Meng Li
Orcid: 0000-0003-3553-0813Affiliations:
- Hefei University of Technology, Key Laboratory of Knowledge Engineering with Big Data, Anhui, China
- Beijing Institute of Technology, School of Computer Science and Technology, China (PhD 2019)
According to our database1,
Meng Li
authored at least 79 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Trusted Execution Environment With Rollback Protection for Smart Contract-Based IoT Data Trading.
IEEE Internet Things J., October, 2024
IEEE Internet Things J., June, 2024
IEEE Trans. Knowl. Data Eng., May, 2024
SVCA: Secure and Verifiable Chained Aggregation for Privacy-Preserving Federated Learning.
IEEE Internet Things J., May, 2024
Efficient and Verifiable General Quantum Secret Sharing Based on Special Entangled State.
IEEE Internet Things J., April, 2024
Enabling Low Sidelobe Secret Multicast Transmission for mmWave Communication: An Integrated Oblique Projection Approach.
IEEE Trans. Wirel. Commun., January, 2024
IEEE Trans. Serv. Comput., 2024
Time-Restricted, Verifiable, and Efficient Query Processing Over Encrypted Data on Cloud.
IEEE Trans. Serv. Comput., 2024
IEEE Trans. Serv. Comput., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Cross-Modal Learning Based Flexible Bimodal Biometric Authentication With Template Protection.
IEEE Trans. Inf. Forensics Secur., 2024
KeystrokeSniffer: An Off-the-Shelf Smartphone Can Eavesdrop on Your Privacy From Anywhere.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Robust Asynchronous Federated Learning With Time-Weighted and Stale Model Aggregation.
IEEE Trans. Dependable Secur. Comput., 2024
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
Secure, Available, Verifiable, and Efficient Range Query Processing on Outsourced Datasets.
Proceedings of the IEEE International Conference on Communications, 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
InFocus: Amplifying Critical Feature Influence on Non-Intrusive Load Monitoring Through Self-Attention Mechanisms.
IEEE Trans. Smart Grid, September, 2023
An Efficient and Privacy-Preserving Information Reporting Framework for Traffic Monitoring in Vehicular Networks.
IEEE Trans. Veh. Technol., June, 2023
Reversible Database Watermarking Based on Order-preserving Encryption for Data Sharing.
ACM Trans. Database Syst., June, 2023
Mnemosyne: Privacy-Preserving Ride Matching With Collusion-Resistant Driver Exclusion.
IEEE Trans. Veh. Technol., April, 2023
Astraea: Anonymous and Secure Auditing Based on Private Smart Contracts for Donation Systems.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
CoRR, 2023
A Survey on X.509 Public-Key Infrastructure, Certificate Revocation, and Their Modern Implementation on Blockchain and Ledger Technologies.
IEEE Commun. Surv. Tutorials, 2023
2022
IEEE/ACM Trans. Netw., 2022
Quantifying Location Privacy for Navigation Services in Sustainable Vehicular Networks.
IEEE Trans. Green Commun. Netw., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Internet Things J., 2022
Practical Blockchain-Based Steganographic Communication Via Adversarial AI: A Case Study In Bitcoin.
Comput. J., 2022
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the Information and Communications Security - 24th International Conference, 2022
2021
Privacy-Preserving Traffic Monitoring with False Report Filtering via Fog-Assisted Vehicular Crowdsensing.
IEEE Trans. Serv. Comput., 2021
Anonymous and Verifiable Reputation System for E-Commerce Platforms Based on Blockchain.
IEEE Trans. Netw. Serv. Manag., 2021
IEEE Trans. Netw. Sci. Eng., 2021
Peer-to-Peer Netw. Appl., 2021
Future Gener. Comput. Syst., 2021
Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services.
Proceedings of the Security and Trust Management - 17th International Workshop, 2021
2020
Blockchain-Enabled Secure Energy Trading With Verifiable Fairness in Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2020
IEEE Trans. Dependable Secur. Comput., 2020
Pattern Recognit. Lett., 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the Information and Communications Security - 22nd International Conference, 2020
Proceedings of the ACM TUR-C'20: ACM Turing Celebration Conference, 2020
2019
Secure Fog-Assisted Crowdsensing With Collusion Resistance: From Data Reporting to Data Requesting.
IEEE Internet Things J., 2019
Efficient and Privacy-Preserving Carpooling Using Blockchain-Assisted Vehicular Fog Computing.
IEEE Internet Things J., 2019
Comput. Secur., 2019
IEEE Commun. Mag., 2019
Invalidating Analysis Knowledge for Code Virtualization Protection Through Partition Diversity.
IEEE Access, 2019
IEEE Access, 2019
Provable Data Integrity of Cloud Storage Service With Enhanced Security in the Internet of Things.
IEEE Access, 2019
CoRide: A Privacy-Preserving Collaborative-Ride Hailing Service Using Blockchain-Assisted Vehicular Fog Computing.
Proceedings of the Security and Privacy in Communication Networks, 2019
Proceedings of the IEEE Pacific Rim Conference on Communications, 2019
New Steganalytic Features for Spatial Image Steganography Based on Non-negative Matrix Factorization.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
2018
IEEE Wirel. Commun., 2018
Accountable and Transparent TLS Certificate Management: An Alternate Public-Key Infrastructure with Verifiable Trusted Parties.
Secur. Commun. Networks, 2018
IEEE Access, 2018
SmartDetect: A Smart Detection Scheme for Malicious Web Shell Codes via Ensemble Learning.
Proceedings of the Smart Computing and Communication - Third International Conference, 2018
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018
2017
Achieving differential privacy of trajectory data publishing in participatory sensing.
Inf. Sci., 2017
A Privacy-Preserving and Vessel Authentication Scheme Using Automatic Identification System.
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017
2016
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016
2015
How to protect query and report privacy without sacrificing service quality in participatory sensing.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015
2013
ID List Forwarding Free Confidentiality Preserving Data Aggregation for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013
An Efficient Data Aggregation Protocol Concentrated on Data Integrity in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013
2011
An energy efficient and integrity-preserving aggregation protocol in wireless sensor networks.
Proceedings of the 30th IEEE International Performance Computing and Communications Conference, 2011