Xinghua Li

Orcid: 0000-0002-5583-4155

Affiliations:
  • Xidian University, School of Cyber Engineering, Xi'an, China (PhD 2007)


According to our database1, Xinghua Li authored at least 131 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
BADFL: Backdoor Attack Defense in Federated Learning From Local Model Perspective.
IEEE Trans. Knowl. Data Eng., November, 2024

Target link protection against link-prediction-based attacks via artificial bee colony algorithm based on random walk.
Int. J. Mach. Learn. Cybern., November, 2024

Hiding in Plain Sight: Adversarial Attack via Style Transfer on Image Borders.
IEEE Trans. Computers, October, 2024

Dvatar: Simulating the Binary Firmware of Drones.
IEEE Internet Things J., October, 2024

Provable secure authentication key agreement for wireless body area networks.
Frontiers Comput. Sci., October, 2024

K-Backup: Load- and TCAM-Aware Multi-Backup Fast Failure Recovery in SDNs.
IEEE/ACM Trans. Netw., August, 2024

Privacy-Preserving Arbitrary Geometric Range Query in Mobile Internet of Vehicles.
IEEE Trans. Mob. Comput., July, 2024

PSMA: Layered Deployment Scheme for Secure VNF Multiplexing Based on Primary and Secondary Multiplexing Architecture.
IEEE Trans. Netw. Serv. Manag., June, 2024

Intelligent Adaptive Gossip-Based Broadcast Protocol for UAV-MEC Using Multi-Agent Deep Reinforcement Learning.
IEEE Trans. Mob. Comput., June, 2024

Time-Controllable Keyword Search Scheme With Efficient Revocation in Mobile E-Health Cloud.
IEEE Trans. Mob. Comput., May, 2024

MLDR: An O(|V|/4) and Near-Optimal Routing Scheme for LEO Mega-Constellations.
IEEE Internet Things J., May, 2024

STCLA: An Efficient Certificateless Authenticated Key Agreement Scheme for the Internet of Vehicles.
IEEE Trans. Veh. Technol., April, 2024

$D^{2}MTS$: Enabling Dependable Data Collection With Multiple Crowdsourcers Trust Sharing in Mobile Crowdsensing.
IEEE Trans. Knowl. Data Eng., March, 2024

Efficient Privacy-Preserving Federated Learning With Improved Compressed Sensing.
IEEE Trans. Ind. Informatics, March, 2024

Interface-Based Side Channel in TEE-Assisted Networked Services.
IEEE/ACM Trans. Netw., February, 2024

Robust Permissioned Blockchain Consensus for Unstable Communication in FANET.
IEEE/ACM Trans. Netw., February, 2024

PAM<sup>3</sup>S: Progressive Two-Stage Auction-Based Multi-Platform Multi-User Mutual Selection Scheme in MCS.
IEEE/ACM Trans. Netw., February, 2024

PEAK: Privacy-Enhanced Incentive Mechanism for Distributed -Anonymity in LBS.
IEEE Trans. Knowl. Data Eng., February, 2024

Efficient Privacy-Preserving Spatial Data Query in Cloud Computing.
IEEE Trans. Knowl. Data Eng., January, 2024

Oasis: Online All-Phase Quality-Aware Incentive Mechanism for MCS.
IEEE Trans. Serv. Comput., 2024

Privacy-Preserved Data Disturbance and Truthfulness Verification for Data Trading.
IEEE Trans. Inf. Forensics Secur., 2024

Beyond Result Verification: Efficient Privacy-Preserving Spatial Keyword Query With Suppressed Leakage.
IEEE Trans. Inf. Forensics Secur., 2024

RFed: Robustness-Enhanced Privacy-Preserving Federated Learning Against Poisoning Attack.
IEEE Trans. Inf. Forensics Secur., 2024

Privacy-Preserving Asynchronous Federated Learning Under Non-IID Settings.
IEEE Trans. Inf. Forensics Secur., 2024

Cross-Modal Learning Based Flexible Bimodal Biometric Authentication With Template Protection.
IEEE Trans. Inf. Forensics Secur., 2024

FDFL: Fair and Discrepancy-Aware Incentive Mechanism for Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2024

Deep Hashing Based Cancelable Multi-Biometric Template Protection.
IEEE Trans. Dependable Secur. Comput., 2024

