Jianhua Li
Orcid: 0000-0002-6831-3973Affiliations:
- Shanghai Jiao Tong University, Shanghai Key Laboratory of Integrated Administration Technologies for Information Security, China
According to our database1,
Jianhua Li
authored at least 302 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
HSESR: Hierarchical Software Execution State Representation for Ultralow-Latency Threat Alerting Over Internet of Things.
IEEE Internet Things J., November, 2024
Personalized Privacy-Preserving Distributed Artificial Intelligence for Digital-Twin-Driven Vehicle Road Cooperation.
IEEE Internet Things J., November, 2024
Large-Scale Mean-Field Federated Learning for Detection and Defense: A Byzantine Robustness Approach in IoT.
IEEE Internet Things J., November, 2024
Joint Top-K Sparsification and Shuffle Model for Communication-Privacy-Accuracy Tradeoffs in Federated-Learning-Based IoV.
IEEE Internet Things J., June, 2024
Leveraging Digital Twin and DRL for Collaborative Context Offloading in C-V2X Autonomous Driving.
IEEE Trans. Veh. Technol., April, 2024
Blockchain and Multi-Agent Learning Empowered Incentive IRS Resource Scheduling for Intelligent Reconfigurable Networks.
IEEE/ACM Trans. Netw., April, 2024
Privacy-Preserving Few-Shot Traffic Detection Against Advanced Persistent Threats via Federated Meta Learning.
IEEE Trans. Netw. Sci. Eng., 2024
From Control Application to Control Logic: PLC Decompile Framework for Industrial Control System.
IEEE Trans. Inf. Forensics Secur., 2024
Generative AI for Software Security Analysis: Fundamentals, Applications, and Challenges.
IEEE Softw., 2024
SupRTE: Suppressing Backdoor Injection in Federated Learning via Robust Trust Evaluation.
IEEE Intell. Syst., 2024
Graph Neural Backdoor: Fundamentals, Methodologies, Applications, and Future Directions.
CoRR, 2024
Trustworthy AI-Generative Content in Intelligent 6G Network: Adversarial, Privacy, and Fairness.
CoRR, 2024
Spikewhisper: Temporal Spike Backdoor Attacks on Federated Neuromorphic Learning over Low-power Devices.
CoRR, 2024
LinkGuard: Link Locally Privacy-Preserving Graph Neural Networks with Integrated Denoising and Private Learning.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024
Local Differential Private Spatio- Temporal Dynamic Graph Learning for Wireless Social Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024
Covert and Reliable Semantic Communication Against Cross-Layer Privacy Inference over Wireless Edge Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024
Leveraging Neural Radiance Field and Semantic Communication for Robust 3D Reconstruction.
Proceedings of the 100th IEEE Vehicular Technology Conference, 2024
Towards Multi-Task Generative-AI Edge Services with an Attention-based Diffusion DRL Approach.
Proceedings of the 9th IEEE International Conference on Smart Cloud, 2024
Digital Twin Enhanced Data Protection Based on Cloud-Edge Collaboration in Healthcare System.
Proceedings of the 9th IEEE International Conference on Smart Cloud, 2024
ZeroTKS: Zero-trust Knowledge Synchronization via Federated Fine-tuning for Secure Semantic Communications.
Proceedings of the Twenty-fifth International Symposium on Theory, 2024
How to Efficiently Manage Critical Infrastructure Vulnerabilities? Toward Large Code-graph Models.
Proceedings of the 1st ACM Workshop on Large AI Systems and Models with Privacy and Safety Analysis, 2024
Proceedings of the 15th Asia-Pacific Symposium on Internetware, 2024
Proceedings of the IEEE INFOCOM 2024, 2024
Adaptively Compressed Swarm Learning for Distributed Traffic Prediction over IoV-Web3.0.
Proceedings of the International Joint Conference on Neural Networks, 2024
Regulating Covert Communication Capacity with Full-Duplex Receiver Against Location-Uncertain Eavesdropper.
Proceedings of the International Conference on Computing, Networking and Communications, 2024
A Binary Level Verification Framework for Real-Time Performance of PLC Program in Backhaul/Fronthaul Networks.
