Fenghua Li

Orcid: 0000-0003-0803-5526

According to our database1, Fenghua Li authored at least 170 papers between 2004 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
A deep learning method for contactless emotion recognition from ballistocardiogram.
Biomed. Signal Process. Control., 2025

2024
Authentication for Satellite Internet Resource Slicing Access Based on Trust Measurement.
IEEE Internet Things J., June, 2024

LSPSS: Constructing Lightweight and Secure Scheme for Private Data Storage and Sharing in Aerial Computing.
IEEE Trans. Serv. Comput., 2024

IMap: Toward a Fast, Scalable and Reconfigurable In-Network Scanner With Programmable Switches.
IEEE Trans. Inf. Forensics Secur., 2024

Automatic Evasion of Machine Learning-Based Network Intrusion Detection Systems.
IEEE Trans. Dependable Secur. Comput., 2024

A Classification Framework for Depressive Episode Using R-R Intervals From Smartwatch.
IEEE Trans. Affect. Comput., 2024

A Comprehensive Study on GDPR-Oriented Analysis of Privacy Policies: Taxonomy, Corpus and GDPR Concept Classifiers.
CoRR, 2024

Training Data Attribution: Was Your Model Secretly Trained On Data Created By Mine?
CoRR, 2024

Cost-Effective Defense Timing Selection for Moving Target Defense in Satellite Computing Systems.
Proceedings of the Computational Science - ICCS 2024, 2024

ADP-VFL: An Adaptive Differential Privacy Scheme for VPP Based on Federated Learning.
Proceedings of the IEEE International Conference on Communications, 2024

Online and Collaboratively Mitigating Multi-Vector DDoS Attacks for Cloud-Edge Computing.
Proceedings of the IEEE International Conference on Communications, 2024

Interpreting Memorization in Deep Learning from Data Distribution.
Proceedings of the IEEE International Conference on Acoustics, 2024

Missing Data Completion for Network Traffic with Continuous Mutation Based on Tensor Ring Decomposition.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

2023
Strain ultrasonic elastography imaging features of locally advanced breast cancer: association with response to neoadjuvant chemotherapy and recurrence-free survival.
BMC Medical Imaging, December, 2023

Go-Sharing: A Blockchain-Based Privacy-Preserving Framework for Cross-Social Network Photo Sharing.
IEEE Trans. Dependable Secur. Comput., 2023

Joint Biological ID : A Secure and Efficient Lightweight Biometric Authentication Scheme.
IEEE Trans. Dependable Secur. Comput., 2023

Dynamic threshold strategy optimization for security protection in Internet of Things: An adversarial deep learning-based game-theoretical approach.
Concurr. Comput. Pract. Exp., 2023

Interpreting Disparate Privacy-Utility Tradeoff in Adversarial Learning via Attribute Correlation.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2023

A Certificateless Conditional Anonymous Authentication Scheme for Satellite Internet of Things.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

On-Demand Allocation of Cryptographic Computing Resource with Load Prediction.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

Collaboration and orchestration in a virtual teaching organization of environmental education.
Proceedings of the 15th International Conference on Education Technology and Computers, 2023

GapReplay: A High-Accuracy Packet Replayer.
Proceedings of the IEEE International Conference on Communications, 2023

A Sensitivity-aware and Block-wise Pruning Method for Privacy-preserving Federated Learning.
Proceedings of the IEEE Global Communications Conference, 2023

A Moving Target Defense Approach for the Distributed Dynamic Network.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

Evaluating Indicator Weights for Satellite Internet Security Assessment: an Approach to Combining Rough Set with Fuzzy Hierarchical Analysis.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

ProMD: A Proactive Intrusion Response System for Enterprise Network with Multi-Domain.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

