Teng Li

Orcid: 0000-0001-5147-8336

Affiliations:
  • Xidian University, School of Cyber Engineering, Xi'an, China


According to our database1, Teng Li authored at least 51 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Multi-Party Private Edge Computing for Collaborative Quantitative Exposure Detection of Endemic Diseases.
IEEE Trans. Mob. Comput., December, 2024

Provably and Physically Secure UAV-Assisted Authentication Protocol for IoT Devices in Unattended Settings.
IEEE Trans. Inf. Forensics Secur., 2024

T-Trace: Constructing the APTs Provenance Graphs Through Multiple Syslogs Correlation.
IEEE Trans. Dependable Secur. Comput., 2024

Slot: Provenance-Driven APT Detection through Graph Reinforcement Learning.
CoRR, 2024

DawnGNN: Documentation augmented windows malware detection using graph neural network.
Comput. Secur., 2024

CoDetect: cooperative anomaly detection with privacy protection towards UAV swarm.
Sci. China Inf. Sci., 2024

Need for Speed: Taming Backdoor Attacks with Speed and Precision.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

2023
Reveal Your Images: Gradient Leakage Attack Against Unbiased Sampling-Based Secure Aggregation.
IEEE Trans. Knowl. Data Eng., December, 2023

Outsourced Privacy-Preserving Data Alignment on Vertically Partitioned Database.
IEEE Trans. Big Data, October, 2023

Near Optimal Charging Schedule for 3-D Wireless Rechargeable Sensor Networks.
IEEE Trans. Mob. Comput., June, 2023

A Secure and Lightweight Multi-Party Private Intersection-Sum Scheme over a Symmetric Cryptosystem.
Symmetry, February, 2023

Hierarchical and Multi-Group Data Sharing for Cloud-Assisted Industrial Internet of Things.
IEEE Trans. Serv. Comput., 2023

DeepAG: Attack Graph Construction and Threats Prediction With Bi-Directional Deep Learning.
IEEE Trans. Dependable Secur. Comput., 2023

Trust-Based Secure Multi-Cloud Collaboration Framework in Cloud-Fog-Assisted IoT.
IEEE Trans. Cloud Comput., 2023

Joint Controller Placement and Control-Service Connection in Hybrid-Band Control.
IEEE Trans. Cloud Comput., 2023

TripleLP: Privacy-Preserving Log Parsing Based on Blockchain.
Proceedings of the 14th IEEE International Symposium on Parallel Architectures, 2023

Research on Activation Functions in Machine Learning Based Network Coding.
Proceedings of the International Conference on Networking and Network Applications, 2023

2022
Enabling Efficient Data Sharing With Auditable User Revocation for IoV Systems.
IEEE Syst. J., 2022

CoAvoid: Secure, Privacy-Preserved Tracing of Contacts for Infectious Diseases.
IEEE J. Sel. Areas Commun., 2022

Energy-Efficient and Secure Communication Toward UAV Networks.
IEEE Internet Things J., 2022

Enabling efficient traceable and revocable time-based data sharing in smart city.
EURASIP J. Wirel. Commun. Netw., 2022

Reliable PUF-based mutual authentication protocol for UAVs towards multi-domain environment.
Comput. Networks, 2022

Research on grassland grazing environment planning based on GA-ACO hybrid algorithm.
Proceedings of the International Conference on Networking and Network Applications, 2022

I Can Still Observe You: Flow-level Behavior Fingerprinting for Online Social Network.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Enabling Efficient Decentralized and Privacy Preserving Data Sharing in Mobile Cloud Computing.
Wirel. Commun. Mob. Comput., 2021

Efficient Hierarchical and Time-Sensitive Data Sharing with User Revocation in Mobile Crowdsensing.
Secur. Commun. Networks, 2021

Blockchain-Based Fine-Grained Data Sharing for Multiple Groups in Internet of Things.
Secur. Commun. Networks, 2021

Android Malware Detection via Graph Representation Learning.
Mob. Inf. Syst., 2021

Cold-start Recommendation Method Based on Homomorphic Encryption.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

2020
A secured TPM integration scheme towards smart embedded system based collaboration network.
Comput. Secur., 2020

Android Malware Detection Based on Call Graph via Graph Neural Network.
Proceedings of the International Conference on Networking and Network Applications, 2020

2019
SRDPV: secure route discovery and privacy-preserving verification in MANETs.
Wirel. Networks, 2019

Anomalies Detection and Proactive Defence of Routers Based on Multiple Information Learning.
Entropy, 2019

DAPV: Diagnosing Anomalies in MANETs Routing With Provenance and Verification.
IEEE Access, 2019

Efficient Hierarchical Data Access Control for Resource-Limited Users in Cloud-Based e-Health.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Cloud Computing Task Scheduling Based on Improved Differential Evolution Algorithm.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Lightweight Security Authentication Mechanism Towards UAV Networks.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Detection of GPS Spoofing Attack on Unmanned Aerial Vehicle System.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

Poster Abstract: A Practical Sybil-Proof Incentive Mechanism for Multichannel Allocation.
Proceedings of the IEEE INFOCOM 2019, 2019

Privacy-Preserving Verification and Root-Cause Tracing Towards UAV Social Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

AClog: Attack Chain Construction Based on Log Correlation.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Lightweight Secure Communication Mechanism Towards UAV Networks.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

2018
Dlog: diagnosing router events with syslogs for anomaly detection.
J. Supercomput., 2018

PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks.
J. Inf. Sci. Eng., 2018

Anomalies Detection of Routers Based on Multiple Information Learning.
Proceedings of the International Conference on Networking and Network Applications, 2018

Log-based Anomalies Detection of MANETs Routing with Reasoning and Verification.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

2017
NetPro: detecting attacks in MANET routing with provenance and verification.
Sci. China Inf. Sci., 2017

PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks.
Proceedings of the International Conference on Networking and Network Applications, 2017

Data-Oriented Instrumentation against Information Leakages of Android Applications.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
CDRep: Automatic Repair of Cryptographic Misuses in Android Applications.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
CRVad: Confidential Reasoning and Verification Towards Secure Routing in Ad Hoc Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015


  Loading...