Proceedings of the IEEE International Conference on Communications, 2024
Scale Wisely, Secure Wholly: P2P Swarm Learning Over Consortium Blockchain in Edge Networks.
Proceedings of the IEEE International Conference on Communications, 2024
Proceedings of the IEEE International Conference on Communications, 2024
OpticGAI: Generative AI-aided Deep Reinforcement Learning for Optical Networks Optimization.
Proceedings of the 1st SIGCOMM Workshop on Hot Topics in Optical Technologies and Applications in Networking, 2024
Trading Trust for Privacy: Socially-Motivated Personalized Privacy-Preserving Collaborative Learning in IoT.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
BlockAgents: Towards Byzantine-Robust LLM-Based Multi-Agent Coordination via Blockchain.
Proceedings of the ACM Turing Award Celebration Conference 2024, 2024
2023
Digital Twin and Artificial Intelligence-Empowered Panoramic Video Streaming: Reducing Transmission Latency in the Extended Reality-Assisted Vehicular Metaverse.
IEEE Veh. Technol. Mag., December, 2023
Stochastic Digital-Twin Service Demand With Edge Response: An Incentive-Based Congestion Control Approach.
IEEE Trans. Mob. Comput., April, 2023
Vulnerability-Aware Task Scheduling for Edge Intelligence Empowered Trajectory Analysis in Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., April, 2023
IEEE Internet Things J., April, 2023
Recurrent Semantic Learning-Driven Fast Binary Vulnerability Detection in Healthcare Cyber Physical Systems.
IEEE Trans. Netw. Sci. Eng., 2023
Friend-as-Learner: Socially-Driven Trustworthy and Efficient Wireless Federated Edge Learning.
IEEE Trans. Mob. Comput., 2023
Heterogeneous Differential-Private Federated Learning: Trading Privacy for Utility Truthfully.
IEEE Trans. Dependable Secur. Comput., 2023
Cloud-Edge Orchestrated Power Dispatching for Smart Grid With Distributed Energy Resources.
IEEE Trans. Cloud Comput., 2023
Blockchain and digital twin empowered trustworthy self-healing for edge-AI enabled industrial Internet of things.
Inf. Sci., 2023
Reinforcement Learning-Empowered Decentralized Channel Selection for Dense Wi-Fi 7 Networks.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2023
Proceedings of the 19th International Conference on Mobility, Sensing and Networking, 2023
DPG-DT: Differentially Private Generative Digital Twin for Imbalanced Learning in Industrial IoT.
Proceedings of the 19th International Conference on Mobility, Sensing and Networking, 2023
Proceedings of the IEEE International Symposium on Information Theory, 2023
SemSBA: Semantic-perturbed Stealthy Backdoor Attack on Federated Semi-supervised Learning.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
Swarm Reinforcement Learning for Collaborative Content Caching in Information Centric Networks.
Proceedings of the IEEE International Conference on Communications, 2023
Hierarchical Swarm Learning for Edge-Assisted Collaborative Vehicle Trajectory Prediction.
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023
Proceedings of the IEEE International Conference on High Performance Computing & Communications, 2023
Proceedings of the Emerging Information Security and Applications, 2023
AdvBinSD: Poisoning the Binary Code Similarity Detector via Isolated Instruction Sequences.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023
Ensuring Minority Group Rights in Social IoT with Fairness-aware Federated Graph Node Classification.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023
Content Style-triggered Backdoor Attack in Non-IID Federated Learning via Generative AI.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023
2022
Blockchain and AI Enabled Configurable Reflection Resource Allocation for IRS-Aided Coexisting Drone-Terrestrial Networks.
IEEE Wirel. Commun., 2022
Malicious encrypted traffic features extraction model based on unsupervised feature adaptive learning.
J. Comput. Virol. Hacking Tech., 2022
FLAG: Few-Shot Latent Dirichlet Generative Learning for Semantic-Aware Traffic Detection.
IEEE Trans. Netw. Serv. Manag., 2022
Cognitive Balance for Fog Computing Resource in Internet of Things: An Edge Learning Approach.