2022
Scheduling Massive Camera Streams to Optimize Large-Scale Live Video Analytics.
IEEE/ACM Trans. Netw., 2022

A Framework for Personalized Location Privacy.
IEEE Trans. Mob. Comput., 2022

Eclipse: Preserving Differential Location Privacy Against Long-Term Observation Attacks.
IEEE Trans. Mob. Comput., 2022

Monitoring-Based Differential Privacy Mechanism Against Query Flooding-Based Model Extraction Attack.
IEEE Trans. Dependable Secur. Comput., 2022

MARS: Automated Protocol Analysis Framework for Internet of Things.
IEEE Internet Things J., 2022

Detecting conflict of heterogeneous access control policies.
Digit. Commun. Networks, 2022

DP-Opt: Identify High Differential Privacy Violation by Optimization.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Inferring Attack Paths in Networks with Periodic Topology Changes.
Proceedings of the IEEE Smartworld, 2022

A Terminal Security Authentication Protocol for Zero-Trust Satellite IoT.
Proceedings of the IEEE International Conference on Trust, 2022

Efficiently Constructing Topology of Dynamic Networks.
Proceedings of the IEEE International Conference on Trust, 2022

Message Recovery Attack of Kyber Based on Information Leakage in Decoding Operation.
Proceedings of the Security and Privacy in Communication Networks, 2022

IMap: Fast and Scalable In-Network Scanning with Programmable Switches.
Proceedings of the 19th USENIX Symposium on Networked Systems Design and Implementation, 2022

Multi-hop Precision Time Protocol: an Internet Applicable Time Synchronization Scheme.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

PNT Sketch: A Generic Sketch Algorithm for Periodic Network Telemetry.
Proceedings of the IFIP Networking Conference, 2022

DICOF: A Distributed and Collaborative Framework for Hybrid DDoS Attack Detection.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

A blockchain-based Privacy-Preserving Framework for Cross-Social Network Photo Sharing.
Proceedings of the IEEE INFOCOM 2022, 2022

ARCANE: An Efficient Architecture for Exact Machine Unlearning.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

Designing Problem-based Learning at a Department Level in Resources and Environment: An Interdisciplinary Study.
Proceedings of the 14th International Conference on Education Technology and Computers, 2022

Insider Threat Detection Using Generative Adversarial Graph Attention Networks.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Smart and Practical Privacy-Preserving Data Aggregation for Fog-Based Smart Grids.
IEEE Trans. Inf. Forensics Secur., 2021

AdaPDP: Adaptive Personalized Differential Privacy.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

Hopping on Spectrum: Measuring and Boosting a Large-scale Dual-band Wireless Network.
Proceedings of the 29th IEEE International Conference on Network Protocols, 2021

Exploration of Problem-based Learning at Inter-course Level.
Proceedings of the ICETC 2021: 13th International Conference on Education Technology and Computers, Wuhan, China, October 22, 2021

Resolving Policy Conflicts for Cross-Domain Access Control: A Double Auction Approach.
Proceedings of the Computational Science - ICCS 2021, 2021

Efficiently Managing Large-Scale Keys in HDFS.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

Discovering obscure looking glass sites on the web to facilitate internet measurement research.
Proceedings of the CoNEXT '21: The 17th International Conference on emerging Networking EXperiments and Technologies, Virtual Event, Munich, Germany, December 7, 2021

2020
Achieving Privacy-Preserving Group Recommendation with Local Differential Privacy and Random Transmission.
Wirel. Commun. Mob. Comput., 2020

Achieving Fine-Grained QoS for Privacy-Aware Users in LBSs.
IEEE Wirel. Commun., 2020

Squeezing the Gap: An Empirical Study on DHCP Performance in a Large-Scale Wireless Network.
IEEE/ACM Trans. Netw., 2020

A Stackelberg Security Game for Adversarial Outbreak Detection in the Internet of Things.
Sensors, 2020

Securing instruction interaction for hierarchical management.
J. Parallel Distributed Comput., 2020

Privbus: A privacy-enhanced crowdsourced bus service via fog computing.
J. Parallel Distributed Comput., 2020

