Li Xu
Orcid: 0000-0002-8972-3373Affiliations:
- Fujian Normal University, Fujian Provincial Key Laboratory of Network Security and Cryptology, Fuzhou, China
- Nanjing University of Posts and Telecommunications, China (PhD 2004)
According to our database1,
Li Xu
authored at least 204 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Efficient Blockchain-Based Data Aggregation Scheme With Privacy-Preserving on the Smart Grid.
IEEE Trans. Smart Grid, November, 2024
Endogenous Security of $FQ_{n}$ Networks: Adaptive System-Level Fault Self-Diagnosis.
IEEE Trans. Reliab., September, 2024
Computing, June, 2024
Computing, June, 2024
IEEE Trans. Reliab., March, 2024
IEEE Trans. Emerg. Top. Comput., 2024
2023
Comput. J., August, 2023
Comput. J., May, 2023
Fault Diagnosability of Networks With Fault-Free Block at Local Vertex Under MM* Model.
IEEE Trans. Reliab., March, 2023
ACM Trans. Sens. Networks, February, 2023
Computing, February, 2023
ACM Trans. Design Autom. Electr. Syst., 2023
Collaborative Authentication for 6G Networks: An Edge Intelligence Based Autonomous Approach.
IEEE Trans. Inf. Forensics Secur., 2023
Sensors, 2023
Differential privacy preservation for graph auto-encoders: A novel anonymous graph publishing model.
Neurocomputing, 2023
BLAC: A Blockchain-Based Lightweight Access Control Scheme in Vehicular Social Networks.
Proceedings of the Information and Communications Security - 25th International Conference, 2023
A Continuous Authentication Scheme for Digital Therapeutics Using Denoising Autoencoder.
Proceedings of the 2023 13th International Conference on Communication and Network Security, 2023
Resource Binding and Module Placement Algorithms for Continuous-Flow Microfluidic Biochip in Intelligent Digital Healthcare.
Proceedings of the Green, Pervasive, and Cloud Computing - 18th International Conference, 2023
A Cloud Computing User Experience Focused Load Balancing Method Based on Modified CMA-ES Algorithm.
Proceedings of the Green, Pervasive, and Cloud Computing - 18th International Conference, 2023
Genetic-A* Algorithm-Based Routing for Continuous-Flow Microfluidic Biochip in Intelligent Digital Healthcare.
Proceedings of the Green, Pervasive, and Cloud Computing - 18th International Conference, 2023
IoT-enabled Low Communication Cost Sentiment Analysis Architecture for Intelligent Healthcare.
Proceedings of the IEEE Intl Conf on Dependable, 2023
Some Classes of Cryptographic Power Functions and Permutation Polynomials with Low (-1)-Differential Uniformity in Cyber Security.
Proceedings of the IEEE Intl Conf on Dependable, 2023
Proceedings of the IEEE Intl Conf on Dependable, 2023
2022
IEEE Trans. Reliab., 2022
A Pessimistic Fault Diagnosability of Large-Scale Connected Networks via Extra Connectivity.
IEEE Trans. Parallel Distributed Syst., 2022
FFNLFD: Fault Diagnosis of Multiprocessor Systems at Local Node With Fault-Free Neighbors Under PMC Model and MM* Model.
IEEE Trans. Parallel Distributed Syst., 2022
IEEE Trans. Netw. Sci. Eng., 2022
Lightweight Public/Private Auditing Scheme for Resource-Constrained End Devices in Cloud Storage.
IEEE Trans. Cloud Comput., 2022
IEEE Trans. Computers, 2022
Toward Secure and Privacy-Preserving Cloud Data Sharing: Online/Offline Multiauthority CP-ABE With Hidden Policy.
IEEE Syst. J., 2022
Individual Attribute and Cascade Influence Capability-Based Privacy Protection Method in Social Networks.
Secur. Commun. Networks, 2022
Subgraph Reliability of Alternating Group Graph With Uniform and Nonuniform Vertex Fault-Free Probabilities.
Comput. J., 2022
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022
Information spreading in mobile social networks: identifying the influential nodes using FPSO algorithm.
Proceedings of the 2022 10th International Conference on Information Technology: IoT and Smart City, 2022
2021
IEEE Trans. Reliab., 2021
A Complete Fault Tolerant Method for Extra Fault Diagnosability of Alternating Group Graphs.
