A Classification Framework for Depressive Episode Using R-R Intervals From Smartwatch.
IEEE Trans. Affect. Comput., 2024
A Comprehensive Study on GDPR-Oriented Analysis of Privacy Policies: Taxonomy, Corpus and GDPR Concept Classifiers.
CoRR, 2024
CoRR, 2024
Cost-Effective Defense Timing Selection for Moving Target Defense in Satellite Computing Systems.
Proceedings of the Computational Science - ICCS 2024, 2024
ADP-VFL: An Adaptive Differential Privacy Scheme for VPP Based on Federated Learning.
Proceedings of the IEEE International Conference on Communications, 2024
Online and Collaboratively Mitigating Multi-Vector DDoS Attacks for Cloud-Edge Computing.
Proceedings of the IEEE International Conference on Communications, 2024
Proceedings of the IEEE International Conference on Acoustics, 2024
Missing Data Completion for Network Traffic with Continuous Mutation Based on Tensor Ring Decomposition.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
2023
Strain ultrasonic elastography imaging features of locally advanced breast cancer: association with response to neoadjuvant chemotherapy and recurrence-free survival.
BMC Medical Imaging, December, 2023
Go-Sharing: A Blockchain-Based Privacy-Preserving Framework for Cross-Social Network Photo Sharing.
IEEE Trans. Dependable Secur. Comput., 2023
Joint Biological ID : A Secure and Efficient Lightweight Biometric Authentication Scheme.
IEEE Trans. Dependable Secur. Comput., 2023
Dynamic threshold strategy optimization for security protection in Internet of Things: An adversarial deep learning-based game-theoretical approach.
Concurr. Comput. Pract. Exp., 2023
Interpreting Disparate Privacy-Utility Tradeoff in Adversarial Learning via Attribute Correlation.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2023
A Certificateless Conditional Anonymous Authentication Scheme for Satellite Internet of Things.
Proceedings of the Information and Communications Security - 25th International Conference, 2023
Proceedings of the Information and Communications Security - 25th International Conference, 2023
Collaboration and orchestration in a virtual teaching organization of environmental education.
Proceedings of the 15th International Conference on Education Technology and Computers, 2023
Proceedings of the IEEE International Conference on Communications, 2023
A Sensitivity-aware and Block-wise Pruning Method for Privacy-preserving Federated Learning.
Proceedings of the IEEE Global Communications Conference, 2023
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023
Evaluating Indicator Weights for Satellite Internet Security Assessment: an Approach to Combining Rough Set with Fuzzy Hierarchical Analysis.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023
ProMD: A Proactive Intrusion Response System for Enterprise Network with Multi-Domain.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023
2022
IEEE/ACM Trans. Netw., 2022
Eclipse: Preserving Differential Location Privacy Against Long-Term Observation Attacks.
IEEE Trans. Mob. Comput., 2022
Monitoring-Based Differential Privacy Mechanism Against Query Flooding-Based Model Extraction Attack.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Internet Things J., 2022
Digit. Commun. Networks, 2022
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
Proceedings of the IEEE Smartworld, 2022
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the Security and Privacy in Communication Networks, 2022
Proceedings of the 19th USENIX Symposium on Networked Systems Design and Implementation, 2022
Multi-hop Precision Time Protocol: an Internet Applicable Time Synchronization Scheme.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022
Proceedings of the IFIP Networking Conference, 2022
Proceedings of the IEEE Symposium on Computers and Communications, 2022
A blockchain-based Privacy-Preserving Framework for Cross-Social Network Photo Sharing.
Proceedings of the IEEE INFOCOM 2022, 2022
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022
Designing Problem-based Learning at a Department Level in Resources and Environment: An Interdisciplinary Study.
Proceedings of the 14th International Conference on Education Technology and Computers, 2022
Proceedings of the IEEE Global Communications Conference, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
Hopping on Spectrum: Measuring and Boosting a Large-scale Dual-band Wireless Network.
Proceedings of the 29th IEEE International Conference on Network Protocols, 2021
Proceedings of the ICETC 2021: 13th International Conference on Education Technology and Computers, Wuhan, China, October 22, 2021
Resolving Policy Conflicts for Cross-Domain Access Control: A Double Auction Approach.
Proceedings of the Computational Science - ICCS 2021, 2021
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021
Discovering obscure looking glass sites on the web to facilitate internet measurement research.
Proceedings of the CoNEXT '21: The 17th International Conference on emerging Networking EXperiments and Technologies, Virtual Event, Munich, Germany, December 7, 2021
2020
Achieving Privacy-Preserving Group Recommendation with Local Differential Privacy and Random Transmission.
Wirel. Commun. Mob. Comput., 2020
IEEE Wirel. Commun., 2020
Squeezing the Gap: An Empirical Study on DHCP Performance in a Large-Scale Wireless Network.
IEEE/ACM Trans. Netw., 2020
A Stackelberg Security Game for Adversarial Outbreak Detection in the Internet of Things.
Sensors, 2020
J. Parallel Distributed Comput., 2020
J. Parallel Distributed Comput., 2020
Inf. Sci., 2020
Int. J. Comput. Sci. Eng., 2020
Monitoring-based Differential Privacy Mechanism Against Query-Flooding Parameter Duplication Attack.
CoRR, 2020
Concurr. Comput. Pract. Exp., 2020
Computer-aided diagnosis of gallbladder polyps based on high resolution ultrasonography.
Comput. Methods Programs Biomed., 2020
Revocable Certificateless Public Key Encryption With Outsourced Semi-Trusted Cloud Revocation Agent.