Exploiting location-related behaviors without the GPS data on smartphones.
Inf. Sci., 2020

General process of big data analysis and visualisation.
Int. J. Comput. Sci. Eng., 2020

Monitoring-based Differential Privacy Mechanism Against Query-Flooding Parameter Duplication Attack.
CoRR, 2020

A topic-centric access control model for the publish/subscribe paradigm.
Concurr. Comput. Pract. Exp., 2020

Dynamic countermeasures selection for multi-path attacks.
Comput. Secur., 2020

Computer-aided diagnosis of gallbladder polyps based on high resolution ultrasonography.
Comput. Methods Programs Biomed., 2020

Revocable Certificateless Public Key Encryption With Outsourced Semi-Trusted Cloud Revocation Agent.
IEEE Access, 2020

Utility-aware Exponential Mechanism for Personalized Differential Privacy.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

A Secure Authentication Scheme for Remote Diagnosis and Maintenance in Internet of Vehicles.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

Decision-Making for Intrusion Response: Which, Where, in What Order, and How Long?
Proceedings of the 2020 IEEE International Conference on Communications, 2020

A Framework to Preserve User Privacy for Machine Learning as a Service.
Proceedings of the IEEE Global Communications Conference, 2020

The Linear Geometry Structure of Label Matrix for Multi-label Learning.
Proceedings of the Database and Expert Systems Applications, 2020

Membership Inference Attacks against MemGuard : IEEE CNS 20 Poster.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
AnFRA: Anonymous and Fast Roaming Authentication for Space Information Network.
IEEE Trans. Inf. Forensics Secur., 2019

Combination Model of Heterogeneous Data for Security Measurement.
J. Univers. Comput. Sci., 2019

A game theoretic approach to cooperative intrusion detection.
J. Comput. Sci., 2019

Guest Editorial Special Issue on Security and Privacy Protection for Big Data and IoT.
IEEE Internet Things J., 2019

Cyberspace-Oriented Access Control: A Cyberspace Characteristics-Based Model and its Policies.
IEEE Internet Things J., 2019

A Searchable CP-ABE Privacy Preserving Scheme.
Int. J. Netw. Secur., 2019

An Attribute-Based Assured Deletion Scheme in Cloud Computing.
Int. J. Inf. Technol. Web Eng., 2019

Multi-Service Oriented Stream Data Synchronization Scheme for Multicore Cipher Chips.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

Privacy-Oriented Blockchain-Based Distributed Key Management Architecture for Hierarchical Access Control in the IoT Scenario.
IEEE Access, 2019

Quantum-Resistance Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

HideMe: Privacy-Preserving Photo Sharing on Social Networks.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

BDAC: A Behavior-aware Dynamic Adaptive Configuration on DHCP in Wireless LANs.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

Privacy-Preserving Device Discovery and Authentication Scheme for D2D Communication in 3GPP 5G HetNet.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

DIAM: Diversified Identity Authentication Mechanism for 5G Multi-Service System.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

An Extended Control Framework for Privacy-Preserving Photo Sharing across Different Social Networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Incentive Mechanism for Cooperative Intrusion Response: A Dynamic Game Approach.
Proceedings of the Computational Science - ICCS 2019, 2019

PGSM-DPI: Precisely Guided Signature Matching of Deep Packet Inspection for Traffic Analysis.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Hierarchical Key Management Scheme with Multilevel Secure Access.
Proceedings of the 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2019

Enhanced blockchain based key management scheme against key exposure attack.
Proceedings of the International Conference on Artificial Intelligence, 2019

On data visualization for securities investment fund analysis.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2018
A game-theoretic approach to advertisement dissemination in ephemeral networks.
World Wide Web, 2018

Efficient and Privacy-Preserving Dynamic Spatial Query Scheme for Ride-Hailing Services.
IEEE Trans. Veh. Technol., 2018