Privacy-Preserved Data Trading Via Verifiable Data Disturbance.
IEEE Trans. Dependable Secur. Comput., 2024

Efficient and Secure Federated Learning Against Backdoor Attacks.
IEEE Trans. Dependable Secur. Comput., 2024

Verifiable Outsourced Attribute-Based Encryption Scheme for Cloud-Assisted Mobile E-Health System.
IEEE Trans. Dependable Secur. Comput., 2024

Robust Asynchronous Federated Learning With Time-Weighted and Stale Model Aggregation.
IEEE Trans. Dependable Secur. Comput., 2024

GNSS spoofing detection for UAVs using Doppler frequency and Carrier-to-Noise Density Ratio.
J. Syst. Archit., 2024

Practical Revocable Keyword Search Over Mobile Cloud-Assisted Internet of Things.
IEEE Internet Things J., 2024

A Survey of Protocol Fuzzing.
CoRR, 2024

Medusa: Unveil Memory Exhaustion DoS Vulnerabilities in Protocol Implementations.
Proceedings of the ACM on Web Conference 2024, 2024

2023
Comprehensive Survey on Privacy-Preserving Spatial Data Query in Transportation Systems.
IEEE Trans. Intell. Transp. Syst., December, 2023

FedG2L: a privacy-preserving federated learning scheme base on "G2L" against poisoning attack.
Connect. Sci., December, 2023

Design and implementation of an efficient container tag dynamic taint analysis.
Comput. Secur., December, 2023

TAGKA: Threshold Authenticated Group Key Agreement Protocol Against Member Disconnect for UANET.
IEEE Trans. Veh. Technol., November, 2023

Owner-free Distributed Symmetric Searchable Encryption Supporting Conjunctive Queries.
ACM Trans. Storage, November, 2023

TFL-DT: A Trust Evaluation Scheme for Federated Learning in Digital Twin for Mobile Networks.
IEEE J. Sel. Areas Commun., November, 2023

Privacy-Preserving Asynchronous Federated Learning Framework in Distributed IoT.
IEEE Internet Things J., August, 2023

DistPreserv: Maintaining User Distribution for Privacy-Preserving Location-Based Services.
IEEE Trans. Mob. Comput., June, 2023

Privacy-Preserving Boolean Range Query With Temporal Access Control in Mobile Computing.
IEEE Trans. Knowl. Data Eng., May, 2023

CITS-MEW: Multi-Party Entangled Watermark in Cooperative Intelligent Transportation System.
IEEE Trans. Intell. Transp. Syst., March, 2023

ICRA: An Intelligent Clustering Routing Approach for UAV Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., February, 2023

A fine-grained privacy protection data aggregation scheme for outsourcing smart grid.
Frontiers Comput. Sci., February, 2023

Defending Against Membership Inference Attack by Shielding Membership Signals.
IEEE Trans. Serv. Comput., 2023

Privacy-Preserving and Verifiable Outsourcing Linear Inference Computing Framework.
IEEE Trans. Serv. Comput., 2023

VRFMS: Verifiable Ranked Fuzzy Multi-Keyword Search Over Encrypted Data.
IEEE Trans. Serv. Comput., 2023

Privacy-Preserving Top-$k$k Spatial Keyword Queries in Fog-Based Cloud Computing.
IEEE Trans. Serv. Comput., 2023

Secure Model-Contrastive Federated Learning With Improved Compressive Sensing.
IEEE Trans. Inf. Forensics Secur., 2023

Efficient Privacy-Preserving Spatial Range Query Over Outsourced Encrypted Data.
IEEE Trans. Inf. Forensics Secur., 2023

A Privacy-Preserving Service Framework for Traveling Salesman Problem-Based Neural Combinatorial Optimization Network.
IEEE Trans. Cloud Comput., 2023

Network Slicing in 6G: An Authentication Framework for Unattended Terminals.
IEEE Netw., 2023

A Multi-CUAV Multi-UAV Electricity Scheduling Scheme: From Charging Location Selection to Electricity Transaction.
IEEE Internet Things J., 2023

Automata-Guided Control-Flow-Sensitive Fuzz Driver Generation.
Proceedings of the 32nd USENIX Security Symposium, 2023

Devils in Your Apps: Vulnerabilities and User Privacy Exposure in Mobile Notification Systems.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