IEEE Trans. Mob. Comput., 2022
Artificial Intelligence-Based Energy Efficient Communication System for Intelligent Reflecting Surface-Driven VANETs.
IEEE Trans. Intell. Transp. Syst., 2022
Digital Twin Consensus for Blockchain-Enabled Intelligent Transportation Systems in Smart Cities.
IEEE Trans. Intell. Transp. Syst., 2022
Joint Protection of Energy Security and Information Privacy for Energy Harvesting: An Incentive Federated Learning Approach.
IEEE Trans. Ind. Informatics, 2022
Side-Channel Fuzzy Analysis-Based AI Model Extraction Attack With Information-Theoretic Perspective in Intelligent IoT.
IEEE Trans. Fuzzy Syst., 2022
Differential Privacy and IRS Empowered Intelligent Energy Harvesting for 6G Internet of Things.
IEEE Internet Things J., 2022
Blockchain-Based Incentive Energy-Knowledge Trading in IoT: Joint Power Transfer and AI Design.
IEEE Internet Things J., 2022
Information-Centric Wireless Sensor Networking Scheme With Water-Depth-Awareness Content Caching for Underwater IoT.
IEEE Internet Things J., 2022
Metric Learning-based Few-Shot Malicious Node Detection for IoT Backhaul/Fronthaul Networks.
Proceedings of the IEEE Global Communications Conference, 2022
Contrastive GNN-based Traffic Anomaly Analysis Against Imbalanced Dataset in IoT-based ITS.
Proceedings of the IEEE Global Communications Conference, 2022
Multi-Agent Learning Automata for Online Adaptive Control of Large-Scale Traffic Signal Systems.
Proceedings of the IEEE Global Communications Conference, 2022
2021
Trustworthy Edge Storage Orchestration in Intelligent Transportation Systems Using Reinforcement Learning.
IEEE Trans. Intell. Transp. Syst., 2021
Leveraging Energy Function Virtualization With Game Theory for Fault-Tolerant Smart Grid.
IEEE Trans. Ind. Informatics, 2021
IEEE Trans. Emerg. Top. Comput., 2021
Privacy-Accuracy Trade-Off in Differentially-Private Distributed Classification: A Game Theoretical Approach.
IEEE Trans. Big Data, 2021
Privacy Preserved Cyber-Physical Searching for Information-Centric Intelligent Agriculture.
IEEE Open J. Comput. Soc., 2021
Weakly-supervised learning for community detection based on graph convolution in attributed networks.
Int. J. Mach. Learn. Cybern., 2021
Securing Collaborative Environment Monitoring in Smart Cities Using Blockchain Enabled Software-Defined Internet of Drones.
IEEE Internet Things Mag., 2021
Deep-Reinforcement-Learning-Based Cybertwin Architecture for 6G IIoT: An Integrated Design of Control, Communication, and Computing.
IEEE Internet Things J., 2021
Information-Centric Massive IoT-Based Ubiquitous Connected VR/AR in 6G: A Proposed Caching Consensus Approach.
IEEE Internet Things J., 2021
Unsupervised learning for community detection in attributed networks based on graph convolutional network.
Neurocomputing, 2021
Blockchain-Based Trust Edge Knowledge Inference of Multi-Robot Systems for Collaborative Tasks.
IEEE Commun. Mag., 2021
Side-Channel Analysis-Based Model Extraction on Intelligent CPS: An Information Theory Perspective.
Proceedings of the 2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2021
Communication Modeling for Targeted Delivery under Bio-DoS Attack in 6G Molecular Networks.
Proceedings of the ICC 2021, 2021
MT-MTD: Muti-Training based Moving Target Defense Trojaning Attack in Edged-AI network.
Proceedings of the ICC 2021, 2021
Deep Reinforcement Learning for Intelligent Computing and Content Edge Service in ICN-based IoV.
Proceedings of the IEEE International Conference on Communications Workshops, 2021
GradMFL: Gradient Memory-Based Federated Learning for Hierarchical Knowledge Transferring Over Non-IID Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021
PFCC: Predictive Fast Consensus Convergence for Mobile Blockchain over 5G Slicing-enabled IoT.
