Qi Li
Orcid: 0000-0002-7280-7378Affiliations:
- Nanjing University of Posts and Telecommunications, School of Computer Science / Jiangsu Key Laboratory of Big Data Security and Intelligent Processing / Jiangsu Innovative Coordination Center of Internet of Things, China
- Xidian University, School of Computer Science and Technology, Xi'an, China (PhD 2014)
According to our database1,
Qi Li
authored at least 59 papers
between 2013 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
7
8
9
10
2
3
3
5
5
5
3
4
2
3
5
1
1
3
2
1
3
8
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Appl. Intell., February, 2025
IEEE Trans. Inf. Forensics Secur., 2025
2024
Privacy-Preserving Outsourcing Learning for Connected Autonomous Vehicles: Challenges, Solutions, and Perspectives.
IEEE Netw., May, 2024
Decentralized Access Control for Privacy-Preserving Cloud-Based Personal Health Record With Verifiable Policy Update.
IEEE Internet Things J., May, 2024
DScPA: A Dynamic Subcluster Privacy-Preserving Aggregation Scheme for Mobile Crowdsourcing in Industrial IoT.
IEEE Internet Things J., January, 2024
Proceedings of the International Joint Conference on Neural Networks, 2024
2023
Blockchain-Enabled Fine-Grained Searchable Encryption With Cloud-Edge Computing for Electronic Health Records Sharing.
IEEE Internet Things J., October, 2023
J. Inf. Secur. Appl., August, 2023
Achieving Lightweight and Privacy-Preserving Object Detection for Connected Autonomous Vehicles.
IEEE Internet Things J., February, 2023
2022
An Adaptive Secure Handover Authenticated Key Agreement for Multi-Server Architecture Communication Applications.
IEEE Trans. Veh. Technol., 2022
Edge-Cooperative Privacy-Preserving Object Detection Over Random Point Cloud Shares for Connected Autonomous Vehicles.
IEEE Trans. Intell. Transp. Syst., 2022
IEEE Trans. Ind. Informatics, 2022
Differential privacy protection scheme based on community density aggregation and matrix perturbation.
Inf. Sci., 2022
IEEE Internet Things J., 2022
HyperMean: Effective Multidimensional Mean Estimation with Local Differential Privacy.
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the International Conference on Networking and Network Applications, 2022
Blockchain-enabled Secure Distributed Data Aggregation and Verification Mechanism for IIoT.
Proceedings of the IEEE Global Communications Conference, 2022
2021
IEEE Trans. Serv. Comput., 2021
Secur. Commun. Networks, 2021
J. Syst. Archit., 2021
A lightweight privacy protection scheme based on user preference in mobile crowdsensing.
Trans. Emerg. Telecommun. Technol., 2021
ACM Comput. Surv., 2021
2020
An Authentication Scheme Based on Novel Construction of Hash Chains for Smart Mobile Devices.
Wirel. Commun. Mob. Comput., 2020
IEEE Trans. Ind. Informatics, 2020
An Improved Broadcast Authentication Protocol for Wireless Sensor Networks Based on the Self-Reinitializable Hash Chains.
Secur. Commun. Networks, 2020
Generalized Intrusion Detection Mechanism for Empowered Intruders in Wireless Sensor Networks.
IEEE Access, 2020
IEEE Access, 2020
2019
IEEE Internet Things J., 2019
Ann. des Télécommunications, 2019
Efficient Privacy-Preserving Access Control of Mobile Multimedia Data in Cloud Computing.
IEEE Access, 2019
Proceedings of the IEEE International Conference on Industrial Internet, 2019
Spoofing Attacks on Speaker Verification Systems Based Generated Voice using Genetic Algorithm.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
2018
Traceable Ciphertext-Policy Attribute-Based Encryption with Verifiable Outsourced Decryption in eHealth Cloud.
Wirel. Commun. Mob. Comput., 2018
D2D Data Privacy Protection Mechanism Based on Reliability and Homomorphic Encryption.
IEEE Access, 2018
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
2017
Multi-authority attribute-based access control scheme in mHealth cloud with unbounded attribute universe and decryption outsourcing.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017
Proceedings of the International Conference on Networking and Network Applications, 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
2016
Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing.
Secur. Commun. Networks, 2016
Secure, efficient and revocable multi-authority access control system in cloud storage.
Comput. Secur., 2016
2015
Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption.
Secur. Commun. Networks, 2015
Secur. Commun. Networks, 2015
Mob. Inf. Syst., 2015
2014
IEEE Trans. Cloud Comput., 2014
KSII Trans. Internet Inf. Syst., 2014
Efficient attribute based sequential aggregate signature for wireless sensor networks.
Int. J. Sens. Networks, 2014
Threshold attribute-based encryption with attribute hierarchy for lattices in the standard model.
IET Inf. Secur., 2014
Sci. China Inf. Sci., 2014
2013
Int. J. Grid Util. Comput., 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Ciphertext-Policy Weighted Attribute Based Encryption for Fine-Grained Access Control.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Personal Health Records Integrity Verification Using Attribute Based Proxy Signature in Cloud Computing.
Proceedings of the Internet and Distributed Computing Systems, 2013
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013