Ping Li
Orcid: 0000-0001-5280-851XAffiliations:
- Changsha University of Science and Technology, School of Computer and Communication Engineering, Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation, China
- Hunan University, Institute of Computer Science and Communications, Changsha, China (PhD 2007)
According to our database1,
Ping Li
authored at least 18 papers
between 2005 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
AI Commun., 2023
2022
Proceedings of the 34th IEEE International Conference on Tools with Artificial Intelligence, 2022
Proceedings of the Computer Vision - ACCV 2022, 2022
2021
Mob. Inf. Syst., 2021
2020
2016
Connected Dominating Set Construction Algorithm for Wireless Networks Based on Connected Subset.
J. Commun., 2016
EURASIP J. Wirel. Commun. Netw., 2016
Data Cost Optimization for Wireless Data Transmission Service Providers in Virtualized Wireless Networks.
Proceedings of the Advances in Services Computing, 2016
2013
Optimal power control for wireless cooperative relay networks: a cooperative game theoretic approach.
Int. J. Commun. Syst., 2013
False Data Attacks Judgment Based on Consistency Loop Model in Wireless Sensor Networks.
Proceedings of the Advances in Swarm Intelligence, 4th International Conference, 2013
An Study of Indoor Localization Algorithm Based on Imperfect Signal Coverage in Wireless Networks.
Proceedings of the Advances in Swarm Intelligence, 4th International Conference, 2013
2012
EURASIP J. Wirel. Commun. Netw., 2012
2008
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008
2007
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007
2006
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006
2005
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005
RSA Extended Modulus Attacks and Their Solutions in a Kind of Fair Exchange Protocols.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005
A Protocol for Designated Confirmer Signatures Based on RSA Cryptographic Algorithms.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005