Proceedings of the IEEE Global Communications Conference, 2021
2020
Processing capability and QoE driven optimized computation offloading scheme in vehicular fog based F-RAN.
World Wide Web, 2020
Sustainable Secure Management Against APT Attacks for Intelligent Embedded-Enabled Smart Manufacturing.
IEEE Trans. Sustain. Comput., 2020
Fog-based Secure Service Discovery for Internet of Multimedia Things: A Cross-blockchain Approach.
ACM Trans. Multim. Comput. Commun. Appl., 2020
Cognitive Popularity Based AI Service Sharing for Software-Defined Information-Centric Networks.
IEEE Trans. Netw. Sci. Eng., 2020
DeSVig: Decentralized Swift Vigilance Against Adversarial Attacks in Industrial Artificial Intelligence Systems.
IEEE Trans. Ind. Informatics, 2020
IEEE Trans. Emerg. Top. Comput. Intell., 2020
Application-Aware Consensus Management for Software-Defined Intelligent Blockchain in IoT.
IEEE Netw., 2020
IEEE Netw., 2020
IEEE Internet Things J., 2020
Leveraging AI and Intelligent Reflecting Surface for Energy-Efficient Communication in 6G IoT.
CoRR, 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
A Big Data Management Architecture for Standardized IoT Based on Smart Scalable SNMP.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
RALaaS: Resource-Aware Learning-as-a-Service in Edge-Cloud Collaborative Smart Connected Communities.
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020
2019
Making Knowledge Tradable in Edge-AI Enabled IoT: A Consortium Blockchain-Based Efficient and Incentive Approach.
IEEE Trans. Ind. Informatics, 2019
FCSS: Fog-Computing-based Content-Aware Filtering for Security Services in Information-Centric Social Networks.
IEEE Trans. Emerg. Top. Comput., 2019
Decentralized On-Demand Energy Supply for Blockchain in Internet of Things: A Microgrids Approach.
IEEE Trans. Comput. Soc. Syst., 2019
IEEE Netw., 2019
CDLB: a cross-domain load balancing mechanism for software defined networks in cloud data centre.
Int. J. Comput. Sci. Eng., 2019
Fog-Computing-Enabled Cognitive Network Function Virtualization for an Information-Centric Future Internet.
IEEE Commun. Mag., 2019
IEEE Commun. Mag., 2019
IEEE Access, 2019
Fog-Enabled Vehicle as a Service for Computing Geographical Migration in Smart Cities.
IEEE Access, 2019
Vehicle-to-Cloudlet: Game-Based Computation Demand Response for Mobile Edge Computing through Vehicles.
Proceedings of the 89th IEEE Vehicular Technology Conference, 2019
Edge Learning based Green Content Distribution for Information-Centric Internet of Things.
Proceedings of the 42nd International Conference on Telecommunications and Signal Processing, 2019
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019
Toward Software Defined Dynamic Defense as a Service for 5G-Enabled Vehicular Networks.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019
Proceedings of the IEEE International Conference on Industrial Cyber Physical Systems, 2019
Shape-Unconstrained Privacy-Preserving Range Query for Fog Computing Supported Vehicular Networks Using Image.
Proceedings of the 2019 IEEE/CIC International Conference on Communications in China, 2019
SCTD: Smart Reasoning Based Content Threat Defense in Semantics Knowledge Enhanced ICN.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Security Function Virtualization Based Moving Target Defense of SDN-Enabled Smart Grid.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
NSTN: Name-Based Smart Tracking for Network Status in Information-Centric Internet of Things.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Edge-to-Edge Cooperative Artificial Intelligence in Smart Cities with On-Demand Learning Offloading.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
SCEH: Smart Customized E-Health Framework for Countryside Using Edge AI and Body Sensor Networks.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Making Big Data Intelligent Storable at the Edge: Storage Resource Intelligent Orchestration.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Toward Dynamic Computation Offloading for Data Processing in Vehicular Fog Based F-RAN.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019
2018
Big Data Analysis-Based Secure Cluster Management for Optimized Control Plane in Software-Defined Networks.