IEEE Access, 2020
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020
A Secure Authentication Scheme for Remote Diagnosis and Maintenance in Internet of Vehicles.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the Database and Expert Systems Applications, 2020
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
2019
IEEE Trans. Inf. Forensics Secur., 2019
J. Univers. Comput. Sci., 2019
Guest Editorial Special Issue on Security and Privacy Protection for Big Data and IoT.
IEEE Internet Things J., 2019
Cyberspace-Oriented Access Control: A Cyberspace Characteristics-Based Model and its Policies.
IEEE Internet Things J., 2019
Int. J. Inf. Technol. Web Eng., 2019
Multi-Service Oriented Stream Data Synchronization Scheme for Multicore Cipher Chips.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
Privacy-Oriented Blockchain-Based Distributed Key Management Architecture for Hierarchical Access Control in the IoT Scenario.
IEEE Access, 2019
Quantum-Resistance Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019
Privacy-Preserving Device Discovery and Authentication Scheme for D2D Communication in 3GPP 5G HetNet.
Proceedings of the International Conference on Computing, Networking and Communications, 2019
Proceedings of the International Conference on Computing, Networking and Communications, 2019
An Extended Control Framework for Privacy-Preserving Photo Sharing across Different Social Networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2019
Proceedings of the Computational Science - ICCS 2019, 2019
PGSM-DPI: Precisely Guided Signature Matching of Deep Packet Inspection for Traffic Analysis.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2019
Proceedings of the International Conference on Artificial Intelligence, 2019
Proceedings of the ACM Turing Celebration Conference - China, 2019
2018
World Wide Web, 2018
Efficient and Privacy-Preserving Dynamic Spatial Query Scheme for Ride-Hailing Services.
IEEE Trans. Veh. Technol., 2018
IEEE Trans. Veh. Technol., 2018
Secur. Commun. Networks, 2018
UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks.
Secur. Commun. Networks, 2018
Microprocess. Microsystems, 2018
J. Electr. Comput. Eng., 2018
Photoplethysmography based psychological stress detection with pulse rate variability feature differences and elastic net.
Int. J. Distributed Sens. Networks, 2018
IACR Cryptol. ePrint Arch., 2018
Sci. China Inf. Sci., 2018
Privacy-preserving ride clustering for customized-bus sharing: A fog-assisted approach.
Proceedings of the 16th International Symposium on Modeling and Optimization in Mobile, 2018
Proceedings of the 2018 IEEE Military Communications Conference, 2018
Wi-Live, Adaptive Scenario-Aware Wireless Multicast Solution for Living Streaming Based on Software Defined Networks.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018
Squeezing the Gap: An Empirical Study on DHCP Performance in a Large-scale Wireless Network.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
A Reliable Multicast Transport Protocol for Device Management in Space-ground Integrated Network.
Proceedings of the 3rd International Conference on Multimedia Systems and Signal Processing, 2018
Selecting Combined Countermeasures for Multi-Attack Paths in Intrusion Response System.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
Incentive Mechanism for Cooperative Intrusion Detection: An Evolutionary Game Approach.
Proceedings of the Computational Science - ICCS 2018, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of 2018 International Conference on Big Data Technologies, 2018
Achieving Personalized k-Anonymity against Long-Term Observation in Location-Based Services.
Proceedings of the IEEE Global Communications Conference, 2018
2017
Inf. Sci., 2017
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
Research on Similarity Record Detection of Device Status Information Based on Multiple Encoding Field.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Proceedings of the Network and System Security - 11th International Conference, 2017
Proceedings of the International Conference on Networking and Network Applications, 2017
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017
Proceedings of the 2017 International Conference on Cryptography, Security and Privacy, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Trajectory prediction-based handover authentication mechanism for mobile relays in LTE-A high-speed rail networks.
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the Algorithms and Architectures for Parallel Processing, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
2016
Proceedings of the IEEE Wireless Communications and Networking Conference Workshops, 2016
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016
Proceedings of the 2016 IEEE Military Communications Conference, 2016
Proceedings of the 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), 2016
Proceedings of the 2016 International Conference on Computing, 2016
Protection of location privacy in continuous LBSs against adversaries with background information.
Proceedings of the 2016 International Conference on Computing, 2016
Match-MORE: An efficient private matching scheme using friends-of-friends' recommendation.
Proceedings of the 2016 International Conference on Computing, 2016
Achieving secure and accurate friend discovery based on friend-of-friend's recommendations.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
A Voronoi-Based Dummy Generation Algorithm for Privacy-Aware Location-Based Services.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016
Proceedings of the 10th International Conference on Complex, 2016
Proceedings of the 10th International Conference on Complex, 2016
2015
Peer-to-Peer Netw. Appl., 2015
KSII Trans. Internet Inf. Syst., 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
UGHA: Uniform group-based handover authentication for MTC within E-UTRAN in LTE-A networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
2014
Secur. Commun. Networks, 2014
J. Commun. Networks, 2014
KSII Trans. Internet Inf. Syst., 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
IEEE Trans. Inf. Forensics Secur., 2013
Int. J. Grid Util. Comput., 2013
An improved attack on clock-controlled shift registers based on hardware implementation.
Sci. China Inf. Sci., 2013
Proceedings of the Conference on Underwater Networks and Systems, 2013
Proceedings of the Media Watermarking, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
2010
Ad Hoc Sens. Wirel. Networks, 2010
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010
2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
Sci. China Ser. F Inf. Sci., 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the AINTEC '08, 2008
2004
Three-dimensional reconstruction of objects buried in layered media using Born and distorted Born iterative methods.
IEEE Geosci. Remote. Sens. Lett., 2004