Privacy-Preserving Partner Selection for Ride-Sharing Services.
IEEE Trans. Veh. Technol., 2018

Security Measurement for Unknown Threats Based on Attack Preferences.
Secur. Commun. Networks, 2018

HAC: Hybrid Access Control for Online Social Networks.
Secur. Commun. Networks, 2018

UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks.
Secur. Commun. Networks, 2018

Design of Multi Cipher Processing Architecture for Random Cross Access.
Microprocess. Microsystems, 2018

An Efficient Stream Data Processing Model for Multiuser Cryptographic Service.
J. Electr. Comput. Eng., 2018

Photoplethysmography based psychological stress detection with pulse rate variability feature differences and elastic net.
Int. J. Distributed Sens. Networks, 2018

Privacy Computing: Concept, Computing Framework And Future Development Trends.
IACR Cryptol. ePrint Arch., 2018

DESC: enabling secure data exchange based on smart contracts.
Sci. China Inf. Sci., 2018

Privacy-preserving ride clustering for customized-bus sharing: A fog-assisted approach.
Proceedings of the 16th International Symposium on Modeling and Optimization in Mobile, 2018

Resolving Access Conflicts: An Auction-Based Incentive Approach.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Wi-Live, Adaptive Scenario-Aware Wireless Multicast Solution for Living Streaming Based on Software Defined Networks.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

Squeezing the Gap: An Empirical Study on DHCP Performance in a Large-scale Wireless Network.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

A Reliable Multicast Transport Protocol for Device Management in Space-ground Integrated Network.
Proceedings of the 3rd International Conference on Multimedia Systems and Signal Processing, 2018

Selecting Combined Countermeasures for Multi-Attack Paths in Intrusion Response System.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Incentive Mechanism for Cooperative Intrusion Detection: An Evolutionary Game Approach.
Proceedings of the Computational Science - ICCS 2018, 2018

Real-Time Data Incentives for IoT Searches.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

2-MR: a two-phase mapreduce approach for incremental replication.
Proceedings of 2018 International Conference on Big Data Technologies, 2018

Achieving Personalized k-Anonymity against Long-Term Observation in Location-Based Services.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Server-aided private set intersection based on reputation.
Inf. Sci., 2017

Small-world: Secure friend matching over physical world and social networks.
Inf. Sci., 2017

Pricing Privacy Leakage in Location-Based Services.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Research on Similarity Record Detection of Device Status Information Based on Multiple Encoding Field.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

A Novel Threat-Driven Data Collection Method for Resource-Constrained Networks.
Proceedings of the Network and System Security - 11th International Conference, 2017

Secure Transmission with Limited Feedback in MISOME Wiretap Channels.
Proceedings of the International Conference on Networking and Network Applications, 2017

Receive Buffer Pre-division Based Flow Control for MPTCP.
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017

A Privacy-Preserving Method for Photo Sharing in Instant Message Systems.
Proceedings of the 2017 International Conference on Cryptography, Security and Privacy, 2017

Impact factor-based group recommendation scheme with privacy preservation in MSNs.
Proceedings of the IEEE International Conference on Communications, 2017

Trajectory prediction-based handover authentication mechanism for mobile relays in LTE-A high-speed rail networks.
Proceedings of the IEEE International Conference on Communications, 2017

Optimally Selecting the Timing of Zero-Day Attack via Spatial Evolutionary Game.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2017

TrackU: Exploiting User's Mobility Behavior via WiFi List.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Who Is Visible: Resolving Access Policy Conflicts in Online Social Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

SRAM: A State-Aware Risk Assessment Model for Intrusion Response.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Cyberspace-Oriented Access Control: Model and Policies.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

2016
Time obfuscation-based privacy-preserving scheme for Location-Based Services.
Proceedings of the IEEE Wireless Communications and Networking Conference Workshops, 2016

A practical group matching scheme for privacy-aware users in mobile social networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