IEEE Trans. Netw. Serv. Manag., 2018
Service Popularity-Based Smart Resources Partitioning for Fog Computing-Enabled Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2018
IEEE Trans. Big Data, 2018
Frontiers Inf. Technol. Electron. Eng., 2018
Frontiers Inf. Technol. Electron. Eng., 2018
Check in or Not? A Stochastic Game for Privacy Preserving in Point-of-Interest Recommendation System.
IEEE Internet Things J., 2018
Int. J. Softw. Eng. Knowl. Eng., 2018
Software-defined dynamic QoS provisioning for smart metering in energy Internet using fog computing and network calculus.
IET Cyper-Phys. Syst.: Theory & Appl., 2018
QoS-Predicted Energy Efficient Routing for Information-Centric Smart Grid: A Network Calculus Approach.
IEEE Access, 2018
Energy-Efficient Location Privacy Preserving in Vehicular Networks Using Social Intimate Fogs.
IEEE Access, 2018
IEEE Access, 2018
Fog Computing-Enabled Secure Demand Response for Internet of Energy Against Collusion Attacks Using Consensus and ACE.
IEEE Access, 2018
A Novel Airbnb Matching Scheme in Shared Economy Using Confidence and Prediction Uncertainty Analysis.
IEEE Access, 2018
Proceedings of the Third International Conference on Security of Smart Cities, 2018
Proceedings of the Third International Conference on Security of Smart Cities, 2018
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018
Efficient Secure Access to IEEE 21451 Based Wireless IIoT Using Optimized TEDS and MIB.
Proceedings of the IECON 2018, 2018
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018
Proceedings of the 2018 International Conference on Computing, 2018
MapReduce Enabling Content Analysis Architecture for Information-Centric Networks Using CNN.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Resource-Efficient Secure Data Sharing for Information Centric E-Health System Using Fog Computing.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Sema-ICN: Toward Semantic Information-Centric Networking Supporting Smart Anomalous Access Detection.
Proceedings of the IEEE Global Communications Conference, 2018
Vehicle Mobility-Based Geographical Migration of Fog Resource for Satellite-Enabled Smart Cities.
Proceedings of the IEEE Global Communications Conference, 2018
On-Demand Fog Caching Service for ICN Using Synthetical Popularity, Cost, and Importance Status.
Proceedings of the IEEE Global Communications Conference, 2018
Privacy-Preserving and Unforgeable Searchable Encrypted Audit Logs for Cloud Storage.
Proceedings of the 5th IEEE International Conference on Cyber Security and Cloud Computing, 2018
Proceedings of the 5th IEEE International Conference on Cyber Security and Cloud Computing, 2018
Deep Reinforcement Learning based Smart Mitigation of DDoS Flooding in Software-Defined Networks.
Proceedings of the 23rd IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
Crowd Sensing-Enabling Security Service Recommendation for Social Fog Computing Systems.
Sensors, 2017
KSII Trans. Internet Inf. Syst., 2017
IEEE Internet Things J., 2017
A lightweight authentication scheme based on self-updating strategy for space information network.
Int. J. Satell. Commun. Netw., 2017
Int. J. Distributed Sens. Networks, 2017
Software-defined networking model for smart transformers with ISO/IEC/IEEE 21451 sensors.
ICT Express, 2017
IEEE Access, 2017
Proposed Matching Scheme with Confidence and Prediction Uncertainty in Shared Economy.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017
Proceedings of the Industrial Networks and Intelligent Systems, 2017
Fog computing based content-aware taxonomy for caching optimization in information-centric networks.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017
Towards QoE named content-centric wireless multimedia sensor networks with mobile sinks.
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the 19th IEEE International Conference on e-Health Networking, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Software-Defined Efficient Service Reconstruction in Fog Using Content Awareness and Weighted Graph.
Proceedings of the 2017 IEEE Global Communications Conference, 2017
SD-OPTS: Software-Defined On-Path Time Synchronization for Information-Centric Smart Grid.