IEEE Trans. Reliab., 2021
J. Netw. Comput. Appl., 2021
Proceedings of the Security and Privacy in Social Networks and Big Data, 2021
2020
Fuzzy Learning for Multi-Dimensional Adaptive Physical Layer Authentication: A Compact and Robust Approach.
IEEE Trans. Wirel. Commun., 2020
Theor. Comput. Sci., 2020
A new proof for exact relationship between extra connectivity and extra diagnosability of regular connected graphs under MM* model.
Theor. Comput. Sci., 2020
Decision aids on breast conserving surgery for early stage breast cancer patients: a systematic review.
BMC Medical Informatics Decis. Mak., 2020
J. Netw. Comput. Appl., 2020
Entropy-driven data aggregation method for energy-efficient wireless sensor networks.
Inf. Fusion, 2020
Rollout algorithm for light-weight physical-layer authentication in cognitive radio networks.
IET Commun., 2020
EURASIP J. Wirel. Commun. Netw., 2020
Concurr. Comput. Pract. Exp., 2020
Lightweight Certificate-Based Public/Private Auditing Scheme Based on Bilinear Pairing for Cloud Storage.
IEEE Access, 2020
An Efficient Location Privacy-Preserving Authentication Scheme for Cooperative Spectrum Sensing.
IEEE Access, 2020
Proceedings of the Security and Privacy in Digital Economy, 2020
Proceedings of the Security and Privacy in Digital Economy, 2020
An Efficient Influence Maximization Algorithm Based on Social Relationship Priority in Mobile Social Networks.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020
Proceedings of the IEEE Global Communications Conference, 2020
2019
Minimization of delay and collision with cross cube spanning tree in wireless sensor networks.
Wirel. Networks, 2019
Relating Extra Connectivity and Extra Conditional Diagnosability in Regular Networks.
IEEE Trans. Dependable Secur. Comput., 2019
Extra diagnosability and good-neighbor diagnosability of <i>n</i>-dimensional alternating group graph <i>AG</i><sub><i>n</i></sub> under the PMC model.
Theor. Comput. Sci., 2019
Lightweight Privacy Preservation for Securing Large-Scale Database-Driven Cognitive Radio Networks with Location Verification.
Secur. Commun. Networks, 2019
J. Netw. Comput. Appl., 2019
On exploiting priority relation graph for reliable multi-path communication in mobile social networks.
Inf. Sci., 2019
Comput. J., 2019
An efficient privacy-preserving protocol for database-driven cognitive radio networks.
Ad Hoc Networks, 2019
IEEE Access, 2019
2018
Three-Stage Stackelberg Game for Defending Against Full-Duplex Active Eavesdropping Attacks in Cooperative Communication.
IEEE Trans. Veh. Technol., 2018
The Relationship Between g-Restricted Connectivity and g-Good-Neighbor Fault Diagnosability of General Regular Networks.
IEEE Trans. Reliab., 2018
J. Supercomput., 2018
Coordinated Multiple-Relays Based Physical-Layer Security Improvement: A Single-Leader Multiple-Followers Stackelberg Game Scheme.
IEEE Trans. Inf. Forensics Secur., 2018
IEEE Trans. Dependable Secur. Comput., 2018
Comments on "SCLPV: Secure Certificateless Public Verification for Cloud-Based Cyber-Physical-Social Systems Against Malicious Auditors".
IEEE Trans. Comput. Soc. Syst., 2018
The relationship between extra connectivity and conditional diagnosability of regular graphs under the PMC model.
J. Comput. Syst. Sci., 2018
Int. J. Comput. Math. Comput. Syst. Theory, 2018
Future Gener. Comput. Syst., 2018
An anonymous batch handover authentication protocol for big flow wireless mesh networks.
EURASIP J. Wirel. Commun. Netw., 2018
Comput. Electr. Eng., 2018
Big Data Min. Anal., 2018
2017
Wirel. Pers. Commun., 2017
Protecting Mobile Health Records in Cloud Computing: A Secure, Efficient, and Anonymous Design.
ACM Trans. Embed. Comput. Syst., 2017
Sci. Program., 2017
Uncertain random spectra: a new metric for assessing the survivability of mobile wireless sensor networks.