2022
Verifiable data streaming protocol supporting update history queries.
Int. J. Intell. Syst., December, 2022

ARPLR: An All-Round and Highly Privacy-Preserving Location-Based Routing Scheme for VANETs.
IEEE Trans. Intell. Transp. Syst., 2022

A Data Trading Scheme With Efficient Data Usage Control for Industrial IoT.
IEEE Trans. Ind. Informatics, 2022

ADFL: A Poisoning Attack Defense Framework for Horizontal Federated Learning.
IEEE Trans. Ind. Informatics, 2022

Towards Privacy-Preserving Spatial Distribution Crowdsensing: A Game Theoretic Approach.
IEEE Trans. Inf. Forensics Secur., 2022

Lightweight and Fine-Grained Privacy-Preserving Data Aggregation Scheme in Edge Computing.
IEEE Syst. J., 2022

A Certificateless Authentication and Key Agreement Scheme for Secure Cloud-assisted Wireless Body Area Network.
Mob. Networks Appl., 2022

RESAT: A Utility-Aware Incentive Mechanism-Based Distributed Spatial Cloaking.
IEEE Internet Things J., 2022

CAN Bus Messages Abnormal Detection Using Improved SVDD in Internet of Vehicles.
IEEE Internet Things J., 2022

An efficient and authenticated key establishment scheme based on fog computing for healthcare system.
Frontiers Comput. Sci., 2022

Improvement on a batch authenticated key agreement scheme.
Frontiers Comput. Sci., 2022

Detection of global positioning system spoofing attack on unmanned aerial vehicle system.
Concurr. Comput. Pract. Exp., 2022

An anonymous key agreement protocol with robust authentication for smart grid infrastructure.
Sci. China Inf. Sci., 2022

FedBC: An Efficient and Privacy-Preserving Federated Consensus Scheme.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2022

BS: Blockwise Sieve Algorithm for Finding Short Vectors from Sublattices.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

FedMCS: A Privacy-Preserving Mobile Crowdsensing Defense Scheme.
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022

Compressed Federated Learning Based on Adaptive Local Differential Privacy.
Proceedings of the Annual Computer Security Applications Conference, 2022

Handle the Traces: Revisiting the Attack on ECDSA with EHNP.
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022

2021
An Unlinkable Authenticated Key Agreement With Collusion Resistant for VANETs.
IEEE Trans. Veh. Technol., 2021

Perturbation-Hidden: Enhancement of Vehicular Privacy for Location-Based Services in Internet of Vehicles.
IEEE Trans. Netw. Sci. Eng., 2021

Sustainable Ensemble Learning Driving Intrusion Detection Model.
IEEE Trans. Dependable Secur. Comput., 2021

A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing.
IEEE Syst. J., 2021

Fast and Universal Inter-Slice Handover Authentication with Privacy Protection in 5G Network.
Secur. Commun. Networks, 2021

Transfer learning based intrusion detection scheme for Internet of vehicles.
Inf. Sci., 2021

Smart Applications in Edge Computing: Overview on Authentication and Data Security.
IEEE Internet Things J., 2021

Privacy-preserving multisource transfer learning in intrusion detection system.
Trans. Emerg. Telecommun. Technol., 2021

Computation offloading over multi-UAV MEC network: A distributed deep reinforcement learning approach.
Comput. Networks, 2021

An enhanced key exchange protocol exhibiting key compromise impersonation attacks resistance in mobile commerce environment.
Sci. China Inf. Sci., 2021

2020
Blockchain Enabled Trust-Based Location Privacy Protection Scheme in VANET.
IEEE Trans. Veh. Technol., 2020

Detection of Low-Frequency and Multi-Stage Attacks in Industrial Internet of Things.
IEEE Trans. Veh. Technol., 2020

Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing.
IEEE Trans. Serv. Comput., 2020

Analysis and improvement of a key exchange and authentication protocol in client-server environment.
J. Ambient Intell. Humaniz. Comput., 2020

PAPU: Pseudonym Swap With Provable Unlinkability Based on Differential Privacy in VANETs.
IEEE Internet Things J., 2020

TROVE: A Context-Awareness Trust Model for VANETs Using Reinforcement Learning.
IEEE Internet Things J., 2020