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Learning Automata Based Approach for Influence Maximization Problem on Social Networks.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
Security Analysis of Simple Network Management Protocol Based IEEE P21451 Internet of Things.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017
2016
IEEE Trans. Consumer Electron., 2016
Estimator Goore Game based quality of service control with incomplete information for wireless sensor networks.
Signal Process., 2016
A Safety Resource Allocation Mechanism against Connection Fault for Vehicular Cloud Computing.
Mob. Inf. Syst., 2016
Strongly secure identity-based authenticated key agreement protocols without bilinear pairings.
Inf. Sci., 2016
Neurocomputing, 2016
Security-Aware Distributed Service Composition for Wireless Sensor Networks Based Smart Metering in Smart Grid Using Software Defined Networks.
Proceedings of the Wireless Internet - 9th International Conference, 2016
Improving Energy Efficiency in Industrial Wireless Sensor Networks Using SDN and NFV.
Proceedings of the IEEE 83rd Vehicular Technology Conference, 2016
Proceedings of the IEEE 83rd Vehicular Technology Conference, 2016
Proceedings of the International Conference on Security of Smart Cities, 2016
Proceedings of the International Conference on Security of Smart Cities, 2016
Channel aware resource allocation for device-to-device communication underlaying cellular networks.
Proceedings of the International Conference on Security of Smart Cities, 2016
Proceedings of the 2016 IEEE Military Communications Conference, 2016
Software-defined QoS provisioning for fog computing advanced wireless sensor networks.
Proceedings of the 2016 IEEE SENSORS, Orlando, FL, USA, October 30 - November 3, 2016, 2016
Proceedings of the Intelligent Computing Methodologies - 12th International Conference, 2016
An anonymous distributed key management system based on CL-PKC for space information network.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Deep Packet Inspection Based Application-Aware Traffic Control for Software Defined Networks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016
A Name-Based Secure Communication Mechanism for Smart Grid Employing Wireless Networks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016
Automatic Threshold Calculation Based Label Propagation Algorithm for Overlapping Community.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016
A Lightweight Authentication and Key Agreement Scheme for Mobile Satellite Communication Systems.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016
2015
Periodic K-Times Anonymous Authentication With Efficient Revocation of Violator's Credential.
IEEE Trans. Inf. Forensics Secur., 2015
IEEE Trans. Circuits Syst. Video Technol., 2015
A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks.
Sensors, 2015
Proceedings of the International Conference on Cyber Security of Smart Cities, 2015
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015
Proceedings of the Twelfth IEEE International Symposium on Autonomous Decentralized Systems, 2015
Chance Discovery Based Security Service Selection for Social P2P Based Sensor Networks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015
A Defense Mechanism for Distributed Denial of Service Attack in Software-Defined Networks.
Proceedings of the Ninth International Conference on Frontier of Computer Science and Technology, 2015
2014
A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network.
J. Electr. Comput. Eng., 2014
Int. J. Inf. Sec., 2014
Analysis and Extension of Safety Mechanisms for Standardized Control Networks in Smart Grid.
Int. J. Distributed Sens. Networks, 2014
EURASIP J. Adv. Signal Process., 2014
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014
A Distributed Local Margin Learning based scheme for high-dimensional feature processing in image tampering detection.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2014
A 3-hop message relay algorithm for connected dominating sets in wireless ad-hoc sensor networks.
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the International Conference on Data Science and Advanced Analytics, 2014
An Asynchronous Distributed Algorithm for Constructing a Connected Dominating Set Optimized by Minimum-Weight Spanning Tree.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014
Proceedings of the 9th International Conference on Communications and Networking in China, 2014
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2014
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014
2013
Comput. Math. Appl., 2013
Strongly secure identity-based authenticated key agreement protocols in the escrow mode.
Sci. China Inf. Sci., 2013
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013
Proceedings of the IEEE International Conference on Image Processing, 2013
Proceedings of the Fifth International Conference on Computational Aspects of Social Networks, 2013
Implementing quasi-parallel breadth-first search in MapReduce for large-scale social network mining.