Soft Comput., 2017
Soft Comput., 2017
A Straight Skeleton Based Connectivity Restoration Strategy in the Presence of Obstacles for WSNs.
Sensors, 2017
J. Netw. Comput. Appl., 2017
Strongly Secure Certificateless Signature Scheme in the Standard Model with Resisting Malicious-But-Passive KGC Attack Ability.
J. Inf. Sci. Eng., 2017
J. Comput. Syst. Sci., 2017
Toward better data veracity in mobile cloud computing: A context-aware and incentive-based reputation mechanism.
Inf. Sci., 2017
An adaptive trust-Stackelberg game model for security and energy efficiency in dynamic cognitive radio networks.
Comput. Commun., 2017
A trustworthy and energy-aware routing protocol in software-defined wireless mesh networks.
Comput. Electr. Eng., 2017
Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks.
Appl. Math. Comput., 2017
Virtual Backbone Scheduling with Connected Domatic Partition in Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2017
IEEE Access, 2017
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017
2016
The Extra Connectivity, Extra Conditional Diagnosability, and t/m-Diagnosability of Arrangement Graphs.
IEEE Trans. Reliab., 2016
The Extra, Restricted Connectivity and Conditional Diagnosability of Split-Star Networks.
IEEE Trans. Parallel Distributed Syst., 2016
Relating the extra connectivity and the conditional diagnosability of regular graphs under the comparison model.
Theor. Comput. Sci., 2016
Sensors, 2016
Inf. Sci., 2016
IET Commun., 2016
Secure routing and resource allocation based on game theory in cooperative cognitive radio networks.
Concurr. Comput. Pract. Exp., 2016
Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications.
Proceedings of the Network and System Security - 10th International Conference, 2016
A Privacy-Preserving Approach Based on Graph Partition for Uncertain Trajectory Publishing.
Proceedings of the 15th International Symposium on Parallel and Distributed Computing, 2016
Proceedings of the International Conference on Internet of Things and Cloud Computing, 2016
Proceedings of the Advances in Image and Graphics Technologies - 11th Chinese Conference, 2016
2015
IEEE Trans. Parallel Distributed Syst., 2015
J. Supercomput., 2015
TPP: Traceable Privacy-Preserving Communication and Precise Reward for Vehicle-to-Grid Networks in Smart Grids.
IEEE Trans. Inf. Forensics Secur., 2015
Cross-layer design in wireless multi-hop networks: a bargaining game theoretic analysis.
Telecommun. Syst., 2015
Conditional diagnosability and strong diagnosability of Split-Star Networks under the PMC model.
Theor. Comput. Sci., 2015
IEEE Trans. Computers, 2015
J. Univers. Comput. Sci., 2015
Inf. Sci., 2015
Int. J. High Perform. Comput. Netw., 2015
Int. J. Embed. Syst., 2015
Restoration Strategy Based on Optimal Relay Node Placement in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015
Secure Cooperative Spectrum Sensing and Allocation in Distributed Cognitive Radio Networks.
Int. J. Distributed Sens. Networks, 2015
Collecting all data continuously in wireless sensor networks with a mobile base station.
Int. J. Comput. Sci. Eng., 2015
Conditional diagnosability and strong diagnosability of shuffle-cubes under the comparison model.
Int. J. Comput. Math., 2015
Matrix-based key pre-distribution schemes in WMNs using pre and post deployment knowledge.
Int. J. Ad Hoc Ubiquitous Comput., 2015
A reliable recommendation and privacy-preserving based cross-layer reputation mechanism for mobile cloud computing.
Future Gener. Comput. Syst., 2015
Comput. J., 2015
An Efficient Connected Dominating Set Algorithm in WSNS Based on the Induced Tree of the Crossed Cube.
Int. J. Appl. Math. Comput. Sci., 2015
A trustworthy access control model for mobile cloud computing based on reputation and mechanism design.
Ad Hoc Networks, 2015
First-Priority Relation Graph-Based Malicious Users Detection in Mobile Social Networks.
Proceedings of the Network and System Security - 9th International Conference, 2015
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015
Security Analysis on "Strongly Secure Certificateless Key-Insulated Signature Secure in the Standard Model".
