Jinguo Li
Orcid: 0000-0002-7980-0312
According to our database1,
Jinguo Li
authored at least 45 papers
between 2011 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Aldp-fl: an adaptive local differential privacy-based federated learning mechanism for IoT.
Int. J. Inf. Sec., February, 2025
2024
Continuous release of temporal correlation location statistics with local differential privacy.
Multim. Tools Appl., May, 2024
Frontiers Inf. Technol. Electron. Eng., May, 2024
An LDP-Based Privacy-Preserving Longitudinal and Multidimensional Range Query Scheme in IoT.
IEEE Internet Things J., February, 2024
FPCNN: A fast privacy-preserving outsourced convolutional neural network with low-bandwidth.
Knowl. Based Syst., January, 2024
Non-interactive Boolean Searchable Asymmetric Encryption With Bilateral Access Control.
Comput. J., January, 2024
TRA-PS: Accountable data Pub/Sub service with fast and fine-grained controllable subscription.
J. Syst. Archit., 2024
FedEVCP: Federated Learning-Based Anomalies Detection for Electric Vehicle Charging Pile.
Comput. J., 2024
CM-UTC: A Cost-sensitive Matrix based Method for Unknown Encrypted Traffic Classification.
Comput. J., 2024
Comput. J., 2024
2023
FedLVR: a federated learning-based fine-grained vehicle recognition scheme in intelligent traffic system.
Multim. Tools Appl., October, 2023
Efficient and interpretable SRU combined with TabNet for network intrusion detection in the big data environment.
Int. J. Inf. Sec., June, 2023
Multim. Tools Appl., February, 2023
IEEE Trans. Cloud Comput., 2023
Intrusion Detection based on Multi-measure Feature Selection and DSCA-BiLSTM in Fog Environment.
Proceedings of the 11th International Conference on Communications and Broadband Networking, 2023
2022
An efficient conditional privacy-preserving authentication scheme with scalable revocation for VANETs.
J. Syst. Archit., 2022
J. Inf. Secur. Appl., 2022
A Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme in the Standard Model for VANETs.
IEEE Access, 2022
A Blockchain-assisted Collaborative Ensemble Learning for Network Intrusion Detection.
Proceedings of the IEEE International Conference on Trust, 2022
2021
An Adversarial Attack Based on Incremental Learning Techniques for Unmanned in 6G Scenes.
IEEE Trans. Veh. Technol., 2021
An Effective Intrusion Detection Model for Class-imbalanced Learning Based on SMOTE and Attention Mechanism.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021
2020
HYBRID-CNN: An Efficient Scheme for Abnormal Flow Detection in the SDN-Based Smart Grid.
Secur. Commun. Networks, 2020
Peer-to-Peer Netw. Appl., 2020
IET Inf. Secur., 2020
An Accurate Ensemble Forecasting Approach for Highly Dynamic Cloud Workload With VMD and R-Transformer.
IEEE Access, 2020
Efficient BiSRU Combined With Feature Dimensionality Reduction for Abnormal Traffic Detection.
IEEE Access, 2020
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020
2019
Secure, flexible and high-efficient similarity search over encrypted data in multiple clouds.
Peer-to-Peer Netw. Appl., 2019
IEEE Access, 2019
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019
Proceedings of the ACM Turing Celebration Conference - China, 2019
2017
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017
Proceedings of the 2017 International Symposium on Intelligent Signal Processing and Communication Systems, 2017
2016
PIMRS: achieving privacy and integrity-preserving multi-owner ranked-keyword search over encrypted cloud data.
Secur. Commun. Networks, 2016
Group-Based Authentication and Key Agreement With Dynamic Policy Updating for MTC in LTE-A Networks.
IEEE Internet Things J., 2016
Int. J. Netw. Secur., 2016
PSS: Achieving high-efficiency and privacy-preserving similarity search in multiple clouds.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
2015
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015
2014
Secur. Commun. Networks, 2014
2013
A comprehensive metering scheme for intellectual property protection during both after-sale and evaluation periods of IC design.
IEICE Electron. Express, 2013
Proceedings of the Security and Privacy in Communication Networks, 2013
A Multi-dimensional Packet Classification Algorithm Based on Hierarchical All-Match B+ Tree.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013
2012
IEICE Trans. Inf. Syst., 2012
2011
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011