Hunting abnormal configurations for permission-sensitive role mining.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

A core-stateless IP mobility management scheme based on OpenFlow protocol.
Proceedings of the 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), 2016

Achieving lightweight, time-specific and secure access control in cloud storage.
Proceedings of the 2016 International Conference on Computing, 2016

Protection of location privacy in continuous LBSs against adversaries with background information.
Proceedings of the 2016 International Conference on Computing, 2016

Match-MORE: An efficient private matching scheme using friends-of-friends' recommendation.
Proceedings of the 2016 International Conference on Computing, 2016

Achieving secure and accurate friend discovery based on friend-of-friend's recommendations.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

A Voronoi-Based Dummy Generation Algorithm for Privacy-Aware Location-Based Services.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

Role and Time-Based Access Control with Efficient Revocation for Cloud Storage.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

Design and Implementation of an Extensible Network Device Management System.
Proceedings of the 10th International Conference on Complex, 2016

Extensible Command Parsing Method for Network Device.
Proceedings of the 10th International Conference on Complex, 2016

2015
A full lifecycle privacy protection scheme for sensitive data in cloud computing.
Peer-to-Peer Netw. Appl., 2015

Towards Smart Card Based Mutual Authentication Schemes in Cloud Computing.
KSII Trans. Internet Inf. Syst., 2015

A Novel Cyberspace-Oriented Access Control Model.
IACR Cryptol. ePrint Arch., 2015

Achieving Lightweight and Secure Access Control in Multi-authority Cloud.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Achieving secure friend discovery in social strength-aware PMSNs.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Does dynamic still work in today's 'D'HCP.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

Privacy-preserving strategies in service quality aware Location-Based Services.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

UGHA: Uniform group-based handover authentication for MTC within E-UTRAN in LTE-A networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
Preserving identity privacy on multi-owner cloud data during public verification.
Secur. Commun. Networks, 2014

Efficient public verification on the integrity of multi-owner data in the cloud.
J. Commun. Networks, 2014

Attribute-Based Data Sharing with Flexible and Direct Revocation in Cloud Computing.
KSII Trans. Internet Inf. Syst., 2014

Tree-Based Multi-dimensional Range Search on Encrypted Data with Enhanced Privacy.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Research on Credible Regulation Mechanism for the Trading of Digital Works.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

A Reliable Supervision Model and Implementation for the Trading of Digital Works.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

A User-Based Document Management Mechanism in Cloud.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2013
Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption.
IEEE Trans. Inf. Forensics Secur., 2013

Fast Estimation of Optimal Marked-Signal Distribution for Reversible Data Hiding.
IEEE Trans. Inf. Forensics Secur., 2013

Privacy-preserving logistic regression outsourcing in cloud computing.
Int. J. Grid Util. Comput., 2013

An improved attack on clock-controlled shift registers based on hardware implementation.
Sci. China Inf. Sci., 2013

Chaotic modulations for digital underwater acoustic communications.
Proceedings of the Conference on Underwater Networks and Systems, 2013

Video steganography with multi-path motion estimation.
Proceedings of the Media Watermarking, 2013

FDR-ABE: Attribute-Based Encryption with Flexible and Direct Revocation.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Certificateless public auditing for data integrity in the cloud.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2011
Research on Access Control Mechanism for Digital Products Trading.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
Key Pre-distribution Scheme with Node Revocation for Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2010

RPS: range-based path selection method for concurrent multipath transfer.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

2009
Action-Based Access Control for Web Services.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
A new approach for UC security concurrent deniable authentication.
Sci. China Ser. F Inf. Sci., 2008

Enhanced Architecture of TPM.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A novel infrastructure WLAN locating method based on neural network.
Proceedings of the AINTEC '08, 2008

2004
Three-dimensional reconstruction of objects buried in layered media using Born and distorted Born iterative methods.
IEEE Geosci. Remote. Sens. Lett., 2004


  Loading...