BUA: A Blockchain-based Unlinkable Authentication in VANETs.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
Real-Time Privacy-Preserving Data Release Over Vehicle Trajectory.
IEEE Trans. Veh. Technol., 2019

Blockchain-Based Mutual-Healing Group Key Distribution Scheme in Unmanned Aerial Vehicles Ad-Hoc Network.
IEEE Trans. Veh. Technol., 2019

Energy-Aware RFID Authentication in Edge Computing.
IEEE Access, 2019

Detection of GPS Spoofing Attack on Unmanned Aerial Vehicle System.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

Credible Routing Scheme of SDN-Based Cloud Using Blockchain.
Proceedings of the Data Science, 2019

Detection of Multi-Stage Attacks Based on Multi-Layer Long and Short-Term Memory Network.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
Identifying opinion leader nodes in online social networks with a new closeness evaluation algorithm.
Soft Comput., 2018

Trust-based service composition and selection in service oriented architecture.
Peer-to-Peer Netw. Appl., 2018

Practical Attribute-Based Multi-Keyword Search Scheme in Mobile Crowdsourcing.
IEEE Internet Things J., 2018

A Situational Awareness Trust Evolution Model for Mobile Devices in D2D Communication.
IEEE Access, 2018

2017
An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism.
Soft Comput., 2017

NFC Secure Payment and Verification Scheme with CS E-Ticket.
Secur. Commun. Networks, 2017

An Attribute-Based Trust Negotiation Protocol for D2D Communication in Smart City Balancing Trust and Privacy.
J. Inf. Sci. Eng., 2017

A fair data access control towards rational users in cloud storage.
Inf. Sci., 2017

Reconstruction methodology for rational secret sharing based on mechanism design.
Sci. China Inf. Sci., 2017

Efficient and Consistent Key Extraction Based on Received Signal Strength for Vehicular Ad Hoc Networks.
IEEE Access, 2017

Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

2016
DALP: A demand-aware location privacy protection scheme in continuous location-based services.
Concurr. Comput. Pract. Exp., 2016

NFC Secure Payment and Verification Scheme for Mobile Payment.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

Attack gives me power: DoS-defending constant-time privacy-preserving authentication of low-cost devices such as backscattering RFID tags.
Proceedings of the 3rd ACM Workshop on Mobile Sensing, Computing and Communication, 2016

2015
A two-factor authenticated key exchange protocol based on RSA with dynamic passwords.
Int. J. Embed. Syst., 2015

Improvement of robust smart-card-based password authentication scheme.
Int. J. Commun. Syst., 2015

A Lightweight Anonymous Authentication Protocol Using k-Pseudonym Set in Wireless Networks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
FLAP: An Efficient WLAN Initial Access Authentication Protocol.
IEEE Trans. Parallel Distributed Syst., 2014

Balancing trajectory privacy and data utility using a personalized anonymization model.
J. Netw. Comput. Appl., 2014

A demand-aware location privacy protection scheme in continuous location-based services.
Proceedings of the International Conference on Connected Vehicles and Expo, 2014

2013
An Engine for Automatic Code Generation of Security Protocols in Multiple Languages.
Smart Comput. Rev., 2013

2012
An efficient WLAN initial access authentication protocol.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Authentications and Key Management in 3G-WLAN Interworking.
Mob. Networks Appl., 2011

A USIM-Based Uniform Access Authentication Framework in Mobile Communication.
EURASIP J. Wirel. Commun. Netw., 2011

Analysis of the Authentication Protocols Based on Game Theory.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
An Efficient Authentication Protocol for WLAN Mesh Networks in Trusted Environment.
IEICE Trans. Inf. Syst., 2010

2009
UC-Secure Source Routing Protocol.
IACR Cryptol. ePrint Arch., 2009

The Development Mode of Trust E-commerce Services.
Proceedings of the 2009 IEEE International Conference on e-Business Engineering, 2009

2007
Security Analysis of the Authentication Modules of Chinese WLAN Standard and Its Implementation Plan.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2007

2006
On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
Security extension for the Canetti-Krawczyk model in identity-based systems.
Sci. China Ser. F Inf. Sci., 2005

On the Security of the Canetti-Krawczyk Model.
Proceedings of the Computational Intelligence and Security, International Conference, 2005


  Loading...