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015
Proceedings of the Intelligent Data Analysis and Applications, 2015
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
A Context Aware Reputation Mechanism for Enhancing Big Data Veracity in Mobile Cloud Computing.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
A Secure Cooperative Spectrum Sensing Strategy for Distributed Cognitive Radio Networks.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
2014
Wirel. Pers. Commun., 2014
Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems.
IEEE Trans. Parallel Distributed Syst., 2014
Distributed Separate Coding for Continuous Data Collection in Wireless Sensor Networks.
ACM Trans. Sens. Networks, 2014
Theor. Comput. Sci., 2014
Anomaly diagnosis based on regression and classification analysis of statistical traffic features.
Secur. Commun. Networks, 2014
Secur. Commun. Networks, 2014
J. Comput. Syst. Sci., 2014
J. Appl. Math., 2014
A secure remote data integrity checking cloud storage system from threshold encryption.
J. Ambient Intell. Humaniz. Comput., 2014
Future Gener. Comput. Syst., 2014
Optimizing wireless unicast and multicast sensor networks on the basis of evolutionary game theory.
Concurr. Comput. Pract. Exp., 2014
Comput. Networks, 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014
2013
A Matrix-Based Pairwise Key Establishment Scheme for Wireless Mesh Networks Using Pre Deployment Knowledge.
IEEE Trans. Emerg. Top. Comput., 2013
J. Comput. Syst. Sci., 2013
Int. J. Distributed Sens. Networks, 2013
Concurr. Comput. Pract. Exp., 2013
Analysis of the MAC protocol in low rate wireless personal area networks with bursty ON-OFF traffic.
Concurr. Comput. Pract. Exp., 2013
Clust. Comput., 2013
Comput. Electr. Eng., 2013
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013
A Dynamic and Multi-layer Reputation Computation Model for Multi-hop Wireless Networks.
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013
Dynamic Opportunistic Spectrum Access of Multi-channel Multi-radio Based on Game Theory in Wireless Cognitive Network.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Matrix-Based Pairwise Key Establishment with Pre and Post Deployment Knowledge for Wireless Mesh Networks.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
Matrix-based pairwise key establishment in wireless mesh networks using deployment knowledge.
Proceedings of IEEE International Conference on Communications, 2013
2012
A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption.
Comput. J., 2012
Proceedings of the 75th IEEE Vehicular Technology Conference, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Physical-Layer Network Coding and Connected Dominating Set Based Routing Protocol in Wireless Multi-hop Network.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Multi-objective Optimization Based Virtual Resource Allocation Strategy for Cloud Computing.
Proceedings of the 2012 IEEE/ACIS 11th International Conference on Computer and Information Science, Shanghai, China, May 30, 2012
2011
Mob. Networks Appl., 2011
EURASIP J. Wirel. Commun. Netw., 2011
Incentive mechanism for selfish nodes in wireless sensor networks based on evolutionary game.
Comput. Math. Appl., 2011
A study of subdividing hexagon-clustered WSN for power saving: Analysis and simulation.
Ad Hoc Networks, 2011
2010
Int. J. Secur. Networks, 2010
Construction of Large Families of Pseudorandom Subsets of the Set {1, 2, ..., N} Using Elliptic Curves.
Int. J. Netw. Secur., 2010
Future Gener. Comput. Syst., 2010
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010
Proceedings of the 13th IEEE International Conference on Computational Science and Engineering, 2010
Bargaining Game and Cross-layer Design Based Optimization Strategy in Wireless Multi-hop Network.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
Int. J. Distributed Sens. Networks, 2009
Proceedings of the MSN 2009, 2009
2008
A Cooperative Secure Routing Protocol based on Reputation System for Ad Hoc Networks.
J. Commun., 2008
Cover-Free Family based Efficient Group Key Management Strategy in Wireless Sensor Network.
J. Commun., 2008
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
2007
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007
Proceedings of the Third International Workshop on Security, 2007
Proceedings of the International Conference on Networking, 2007
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
2006
Proceedings of the Advances in Grid and Pervasive Computing, 2006
Proceedings of the 10th International Conference on CSCW in Design, 2006
Proceedings of the Computational Intelligence and Security, International Conference, 2006
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006