Jiliang Li

Orcid: 0009-0004-2852-0865

According to our database1, Jiliang Li authored at least 38 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Combating Advanced Persistent Threats: Challenges and Solutions.
IEEE Netw., November, 2024

Fault Diagnosis in the Network Function Virtualization: A Survey, Taxonomy, and Future Directions.
IEEE Internet Things J., June, 2024

Delayed packing attack and countermeasure against transaction information based applications.
Inf. Sci., January, 2024

Practical Privacy-Preserving Scheme With Fault Tolerance for Smart Grids.
IEEE Internet Things J., January, 2024

Oracle Based Privacy-Preserving Cross-Domain Authentication Scheme.
IEEE Trans. Sustain. Comput., 2024

Robust and Lightweight Data Aggregation With Histogram Estimation in Edge-Cloud Systems.
IEEE Trans. Netw. Sci. Eng., 2024

EyeTrans: Merging Human and Machine Attention for Neural Code Summarization.
Proc. ACM Softw. Eng., 2024

Scalable Graph-Aware Edge Representation Learning for Wireless IoT Intrusion Detection.
IEEE Internet Things J., 2024

Dumbo-MPC: Efficient Fully Asynchronous MPC with Optimal Resilience.
IACR Cryptol. ePrint Arch., 2024

Resilience-Optimal Lightweight High-threshold Asynchronous Verifiable Secret Sharing.
IACR Cryptol. ePrint Arch., 2024

Do Machines and Humans Focus on Similar Code? Exploring Explainability of Large Language Models in Code Summarization.
Proceedings of the 32nd IEEE/ACM International Conference on Program Comprehension, 2024

Multi-Attention Enhanced Discriminator for GAN-Based Anomalous Sound Detection.
Proceedings of the IEEE International Conference on Acoustics, 2024

2023
GenDroid: A query-efficient black-box android adversarial attack framework.
Comput. Secur., September, 2023

Gas-expensive patterns detection to optimize smart contracts.
Appl. Soft Comput., September, 2023

2D2PS: A demand-driven privacy-preserving scheme for anonymous data sharing in smart grids.
J. Inf. Secur. Appl., May, 2023

GaSaver: A Static Analysis Tool for Saving Gas.
IEEE Trans. Sustain. Comput., 2023

Edge-Enabled: A Scalable and Decentralized Data Aggregation Scheme for IoT.
IEEE Trans. Ind. Informatics, 2023

SEAL: A Strategy-Proof and Privacy-Preserving UAV Computation Offloading Framework.
IEEE Trans. Inf. Forensics Secur., 2023

Optimal Repair Strategy Against Advanced Persistent Threats Under Time-Varying Networks.
IEEE Trans. Inf. Forensics Secur., 2023

Design and Implementation of Chua's Chaotic Circuit Based on an Active Inductor.
Proceedings of the 3rd International Conference on Electronic Information Technology and Smart Agriculture, 2023

2022
Blockchain-Based Secure and Cooperative Private Charging Pile Sharing Services for Vehicular Networks.
IEEE Trans. Veh. Technol., 2022

Continuous Temporal Graph Networks for Event-Based Graph Data.
CoRR, 2022

Arbitrage Attack: Miners of the World, Unite!
Proceedings of the Financial Cryptography and Data Security, 2022

2021
Secure Data Deduplication Protocol for Edge-Assisted Mobile CrowdSensing Services.
IEEE Trans. Veh. Technol., 2021

LCEDA: Lightweight and Communication-Efficient Data Aggregation Scheme for Smart Grid.
IEEE Internet Things J., 2021

PSL-MAAKA: Provably Secure and Lightweight Mutual Authentication and Key Agreement Protocol for Fully Public Channels in Internet of Medical Things.
IEEE Internet Things J., 2021

P2S2O: Pseudonymous Polling System for Small Organizations.
Proceedings of the 6th International Conference on Internet of Things, 2021

2020
Energy-Aware Task Offloading in the Internet of Things.
IEEE Wirel. Commun., 2020

Trust Based Secure Content Delivery in Vehicular Networks: A Bargaining Game Theoretical Approach.
IEEE Trans. Veh. Technol., 2020

A Privacy Preservation Based Scheme for Task Assignment in Internet of Things.
IEEE Trans. Netw. Sci. Eng., 2020

An Energy-Efficient Edge Offloading Scheme for UAV-Assisted Internet of Things.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

2019
AEP-PPA: An anonymous, efficient and provably-secure privacy-preserving authentication protocol for mobile services in smart cities.
J. Netw. Comput. Appl., 2019

CL-CPPA: Certificate-Less Conditional Privacy-Preserving Authentication Protocol for the Internet of Vehicles.
IEEE Internet Things J., 2019

2018
EPA-CPPA: An efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks.
Veh. Commun., 2018

Security analysis and improvement of a mutual authentication and key agreement solution for wireless sensor networks using chaotic maps.
Trans. Emerg. Telecommun. Technol., 2018

2011
An integrated proteomics analysis of bone tissues in response to mechanical stimulation.
BMC Syst. Biol., 2011

2006
Constant Rate Control for Motion JPEG2000.
IEICE Trans. Inf. Syst., 2006

Multi-Rate, Dynamic and Compliant Region of Interest Coding for JPEG2000.
Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, 2006


  Loading...