Proceedings of the Fifth International Conference on Computational Aspects of Social Networks, 2013
A complex network-based approach to estimating the number of people in video surveillance.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2013
2012
IEEE Commun. Lett., 2012
EURASIP J. Adv. Signal Process., 2012
An Image Super-Resolution Scheme Based on Compressive Sensing with PCA Sparse Representation.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012
Green firewall: An energy-efficient intrusion prevention mechanism in wireless sensor network.
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012
Proceedings of the 7th International Conference on Communications and Networking in China, 2012
Proceedings of the IEEE international Symposium on Broadband Multimedia Systems and Broadcasting, 2012
Proceedings of the Intelligent Information and Database Systems - 4th Asian Conference, 2012
Proceedings of the 2012 IEEE/ACIS 11th International Conference on Computer and Information Science, Shanghai, China, May 30, 2012
2011
Quantitative Similarity Evaluation of Internet Social Network Entities Based on Supernetwork.
J. Comput. Networks Commun., 2011
Speedup of bit-parallel Karatsuba multiplier in GF(2<sup>m</sup>) generated by trinomials.
Inf. Process. Lett., 2011
Int. J. Commun. Syst., 2011
Des. Codes Cryptogr., 2011
Comput. Networks, 2011
Comput. Electr. Eng., 2011
A Comprehensive Study on Third Order Statistical Features for Image Splicing Detection.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011
New Feature Presentation of Transition Probability Matrix for Image Tampering Detection.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011
Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, 2011
2010
Inf. Process. Lett., 2010
Informatica (Slovenia), 2010
Informatica, 2010
Future Gener. Comput. Syst., 2010
Proceedings of the Digital Watermarking - 9th International Workshop, 2010
Fast Forth Power and Its Application in Inversion Computation for a Special Class of Trinomials.
Proceedings of the Computational Science and Its Applications, 2010
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010
Proceedings of the 5th IEEE Asia-Pacific Services Computing Conference, 2010
2009
Comput. Secur., 2009
Real-Time and Self-adaptive Method for Abnormal Traffic Detection Based on Self-similarity.
Proceedings of the Web Information Systems and Mining, International Conference, 2009
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009
A LoSS Based On-line Detection of Abnormal Traffic Using Dynamic Detection Threshold.
Proceedings of the Information and Communications Security, 11th International Conference, 2009
2008
IEICE Trans. Commun., 2008
IACR Cryptol. ePrint Arch., 2008
A Group Key Management Scheme with Revocation and Loss-tolerance Capability for Wireless Sensor Networks.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008
A Novel Original Streaming Video Wavelet Domain Watermarking Algorithm in Copyright Protection.
Proceedings of the Advances in Multimedia Information Processing, 2008
Proceedings of the Digital Watermarking, 7th International Workshop, 2008
Proceedings of the International Conference on Computer Science and Software Engineering, 2008
2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
ACKDs: An Authenticated Combinatorial Key Distribution Scheme for Wireless Sensor Networks.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007
The Necessity of Combining ELN and SACK to Improve TCP Performance over Heterogeneous Networks.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007
An Efficient Video Watermarking Scheme with Luminance Differential DC Coefficient Modification.
Proceedings of the Advances in Multimedia Information Processing, 2007
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, 2007
Chameleon-Based Deniable Authenticated Key Agreement Protocol Secure Against Forgery.
Proceedings of the Online Communities and Social Computing, 2007
2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the 2006 International Conference on Privacy, 2006
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006
2005
An Improved Network Intrusion Detection Method based on VQ-SVM.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2005
ID-Based One Round Authenticated Group Key Agreement Protocol with Bilinear Pairings.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005
Proceedings of the Parallel and Distributed Processing and Applications, 2005
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005
Proceedings of the Web Technologies Research and Development - APWeb 2005, 7th Asia-Pacific Web Conference, Shanghai, China, March 29, 2005
Proceedings of the Autonomous Intelligent Systems: Agents and Data Mining, 2005
2004
Comput. Secur., 2004
Cryptanalysis on a Blind Signature Scheme Based on ElGamal Signature.
Proceedings of the 4th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004), 2004
Proceedings of the Digital Libraries: International Collaboration and Cross-Fertilization, 2004
Proceedings of the 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 2004
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004